[Gluster-users] Setup gluster 3.1.2 ok but probe fails
Gerry Reno
greno at verizon.net
Tue Jan 18 17:41:43 UTC 2011
On 01/18/2011 12:28 PM, Joe Landman wrote:
> On 01/18/2011 12:24 PM, Gerry Reno wrote:
>
>>> From primary to secondary:
>>
>> # telnet 10.XXX.58.95 24007
>> Trying 10.XXX.58.95...
>> telnet: Unable to connect to remote host: Connection timed out
>>
>> This doesn't make sense though because the 2 servers are both in the
>> same security group which means that they should be able to connect on
>> internal IP or internal hostname with each other on any port. Have you
>> tried 3.1.2 on ec2 yet?
>
> Dumb question. Do you have IPtables turned on?
No.
>
> What is the output of
>
> iptables -L
# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
>
> What is the output of
>
> ping -c 5 10.XXX.58.95
>
> from the other machine
On primary:
# ping -c 5 10.XXX.58.95
PING 10.XXX.58.95 (10.XXX.58.95) 56(84) bytes of data.
64 bytes from 10.XXX.58.95: icmp_seq=1 ttl=61 time=0.998 ms
64 bytes from 10.XXX.58.95: icmp_seq=2 ttl=61 time=0.632 ms
64 bytes from 10.XXX.58.95: icmp_seq=3 ttl=61 time=0.527 ms
64 bytes from 10.XXX.58.95: icmp_seq=4 ttl=61 time=0.585 ms
64 bytes from 10.XXX.58.95: icmp_seq=5 ttl=61 time=0.522 ms
>
> can you do a
>
> tcpdump -i eth0 'port 24007'
>
> on the target,
On secondary:
# tcpdump -i eth0 'port 24007'
tcpdump: verbose output suppressed, use -v or -vv for full protocol
decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
> and see if you can get anything when you telnet into that port?
On secondary:
# telnet 10.XXX.58.95 24007
Trying 10.XXX.58.95...
Connected to 10.XXX.58.95.
Escape character is '^]'.
Of course it can connect to itself.
>
> And for laughs, please try
>
> lsof -i:24007
>
On primary:
# lsof -i:24007
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
glusterd 372 root 8u IPv4 4021 0t0 TCP *:24007 (LISTEN)
More information about the Gluster-users
mailing list