Cluster (connect 2 nodes)

[root@frghcslnetv12 data]# tail /var/log/elasticsearch/network-logs.log
[2018-06-04T12:15:42,440][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:15:45,466][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:15:48,495][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:16:06,535][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:16:10,549][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:16:13,556][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:16:17,638][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:16:27,675][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:16:31,688][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]
[2018-06-04T12:16:49,729][INFO ][o.e.d.z.ZenDiscovery     ] [9hSWSDU] failed to send join request to master [{network-1}{M3r-tbp1QuqOQSj5UM6Ehw}{MdvaRbsfRty_dAHM8jKmkQ}{172.16.250.29}{172.16.250.29:9300}], reason [RemoteTransportException[[network-1][172.16.250.29:9300][internal:discovery/zen/join]]; nested: ConnectTransportException[[9hSWSDU][172.16.250.30:9300] connect_exception]; nested: IOException[No route to host: 172.16.250.30/172.16.250.30:9300]; nested: IOException[No route to host]; ]

Are the two hosts on the same network, is the a firewall between them?

ifconfig

Are there any iptables rules?

iptables -nvL

hi jamesspi i am facing problem in elasticsearch could you help me please?

They are on the same network :

[root@frghcslnetv12 ~]# ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 172.16.250.30  netmask 255.255.255.0  broadcast 172.16.250.255
        inet6 fe80::250:56ff:feb6:71fd  prefixlen 64  scopeid 0x20<link>
        ether 00:50:56:b6:71:fd  txqueuelen 1000  (Ethernet)
        RX packets 38865  bytes 33083427 (31.5 MiB)
        RX errors 0  dropped 761  overruns 0  frame 0
        TX packets 10069  bytes 1607764 (1.5 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1  (Local Loopback)
        RX packets 5860  bytes 508660 (496.7 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 5860  bytes 508660 (496.7 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

virbr0: flags=4099<UP,BROADCAST,MULTICAST>  mtu 1500
        ether 52:54:00:94:2b:d4  txqueuelen 1000  (Ethernet)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
[root@frghcslnetv12 ~]# iptables -nvL
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
 4262 1153K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
   65  4624 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
 2449  147K INPUT_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 2449  147K INPUT_ZONES_SOURCE  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 2449  147K INPUT_ZONES  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate INVALID
 2449  147K REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
    0     0 FORWARD_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FORWARD_IN_ZONES_SOURCE  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FORWARD_IN_ZONES  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FORWARD_OUT_ZONES_SOURCE  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FORWARD_OUT_ZONES  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate INVALID
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibited

Chain OUTPUT (policy ACCEPT 5084 packets, 693K bytes)
 pkts bytes target     prot opt in     out     source               destination
 5084  693K OUTPUT_direct  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD_IN_ZONES (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 FWDI_public  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0           [goto]
    0     0 FWDI_public  all  --  +      *       0.0.0.0/0            0.0.0.0/0           [goto]

Chain FORWARD_IN_ZONES_SOURCE (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FORWARD_OUT_ZONES (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 FWDO_public  all  --  *      eth0    0.0.0.0/0            0.0.0.0/0           [goto]
    0     0 FWDO_public  all  --  *      +       0.0.0.0/0            0.0.0.0/0           [goto]

Chain FORWARD_OUT_ZONES_SOURCE (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FORWARD_direct (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FWDI_public (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 FWDI_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FWDI_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FWDI_public_allow  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FWDI_public_allow (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FWDI_public_deny (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FWDI_public_log (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FWDO_public (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 FWDO_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FWDO_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 FWDO_public_allow  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FWDO_public_allow (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FWDO_public_deny (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain FWDO_public_log (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain INPUT_ZONES (1 references)
 pkts bytes target     prot opt in     out     source               destination
 2449  147K IN_public  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0           [goto]
    0     0 IN_public  all  --  +      *       0.0.0.0/0            0.0.0.0/0           [goto]

Chain INPUT_ZONES_SOURCE (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain INPUT_direct (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain IN_public (2 references)
 pkts bytes target     prot opt in     out     source               destination
 2449  147K IN_public_log  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 2449  147K IN_public_deny  all  --  *      *       0.0.0.0/0            0.0.0.0/0
 2449  147K IN_public_allow  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
... etc

The node 1 is on : 172.16.250.29

The node 2 is on : 172.16.250.30

@asalma, which is the node giving you issues? .29 or .30?

Also, based on your iptables output, I am assuming you are using firewalld? If so, can you run:

firewall-cmd --get-active-zones

@Hamza_Dhahri, just open a new topic with your question, someone will pick it up :slight_smile:

The ".30"

[root@frghcslnetv12 ~]# firewall-cmd --get-active-zones
public
  interfaces: eth0

Ok, on both nodes, please add:

firewall-cmd --zone=public --add-port=9200/tcp --permanent
firewall-cmd --zone=public --add-port=9300/tcp --permanent
firewall-cmd --reload

Restart elasticsearch and try again.

I could do this on : ".30"

but on the ".29"
I got this :

[root@frghcslnetv10 ~]# firewall-cmd --get-active-zones
FirewallD is not running
[root@frghcslnetv10 ~]# firewall-cmd --zone=public --add-port=9200/tcp --permanent
FirewallD is not running

Interesting!

Can you run iptables -nvL on .29?

It workes :slight_smile:

[root@frghcslnetv12 ~]# curl http://localhost:9200/_cat/nodes?pretty
172.16.250.30 53 98  4 1.28 0.55 0.24 mdi - network-2
172.16.250.29 73 98 98 7.66 8.35 8.30 mdi * network-1
[root@frghcslnetv10 ~]# iptables -nvL
Chain INPUT (policy ACCEPT 1 packets, 73 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination

Great! You had a local firewall on .30, but not .29.

Thank you a lot @jamesspi

You're welcome! Please close the topic if you're ready :slight_smile:

Please one last question :

How can I know that this worked, how can I see this on kibana ?

My kibana and logstash are on : ".29"

Why i can't see the "network-2"

Hey @asalma,

You can run:

GET _cat/nodes?v

Or, even better, install the free version of x-pack to get monitoring set up (you can monitor all aspects of the cluster visually, very very helpful)

ip            heap.percent ram.percent cpu load_1m load_5m load_15m node.role master name
172.16.250.29           59          98  93    8.15    7.88     6.64 mdi       *      network-1

The cluster can't work without the X-pack ?

Yes, it can work of course.

You should have both nodes listed there if it is still working from before..is elasticsearch still running on .30?