Redhat Piranha and LVS experts,
I am running Piranha/LVS on as NAT router for a set of
servers serving up smtp and https requests. We use
Silkymail + Apache for WEBMAIL on https port 443. To
make that work, I use PERSISTSANCE = 1 in the lvs.cf
file so that the user gets to the webpage, then types
in his id/pw and gets authenticated through the same
server it first connected to.... In general, seeing we
have thousands of people using it and anywhere from
20-140 inactive connections open at any time with
several actives, this has been working EXCELLENTLY.
Problem is we have a few people complaining they get
kicked out of the secure https connection somewhat
randomly, whereas other times all is well. I've
testing myself, opening a webmail connection for over
an hour, then finishing an email and sending it no
Do you think INCREASING THE PERSISTANCE TIMEOUT would
fix this? I don't know that the PERSISTANCE=1 or
whatever value in lvs.cf actually matches the -p
timeout value for ipvadm , so please be specific in
how to increase the time out in lvs.cf and/or ipvsadm.
Do You Yahoo!?
Yahoo! Games - play chess, backgammon, pool and more