Submit Search
Upload
Linux에서 Secondary VNIC와 Secondary Private IP 추가 방법
•
0 likes
•
348 views
J
JC Park
Follow
Oracle Cloud Compute상의 Linux OS에서 Secondary VNIC와 Secondary Private IP 추가 방법
Read less
Read more
Technology
Report
Share
Report
Share
1 of 17
Download now
Download to read offline
Recommended
Windows에서 Secondary VNIC와 Secondary Private IP 추가 방법
Windows에서 Secondary VNIC와 Secondary Private IP 추가 방법
JC Park
OCI Database Management 설정 방법
OCI Database Management 설정 방법
JC Park
eBPF in the view of a storage developer
eBPF in the view of a storage developer
Richárd Kovács
What's Coming In CloudStack 4.18
What's Coming In CloudStack 4.18
ShapeBlue
Routed Provider Networks on OpenStack
Routed Provider Networks on OpenStack
Romana Project
Oracle Cloud에서 Open VPN 설치 및 이용 방법
Oracle Cloud에서 Open VPN 설치 및 이용 방법
JC Park
今さら聞けない! Active Directoryドメインサービス入門
今さら聞けない! Active Directoryドメインサービス入門
Tetsuya Yokoyama
Load Balance with NSX-T.pptx
Load Balance with NSX-T.pptx
Dhruv Sharma
Recommended
Windows에서 Secondary VNIC와 Secondary Private IP 추가 방법
Windows에서 Secondary VNIC와 Secondary Private IP 추가 방법
JC Park
OCI Database Management 설정 방법
OCI Database Management 설정 방법
JC Park
eBPF in the view of a storage developer
eBPF in the view of a storage developer
Richárd Kovács
What's Coming In CloudStack 4.18
What's Coming In CloudStack 4.18
ShapeBlue
Routed Provider Networks on OpenStack
Routed Provider Networks on OpenStack
Romana Project
Oracle Cloud에서 Open VPN 설치 및 이용 방법
Oracle Cloud에서 Open VPN 설치 및 이용 방법
JC Park
今さら聞けない! Active Directoryドメインサービス入門
今さら聞けない! Active Directoryドメインサービス入門
Tetsuya Yokoyama
Load Balance with NSX-T.pptx
Load Balance with NSX-T.pptx
Dhruv Sharma
Red Hat Ansible 적용 사례
Red Hat Ansible 적용 사례
Opennaru, inc.
5分で分かるBig Switch Networks
5分で分かるBig Switch Networks
Big Switch Networks Japan
Network Automation with Ansible
Network Automation with Ansible
Anas
Sql 2012 always on
Sql 2012 always on
dilip nayak
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
Open Source Consulting
SAN デザイン講座
SAN デザイン講座
Brocade
フロー技術によるネットワーク管理
フロー技術によるネットワーク管理
Motonori Shindo
初心者でもわかるActive directoryの基本
初心者でもわかるActive directoryの基本
Sho Okada
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...
turgaysahtiyan
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
OpenStack Korea Community
Oracle常駐接続プーリング(DRCP)を導入した話
Oracle常駐接続プーリング(DRCP)を導入した話
Kentaro Kitagawa
Lagopus + DockerのDPDK接続
Lagopus + DockerのDPDK接続
Tomoya Hibi
[よくわかるクラウドデータベース] Amazon RDS for SQL Server導入事例
[よくわかるクラウドデータベース] Amazon RDS for SQL Server導入事例
Amazon Web Services Japan
C34 Always On 可用性グループ 構築時のポイント by 小澤真之
C34 Always On 可用性グループ 構築時のポイント by 小澤真之
Insight Technology, Inc.
OpenStack Architecture
OpenStack Architecture
Mirantis
仕組みがわかるActive Directory
仕組みがわかるActive Directory
Suguru Kunii
Red Hat OpenStack 17 저자직강+스터디그룹_5주차
Red Hat OpenStack 17 저자직강+스터디그룹_5주차
Nalee Jang
ソーシャルゲーム案件におけるDB分割のPHP実装
ソーシャルゲーム案件におけるDB分割のPHP実装
infinite_loop
#logstudy 01 rsyslog入門
#logstudy 01 rsyslog入門
Takashi Takizawa
DNSのRFCの歩き方
DNSのRFCの歩き方
Takashi Takizawa
Solaris 11 network virtualization & Server Virtualization for cloud
Solaris 11 network virtualization & Server Virtualization for cloud
suk kim
Enterprise Linux 7 new feature_network configuration
Enterprise Linux 7 new feature_network configuration
suk kim
More Related Content
What's hot
Red Hat Ansible 적용 사례
Red Hat Ansible 적용 사례
Opennaru, inc.
5分で分かるBig Switch Networks
5分で分かるBig Switch Networks
Big Switch Networks Japan
Network Automation with Ansible
Network Automation with Ansible
Anas
Sql 2012 always on
Sql 2012 always on
dilip nayak
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
Open Source Consulting
SAN デザイン講座
SAN デザイン講座
Brocade
フロー技術によるネットワーク管理
フロー技術によるネットワーク管理
Motonori Shindo
初心者でもわかるActive directoryの基本
初心者でもわかるActive directoryの基本
Sho Okada
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...
turgaysahtiyan
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
OpenStack Korea Community
Oracle常駐接続プーリング(DRCP)を導入した話
Oracle常駐接続プーリング(DRCP)を導入した話
Kentaro Kitagawa
Lagopus + DockerのDPDK接続
Lagopus + DockerのDPDK接続
Tomoya Hibi
[よくわかるクラウドデータベース] Amazon RDS for SQL Server導入事例
[よくわかるクラウドデータベース] Amazon RDS for SQL Server導入事例
Amazon Web Services Japan
C34 Always On 可用性グループ 構築時のポイント by 小澤真之
C34 Always On 可用性グループ 構築時のポイント by 小澤真之
Insight Technology, Inc.
OpenStack Architecture
OpenStack Architecture
Mirantis
仕組みがわかるActive Directory
仕組みがわかるActive Directory
Suguru Kunii
Red Hat OpenStack 17 저자직강+스터디그룹_5주차
Red Hat OpenStack 17 저자직강+스터디그룹_5주차
Nalee Jang
ソーシャルゲーム案件におけるDB分割のPHP実装
ソーシャルゲーム案件におけるDB分割のPHP実装
infinite_loop
#logstudy 01 rsyslog入門
#logstudy 01 rsyslog入門
Takashi Takizawa
DNSのRFCの歩き方
DNSのRFCの歩き方
Takashi Takizawa
What's hot
(20)
Red Hat Ansible 적용 사례
Red Hat Ansible 적용 사례
5分で分かるBig Switch Networks
5分で分かるBig Switch Networks
Network Automation with Ansible
Network Automation with Ansible
Sql 2012 always on
Sql 2012 always on
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
SAN デザイン講座
SAN デザイン講座
フロー技術によるネットワーク管理
フロー技術によるネットワーク管理
初心者でもわかるActive directoryの基本
初心者でもわかるActive directoryの基本
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...
High Availability & Disaster Recovery with SQL Server 2012 AlwaysOn Availabil...
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
[OpenInfra Days Korea 2018] (Track 4) - Grafana를 이용한 OpenStack 클라우드 성능 모니터링
Oracle常駐接続プーリング(DRCP)を導入した話
Oracle常駐接続プーリング(DRCP)を導入した話
Lagopus + DockerのDPDK接続
Lagopus + DockerのDPDK接続
[よくわかるクラウドデータベース] Amazon RDS for SQL Server導入事例
[よくわかるクラウドデータベース] Amazon RDS for SQL Server導入事例
C34 Always On 可用性グループ 構築時のポイント by 小澤真之
C34 Always On 可用性グループ 構築時のポイント by 小澤真之
OpenStack Architecture
OpenStack Architecture
仕組みがわかるActive Directory
仕組みがわかるActive Directory
Red Hat OpenStack 17 저자직강+스터디그룹_5주차
Red Hat OpenStack 17 저자직강+스터디그룹_5주차
ソーシャルゲーム案件におけるDB分割のPHP実装
ソーシャルゲーム案件におけるDB分割のPHP実装
#logstudy 01 rsyslog入門
#logstudy 01 rsyslog入門
DNSのRFCの歩き方
DNSのRFCの歩き方
Similar to Linux에서 Secondary VNIC와 Secondary Private IP 추가 방법
Solaris 11 network virtualization & Server Virtualization for cloud
Solaris 11 network virtualization & Server Virtualization for cloud
suk kim
Enterprise Linux 7 new feature_network configuration
Enterprise Linux 7 new feature_network configuration
suk kim
[오픈소스컨설팅]RHEL7/CentOS7 Pacemaker기반-HA시스템구성-v1.0
[오픈소스컨설팅]RHEL7/CentOS7 Pacemaker기반-HA시스템구성-v1.0
Ji-Woong Choi
Lam pstack
Lam pstack
DooNa Lee
Build the OpenStack Cloud with Neutron Networing, IceHouse
Build the OpenStack Cloud with Neutron Networing, IceHouse
jieun kim
Solaris11 기초 자료
Solaris11 기초 자료
Dong-Hwa jung
20141229 dklee docker
20141229 dklee docker
DK Lee
Kafka slideshare
Kafka slideshare
wonyong hwang
Nginx Https 적용하기.pptx
Nginx Https 적용하기.pptx
wonyong hwang
Red Hat OpenStack 17 저자직강+스터디그룹_2주차
Red Hat OpenStack 17 저자직강+스터디그룹_2주차
Nalee Jang
KAFKA 3.1.0.pdf
KAFKA 3.1.0.pdf
wonyong hwang
20141029 하둡2.5와 hive설치 및 예제
20141029 하둡2.5와 hive설치 및 예제
Tae Young Lee
Nginx basic configurations
Nginx basic configurations
John Kim
Before OTD EDU Assignments
Before OTD EDU Assignments
Beom Lee
Mininet
Mininet
ymtech
ACL - cisco 2811 router
ACL - cisco 2811 router
준기 홍
KGC 2016 오픈소스 네트워크 엔진 Super socket 사용하기
KGC 2016 오픈소스 네트워크 엔진 Super socket 사용하기
흥배 최
Cubietruck 리눅스 이미지 설치
Cubietruck 리눅스 이미지 설치
ymtech
Wiki academy sysadmin 6_day
Wiki academy sysadmin 6_day
Jo Hoon
PCF Installation Guide
PCF Installation Guide
seungdon Choi
Similar to Linux에서 Secondary VNIC와 Secondary Private IP 추가 방법
(20)
Solaris 11 network virtualization & Server Virtualization for cloud
Solaris 11 network virtualization & Server Virtualization for cloud
Enterprise Linux 7 new feature_network configuration
Enterprise Linux 7 new feature_network configuration
[오픈소스컨설팅]RHEL7/CentOS7 Pacemaker기반-HA시스템구성-v1.0
[오픈소스컨설팅]RHEL7/CentOS7 Pacemaker기반-HA시스템구성-v1.0
Lam pstack
Lam pstack
Build the OpenStack Cloud with Neutron Networing, IceHouse
Build the OpenStack Cloud with Neutron Networing, IceHouse
Solaris11 기초 자료
Solaris11 기초 자료
20141229 dklee docker
20141229 dklee docker
Kafka slideshare
Kafka slideshare
Nginx Https 적용하기.pptx
Nginx Https 적용하기.pptx
Red Hat OpenStack 17 저자직강+스터디그룹_2주차
Red Hat OpenStack 17 저자직강+스터디그룹_2주차
KAFKA 3.1.0.pdf
KAFKA 3.1.0.pdf
20141029 하둡2.5와 hive설치 및 예제
20141029 하둡2.5와 hive설치 및 예제
Nginx basic configurations
Nginx basic configurations
Before OTD EDU Assignments
Before OTD EDU Assignments
Mininet
Mininet
ACL - cisco 2811 router
ACL - cisco 2811 router
KGC 2016 오픈소스 네트워크 엔진 Super socket 사용하기
KGC 2016 오픈소스 네트워크 엔진 Super socket 사용하기
Cubietruck 리눅스 이미지 설치
Cubietruck 리눅스 이미지 설치
Wiki academy sysadmin 6_day
Wiki academy sysadmin 6_day
PCF Installation Guide
PCF Installation Guide
Linux에서 Secondary VNIC와 Secondary Private IP 추가 방법
1.
Junchol Park Principal Internet
Sales Consultant Oracle Digital Prime Tech Presales 2020.09 Secondary VNIC & Secondary Private IP for Linux Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 1
2.
Secondary Private IP
및 Secondary VNIC Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 2 • Secondary Private IP Address 이용 중인 VNIC의 VCN 및 Subnet 내 IP만 할당 가능 이용 목적 Reserved Public IP(고정 IP) 이용 인스턴스 장애 조치 : 새로운 인스턴스에 이전 Private IP/Reserved Public IP 설정 단일 인스턴스에 여러 서비스 또는 엔드 포인트 실행 • Secondary VNIC 다른 VCN 또는 다른 Subnet내 IP도 할당 가능 이용 목적 인스턴스를 여러 VCN의 Subnet에 연결하는게 목적
3.
Secondary Private IP
Address Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 3
4.
Secondary Private IP
Address 할당 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 4 동일 VCN 내의 IP만 등록 가능
5.
Secondary Private IP
Address 할당 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 5 참고 https://docs.cloud.oracle.com/en-us/iaas/Content/Network/Tasks/managingIPaddresses.htm#Linux 스크립트를 사용하여 OS 구성 • 추가 명령어 ip addr add <address>/<subnet_prefix_len> dev <phys_dev> label <phys_dev>:<addr_seq_num> <address>: The secondary private IP address. <subnet_prefix_len>: The subnet's prefix length. For example, if the subnet is 192.168.20.0/24, the subnet prefix length is 24. <phys_dev>: The interface to add the address to (for example, ens2f0). <addr_seq_num>: The sequential number in the stack of addresses on the device (for example, 0). 예) sudo ip addr add 10.0.0.3/24 dev ens3 • 삭제 명령어 sudo ip addr del 10.0.0.3/24 dev ens3 • 인스턴스 재부팅시 초기화됨 재부팅에도 유지하기 위해서는 /etc/sysconfig/network-scripts/ifcfg-<phys_dev>:<addr_seq_num> 에 설정을 하여야 함
6.
Secondary Private IP
Address 할당 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 6 Linux OS에서 할당한 IP를 OS명령어로 추가 현재 등록된 IP 조회 [opc@proxy ~]$ ip addr show 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast state UP group default qlen 1000 link/ether 02:00:17:00:e0:80 brd ff:ff:ff:ff:ff:ff inet 10.0.0.15/24 brd 10.0.0.255 scope global dynamic ens3 valid_lft 85924sec preferred_lft 85924sec [opc@proxy ~]$ ip route default via 10.0.0.1 dev ens3 10.0.0.0/24 dev ens3 proto kernel scope link src 10.0.0.15 169.254.0.0/16 dev ens3 proto static scope link 169.254.0.0/16 dev ens3 scope link metric 1002 [opc@proxy ~]$ netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface default gateway 0.0.0.0 UG 0 0 0 ens3 10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 ens3 link-local 0.0.0.0 255.255.0.0 U 0 0 0 ens3 link-local 0.0.0.0 255.255.0.0 U 0 0 0 ens3
7.
Secondary Private IP
Address 할당 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 7 ens3 Interface에 보조 Private IP 추가 [opc@proxy ~]$ sudo ip addr add 10.0.0.3/24 dev ens3 [opc@proxy ~]$ ip addr show 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast state UP group default qlen 1000 link/ether 02:00:17:00:e0:80 brd ff:ff:ff:ff:ff:ff inet 10.0.0.15/24 brd 10.0.0.255 scope global dynamic ens3 valid_lft 85886sec preferred_lft 85886sec inet 10.0.0.3/24 scope global secondary ens3 valid_lft forever preferred_lft forever
8.
Secondary Private IP
Address 제거 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 8 [opc@proxy ~]$ sudo ip addr del 10.0.0.3/24 dev ens3 다음 명령어 실행 후, Console에서 삭제
9.
서버 재부팅에도 Secondary
Private IP Address 할당 유지 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted 9 다음 파일에 설정 추가 /etc/sysconfig/network-scripts/ifcfg-<phys_dev>:<addr_seq_num> [opc@proxy ~]$ sudo touch /etc/sysconfig/network-scripts/ifcfg-ens3:0 [opc@proxy ~]$ sudo vi /etc/sysconfig/network-scripts/ifcfg-ens3:0 DEVICE="ens3:0" BOOTPROTO=static IPADDR=10.0.0.3 NETMASK=255.255.255.0 ONBOOT=yes [opc@proxy ~]$ ip addr show 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast state UP group default qlen 1000 link/ether 02:00:17:00:e0:80 brd ff:ff:ff:ff:ff:ff inet 10.0.0.15/24 brd 10.0.0.255 scope global dynamic ens3 valid_lft 86337sec preferred_lft 86337sec inet 10.0.0.3/24 brd 10.0.0.255 scope global secondary ens3:0 valid_lft forever preferred_lft forever 재부팅 후 결과 확인
10.
Secondary VNIC Confidential –
© 2019 Oracle Internal/Restricted/Highly Restricted 10
11.
Secondary VNIC 추가 Confidential
– © 2019 Oracle Internal/Restricted/Highly Restricted 11 다른 VCN 또는 다른 subnet 선택 가능
12.
Secondary VNIC 추가 Confidential
– © 2019 Oracle Internal/Restricted/Highly Restricted 12 참고 https://docs.cloud.oracle.com/en-us/iaas/Content/Network/Tasks/managingVNICs.htm#Linux 스크립트를 사용하여 OS 구성 • 스크립트 다운로드 $ wget http://docs.cloud.oracle.com/en-us/iaas/Content/Resources/Assets/secondary_vnic_all_configure.sh • 실행 가능하도록 설정 $ chmod +x secondary_vnic_all_configure.sh • 스크립트 실행 방법 $ secondary_vnic_all_configure.sh -c : Configure (adds or deletes) secondary VNIC host IP configuration $ secondary_vnic_all_configure.sh -c -n : Same but uses separate namespaces $ secondary_vnic_all_configure.sh -d : Force removes all secondary VNIC host IP configuration • 인스턴스 재부팅시 초기화됨
13.
Secondary VNIC 추가 Confidential
– © 2019 Oracle Internal/Restricted/Highly Restricted 13 [opc@proxy ~]$ ip addr show 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast state UP group default qlen 1000 link/ether 02:00:17:00:e0:80 brd ff:ff:ff:ff:ff:ff inet 10.0.0.15/24 brd 10.0.0.255 scope global dynamic ens3 valid_lft 86380sec preferred_lft 86380sec 3: ens5: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000 [opc@proxy ~]$ ip route default via 10.0.0.1 dev ens3 10.0.0.0/24 dev ens3 proto kernel scope link src 10.0.0.15 169.254.0.0/16 dev ens3 proto static scope link 169.254.0.0/16 dev ens3 scope link metric 1002 [opc@proxy ~]$ netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface default gateway 0.0.0.0 UG 0 0 0 ens3 10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 ens3 link-local 0.0.0.0 255.255.0.0 U 0 0 0 ens3 link-local 0.0.0.0 255.255.0.0 U 0 0 0 ens3 현재 현황
14.
Secondary VNIC 추가 Confidential
– © 2019 Oracle Internal/Restricted/Highly Restricted 14 [opc@proxy ~]$ sudo ./secondary_vnic_all_configure.sh CONFIG ADDR SPREFIX SBITS VIRTRT NS IND IFACE VLTAG VLAN STATE MAC VNIC - 10.0.0.15 10.0.0.0 24 10.0.0.1 - 0 ens3 - - UP 02:00:17:00:e0:80 ocid1.vnic.oc1.ap- seoul-1.abuwgljr6kumxxfo6khot4pmtm4mm4bjmosscmh6h7wgli6bqrx7ajsoe3ra ADD 20.0.0.2 20.0.0.0 24 20.0.0.1 - 1 ens5 - - DOWN 02:00:17:00:fb:84 ocid1.vnic.oc1.ap- seoul-1.abuwgljrgupat4lxyyvhy6y66q4a5zeeblihlhqr53yoxptoabavfh6mtuka [opc@proxy ~]$ sudo ./secondary_vnic_all_configure.sh -c Info: adding IP config for VNIC MAC 02:00:17:00:fb:84 with id ocid1.vnic.oc1.ap-seoul-1.abuwgljrgupat4lxyyvhy6y66q4a5zeeblihlhqr53yoxptoabavfh6mtuka Info: added IP address 20.0.0.2 on interface ens5 with MTU 9000 Info: added rule for routing from 20.0.0.2 lookup ort1 with default via 20.0.0.1 VNIC 추가
15.
Secondary VNIC 추가 Confidential
– © 2019 Oracle Internal/Restricted/Highly Restricted 15 [opc@proxy ~]$ ip addr show 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast state UP group default qlen 1000 link/ether 02:00:17:00:e0:80 brd ff:ff:ff:ff:ff:ff inet 10.0.0.15/24 brd 10.0.0.255 scope global dynamic ens3 valid_lft 86042sec preferred_lft 86042sec 3: ens5: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 9000 qdisc pfifo_fast state UP group default qlen 1000 link/ether 02:00:17:00:fb:84 brd ff:ff:ff:ff:ff:ff inet 20.0.0.2/24 scope global ens5 valid_lft forever preferred_lft forever [opc@proxy ~]$ ip route default via 10.0.0.1 dev ens3 10.0.0.0/24 dev ens3 proto kernel scope link src 10.0.0.15 20.0.0.0/24 dev ens5 proto kernel scope link src 20.0.0.2 169.254.0.0/16 dev ens3 proto static scope link 169.254.0.0/16 dev ens3 scope link metric 1002 추가된 상황
16.
Secondary VNIC 추가 Confidential
– © 2019 Oracle Internal/Restricted/Highly Restricted 16 [opc@proxy ~]$ netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface default gateway 0.0.0.0 UG 0 0 0 ens3 10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 ens3 20.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 ens5 link-local 0.0.0.0 255.255.0.0 U 0 0 0 ens3 link-local 0.0.0.0 255.255.0.0 U 0 0 0 ens3 [opc@proxy ~]$ sudo ./secondary_vnic_all_configure.sh CONFIG ADDR SPREFIX SBITS VIRTRT NS IND IFACE VLTAG VLAN STATE MAC VNIC - 10.0.0.15 10.0.0.0 24 10.0.0.1 - 0 ens3 - - UP 02:00:17:00:e0:80 ocid1.vnic.oc1.ap- seoul-1.abuwgljr6kumxxfo6khot4pmtm4mm4bjmosscmh6h7wgli6bqrx7ajsoe3ra - 20.0.0.2 20.0.0.0 24 20.0.0.1 - 1 ens5 - - UP 02:00:17:00:fb:84 ocid1.vnic.oc1.ap- seoul-1.abuwgljrgupat4lxyyvhy6y66q4a5zeeblihlhqr53yoxptoabavfh6mtuka 추가된 상황
17.
Secondary VNIC 제거 Confidential
– © 2019 Oracle Internal/Restricted/Highly Restricted 17 스크립트 실행 후, OCI Console에서 제거 [opc@proxy ~]$ sudo ./secondary_vnic_all_configure.sh -d Info: removing IP config of address 20.0.0.2 for VNIC MAC 02:00:17:00:fb:84 with id ocid1.vnic.oc1.ap-seoul- 1.abuwgljrgupat4lxyyvhy6y66q4a5zeeblihlhqr53yoxptoabavfh6mtuka Info: removed routing on interface ens5 Info: removed IP address 20.0.0.2 from interface ens5
Download now