- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Re: HA Cluster VLAN Interface Remove/Delete
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
HA Cluster VLAN Interface Remove/Delete
Hi Experts,
I am planning to delete an interface from a HA Cluster setup (R81.10) and I have come up with the following steps.. Do these steps look correct to you? It's very hard for me to know the correct way to do this having never done it before and I'm praying this is correct..
Brief action plan for removing an interface from cluster topology (R80.10 and above)
- Remove the Virtual IP address and Change the Interface to 'Private' in SmartConsole and push policy.
- check chaprob -a if for the change on both firewall gateway members.
- Disable clustering on standby gateway.
- delete the interface from standby gateway.
- delete the interface from active gateway.
- Delete the interface from SmartConsole and push policy.
- Restart clustering on standby gateway.
Detailed action plan for removing an interface from cluster topology (R80.10 and above)
- Perform these steps in SmartConsole (before removing an interface from Cluster object topology, set it to 'Private'):
Open the cluster object properties.
- Go to the 'ClusterXL and VRRP' pane.
- Under the 'Upon cluster member recovery' section, make sure the 'Maintain current active Cluster Member' option is selected.
- Go to the 'Network Management' pane.
- Highlight the interface by clicking on it once and then click on 'Edit' button.
- Remove the Virtual IP address from the pair of the interfaces that should be removed from Cluster object topology.
- In the 'Network Type' dropdown, select 'Private'
- Click on 'OK' to apply the changes.
- Proceed with installing the relevant policy to that cluster
- On each cluster member:
- Connect to the command line (over SSH, or console).
- Log in to the Expert mode.
- Run the cphaprob -a if command.
- Check the 'Required number of interfaces' - the total number has to decrease by the number of interfaces that were configured as 'Private'.
Example:
If there were 11 interfaces
And 1 interface was configured as 'Non-Monitored Private'
Then now 'Required number of interfaces' should show 10 interfaces.
Note: If the 'Required number of interfaces' did not decrease, then reboot the problematic cluster member.
- Perform these steps on the Standby member:
- Either stop the Clustering by running the 'cphastop' command, or bring this member administratively down by running the 'clusterXL_admin down' command.
- Delete the interface via one of the following two ways:
- Gaia Web Portal:
Step | Description |
1 | In the navigation tree, click Network Management > Network Interfaces. |
2 | Select the correct Interface from the list and Click the 'Delete' button. |
- Gaia Clish Mode:
delete interface eth1 vlan 172
save config
- Perform these steps on the Active member:
- Do NOT disable clustering. Check clustering is active using the 'cphaprob state' command.
- Delete the interface via one of the following two ways:
- Gaia Web Portal:
Step | Description |
1 | In the navigation tree, click Network Management > Network Interfaces. |
2 | Select the correct Interface from the list and Click the 'Delete' button. |
- Gaia Clish Mode:
delete interface eth1 vlan 172
save config
- Perform these steps in SmartConsole:
- Open Cluster object properties.
- Go to the 'Network Management' and then highlight the interface by clicking on it once and then click on 'Edit' button.
- Remove the interface from the Topology table from the cluster object.
- Click on 'OK' to apply the changes.
- Install the relevant policy onto the cluster object.
- Perform these steps on Standby member:
- Connect to the command line (over SSH, or console).
- Log in to the Expert mode.
- Either start the Clustering by running the 'cphastart' command, or bring this member administratively up by running the 'clusterXL_admin up' command.
- Verify that the new interface was deleted from cluster topology - run this command on each cluster member:
[Expert@HostName]# cphaprob -a if
If the new interface was not deleted yet, then reboot each cluster member.
- Labels:
-
Policy Installation
-
SmartConsole
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Martin, sk57100 provides a reasonable reference for such activities.
As a side, Cluster XL monitors the highest and lowest active VLANs on an interface, is the VLAN ID in question either of those or somewhere in-between?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Chris,
I'm really glad you mentioned "Cluster XL monitors the highest and lowest active VLANs on an interface", because I didn't know this. So am I right in saying that ClusterXL will monitor itself through all physical interfaces, but if an interface is trunked with VLANs, then it elects to monitor itself through one particular VLAN on that interface? I just checked now and I can see the VLAN in question is indeed the lowest numbered VLAN on it's particular interface that it's currently being trunked on, yes. What are the implications and what steps must I follow?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The ClusterXL admin guide and serval SK articles describe VLAN monitoring in detail.
The highest and lowest VLAN IDs on a trunk are both monitored by default (configurable).
In your situation it's important to not take shortcuts since the lowest VLAN ID is one that will directly trigger the interface active check/pnote of ClusterXL.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The ClusterXL admin guide says the following:
"ClusterXL (including VSX) supports the Synchronization Network (CCP packets that carry Delta Sync information) only on the lowest VLAN ID (VLAN tag). For example, if three VLANs with IDs 10, 20 and 30 are configured on interface eth1, then you can use only the VLAN interface eth1.10 for the State Synchronization."
This leaves me with more questions than answers. Okay so here are my questions:
Is the state synchronization mentioned here the same type of synchronization offered by a 'Sync' interface?
If I have a dedicated 'Sync' interface, is the above statement about 'the lowest VLAN ID' irrelevant?
If the state synchronization mentioned here is a different type of synchronization offered by a 'Sync' interface, then what exactly is that difference, where I can learn more information about this difference, and what are the mitigation steps to avoid any issues if this 'lowest VLAN ID' were to be deleted?
Where exactly does it mention that the lowest VLAN ID is one that will directly trigger the interface active check/pnote of ClusterXL?
Any information you can shed is very gratefully appreciated.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
For a given cluster there is typically only a single sync interface defined in the cluster topology either physical or VLAN.
Again, both the highest and lowest VLAN are monitored on a trunk port used as a data interface by default.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just to tell you something from my own experience...when you add clans in web UI, and you go to dashboard, do NOT click "get interface with topology", as that can mess up everything. Just do get interfaces without topology and I would also recommend to set topology as "network defined by routes", as that calculates topology behind the interface.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@the_rock - thank you for this note about your experience with adding VLANs. I did actually see this in another post, that adding "WITH topology" will cause problems. I'll make sure I add new interfaces WITHOUT topology, yes. Many thanks for this.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi - could you not simply delete the interface in Cluster XL and then delete the interfaces on the gateway?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In very simple terms you have described what sk57100 documents as the removal process.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Chris. What I was wondering was, could you delete the cluster interface, and remove/disable the interface on the gateways, without entering "cphastop" and then "cphastart" on the standby gateway?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This was the exact process I used. I did not need to use cpstop/cpstart.
1. Backup both gateways
Take backups and snapshots. Save to external location.
2. Disable the interfaces from Solarwinds Monitoring.
3. Edit the Cluster object in SMS
Go into Cluster member tab, change the IP addresses for both cluster members to the new IP addresses.
4. Perform a SIC test in SMS to ensure comms to/from both gateways function as expected.
SIC was working fine.
5. Update the Alias URL (Platform Portal URL) within Smart Centre.
1. Place the new URLs in manually for each gateway.
6. Push an blank/empty Policy change to the firewall cluster in SMS
7. Change the Management IP address of the gateway in GAIA
Update each gateway to the new management interface in CLISH
Update the DNS host file entry for the firewall hostname/IP mapping:
8. Check ID Awareness PDP to ensure the firewalls are still connected to ID sharing peers:
pdp connections pep
pep show pdp all
Perform validation testing
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks - I was just wondering. I am due to remove a cluster object and reinstate it on a different interface on our firewall gateways. Would you recommend following that process?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sorry, no. I didn't read the title of this thread properly. That process I just gave you was for changing a Management interface to a new interface on the same firewall. Do not follow it for what you are doing, no.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Martin. So, would you recommend following the process outlined earlier in this post, or just delete the cluster interface, reconfigure the physical interfaces on the gateways, and then add the cluster interface referencing the new physical interfaces?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
yes, follow it. You will need to cpstop / cpstart.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks - so that is "cphastop/cphastart" on the standby gateway? Just making sure to cover all bases.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
yes, exactly as I have written it in bold in the original post.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you Martin. Much appreciated.
