文章目录
Keepalived介绍
Keepalived工具介绍
专为LVS和HA设计的一款健康检查工具
- 支持故障自动切换(Failover)
- 支持节点健康状态检查(Health Checking)
Keepalived实现原理剖析
1:Keepalived采用VRRP热备份协议实现Linux服务器的多机热备功能
2:VRRP(虚拟路由冗余协议)是针对路由器的一种备份解决方案
- 由多台路由器组成一个热备组,通过共用的虚拟IP地址对外提供服务
- 每个热备组内同时只有一台主路由器提供服务,其他路由器处于冗余状态
- 若当前在线的路由器失效,则其他路由器会根据设置的优先级自动接替虚拟IP地址,继续提供服务
Keepalived安装与启动
- 在LVS群集环境中应用时,也需用到ipvsadm管理工具
- YUM安装Keepalived
- 启用Keepalived服务
配置Keepalived master服务器
1:Keepalived配置目录位于/etcIlkeepalived/
2:keepalived.conf提主配置文件
- global_defs {…}区段指定全局参数
- vrrp_instance 实例名称{…}区段指定VRRP热备参数
- 注释文字以"!特号开头
- 目录samples,提供了许多配置样例作为参考
3:常用配置选项
- router id HATEST_R1:本路由器(服务器)的名称
- vrrp_instance VI_1:定义VRRP热备实例
- state MASTER:热备状态,MASTER表示主服务器
- interface ens33:承载VIP地址的物理接口
- virtual_router_id 1:虚拟路由器的ID号,每个热备组保持—致
- priority 100:优先级,数值越大优先级越高
- advert_int 1:通告间隔秒数(心跳频率)
- auth_type PASS:认证类型
- auth pass 123456:密码字串
- virtual_ipaddress { vip}:指定漂移地址(VIP),可以有多个
配置Keepalived slave服务器
Keepalived备份服务器的配置与imaster的配置有三个选项不同
- router_id:设为自有名称
- state:设为BACKUP
- priority:值低于主服务器
其他选项与master相同
部署LVS-keepalived
部署环境
- 20.0.0.10 lvs01+keepalive(主)
- 20.0.0.11 lvs02+keepalive(备)
- 20.0.0.12 web1
- 20.0.0.13 web2
- 20.0.0.14 nfs
- 20.0.0.15 client
具体步骤
1:nfs 配置
创建目录并准备测试内容
[root@nfs ~]# mkdir /web1
[root@nfs ~]# mkdir /web2
[root@nfs ~]# echo "<h1>this is my server1.</h1>" > /web1/index.html
[root@nfs ~]# echo "<h1>this is my server2.</h1>" > /web2/index.html
检查nfs所需软件是否安装
[root@nfs ~]# rpm -qa | grep nfs-utils
nfs-utils-1.3.0-0.48.el7.x86_64
[root@nfs ~]# rpm -qa | grep rpcbind
rpcbind-0.2.0-42.el7.x86_64
设置共享目录
[root@nfs ~]# vi /etc/exports
/web1 20.0.0.12 (ro)
/web2 20.0.0.13 (ro)
开启服务
[root@nfs ~]# systemctl start nfs
[root@nfs ~]# systemctl start rpcbind
自检查看
[root@nfs ~]# showmount -e
Export list for nfs:
/web2 (everyone)
/web1 (everyone)
2:web1 和 web2 配置
安装软件
[root@web1 ~]# yum -y install httpd
[root@web2 ~]# yum -y install httpd
挂载重启服务并查看
[root@web1 ~]# mount 20.0.0.14:/web1 /var/www/html/
[root@web1 ~]# systemctl start httpd
[root@web1 ~]# showmount -e 20.0.0.14
Export list for 20.0.0.14:
/web2 (everyone)
/web1 (everyone)
[root@web1 ~]# curl http://localhost
<h1>this is my server1.</h1
[root@web2 ~]# mount 20.0.0.14:/web2 /var/www/html/
[root@web2 ~]# systemctl start httpd
[root@web2 ~]# showmount -e 20.0.0.14
Export list for 20.0.0.14:
/web2 (everyone)
/web1 (everyone)
[root@web2 ~]# curl http://localhost
<h1>this is my server2.</h1>
DR模式需要编写脚本
web1
[root@web1 ~]# vi web1.sh
#!/bin/bash
# lvs_dr web1
ifconfig lo:0 20.0.0.200 broadcast 20.0.0.200 netmask 255.255.255.255 up
route add -host 20.0.0.200 dev lo:0
echo "1" > /proc/sys/net/ipv4/conf/lo/arp_ignore
echo "1" > /proc/sys/net/ipv4/conf/all/arp_ignore
echo "2" > /proc/sys/net/ipv4/conf/lo/arp_announce
echo "2" > /proc/sys/net/ipv4/conf/all/arp_announce
sysctl -p &> /dev/null
web2
[root@web2 ~]# vi web2.sh
#!/bin/bash
# lvs_dr web2
ifconfig lo:0 20.0.0.200 broadcast 20.0.0.200 netmask 255.255.255.255 up
route add -host 20.0.0.200 dev lo:0
echo "1" > /proc/sys/net/ipv4/conf/lo/arp_ignore
echo "1" > /proc/sys/net/ipv4/conf/all/arp_ignore
echo "2" > /proc/sys/net/ipv4/conf/lo/arp_announce
echo "2" > /proc/sys/net/ipv4/conf/all/arp_announce
sysctl -p &> /dev/null
执行脚本验证
web1
[root@web1 ~]# sh web1.sh
[root@web1 ~]# ifconfig
lo:0: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 20.0.0.200 netmask 255.255.255.255
loop txqueuelen 1 (Local Loopback)
[root@web1 ~]# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 20.0.0.2 0.0.0.0 UG 100 0 0 ens33
20.0.0.0 0.0.0.0 255.255.255.0 U 100 0 0 ens33
20.0.0.200 0.0.0.0 255.255.255.255 UH 0 0 0 lo
192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0
web2
[root@web2 ~]# sh web2.sh
[root@web2 ~]# ifconfig
lo:0: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 20.0.0.200 netmask 255.255.255.255
loop txqueuelen 1 (Local Loopback)
[root@web2 ~]# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 20.0.0.2 0.0.0.0 UG 100 0 0 ens33
20.0.0.0 0.0.0.0 255.255.255.0 U 100 0 0 ens33
20.0.0.200 0.0.0.0 255.255.255.255 UH 0 0 0 lo
192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0
3:调度器配置
手动加载 ip_vs 模块
[root@lvs01 ~]# modprobe ip_vs
[root@lvs01 ~]# cat /proc/net/ip_vs
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
[root@lvs02 ~]# modprobe ip_vs
[root@lvs02 ~]# cat /proc/net/ip_vs
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
安装 lvs 群集管理工具
[root@lvs01 ~]# yum -y install ipvsadm
[root@lvs02 ~]# yum -y install ipvsadm
安装所需依赖包
[root@lvs01 ~]# yum -y install gcc gcc-c++ make popt-devel kernel-devel openssl-devel
[root@lvs02 ~]# yum -y install gcc gcc-c++ make popt-devel kernel-devel openssl-devel
编译安装 keepalived
[root@lvs01 ~]# tar zxvf keepalived-2.0.13.tar.gz
[root@lvs01 ~]# cd keepalived-2.0.13/
[root@lvs01 keepalived-2.0.13]# ./configure --prefix=/
[root@lvs01 keepalived-2.0.13]# make && make install
[root@server1 keepalived-2.0.13]# cd keepalived/
[root@server1 keepalived]# cd etc/init.d/
[root@lvs01 init.d]# cp keepalived /etc/init.d/
[root@lvs02 ~]# tar zxvf keepalived-2.0.13.tar.gz
[root@lvs02 ~]# cd keepalived-2.0.13/
[root@lvs02 keepalived-2.0.13]# ./configure --pxefix=/
[root@lvs02 keepalived-2.0.13]# make && make install
[root@lvs02 keepalived-2.0.13]# cp keepalived/etc/init.d/keepalived /etc/init.d/
主调度器的配置
1:全局配置、热备配置
首先应为主、从调度器实现热备功能,漂移地址使用 LVS 群集的 VIP 地址
[root@lvs01 ~]# vi /etc/keepalived/keepalived.conf #进去之后全部删除,保留第一条,重新编辑
global_defs {
router_id lvs_01 #本路由器(服务器的名称)
}
vrrp_instance vi_1 { #定义VRRP热备实例
state MASTER #热备状态,MASTER 表示主服务器
interface ens33 #承载 VIP 地址的物理接口
virtual_router_id 10 #虚拟路由器的 ID 号,每个热备组保持一致
priority 110 #优先级,数值越大优先级越高
advert int 1 #通告间隔秒数(心跳频率)
authentication { #认证信息,每个热备组保持一致
auth_type PASS #认证类型
auth_pass 6666 #密码字串
}
virtual_ipaddress { #指定漂移地址(VIP),可以有多个
20.0.0.200
}
}
2:Web 服务器池配置
在 Keepalived 的热备配置基础上,添加 “virtual_server VIP 端口 { …} ” 区段来配置虚拟服务器,主要包括对负载调度算法、群集工作模式、健康检查间隔、真实服务器地址等参数的设置
接上面继续配置
virtual_server 20.0.0.200 80 { #虚拟服务器地址(VIP)、端口
delay_loop 6 #健康检查的间隔时间(秒)
lb_algo rr #轮询(rr)调度算法
lb_kind DR #直接路由(DR)群集工作模式
persistence_timeout 6 #连接保持时间
protocol TCP #应用服务采用的是 TCP 协议
real_server 20.0.0.12 80 { #第一个 Web 节点的地址、端口
weight 1 #节点的权重
TCP_CHECK { #健康检查方式
connect_port 80 #检查的目标端口
connect_timeout 3 #连接超时(秒)
nb_get_retry 3 #重试次数
delay_before_retry 3 #重试间隔(秒)
}
}
real_server 20.0.0.13 80 { #第二个 Web 节点的地址、端口
weight 1
TCP_CHECK {
connect_port 80
connect_timeout 3
nb_get_retry 3
delay_before_retry 3
}
}
}
[root@lvs01 ~]# systemctl stop keepalived.service
[root@lvs01 ~]# systemctl start keepalived.service
[root@lvs01 ~]# ip addr
inet 20.0.0.200/32 scope global ens33
valid_lft forever preferred_lft forever
查看 LVS 虚拟服务器
[root@lvs01 ~]# ipvsadm -Ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 20.0.0.200:80 rr persistent 6
-> 20.0.0.12:80 Route 1 0 0
-> 20.0.0.13:80 Route 1 0 0
备调度器的配置
1:通过免密方式将lvs01 /etc/keepalived/keepalived.conf 配置文件发送给 lvs02
[root@lvs01 ~]# ssh-keygen -t rsa
[root@lvs01 ~]# ssh-copy-id 20.0.0.11
[root@lvs01 ~]# scp /etc/keepalived/keepalived.conf root@20.0.0.11:/etc/keepalived/
2:查看lvs02的配置文件
原配置文件已被覆盖,进行修改
[root@lvs02 ~]# vi /etc/keepalived/keepalived.conf
! Configuration File for keepalived
global_defs {
router_id lvs_02
}
vrrp_instance vi_1 {
state BACKUP
interface ens33
virtual_router_id 10
priority 105
advert int 1
authentication {
auth_type PASS
auth_pass 6666
}
virtual_ipaddress {
20.0.0.200
}
}
virtual_server 20.0.0.200 80 {
delay_loop 6
lb_algo rr
lb_kind DR
persistence_timeout 6
protocol TCP
real_server 20.0.0.12 80 {
weight 1
delay_loop 6
lb_algo rr
lb_kind DR
persistence_timeout 6
protocol TCP
rver 20.0.0.13 80 {
weight 1
TCP_CHECK {
connect_port 80
connect_timeout 3
nb_get_retry 3
delay_before_retry 3
}
}
}
[root@lvs02 ~]# systemctl start keepalived.service
查看 LVS 虚拟服务器
[root@lvs02 ~]# ip addr #此时没有虚拟地址
[root@lvs02 ~]# ipvsadm -Ln #LVS 调度正常
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 20.0.0.200:80 rr persistent 6
-> 20.0.0.12:80 Route 1 0 0
-> 20.0.0.13:80 Route 1 0 0
客户机服务测试
[root@lvs01 ~]# ipvsadm -Ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 20.0.0.200:80 rr persistent 6
-> 20.0.0.12:80 Route 1 0 0
-> 20.0.0.13:80 Route 1 1 1
[root@lvs01 ~]# ipvsadm -Lnc
IPVS connection entries
pro expire state source virtual destination
TCP 00:53 NONE 20.0.0.1:0 20.0.0.200:80 20.0.0.13:80
TCP 01:58 FIN_WAIT 20.0.0.1:58794 20.0.0.200:80 20.0.0.13:80
TCP 00:52 FIN_WAIT 20.0.0.1:58793 20.0.0.200:80 20.0.0.13:80
[root@lvs01 ~]# ipvsadm -Lnc
IPVS connection entries
pro expire state source virtual destination
TCP 14:47 ESTABLISHED 20.0.0.1:58954 20.0.0.200:80 20.0.0.12:80
TCP 00:42 NONE 20.0.0.200:0 20.0.0.200:80 20.0.0.12:80
TCP 14:41 ESTABLISHED 20.0.0.1:58955 20.0.0.200:80 20.0.0.12:80
TCP 01:42 FIN_WAIT 20.0.0.15:40574 20.0.0.200:80 20.0.0.13:80
TCP 00:45 NONE 20.0.0.1:0 20.0.0.200:80 20.0.0.12:80
TCP 01:37 FIN_WAIT 20.0.0.15:40572 20.0.0.200:80 20.0.0.13:80
TCP 00:43 NONE 20.0.0.15:0 20.0.0.200:80 20.0.0.13:80
TCP 01:37 FIN_WAIT 20.0.0.15:40570 20.0.0.200:80 20.0.0.13:80
将 lvs01 服务停掉测试
[root@lvs01 ~]# systemctl stop keepalived.service
查看虚拟地址状态
[root@lvs02 ~]# ip addr
inet 20.0.0.200/32 scope global ens33
valid_lft forever preferred_lft forever
查看 lvs02 日志文件
[root@lvs02 ~]# tail -f /var/log/messages #出现下面的表示已经成为主服务器
Dec 9 19:57:57 localhost Keepalived_vrrp[60352]: Sending gratuitous ARP on ens33 for 20.0.0.200
Dec 9 19:57:57 localhost Keepalived_vrrp[60352]: Sending gratuitous ARP on ens33 for 20.0.0.200
Dec 9 19:57:57 localhost Keepalived_vrrp[60352]: Sending gratuitous ARP on ens33 for 20.0.0.200
Dec 9 19:57:57 localhost avahi-daemon[600]: Registering new address record for 20.0.0.200 on ens33.IPv4.
再次访问测试
[root@lvs02 ~]# ipvsadm -Ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 20.0.0.200:80 rr persistent 6
-> 20.0.0.12:80 Route 1 0 1
-> 20.0.0.13:80 Route 1 1 3
[root@lvs02 ~]# ipvsadm -Lnc
IPVS connection entries
pro expire state source virtual destination
TCP 01:19 FIN_WAIT 20.0.0.1:59026 20.0.0.200:80 20.0.0.13:80
TCP 00:45 FIN_WAIT 20.0.0.1:59016 20.0.0.200:80 20.0.0.13:80
TCP 00:10 NONE 20.0.0.1:0 20.0.0.200:80 20.0.0.13:80
TCP 01:10 FIN_WAIT 20.0.0.1:59017 20.0.0.200:80 20.0.0.13:80
TCP 01:12 FIN_WAIT 20.0.0.15:40590 20.0.0.200:80 20.0.0.12:80
TCP 14:57 ESTABLISHED 20.0.0.1:59030 20.0.0.200:80 20.0.0.13:80
TCP 00:13 NONE 20.0.0.15:0 20.0.0.200:80 20.0.0.12:80
将 web1 或 web2 其中一个停掉测试
[root@web2 ~]# systemctl stop httpd #显示 20.0.0.13 已关闭
Dec 9 20:04:51 localhost Keepalived_healthcheckers[60351]: Check on service [20.0.0.13]:tcp:80 failed after 1 retries.
Dec 9 20:04:51 localhost Keepalived_healthcheckers[60351]: Removing service [20.0.0.13]:tcp:80 to VS [20.0.0.200]:tcp:80
此时客户机访问
只能访问一个
[root@lvs02 ~]# ipvsadm -Ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 20.0.0.200:80 rr persistent 6
-> 20.0.0.12:80 Route 1 2 0
[root@lvs02 ~]# ipvsadm -Lnc
IPVS connection entries
pro expire state source virtual destination
TCP 14:56 ESTABLISHED 20.0.0.1:59105 20.0.0.200:80 20.0.0.12:80
TCP 14:47 ESTABLISHED 20.0.0.1:59112 20.0.0.200:80 20.0.0.12:80
TCP 14:10 ESTABLISHED 20.0.0.1:59089 20.0.0.200:80 20.0.0.12:80
TCP 00:47 NONE 20.0.0.1:0 20.0.0.200:80 20.0.0.12:80
重新将 lvs01 开启并查看状态
[root@lvs01 ~]# systemctl start keepalived.service
[root@lvs01 ~]# tail -f /var/log/messages #表示已变成主服务器
Dec 9 20:12:13 localhost Keepalived_vrrp[60827]: Sending gratuitous ARP on ens33 for 20.0.0.200
Dec 9 20:12:13 localhost Keepalived_vrrp[60827]: (vi_1) Sending/queueing gratuitous ARPs on ens33 for 20.0.0.200
Dec 9 20:12:13 localhost Keepalived_vrrp[60827]: Sending gratuitous ARP on ens33 for 20.0.0.200
Dec 9 20:12:13 localhost Keepalived_vrrp[60827]: Sending gratuitous ARP on ens33 for 20.0.0.200
Dec 9 20:12:13 localhost Keepalived_vrrp[60827]: Sending gratuitous ARP on ens33 for 20.0.0.200
Dec 9 20:12:13 localhost Keepalived_vrrp[60827]: Sending gratuitous ARP on ens33 for 20.0.0.200
[root@lvs01 ~]# ip addr #虚拟地址已变回来
inet 20.0.0.200/32 scope global ens33
valid_lft forever preferred_lft forever
[root@lvs02 ~]# ip addr #地址已消失
2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
link/ether 00:0c:29:49:77:39 brd ff:ff:ff:ff:ff:ff
inet 20.0.0.11/24 brd 20.0.0.255 scope global ens33
valid_lft forever preferred_lft forever
inet6 fe80::5cbb:1621:4281:3b24/64 scope link
valid_lft forever preferred_lft forever
访问测试
[root@lvs01 ~]# ipvsadm -Ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 20.0.0.200:80 rr persistent 6
-> 20.0.0.12:80 Route 1 2 0
将 web2 开启测试
[root@web2 ~]# systemctl start httpd
[root@lvs01 ~]# ipvsadm -Ln
IP Virtual Server version 1.2.1 (size=4096)
Prot LocalAddress:Port Scheduler Flags
-> RemoteAddress:Port Forward Weight ActiveConn InActConn
TCP 20.0.0.200:80 rr persistent 6
-> 20.0.0.12:80 Route 1 2 3
-> 20.0.0.13:80 Route 1 0 1