-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Separate fastd instance for inter-gateway traffic #112
Comments
I like the idea, we should implement support for multiple fastd instances per community at first and also add an concept so that these instances share their peers directory. The later can be implemented After we have such concept, the topic of this issue is just a matter of minor changes and configuration in the gateway manifest. |
Couldn't we simply implement a few lines in the |
mh yes we could think about something like that. the idea is not bad. 2015-04-28 9:51 GMT+02:00 Hendrik Lüth [email protected]:
|
I like the idea of having all the gateway or backbone-fastd keys in on repo, so they are visible to the outside or much easier to maintain. |
And if we would have an extra fastd instance for the inter-gateway traffic, we could easily cut all clients from one gateway in maintenance mode by disabling the client fastd-instance. Without special fastd instance I would add this to
What is the drawback of this method? Or maybe we should add a line in the fastd.config that limits the number of peers to the number of gateways instead, for example:
|
#128 adds a second fastd instance for inter-gateway traffic |
#200 is another attempt |
I would likle to have this as a feature to separate the user- from the gateway-connections.
advantages: monitoring of inter-gateway traffic, which is otherwise not distinguishable from gateway-node traffic. high load from user traffic does not influence the inter-gateway traffic (important e.g. for ipv6 uplink which not every gateway offers).
this would include a separate backbone key repository, so that node and gateway keys are separated. otherwise the cron script updating the keys would have to sort them in regard to node or gateways keys, which would be a little hacky from my point of view.
The text was updated successfully, but these errors were encountered: