[ntp:questions] NTP Reach is Zero but tally code remain *
natalie.abravanel at kaminario.com
Sun Feb 7 13:30:37 UTC 2016
I have testing the following scenario
* Configured ntp server (1) to sync with other ntp server(2)- all is working well
* Stoping ntpd service on server 2
* I was accepting that once ntp server (1) will have reach value=0, the tally code (*) will be removed, and orphan mode will be available
* It seems like only if the ntpd is restarted , the orphan mode is activated
* I would like to be able to activate orphan mode without restarting the service!
ntp server (1) configuration :
# Permit time synchronization with our time source, but do not
# permit the source to query or modify the service on this system.
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery
# Permit all access over the loopback interface. This could
# be tightened as well, but to do so would effect some of
# the administrative functions.
restrict -6 ::1
# Hosts on local network are less restricted.
#restrict 192.168.1.0 mask 255.255.255.0 nomodify notrap
# Use public servers from the pool.ntp.org project.
# Please consider joining the pool (http://www.pool.ntp.org/join.html).
server 172.16.10.141 iburst
#broadcast 192.168.1.255 key 42 # broadcast server
#broadcastclient # broadcast client
#broadcast 184.108.40.206 key 42 # multicast server
#multicastclient 220.127.116.11 # multicast client
#manycastserver 18.104.22.168 # manycast server
#manycastclient 22.214.171.124 key 42 # manycast client
# Undisciplined Local Clock. This is a fake driver intended for backup
# and when no outside source of synchronized time is available.
tos orphan 15
tos maxdist 30
tinker panic 0
# Drift file. Put this in a directory which the daemon can write to.
# No symbolic links allowed, either, since the daemon updates the file
# by creating a temporary in the same directory and then rename()'ing
# it to the file.
# Key file containing the keys and key identifiers used when operating
# with symmetric key cryptography.
# Specify the key identifiers which are trusted.
#trustedkey 4 8 42
# Specify the key identifier to use with the ntpdc utility.
# Specify the key identifier to use with the ntpq utility.
And off course I will appreciate any help (I have no idea what to do...)
More information about the questions