Solved

Linux Virtual Server - LVS Cluster - NAT

Posted on 2011-02-19
4
795 Views
Last Modified: 2013-11-08
Hello Everyone:

We have used F5 Networks load balancing solutions for some time within our company.  Two years ago, we decided to implement our own lvs cluster of http servers.  Everything is working fairly well, nodes are appropriately load balanced according to lvs-nat scheduling.

Today, I was reviewing normal system activities, inspecting routing configurations and looking at traffic on each of the real servers.  I observed the following and was wondering if it was normal on lvs clusters.  

This information was captured from the node 192.168.1.43

38.101.148.126:55885  192.168.1.43:80       ESTABLISHED  268m   0 B/s


It seems like the kernel, is allowing connections to stay in the ESTABLISHED state for entirely too long.  Ideas on what to check?  I've watched the TCP session off and on for the last hour or so and I have not observed any traffic through the ESTABLISHED connection.  Why isn't it terminating???  Not too sure on what direction to look on this one.  
0
Comment
Question by:christopherdonahue
  • 2
  • 2
4 Comments
 

Author Comment

by:christopherdonahue
ID: 34936852
Increased to 500 points on this issue.
0
 
LVL 34

Expert Comment

by:Duncan Roe
ID: 34946348
If the connection is ESTABLISHED, neither end has closed. That's between applications. There is not normally any time out when this happens.
0
 

Author Comment

by:christopherdonahue
ID: 35073673
Interesting, any ideas why the connection would be held open but, while watching activity on the connection, nothing is being transferred?

0
 
LVL 34

Accepted Solution

by:
Duncan Roe earned 500 total points
ID: 35074128
It's down to the application software. Not serious usually. It may even be intended to work that way
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In order for businesses to be compliant with certain information security laws in some countries, you need to be able to prove that a user (which user it was becomes important to the business to take action against the user after an event has occurr…
Users are often faced with high disk consumption without really knowing where the largest amount of data resides. Disk Usage Analyzer (aka Baobab) is is a graphical, menu-driven application to analyse disk usage in any Gnome environment and can e…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now