当前位置:网站首页>Briefly describe the working principle of kept
Briefly describe the working principle of kept
2022-07-07 15:07:00 【wwzroom】
sketch keepalived working principle
keepalived The principle is vrrp The principle and lvs Combination of principles
vrrp The software implementation of the protocol , The purpose of native design is high availability ipvs service
Official website :http://keepalived.org/
function :
- be based on vrrp The protocol completes the address flow
- by vip The node where the address is located generates ipvs The rules ( Predefined in the configuration file )
- by ipvs Each part of the cluster RS Do health tests ( Check the health by visiting the specified page and returning the results )
- Call the interface based on the script to complete the functions defined in the script , This in turn affects cluster transactions .
- Support nginx、haproxy Etc
1.VRRP Network layer hardware implementation
Access to the external network within the enterprise is realized through the router , To prevent router problems , So we need two routers , But two routers ip And gateway are different , Virtualize two routers into the same ip(vip) And gateway , Let the gateway of the client point to the new gateway , Only run on one router at a time , Float at different times , To avoid conflict . When one goes wrong ,vip Will immediately float to another machine , Ensure continuous Internet access .
vrrp The working host wants to know the situation of the other host at the first time , Through the establishment of heartbeat line communication , Free for adoption arp The way to inform the other party of their working status , The working host sends free arp,( You can broadcast , It can also be unicast ), The purpose is to tell yourself that you have vip, And tell yourself your priorities , The standby node receives the message and compares it with its own priority , Your priority is lower than the working node , I don't work myself , When you can't receive free arp, Or the priority of the working node is lower than itself , Work will start from the node , At this point, get from the node vip Work on .
Firewall strategy can be used to destroy each other's heart jumpers , Because I can't receive free arp, At this point, both hosts will get vip, There will be brain cracking , If there is a brain crack , The first thing is to turn off a host keepalived service , Ensure that the service can work normally , Then find out the reason for maintenance .
2.Keepalived The structure and use of lvs Rules work
Official documents : https://keepalived.org/doc/
http://keepalived.org/documentation.html
User space core components :
vrrp stack:VIP The announcement
checkers: monitoring real server
system call: Realization vrrp The function of calling script during protocol state transition
SMTP: Mail component
IPVS wrapper: Generate IPVS The rules Netlink Reflector: Network interface WatchDog: Monitor progressControl components : Provide keepalived.conf The parser , complete Keepalived To configure
IO Multiplexer : Its own thread abstraction optimized for network purposes
Memory management components : For some general memory management functions ( Such as distribution , Redistribution , Release etc. ) Provide access
keepalived It is divided into kernel space and user space ,ipvs yes lvs Core components , adopt IPVS wrapper Component handle lvs Rule passed keepalived write in lvs Kernel space , control lvs The scheduling strategy of ,lvs Cooperation in production keepalived The use of ,netlink reflector Component implementation vip The strategy of ,VRRP Stack Realization vip float .Checkers Achieve health check , Enriched lvs The missing function of ,Keepalived The emergence of is to make up lvs Deficiency , Achieve high availability in production .SMTP It is a mail alarm service .Keepalive And nginx Cooperate , because nginx The primary and standby relationship between agents cannot be checked for health and shared , adopt Keepalived Realization . High availability of agents depends on keepalived Realization .
边栏推荐
- How does the database perform dynamic custom sorting?
- Navigation - are you sure you want to take a look at such an easy-to-use navigation framework?
- 激光雷達lidar知識點滴
- Niuke real problem programming - Day9
- 8大模块、40个思维模型,打破思维桎梏,满足你工作不同阶段、场景的思维需求,赶紧收藏慢慢学
- Electronic remote error
- JSON parsing instance (QT including source code)
- CTFshow,信息搜集:web7
- [Data Mining] Visual Pattern Mining: Hog Feature + cosinus Similarity / K - means Clustering
- Niuke real problem programming - day14
猜你喜欢
Webrtc audio anti weak network technology (Part 1)
Ctfshow, information collection: web6
Yyds dry goods inventory # solve the real problem of famous enterprises: cross line
With 8 modules and 40 thinking models, you can break the shackles of thinking and meet the thinking needs of different stages and scenes of your work. Collect it quickly and learn it slowly
CTFshow,信息搜集:web14
Niuke real problem programming - Day11
【目标检测】YOLOv5跑通VOC2007数据集
Infinite innovation in cloud "vision" | the 2022 Alibaba cloud live summit was officially launched
"July 2022" Wukong editor update record
[understanding of opportunity -40]: direction, rules, choice, effort, fairness, cognition, ability, action, read the five layers of perception of 3GPP 6G white paper
随机推荐
What is the process of ⼀ objects from loading into JVM to being cleared by GC?
防火墙基础之服务器区的防护策略
Find your own value
Pandora IOT development board learning (HAL Library) - Experiment 12 RTC real-time clock experiment (learning notes)
2022年5月互联网医疗领域月度观察
Es log error appreciation -- allow delete
Ffmpeg --- image processing
A laravel background management expansion package you can't miss - Voyager
Ctfshow, information collection: web4
Bits and Information & integer notes
Unity之ASE实现卡通火焰
Apache多个组件漏洞公开(CVE-2022-32533/CVE-2022-33980/CVE-2021-37839)
激光雷达lidar知识点滴
【深度学习】图像超分实验:SRCNN/FSRCNN
[server data recovery] data recovery case of raid failure of a Dell server
Several ways of JS jump link
知否|两大风控最重要指标与客群好坏的关系分析
MySQL installation configuration 2021 in Windows Environment
6. Electron borderless window and transparent window lock mode setting window icon
缓冲区溢出保护