<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Controlled failovers during a VSX vsls MVC upgrade in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162445#M28888</link>
    <description>&lt;P&gt;Hi!&lt;BR /&gt;&lt;BR /&gt;Im about to perform a R80.30 2.6 kernel to R81.10 vsx vsls MVC upgrade (with clean install)&lt;BR /&gt;It is a three node cluster with seven virtual servers.&lt;/P&gt;&lt;P&gt;During the maintenance windows all vs's can run on one host if necessary.&lt;BR /&gt;&lt;BR /&gt;I would like to have control over the failovers when the upgraded vsx-gateways become active.&lt;BR /&gt;&lt;BR /&gt;Are there any best practises or recommended (and supported) ways to do that?&lt;BR /&gt;&lt;BR /&gt;Is vsx_util vsls supported during a MVC upgrade?&lt;BR /&gt;Or should I run clusterXL_admin down -p to avoid the vs's return to the newly upgraded host?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;&lt;BR /&gt;/Mattias&lt;/P&gt;</description>
    <pubDate>Fri, 18 Nov 2022 12:52:24 GMT</pubDate>
    <dc:creator>Mattias_Jansson</dc:creator>
    <dc:date>2022-11-18T12:52:24Z</dc:date>
    <item>
      <title>Controlled failovers during a VSX vsls MVC upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162445#M28888</link>
      <description>&lt;P&gt;Hi!&lt;BR /&gt;&lt;BR /&gt;Im about to perform a R80.30 2.6 kernel to R81.10 vsx vsls MVC upgrade (with clean install)&lt;BR /&gt;It is a three node cluster with seven virtual servers.&lt;/P&gt;&lt;P&gt;During the maintenance windows all vs's can run on one host if necessary.&lt;BR /&gt;&lt;BR /&gt;I would like to have control over the failovers when the upgraded vsx-gateways become active.&lt;BR /&gt;&lt;BR /&gt;Are there any best practises or recommended (and supported) ways to do that?&lt;BR /&gt;&lt;BR /&gt;Is vsx_util vsls supported during a MVC upgrade?&lt;BR /&gt;Or should I run clusterXL_admin down -p to avoid the vs's return to the newly upgraded host?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;&lt;BR /&gt;/Mattias&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 12:52:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162445#M28888</guid>
      <dc:creator>Mattias_Jansson</dc:creator>
      <dc:date>2022-11-18T12:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Controlled failovers during a VSX vsls MVC upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162454#M28891</link>
      <description>&lt;P&gt;My understanding is, you can clean install the new VSX members, run vsx_util reconfigure to rebuild it, and then use MVC without any issue.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am not sure I understand your question about vsx_util vsls. What is your intention with it during the upgrade?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And of course, admin down command is an ultimate tool to avoid a failover, VSX or otherwise &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 14:04:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162454#M28891</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-11-18T14:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: Controlled failovers during a VSX vsls MVC upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162459#M28893</link>
      <description>&lt;P&gt;As I understand it:&lt;BR /&gt;Checkpoint recommends to use vsx_util vsls to distribute all vs's to M1 before the upgrade.&lt;BR /&gt;Then upgrade M3 and M2 and finally run cpstop on M1 to do the failover to the upgraded gateways.&lt;BR /&gt;But as I understand it: When M1 is upgraded and I install the policy, all VS's will be active on M1 as it has higher priority.&lt;BR /&gt;And in that case I will have two failovers instead of one.&amp;nbsp;&lt;BR /&gt;So my question is: What is the preferred method to avoid that?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 15:32:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162459#M28893</guid>
      <dc:creator>Mattias_Jansson</dc:creator>
      <dc:date>2022-11-18T15:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: Controlled failovers during a VSX vsls MVC upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162571#M28920</link>
      <description>&lt;P&gt;I do not think your statement "&lt;SPAN&gt;When M1 is upgraded and I install the policy, all VS's will be active on M1 as it has higher priority" is correct. Please read R81.10 Installation and Upgrade Guide for more dfetails.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Nov 2022 12:42:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162571#M28920</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-11-20T12:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: Controlled failovers during a VSX vsls MVC upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162609#M28929</link>
      <description>&lt;P&gt;Hi again.&lt;BR /&gt;I performed the the upgrade on saturday and of course I followed the great guide. Below is my reflections.&lt;BR /&gt;Here is how we did it:&lt;BR /&gt;We ran vsx_util vsls and placed our three most critical vs's on M1. The next most critical vs on M2 and the other tree vs's on M3.&lt;BR /&gt;After clean install on M3 I made sure to install latest JHF and apply all required settings before running vsx_util reconfigure and reboot.&lt;BR /&gt;Next step was to enable MVC mechanism. And directly the member became active all three vs's on M3 became active. (The failovers worked perfectly with no downtime)&lt;BR /&gt;It would be nice if the guide would say that failover occurs after enabling MVC. (I thought it would do that after pushing the policy on M3)&lt;BR /&gt;&lt;BR /&gt;M2 worked exactly as M3.&lt;BR /&gt;&lt;BR /&gt;On M1 it was a different experience. After clean install, JHF and adding settings we ran vsx_util reconfigure and reboot.&lt;BR /&gt;When it was up again all critical VS's returned to the newly upgraded M1.&lt;BR /&gt;&lt;BR /&gt;As I need to change the CoreXL and MultiQ setup I needed to reboot the member twice before it was correctly setup.&lt;BR /&gt;Which caused two extra failovers.&lt;BR /&gt;&lt;BR /&gt;During the upgrade though we didn't have any downtime which is really impressive, great work Check Point!&lt;BR /&gt;&lt;BR /&gt;I think that the way I should have handled the M1 not beeing active after vsx_util reconfigure would have been to disable some interfaces on it. In that case the vs's should have stayed at M2.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 08:33:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Controlled-failovers-during-a-VSX-vsls-MVC-upgrade/m-p/162609#M28929</guid>
      <dc:creator>Mattias_Jansson</dc:creator>
      <dc:date>2022-11-21T08:33:26Z</dc:date>
    </item>
  </channel>
</rss>

