Sharing the load between two Squid Servers

Posted on 2003-02-22
Medium Priority
Last Modified: 2010-03-18

I have two squid servers, one squid server is being used by all users.
My question is how can I make some user use the new squid server with out changing the proxy setting on the users PCs.
Is there some sort of way that I can share the user between these servers.
Or can I configure the new squid server to be a backup so if  the main squid server go down or the cache is full it will rediret all users to the new squid server.
I tried find information on this subject but had no joy.
I am running squid 2.5 on Redhat 7.3.

Question by:chamkila
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1

Accepted Solution

BernhardBrueck earned 300 total points
ID: 7998368
1. For load sharing you can insert multiple IP-Address into on DNS record.
e.g. "host -v www.ibm.com" shows 4 server.
Just give the second server a new ip and insert another A entry in your dns file.
2. Failover is more compilcated but possible

Hope that helps,
  Bernhard Brueck

Author Comment

ID: 7998441
Hi BernhardBrueck,

Sorry it may sound like a studip question but how do I configure this for the squid proxy server.

Expert Comment

ID: 8001158
If you use the DNS method he described, you don't need to do anything special in Squid.

You just give the same hostname to both of the Squid boxes, and use that hostname for the clients (which doesn't fulfill your above requirement of not having to touch the clients, if they're not already using that hostname).  Each of them will get a randomly-selected or rotated pick of which IP it uses.

If you want something more complex, you might want to look at this:


But probably you will be fine with the DNS method.
TCP/IP Network Protocol Cheat Sheet

TCP/IP is a set of network protocols which is best known for connecting the machines that make up the Internet. The truth is that TCP/IP is one of the oldest network protocols and its survival is mainly based on its simplicity and universality.


Expert Comment

ID: 8001230
Use the same configuration as for the first squid.
There is nothing special about that. The real work is done by the DNS server. Just use the same hostname for both of them.

Bernhard Brueck

Author Comment

ID: 8002246
But there will be a confliction between the IP address.
That will be a problem.


Expert Comment

ID: 8003219
We are talking about giving them the same *hostname*, not the same *IP address*.

Expert Comment

ID: 9077797
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
Post your closing recommendations!  No comment means you don't care.

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question