On Tuesday 24 January 2012 09:47:18 M Siddiqui wrote:
> I have a situation where two cluster nodes are connected over the VPN; each
> node
> is configured with two interfaces to provide ring redundancy for corosync:
> NODE1:
>   eth1: 192.168.1.111/24
>   eth2: 192.168.1.112/24
> NODE2:
>   eth1: 192.168.1.113/24
>   eth2: 192.168.1.114/24
> Since two nodes are geographically distributed and connected over the VPN,
> configuring each interface in a different subnet is not an option here.
> Now corosync got confused due to same subnet; how we can handle this
> situation?

Lets answer your questions with some questions:

 - Why two interfaces in the same subnet? If these interfaces are connected to 
the same switch, bonding gives you more advantages. And using two 
communication rings for corosync will give you nothing if that network fails.
 - Is that one vpn-connection between these machines? If yes, why do you want 
to use two communication-rings when both cross the same single-point-of-
failure-vpn?

Using the same subnet for two communication-rings will disturb corosync as it 
uses multicasts for communication. And that is best done with one multicast-
channel per subnet.

Have fun,

Arnold

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Pacemaker mailing list: Pacemaker@oss.clusterlabs.org
http://oss.clusterlabs.org/mailman/listinfo/pacemaker

Project Home: http://www.clusterlabs.org
Getting started: http://www.clusterlabs.org/doc/Cluster_from_Scratch.pdf
Bugs: http://bugs.clusterlabs.org

Reply via email to