| More Projects | About the Author |
What is fake?
Fake has been designed to switch in backup servers on a LAN. In particular it has been designed to backup Mail, Web and Proxy servers during periods of both unscheduled and scheduled down time.
Fake allows you to take over the IP address of another machine in the LAN by bringing up an additional interface and making use of ARP spoofing. The additional interface can be either a physical interface or an IP alias.
Fake is easily configurable and is designed to enable automated invocation via systems such as Mon that monitor the availability of servers. Fake can also be used in conjuction with load balancing mecahnisms such as The Linux Virtual Server.
Paper on Redundant Linux using fake
For a more complete explanation of the design of the system and the issues involved in a successful deployment please see the paper Creating Redundant Linux Servers that was presented at the 1998 Linux Expo.
Fake is available for download from the download directory.
A mercurial repository is available, although generally all code is available in the latest release. The mercurial tree may be checked out by running:
hg clone http://hg.vergenet.net/fake/
| Horms Solutions | Simon Horman's Personal Page |
Copyright © 1995-2015 Simon Horman
Copyright © 2010-2015 Horms Solutions Ltd.
All rights reserved unless otherwise noted