<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/154022#M26005</link>
    <description>&lt;P&gt;Looking like a memory leak bug.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Jul 2022 19:39:12 GMT</pubDate>
    <dc:creator>genisis__</dc:creator>
    <dc:date>2022-07-27T19:39:12Z</dc:date>
    <item>
      <title>Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/152818#M25519</link>
      <description>&lt;P&gt;We recently upgraded a VSX VSLS cluster from R80.20 to R81.10 HF55 and the VSs are now reported as DOWN due to FWD pnote (FWD on Active VSX cluster member VSs are in Terminated state T).&lt;/P&gt;&lt;P&gt;Only one VS is in Active/Standby state while the rest are Active/Down.&lt;/P&gt;&lt;P&gt;Anyone faced such an issue recently?&lt;/P&gt;&lt;P&gt;See sample output.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cluster name: CP-Cluster&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Virtual Devices Status on each Cluster Member&lt;BR /&gt;=============================================&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;ID &amp;nbsp; &amp;nbsp;| Weight| CP-G| CP-G&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| &amp;nbsp; &amp;nbsp; &amp;nbsp; | W-1 &amp;nbsp; &amp;nbsp; &amp;nbsp; | W-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| &amp;nbsp; &amp;nbsp; &amp;nbsp; | [local] &amp;nbsp; |&lt;BR /&gt;-------+-------+-----------+-----------&lt;BR /&gt;&amp;nbsp;2 &amp;nbsp; &amp;nbsp; | 10 &amp;nbsp; &amp;nbsp;| DOWN &amp;nbsp; &amp;nbsp; &amp;nbsp;| ACTIVE&lt;BR /&gt;&amp;nbsp;6 &amp;nbsp; &amp;nbsp; | 10 &amp;nbsp; &amp;nbsp;| ACTIVE(!) | DOWN&lt;BR /&gt;&amp;nbsp;7 &amp;nbsp; &amp;nbsp; | 10 &amp;nbsp; &amp;nbsp;| DOWN &amp;nbsp; &amp;nbsp; &amp;nbsp;| ACTIVE(!)&lt;BR /&gt;&amp;nbsp;8 &amp;nbsp; &amp;nbsp; | 10 &amp;nbsp; &amp;nbsp;| DOWN &amp;nbsp; &amp;nbsp; &amp;nbsp;| ACTIVE(!)&lt;BR /&gt;&amp;nbsp;9 &amp;nbsp; &amp;nbsp; | 10 &amp;nbsp; &amp;nbsp;| DOWN &amp;nbsp; &amp;nbsp; &amp;nbsp;| ACTIVE(!)&lt;BR /&gt;&amp;nbsp;10 &amp;nbsp; &amp;nbsp;| 10 &amp;nbsp; &amp;nbsp;| STANDBY &amp;nbsp; | ACTIVE&lt;BR /&gt;---------------+-----------+-----------&lt;BR /&gt;&amp;nbsp;Active &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | 5&lt;BR /&gt;&amp;nbsp;Weight &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 10 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 50&lt;BR /&gt;&amp;nbsp;Weight (%) &amp;nbsp; &amp;nbsp;| 16 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| 84&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Legend: &amp;nbsp;Init - Initializing, Active! - Active Attention&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Down! - ClusterXL Inactive or Virtual System is Down&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2022 15:49:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/152818#M25519</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-12T15:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/152849#M25527</link>
      <description>&lt;P&gt;Hopefully you are engaged with TAC on this issue, what was already attempted in respect to troubleshooting &amp;amp; recovery?&lt;/P&gt;
&lt;P&gt;What process was followed to complete the upgrade, are both members upgraded at this point?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2022 02:49:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/152849#M25527</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-07-13T02:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/152893#M25534</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23666"&gt;@Edward_Waithaka&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you try to reboot the VSX gateways?&lt;/P&gt;&lt;P&gt;BR,&lt;BR /&gt;Kostas&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2022 12:39:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/152893#M25534</guid>
      <dc:creator>KostasGR</dc:creator>
      <dc:date>2022-07-13T12:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153156#M25683</link>
      <description>&lt;UL&gt;&lt;LI&gt;TAC was involved but not much done apart from collection of cpinfo.&lt;/LI&gt;&lt;LI&gt;The MVC upgrade option was used.&lt;/LI&gt;&lt;LI&gt;Both gateways had been upgraded but we ended up rolling back one gateway back to R80.20 using a snapshot.&lt;/LI&gt;&lt;LI&gt;We attempted to rollback the 2nd gateway using a snapshot and it ended up corrupting the disks leading to a boot loop. We did a fresh install of R81.10 and reconfigured vsx.&lt;/LI&gt;&lt;LI&gt;The reinstalled R81.10 gateway is having intermittent performance issues in that traffic seems to be "dropped/lost" (TCP retransmissions seen on client-end Wireshark, no drops seen on zdebug + drop). When we failover to R80.20 gateway, all is well. We suspect default settings (see below) of CoreXL and MQ might be leading to the issues.&lt;/LI&gt;&lt;LI&gt;Action plan -&lt;UL&gt;&lt;LI&gt;Increase number of SNDs to 12 -&amp;nbsp;&lt;STRONG&gt;fw ctl affinity -s -d -fwkall 36&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Disable CoreXL on VS0 using cpconfig, assign VS0 instances manually -&amp;nbsp;&lt;STRONG&gt;fw ctl affinity -s -d -vsid 0 -cpu 6 30&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Change MQ on Mgmt &amp;amp; Sync (bond0)?? -&amp;nbsp;&lt;STRONG&gt;mq_mng -s manual -i Mgmt -c 5 29 AND mq_mng -s manual -i eth2-01 eth2-01 -c 4 28&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;If performance improves on GW2, reimage GW1 and reconfigure it with similar settings as above.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vsx.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17202i3EF7CCE0ED68F2F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="vsx.png" alt="vsx.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;what is the effect of enabling&amp;nbsp;dynamic_balancing after making the above changes?&lt;/P&gt;&lt;P&gt;Is it better to leave defaults and enable&amp;nbsp;dynamic_balancing ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--- Current CoreXL affinity &amp;amp; MQ settings ----------------------------------&lt;/P&gt;&lt;P&gt;[Expert@CP-GW2:0]# fw ctl affinity -l -a&lt;BR /&gt;VS_0 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_1 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_2 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_3 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_4 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_6 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_7 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_8 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_9 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;VS_10 fwk: CPU 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47&lt;BR /&gt;Interface Mgmt: has multi queue enabled&lt;BR /&gt;Interface eth2-01: has multi queue enabled&lt;BR /&gt;Interface eth2-02: has multi queue enabled&lt;BR /&gt;Interface eth4-03: has multi queue enabled&lt;BR /&gt;Interface eth4-04: has multi queue enabled&lt;BR /&gt;Interface eth5-01: has multi queue enabled&lt;BR /&gt;Interface eth5-02: has multi queue enabled&lt;BR /&gt;Interface eth1-01: has multi queue enabled&lt;BR /&gt;Interface eth1-02: has multi queue enabled&lt;BR /&gt;[Expert@CP-GW2:0]#&lt;/P&gt;&lt;P&gt;[Expert@CP-GW2:0]# cpmq get -vv&lt;BR /&gt;Note: 'cpmq' is deprecated and no longer supported. For multiqueue management, please use 'mq_mng'&lt;BR /&gt;Current multiqueue status:&lt;BR /&gt;Total 48 cores. Available for MQ 4 cores&lt;BR /&gt;i/f driver driver mode state mode (queues) cores&lt;BR /&gt;actual/avail&lt;BR /&gt;------------------------------------------------------------------------------------------------&lt;BR /&gt;Mgmt igb Kernel Up Auto (2/2) 0,24&lt;BR /&gt;eth1-01 ixgbe Kernel Up Auto (4/4) 0,24,1,25&lt;BR /&gt;eth1-02 ixgbe Kernel Up Auto (4/4) 0,24,1,25&lt;BR /&gt;eth2-01 igb Kernel Up Auto (4/4) 0,24,1,25&lt;BR /&gt;eth2-02 igb Kernel Up Auto (4/4) 0,24,1,25&lt;BR /&gt;eth4-03 ixgbe Kernel Up Auto (4/4) 0,24,1,25&lt;BR /&gt;eth4-04 ixgbe Kernel Up Auto (4/4) 0,24,1,25&lt;BR /&gt;eth5-01 mlx5_core Kernel Up Auto (4/4) 0,24,1,25&lt;BR /&gt;eth5-02 mlx5_core Kernel Up Auto (4/4) 0,24,1,25&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jul 2022 14:31:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153156#M25683</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-17T14:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153157#M25684</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/54611"&gt;@KostasGR&lt;/a&gt;&amp;nbsp;yes we tried to reboot.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jul 2022 14:33:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153157#M25684</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-17T14:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153169#M25686</link>
      <description>&lt;P&gt;A prerequisite to start Dynamic Balancing, is having all FWKs set to the default FWKs CPUs.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/46744"&gt;@AmitShmuel&lt;/a&gt;&amp;nbsp;talks about it here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/dynamic-balancing-VSX-and-core-affinity/td-p/146273" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/dynamic-balancing-VSX-and-core-affinity/td-p/146273&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2022 00:56:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153169#M25686</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-07-18T00:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153175#M25688</link>
      <description>&lt;P&gt;I will assume default settings means out of the box configuration with coreXL enabled on VS0 with 40 instances. From there dynamic balancing is assumed to do its magic.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also, On further analysis using FW monitor, we also suspect that our Mellanox 2x40G NIC cards might be having issues while in bonded state. We will also try a firmware upgrade of the cards after testing the coreXL/MQ settings.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2022 04:16:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153175#M25688</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-18T04:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153486#M25757</link>
      <description>&lt;P&gt;Update&lt;/P&gt;&lt;P&gt;Seems the 40G NICs required a firmware update after moving to R81.10. Traffic was being dropped on the 40G bond interface causing TCP SYN retransmissions leading to slow loading of web applications. After upgrading the firmware all was good but we have ran into a new issue as seen below from TAC.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;" It seems that you have experienced a segmentation fault that is recently common in the later takes of R81.10 - this segmentation fault is usually causing an FWK crash and initiates a failover.&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;We do not have an official SK about it as it is in an internal R&amp;amp;D investigation.&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Please install the hotfix I have provided you with, as segmentation faults could harm the machine and it is very important to act quickly with this matter."&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;One of our VS crashed and failed over to the&amp;nbsp;standby VS (still running on R80.20).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 17:14:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153486#M25757</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-20T17:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153554#M25768</link>
      <description>&lt;P&gt;Are you noticing high CPU load for specific VS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran into a similar issue after a VSX upgrade from R80.20 -&amp;gt; R81.10 but in HA mode.&lt;/P&gt;&lt;P&gt;Our standby member was flapping between Standby and DOWN due to missing Sync interface and the virtual router VS was missing its interfaces.&lt;/P&gt;&lt;P&gt;In addition the virtual router VS was consuming CPU up to 200% and a lot of Interface DRPs and OVR overall were visible.&lt;/P&gt;&lt;P&gt;We started tuning SNDs and FWKs but no change was resolving the issue.&lt;/P&gt;&lt;P&gt;Thanks to the last support engineer, who found a similar case,&amp;nbsp; we were able to pinpoint it to priority queue and after disabling it the cluster became stable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would be worth in your case to check, if the spike detective is printing errors regarding the fwkX_hp process.&lt;/P&gt;&lt;P&gt;This one is responsible for the high priority queue in priority queue and clogged the specific VS in our case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 13:20:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153554#M25768</guid>
      <dc:creator>Markus_Genser</dc:creator>
      <dc:date>2022-07-21T13:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153563#M25770</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23009"&gt;@Markus_Genser&lt;/a&gt;&amp;nbsp;could you share the commands used to identify the issue and how to kill the priority queues.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 15:20:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153563#M25770</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-21T15:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153598#M25781</link>
      <description>&lt;P&gt;Sure,&lt;/P&gt;&lt;P&gt;spike detective is reporting to /var/log/messages,&lt;/P&gt;&lt;P&gt;we got the following messages over and over again, especially during peak times with a lot of traffic passing through, note the fwk1_hp (according to TAC this is the high priority queue)&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Jul 20 15:28:51 2022 &amp;lt;GWNAME&amp;gt; spike_detective: spike info: type: thread, thread id: 3383, thread name: fwk1_hp, start time: 20/07/22 15:28:26, spike duration (sec): 24, initial cpu usage: 100, average cpu usage: 100, perf taken: 0  
Jul 20 15:28:57 2022 &amp;lt;GWNAME&amp;gt; spike_detective: spike info: type: cpu, cpu core: 5, top consumer: fwk1_hp, start time: 20/07/22 15:28:26, spike duration (sec): 30, initial cpu usage: 84, average cpu usage: 79, perf taken: 1  
Jul 20 15:29:03 2022 &amp;lt;GWNAME&amp;gt; spike_detective: spike info: type: cpu, cpu core: 21, top consumer: fwk1_hp, start time: 20/07/22 15:28:56, spike duration (sec): 6, initial cpu usage: 85, average cpu usage: 85, perf taken: 0  
Jul 20 15:29:03 2022 &amp;lt;GWNAME&amp;gt; spike_detective: spike info: type: thread, thread id: 3383, thread name: fwk1_hp, start time: 20/07/22 15:28:56, spike duration (sec): 6, initial cpu usage: 100, average cpu usage: 100, perf taken: 0&lt;/LI-CODE&gt;&lt;P&gt;For the virtual router, which is normally using 5-10% cpu, this is not normal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rest was good old detective work with top to identify the VS causing the issue (virtual router in our case).&lt;/P&gt;&lt;P&gt;In the VS $FWDIR/log/fwk.elg to verify that the cluster status is caused by missing CCP packets, messages like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;State change: ACTIVE -&amp;gt; ACTIVE(!) | Reason: Interface Sync is down (Cluster Control Protocol packets are not received)&lt;/LI-CODE&gt;&lt;P&gt;even though interfaces are up and you can ping the neighbour and we had enough SNDs to handle all the traffic and all in all the rest of the VS were consuming cpu in a low level, which showed most of the cores idling.&lt;/P&gt;&lt;P&gt;The TAC engineer used&amp;nbsp; one additional command in the remote session, which i failed to note, that showed the various CPU hits for the kernel modules in percent which also displayed the fwk1_hp on top and following all that, he suggested to turn of priority queue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To deactivate priority queue :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;fw ctl multik prioq&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Select 0 to disable the feature.&lt;/LI&gt;&lt;LI&gt;Reboot the device.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 06:28:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153598#M25781</guid>
      <dc:creator>Markus_Genser</dc:creator>
      <dc:date>2022-07-22T06:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153603#M25783</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23009"&gt;@Markus_Genser&lt;/a&gt;&amp;nbsp;thanks.&lt;/P&gt;&lt;P&gt;My take is that the merger of the R80.X SP (Maestro etc) with the normal R80.X has brought about many issues on R81.X platform. Just like the move from SecurePlatform to Gaia OS a few years ago. Running on R81.X is like walking on egg shells in production.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 06:51:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153603#M25783</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-22T06:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153605#M25785</link>
      <description>&lt;P&gt;Did you push policies on them as well, after the upgrade?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 07:13:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153605#M25785</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-07-22T07:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153607#M25787</link>
      <description>&lt;P&gt;Yes, we pushed several times.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 07:22:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153607#M25787</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-22T07:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153890#M25915</link>
      <description>&lt;P&gt;Dear Edward&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am sorry to hear that you had a bad experience with R81.10. We are investigating the reason for VSs to be down. As of the network interfaces firmware&amp;nbsp;&lt;SPAN&gt;we moved towards auto-updates in future versions of the jumbo and major versions;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In general we get a great feedback&amp;nbsp;about R81.10 quality from our partners and customers and we highly recommend upgrading to this version - not only management and regular gateways, but also&amp;nbsp;Maestro environments, and actually the most widely used Maestro version is now R81.10 with the large number of Maestro&amp;nbsp;customers that succesfully&amp;nbsp;upgraded to R81.10.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank You&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 18:42:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153890#M25915</guid>
      <dc:creator>Gera_Dorfman</dc:creator>
      <dc:date>2022-07-26T18:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153893#M25918</link>
      <description>&lt;P&gt;We just did a R80.40 with R81.10 with JHFA66 (inplace upgrade).&lt;/P&gt;
&lt;P&gt;We had an odd issue with one node where some wrp interface just appeared in VS0 and that cause a problem with HA.&lt;/P&gt;
&lt;P&gt;We ended up removing VSX from the GW and then running vsx_util reconfigure which resolve the problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My main issues since upgrade is multicast has stopped working and we have determine the 'fw monitor' causes fwk process crash (yes TAC are engaged) and basically causes an outage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What other surprises are waiting to be discovered..only time will tell.&lt;/P&gt;
&lt;P&gt;b.t.w I am using dynamic balancing and so far not seeing an issue with this, it just works.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 20:48:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153893#M25918</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2022-07-26T20:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153917#M25924</link>
      <description>&lt;P&gt;All the best. We just hit another issue today!&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 06:55:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153917#M25924</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-27T06:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153920#M25927</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23009"&gt;@Markus_Genser&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today we did a fresh install upgrade of our 2nd gateway and we hit another problem.&lt;/P&gt;&lt;P&gt;The VSs on GW2 are complaining that the cluster interface is down hence CCP packets are not being received. This causes the VS to failover in some instances. We are sure the bond interface is fine as everything was working well in the multiversion cluster (R80.20 + R81.10). This just started with the final upgrade of the 2nd GW.&lt;/P&gt;&lt;P&gt;The sync bond interface within the VS is UP in one direction only as seen in the output below.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@CP-GW2:6]# cphaprob -a if

vsid 6:
------
CCP mode: Manual (Unicast)
Required interfaces: 8
Required secured interfaces: 1

Interface Name: Status:

bond0 (S-LS) Inbound: UP
Outbound: DOWN (1245.8 secs)

[Expert@CP-GW2:6]# cphaprob stat

Active PNOTEs: LPRB, IAC

Last member state change event:
Event Code: CLUS-110305
State change: ACTIVE -&amp;gt; ACTIVE(!)
Reason for state change: Interface bond0 is down (Cluster Control Protocol packets are not received)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TAC have tried to analyze interface packet details to no avail. We will try a full reboot later on.&lt;/P&gt;&lt;P&gt;My advise is for customers to work with R80.40 for VSX based on the number of issues being faced. I believe that version is fairly mature and has been out there for long.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 07:10:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153920#M25927</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-27T07:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153927#M25928</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23666"&gt;@Edward_Waithaka&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May I suggest that customer success engineer from R&amp;amp;D organization will work with you to review the environment and to help and resolve R81.10 issues that you're having ?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Gera&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 07:20:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153927#M25928</guid>
      <dc:creator>Gera_Dorfman</dc:creator>
      <dc:date>2022-07-27T07:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VSX Cluster - Virtual Systems down after upgrade from R80.20 to R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153929#M25929</link>
      <description>&lt;P&gt;The ccp probe issue seems to clear on its own sometimes, then comes back later on.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@CP-GW2:2]# cphaprob stat

Cluster Mode:   Virtual System Load Sharing (Primary Up)

ID         Unique Address  Assigned Load   State          Name                                              

1          10.10.100.169   0%              STANDBY        CP-GW-1  
2 (local)  10.10.100.170   100%            ACTIVE         CP-GW-2  


Active PNOTEs: None

Last member state change event:
   Event Code:                 CLUS-114904
   State change:               ACTIVE(!) -&amp;gt; ACTIVE
   Reason for state change:    Reason for ACTIVE! alert has been resolved
   Event time:                 Wed Jul 27 09:43:58 2022

Last cluster failover event:
   Transition to new ACTIVE:   Member 1 -&amp;gt; Member 2
   Reason:                     Available on member 1
   Event time:                 Thu Jul 21 00:26:52 2022

Cluster failover count:
   Failover counter:           1
   Time of counter reset:      Thu Jul 21 00:17:24 2022 (reboot)

[Expert@CP-GW2:2]# cat $FWDIR/log/fwk.elg | grep '27 Jul  9:43:'
[27 Jul  9:43:58][fw4_0];[vs_2];CLUS-120207-2: Local probing has started on interface: bond0 
[27 Jul  9:43:58][fw4_0];[vs_2];CLUS-120207-2: Local probing has started on interface: bond2.xx 
[27 Jul  9:43:58][fw4_0];[vs_2];CLUS-120207-2: Local probing has stopped on interface: bond2.xx 
[27 Jul  9:43:58][fw4_0];[vs_2];CLUS-120207-2: Local Probing PNOTE OFF
[27 Jul  9:43:58][fw4_0];[vs_2];CLUS-114904-2: State change: ACTIVE(!) -&amp;gt;  ACTIVE | Reason: Reason for ACTIVE! alert has been resolved&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 07:35:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VSX-Cluster-Virtual-Systems-down-after-upgrade-from/m-p/153929#M25929</guid>
      <dc:creator>Edward_Waithaka</dc:creator>
      <dc:date>2022-07-27T07:35:32Z</dc:date>
    </item>
  </channel>
</rss>

