summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPaul Buetow <paul@buetow.org>2026-02-05 12:04:06 +0200
committerPaul Buetow <paul@buetow.org>2026-02-05 12:13:08 +0200
commitc50b338cda40cfcd400db5279a3564a8804edd2e (patch)
tree5992e57fd46da6bae1c02168cb092c571165f7f3
parente7665c384557096338ccbb58caba4022f6f74946 (diff)
Remove CARP failover testing section from LAN ingress
Removed the detailed CARP failover testing section including failover/failback test commands and results. The section was too detailed for the blog post scope.
-rw-r--r--gemfeed/2025-12-07-f3s-kubernetes-with-freebsd-part-8.gmi.tpl37
1 files changed, 0 insertions, 37 deletions
diff --git a/gemfeed/2025-12-07-f3s-kubernetes-with-freebsd-part-8.gmi.tpl b/gemfeed/2025-12-07-f3s-kubernetes-with-freebsd-part-8.gmi.tpl
index 4011e017..c69e6d39 100644
--- a/gemfeed/2025-12-07-f3s-kubernetes-with-freebsd-part-8.gmi.tpl
+++ b/gemfeed/2025-12-07-f3s-kubernetes-with-freebsd-part-8.gmi.tpl
@@ -407,43 +407,6 @@ $ sudo update-ca-trust
After trusting the CA, browsers will accept the LAN certificates without warnings.
-*CARP failover testing*:
-
-The CARP + relayd architecture provides high availability with automatic failover. Testing confirmed zero-downtime operation:
-
-**Failover test (f0 → f1):**
-```sh
-# Demote f0 to BACKUP, promote f1 to MASTER
-$ ssh f0 'doas ifconfig re0 vhid 1 advskew 200'
-$ ssh f1 'doas ifconfig re0 vhid 1 advskew 0 state master'
-
-# Service tests: 10/10 requests successful (HTTP 302)
-$ for i in {1..10}; do curl -k https://grafana.f3s.lan.foo.zone \
- -s -o /dev/null -w "Test $i: %{http_code}\n"; sleep 0.5; done
-Test 1: 302 ✓
-Test 2: 302 ✓
-...
-Test 10: 302 ✓
-```
-
-**Failback test (f1 → f0):**
-```sh
-# Restore f0 as MASTER
-$ ssh f0 'doas ifconfig re0 vhid 1 advskew 0 state master'
-$ ssh f1 'doas ifconfig re0 vhid 1 advskew 100'
-
-# Service tests: 10/10 requests successful (HTTP 302)
-```
-
-Results:
-
-* Failover time: ~3 seconds
-* Packet loss: 0/20 requests
-* Service availability: 100%
-* TLS certificate: Maintained (Traefik handles TLS)
-
-The architecture successfully provides high availability for LAN services without requiring MetalLB or complex load balancer setups.
-
*Scaling to other services*:
The same pattern can be applied to any service. To add LAN access: