⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ipvs-sysctl.txt

📁 linux 内核源代码
💻 TXT
字号:
/proc/sys/net/ipv4/vs/* Variables:am_droprate - INTEGER        default 10        It sets the always mode drop rate, which is used in the mode 3        of the drop_rate defense.amemthresh - INTEGER        default 1024        It sets the available memory threshold (in pages), which is        used in the automatic modes of defense. When there is no        enough available memory, the respective strategy will be        enabled and the variable is automatically set to 2, otherwise        the strategy is disabled and the variable is  set  to 1.cache_bypass - BOOLEAN        0 - disabled (default)        not 0 - enabled        If it is enabled, forward packets to the original destination        directly when no cache server is available and destination        address is not local (iph->daddr is RTN_UNICAST). It is mostly        used in transparent web cache cluster.debug_level - INTEGER	0          - transmission error messages (default)	1          - non-fatal error messages	2          - configuration	3          - destination trash	4          - drop entry	5          - service lookup	6          - scheduling	7          - connection new/expire, lookup and synchronization	8          - state transition	9          - binding destination, template checks and applications	10         - IPVS packet transmission	11         - IPVS packet handling (ip_vs_in/ip_vs_out)	12 or more - packet traversal	Only available when IPVS is compiled with the CONFIG_IPVS_DEBUG	Higher debugging levels include the messages for lower debugging	levels, so setting debug level 2, includes level 0, 1 and 2	messages. Thus, logging becomes more and more verbose the higher	the level.drop_entry - INTEGER        0  - disabled (default)        The drop_entry defense is to randomly drop entries in the        connection hash table, just in order to collect back some        memory for new connections. In the current code, the        drop_entry procedure can be activated every second, then it        randomly scans 1/32 of the whole and drops entries that are in        the SYN-RECV/SYNACK state, which should be effective against        syn-flooding attack.        The valid values of drop_entry are from 0 to 3, where 0 means        that this strategy is always disabled, 1 and 2 mean automatic        modes (when there is no enough available memory, the strategy        is enabled and the variable is automatically set to 2,        otherwise the strategy is disabled and the variable is set to        1), and 3 means that that the strategy is always enabled.drop_packet - INTEGER        0  - disabled (default)        The drop_packet defense is designed to drop 1/rate packets        before forwarding them to real servers. If the rate is 1, then        drop all the incoming packets.        The value definition is the same as that of the drop_entry. In        the automatic mode, the rate is determined by the follow        formula: rate = amemthresh / (amemthresh - available_memory)        when available memory is less than the available memory        threshold. When the mode 3 is set, the always mode drop rate        is controlled by the /proc/sys/net/ipv4/vs/am_droprate.expire_nodest_conn - BOOLEAN        0 - disabled (default)        not 0 - enabled        The default value is 0, the load balancer will silently drop        packets when its destination server is not available. It may        be useful, when user-space monitoring program deletes the        destination server (because of server overload or wrong        detection) and add back the server later, and the connections        to the server can continue.        If this feature is enabled, the load balancer will expire the        connection immediately when a packet arrives and its        destination server is not available, then the client program        will be notified that the connection is closed. This is        equivalent to the feature some people requires to flush        connections when its destination is not available.expire_quiescent_template - BOOLEAN	0 - disabled (default)	not 0 - enabled	When set to a non-zero value, the load balancer will expire	persistent templates when the destination server is quiescent.	This may be useful, when a user makes a destination server	quiescent by setting its weight to 0 and it is desired that	subsequent otherwise persistent connections are sent to a	different destination server.  By default new persistent	connections are allowed to quiescent destination servers.	If this feature is enabled, the load balancer will expire the	persistence template if it is to be used to schedule a new	connection and the destination server is quiescent.nat_icmp_send - BOOLEAN        0 - disabled (default)        not 0 - enabled        It controls sending icmp error messages (ICMP_DEST_UNREACH)        for VS/NAT when the load balancer receives packets from real        servers but the connection entries don't exist.secure_tcp - INTEGER        0  - disabled (default)        The secure_tcp defense is to use a more complicated state        transition table and some possible short timeouts of each        state. In the VS/NAT, it delays the entering the ESTABLISHED        until the real server starts to send data and ACK packet        (after 3-way handshake).        The value definition is the same as that of drop_entry or        drop_packet.sync_threshold - INTEGER        default 3        It sets synchronization threshold, which is the minimum number        of incoming packets that a connection needs to receive before        the connection will be synchronized. A connection will be        synchronized, every time the number of its incoming packets        modulus 50 equals the threshold. The range of the threshold is        from 0 to 49.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -