Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Vladimir
Champion
Champion
Jump to solution

Unexpected new behavior of the AWS vSEC

I'm not sure if anyone have seen this, but building AWS vSEC cluster today, I am seeing this:

EIP assigned as an Alias to the external interface of the AWS vSEC

Nope, it was not defined manually.

Additionally, when failing over from active to standby members, secondary IPs are no longer moving to the new active member:

5 minutes later:

It may be a coincident, but the Check Point SE working on one of my previous cases (Inconsistent behavior of vSEC in AWS  ) was able to repeatedly reproduce the issue last week. but can no longer do so today.

If someone can get an update from CP about any changes that may have transpired in the past week, please let me know.

Thank you,

Vladimir

0 Kudos
1 Solution

Accepted Solutions
Vladimir
Champion
Champion

Confirmed bug in the current release of the vSEC AMI (ogu-13-233.raw).

From Check Point:

We have found the issue with the failover within WAS for version ogu-13-233.raw.

 

[Expert@gw-addef0:0]# cat /etc/in-aws

ogu-13-233.raw

 

The fix is to vi the files listed below and add the "shell=True" to lines 373 and 376 on the aws_had.py file and lines 40 and 43 on the aws_ha_test.py file

 

To get the line numbers, after you run the vi <file_name> and are in vi, enter the : and set number <enter> and the lines numbers will show.

 

 

$FWDIR/scripts/aws_had.py

 

    371     if proxy_address != '' and proxy_port.isdigit():

    372         conf['proxy'] = proxy_address + ':' + proxy_port

    373         subprocess.call('fw ctl set int fw_os_proxy_port ' + proxy_port, shell=True)

    374     else:

    375         conf['proxy'] = None

    376         subprocess.call('fw ctl set int fw_os_proxy_port 0', shell=True)

 

               

$FWDIR/scripts/aws_ha_test.py

               

     38 if proxy_address != '' and proxy_port.isdigit():

     39     HTTP_PROXY = proxy_address + ':' + proxy_port

     40     subprocess.call('fw ctl set int fw_os_proxy_port ' + proxy_port, shell=True)

     41 else:

     42     HTTP_PROXY = None

     43     subprocess.call('fw ctl set int fw_os_proxy_port 0', shell=True)

                 

 

Please let me know if you have any questions.

I beleive R&D will provide a new image to AWS, but in the meantime, this is the workaround for this image and we will publish an SK.

 

After modifying the files, you will need to run the following command to reconfigure the files:

 

Expert@HostName]# $FWDIR/Python/bin/python $FWDIR/scripts/aws_ha_cli.py reconf

 

Reboot vSEC for changes to take effect.

View solution in original post

4 Replies
Vladimir
Champion
Champion

For those looking at this thread:

The issue was replicated by TAC and forwarded to R&D.

Service Request # 1-9861861391

I'll update the thread when I'll get anything from them.

0 Kudos
Vladimir
Champion
Champion

Confirmed bug in the current release of the vSEC AMI (ogu-13-233.raw).

From Check Point:

We have found the issue with the failover within WAS for version ogu-13-233.raw.

 

[Expert@gw-addef0:0]# cat /etc/in-aws

ogu-13-233.raw

 

The fix is to vi the files listed below and add the "shell=True" to lines 373 and 376 on the aws_had.py file and lines 40 and 43 on the aws_ha_test.py file

 

To get the line numbers, after you run the vi <file_name> and are in vi, enter the : and set number <enter> and the lines numbers will show.

 

 

$FWDIR/scripts/aws_had.py

 

    371     if proxy_address != '' and proxy_port.isdigit():

    372         conf['proxy'] = proxy_address + ':' + proxy_port

    373         subprocess.call('fw ctl set int fw_os_proxy_port ' + proxy_port, shell=True)

    374     else:

    375         conf['proxy'] = None

    376         subprocess.call('fw ctl set int fw_os_proxy_port 0', shell=True)

 

               

$FWDIR/scripts/aws_ha_test.py

               

     38 if proxy_address != '' and proxy_port.isdigit():

     39     HTTP_PROXY = proxy_address + ':' + proxy_port

     40     subprocess.call('fw ctl set int fw_os_proxy_port ' + proxy_port, shell=True)

     41 else:

     42     HTTP_PROXY = None

     43     subprocess.call('fw ctl set int fw_os_proxy_port 0', shell=True)

                 

 

Please let me know if you have any questions.

I beleive R&D will provide a new image to AWS, but in the meantime, this is the workaround for this image and we will publish an SK.

 

After modifying the files, you will need to run the following command to reconfigure the files:

 

Expert@HostName]# $FWDIR/Python/bin/python $FWDIR/scripts/aws_ha_cli.py reconf

 

Reboot vSEC for changes to take effect.

Vladimir
Champion
Champion

Check Point pulled the problematic AMI and had it replaced.

From Check Point:

We have removed that image from AWS (take-013.233).

 

There was a new image released on Oct. 31 - take-013.240.

-------------------------------------------

0 Kudos
Joe_DeMichele
Explorer

More issues with AMI take-013.233. The recent sk121885 addresses the vSEC controller but does not fix the aws_had.py script on the gateway.   If you enable debugging for this process you will see failover cannot work due to CURL cert validation failures.  My workaround was to add -k to line 53.

cmd = ['curl_cli', '-s', '-f', '-g', '-k', '-L']

Hope this helps.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.