Red Hat CLUSTER SUITE - CONFIGURING AND MANAGING A CLUSTER 2006 Installation Guide Page 37

  • Download
  • Add to my manuals
  • Print
  • Page
    / 74
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 36
Chapter 1. Red Hat Cluster Suite Overview 27
of the active LVS router. During failover, the backup LVS router takes over the VIP ad-
dresses serviced by the failed router using a technique known as ARP spoofing where
the backup LVS router announces itself as the destination for IP packets addressed to the
failed node. When the failed node returns to active service, the backup LVS router assumes
its backup role again.
The simple, two-tier configuration in Figure 1-20 is suited best for clusters serving data
that does not change very frequently — such as static web pages — because the individual
real servers do not automatically synchronize data among themselves.
1.8.2. Three-Tier LVS Topology
Figure 1-21 shows a typical three-tier LVS configuration. In the example, the active LVS
router routes the requests from the public network (Internet) to the second tier real
servers. Each real server then accesses a shared data source of a Red Hat cluster in the
third tier over the private network.
Page view 36
1 2 ... 32 33 34 35 36 37 38 39 40 41 42 ... 73 74

Comments to this Manuals

No comments