Adding a Virtual IP to an Existing Instance
Add a virtual IP
Browse the ALOHA WUI.
Open the Services tab.
Scroll down to the network interface you want to configure.
Click Setup .
Add a new vrrp address directive to add a new VIP in an existing instance: vrrp inst default address 192.168.1.21(the new virtual IP).
The configuration should look like below:
service network eth0 ip address 192.168.1.12/24 ip route default 192.168.1.1 vrrp inst default id 110 vrrp inst default garp 30 vrrp inst default prio 100 vrrp inst default address 192.168.1.20 vrrp inst default address 192.168.1.21 vrrp inst default password aloha vrrp inst default no-address
Click Close. The line corresponding to the VRRP daemon now appears in orange with the flag Need restart.
Click Restart .
In case of a problem:
Check for duplicate IPs
Detect duplicated IPs
To troubleshoot duplicated IPs, you can use the ARP who-has diagnostic tool.
This tool checks if the MAC address associated with the IP address is the one expected or not:
If yes, the problem may be on an upper layer
If not, the MAC address of the server has the duplicated IP
Capture VRRP packets
You can use the capture diagnostic tool for this purpose.
To capture VRRP traffic, use vrrp as <filter> and choose an interface:
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 14:12:27.936839 00:0c:49:65:47:0e > ... , proto VRRP (112), 10.9.104.253 > 184.108.40.206, ... , vrid 30, prio 35, ... , addrs: ... 14:12:28.250381 00:0c:59:20:c7:f6 > ... , proto VRRP (112), 10.9.104.241 > 220.127.116.11, ... , vrid 166, prio 133, ... , addrs: ... 14:12:28.460930 00:0d:b9:18:b9:74 > ... , proto VRRP (112), 10.9.104.253 > 18.104.22.168, ... , vrid 55, prio 70, ... , addrs: ... 14:12:28.939831 00:0c:49:65:47:0e > ... , proto VRRP (112), 10.9.104.253 > 22.214.171.124, ... , vrid 30, prio 35, ... , addrs: ... 14:12:28.250381 00:0c:59:20:c7:f6 > ... , proto VRRP (112), 10.9.104.241 > 126.96.36.199, ... , vrid 166, prio 133, ... , addrs: ... 5 packets captured 0 packets received by filter 0 packets dropped by kernel
Using the capture diagnostic tool, you can get the following information:
Source MAC and IP address
Next upSetting VRRP Priority