SlideShare une entreprise Scribd logo
1  sur  45
HA, SRX Cluster &
Redundancy Groups
High Availability Cluster
High-availability clusters (also known
as HA clusters or failover clusters) are
groups of computers that support
server applications that can be
reliably utilized with a minimum of
down-time.

 They operate by harnessing
 redundant computers in groups
 or clusters that provide continued
 service when system components
Uses of HA Cluster
HA clusters are often used for:

1.   Critical Databases
2.   File Sharing on a Network
3.   Business Applications
4.   Customer Services such
     as electronic commerce websites
Cluster Monitoring
HA clusters usually use a heartbeat
private network connection which is
used to monitor the health and status of
each node in the cluster.
Application Design
Requirements
In order to run in a high-availability cluster
environment, an application must satisfy
at least the following technical
requirements:

 There must be a relatively easy way to
 start, stop, force-stop, and check the
 status of the application.
 The application must be able to use
 shared storage.
Count…
 Ability to restart on another node
 at the last state before failure using
 the saved state from the shared
 storage.
 The application must not corrupt
 data if it crashes, or restarts from
 the saved state.
Node Configurations
In two-node cluster configurations can
sometimes be categorized into one of
the following models:

1.   Active/active
2.   Active/passive
3.   N+1
4.   N+M
5.   N-to-1
6.   N-to-N
Active/active
Traffic intended for the failed node is
either passed onto an existing node
or load balanced across the
remaining nodes.
This is usually only possible when
the nodes utilize a homogeneous
software configuration.
Active/passive

Provides a fully redundant instance
of each node, which is only brought
online when its associated primary
node fails.
This configuration typically requires
the most extra hardware.
Node Reliability
HA clusters usually utilize all available
techniques to make the individual
systems and shared infrastructure as
reliable as possible. These include:
1. Disk Mirroring
2. Redundant Network
3. Redundant Storage Area Network
4. Redundant Electrical Power
5. Redundant Power Supply Units
Failover Strategies
Systems that handle failures in
distributed computing have different
strategies to cure a failure. For
instance, API defines three ways to
configure a failover:

1.   FAIL_FAST: The try fails if the first
     node cannot be reached.
2.   ON_FAIL_TRY_ONE_NEXT_AVAILABL
     E: Tries one more host before giving
     up
3.   ON_FAIL_TRY_ALL_AVAILABLE: Tries
     all existing nodes before giving up
What is SRX Cluster…?

SRX Cluster provides network node
redundancy by grouping a pair of the
same kind of supported SRX Series
devices or J Series devices into a
cluster.

 The devices must be running the
 same version of Junos OS.
SRX Cluster Example
SRX Plane
The SRX has a separated planes.
Depending on the SRX platform
architecture, the separation varies
from being separate processes
running on separate cores to
completely physically differentiated
subsystems.

1.   Control Plane
2.   Data Plane
Control Plane
 The control plane is used in HA to
 synchronize the kernel state between
 the two REs.
 It also provides a path between the two
 devices to send hello messages
 between them.
 The two devices’ control planes talk to
 each other over a control link. This link
 is reserved for control plane
 communication.
Count…
 The control plane is always in an
 active/backup state. This means only
 one RE can be the master over the
 cluster’s configuration and state.
 This ensures that there is only one
 ultimate truth over the state of the
 cluster. If the primary RE fails, the
 secondary takes over for it.
 Creating an active/active control plane
 makes synchronization more difficult
 because many checks would need to be
 put in place to validate which RE is
 right.
Control Plane States
Data Plane
 The data plane’s responsibility in
 the SRX is to pass data and
 processes based on the
 administrator’s configuration.
 All session and service states are
 maintained on the data plane.
 The REs and/or control plane are
 not responsible for maintaining
 state.
Responsibilities of Data
            Plane
    The data plane has a few
    responsibilities when it comes to HA
    implementation.
     First and foremost is state synchronization. The
      state of sessions and services is shared between
      the two devices.
  Sessions are the state of the current
  set of traffic that is going through the
  SRX, and services are other items
  such as:
1. VPN
2. IPS
3. ALGs
Chassis Cluster
An SRX cluster implements a concept
called chassis cluster. A chassis
cluster takes the two SRX devices and
represents them as a single device.

 The interfaces are numbered in such
 a way that they are counted starting
 at the first chassis and then end on
 the second chassis.
Chassis Cluster Numbering
Chassis Cluster Functionality
1. Resilient system architecture, with a
   single active control plane for the entire
   cluster and multiple Packet Forwarding
   Engines. This architecture presents a
   single device view of the cluster.
2. Synchronization of configuration and
   dynamic runtime states between nodes
   within a cluster.
3. Monitoring of physical interfaces, and
   failover if the failure parameters cross
   a configured threshold.
States of Cluster
The different states that a cluster can be in at
any given instant are as follows:
1. Hold
2. Primary
3. Secondary-Hold
4. Secondary
5. Ineligible
6. Disabled

A state transition can be triggered because of
any event, such as interface monitoring, SPU
monitoring, failures, and manual failovers.
Chassis Cluster Formation

To form a chassis cluster, a pair of the
same kind of supported SRX Series
devices or J Series devices are
combined to act as a single system
that enforces the same overall security.

 You can deploy up to 15 chassis
 clusters in a Layer 2 domain.
Identification of Clusters
Clusters and nodes are identified in
the following way:
 A cluster is identified by a cluster
  ID (cluster-id) specified as a
  number from 1 through15.
 A cluster node is identified by a
  node ID (node) specified as a
  number from 0 to 1.
Redundancy Groups
A redundancy group is an abstract
construct that includes and manages a
collection of objects. A redundancy
group contains objects on both nodes.

 A redundancy group is primary on one
 node and backup on the other at any
 time.
 We can create up to 128 redundancy
 groups.
Example of Redundancy
Groups
Primacy of Redundancy
Group
Three things determine the primacy of a
redundancy group:
1. The priority configured for the node
2. The node ID (in case of tied priorities)
3. The order in which the node comes
   up.

If a lower priority node comes up
first, then it will assume the primacy for a
redundancy group (and will stay as
primary if preempt is not enabled).
Redundancy Group
Monitoring
A redundancy group is automatically fail
over to another node, for this it has to
monitor some following components of the
Chassis Cluster:
1. Interface Monitoring
2. IP Address Monitoring
3. Monitoring of Global-Level Objects
     i. SPU Monitoring
     ii. Flowd Monitoring
     iii. Cold-Sync Monitoring
Chassis Cluster Redundancy
          Group Failover
A redundancy group is a collection of
objects that fail over as a group.
Each redundancy group monitors a
set of objects (physical
interfaces), and each monitored
object is assigned a weight.

 Each redundancy group has an
 initial threshold of 255.
Count…
    When a monitored object fails, the
    weight of the object is subtracted from
    the threshold value of the redundancy
    group.

    When the threshold value reaches
    zero, the redundancy group fails over
    to the other node. As a result, all the
    objects associated with the
    redundancy group fail over as well.
Count…
    Because back-to-back redundancy
    group failovers that occur too quickly
    can cause a cluster to exhibit
    unpredictable behavior, a dampening
    time between failovers is needed.

    The default dampening time is 300
    seconds (5 minutes) for redundancy
    group 0 and is configurable to up to
    1800 seconds with the hold-down-
    interval statement.
Count…
Redundancy groups x (redundancy
groups numbered 1 through 128)
have a default dampening time of 1
second, with a range of 0 through
1800 seconds.

The hold-down interval affects

manual failovers, as well as
automatic failovers associated with
monitoring failures.
Chassis Cluster Redundancy
      Group Manual Failover
We can initiate a redundancy group
x failover manually. A manual failover
applies until a failback event occurs.

You can also initiate a redundancy
group 0 failover manually if you want
to change the primary node for
redundancy group 0.
State Transitions Cases

There are three transition cases:

1. Reboot case—The node in the
secondary-hold state transitions to the
primary state; the other node goes
dead (inactive).
Count…
2. Control link failure case—The node
in the secondary-hold state transitions
to the ineligible state and then to a
disabled state; the other node
transitions to the primary state.

3. Fabric link failure case—The node
in the secondary-hold state transitions
directly to the disabled state.
SNMP Failover Traps
Chassis clustering supports SNMP
traps, which are triggered whenever there is
a redundancy group failover.
The trap message can help you
troubleshoot failovers. It contains the
following information:
1. The cluster ID and node ID
2. The reason for the failover
3. The redundancy group that is involved in
    the failover
4. The redundancy group’s previous state
    and current state
Chassis Cluster Interfaces
A network device doesn’t help a
network without participating in traffic
processing.
An SRX has two different interface
types that it can use to process traffic
that are:
1. Reth Interface
2. Local Interface
Reth Interface
 A Reth is a Junos
 aggregate
 Ethernet interface
 and it has special
 properties
 compared to a
 traditional
 aggregate
 Ethernet interface.
 The Reth allows
 the administrator
 to add one or more
 child links per
Reth MAC Address
The MAC address for the Reth is
based on a combination of the
cluster ID and the Reth number.
Count…




 In the figure the first four of the six
 bytes are fixed. They do not change
 between cluster deployments.
 The last two bytes vary based on
 the cluster ID and the Reth index.
Local Interface
 A local interface is an interface that is
 configured local to a specific node.
 This method of configuration on an
 interface is the same method of
 configuration on a standalone device.
Count…
The significance of a local interface
in an SRX cluster is that it does not
have a backup interface on the
other chassis, meaning that it is part
of neither a Reth nor a redundancy
group.

If this interface were to fail, its IP
address would not fail over to the
other node.
Troubleshooting the Cluster
There are various methods that
show the administrator how to
troubleshoot a chassis cluster:
1. Identify the Cluster Status
2. Checking Interfaces
3. Verifying the Data Plane
4. Core Dumps
5. The Dreaded Priority Zero
HA, SRX Cluster & Redundancy Groups

Contenu connexe

Tendances

Naming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile EntitiesNaming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile EntitiesRajat Kumar
 
Irat handover basics
Irat handover basicsIrat handover basics
Irat handover basicsZIZI Yahia
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configurationIT Tech
 
Access control list [1]
Access control list [1]Access control list [1]
Access control list [1]Summit Bisht
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!Niasta Learning
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 

Tendances (20)

Acl
AclAcl
Acl
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Aruba Mobility Controller 7200 Installation Guide
Aruba Mobility Controller 7200 Installation GuideAruba Mobility Controller 7200 Installation Guide
Aruba Mobility Controller 7200 Installation Guide
 
Airheads barcelona 2010 rf design for retail warehousing manufacturing
Airheads barcelona 2010   rf design for retail warehousing manufacturingAirheads barcelona 2010   rf design for retail warehousing manufacturing
Airheads barcelona 2010 rf design for retail warehousing manufacturing
 
Icmp
IcmpIcmp
Icmp
 
Naming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile EntitiesNaming Entities and Locating Mobile Entities
Naming Entities and Locating Mobile Entities
 
Virtual Intranet Access (VIA)
Virtual Intranet Access (VIA)Virtual Intranet Access (VIA)
Virtual Intranet Access (VIA)
 
Irat handover basics
Irat handover basicsIrat handover basics
Irat handover basics
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configuration
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Access control list [1]
Access control list [1]Access control list [1]
Access control list [1]
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!
 
Wireless ethernet
Wireless ethernetWireless ethernet
Wireless ethernet
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Aruba WLANs 101 and design fundamentals
Aruba WLANs 101 and design fundamentalsAruba WLANs 101 and design fundamentals
Aruba WLANs 101 and design fundamentals
 
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice ConfigurationEMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
 

En vedette

Training for F5 BIG-IP LTM and APM
Training for F5 BIG-IP LTM and APMTraining for F5 BIG-IP LTM and APM
Training for F5 BIG-IP LTM and APMBledar Meta
 
AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...
AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...
AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...Amazon Web Services
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsSteven_Jackson
 
Microsoft Azure Traffic Manager
Microsoft Azure Traffic ManagerMicrosoft Azure Traffic Manager
Microsoft Azure Traffic ManagerIdo Katz
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookRHC Technologies
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Mohamed Al-Natour
 
Cisco SourceFire
Cisco SourceFireCisco SourceFire
Cisco SourceFireAhmed Serag
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationPCCW GLOBAL
 

En vedette (9)

Training for F5 BIG-IP LTM and APM
Training for F5 BIG-IP LTM and APMTraining for F5 BIG-IP LTM and APM
Training for F5 BIG-IP LTM and APM
 
AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...
AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...
AWS re:Invent 2016: Global Traffic Management with Amazon Route 53 Traffic Fl...
 
Big Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager DsBig Ip Global Traffic Manager Ds
Big Ip Global Traffic Manager Ds
 
Microsoft Azure Traffic Manager
Microsoft Azure Traffic ManagerMicrosoft Azure Traffic Manager
Microsoft Azure Traffic Manager
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBook
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3
 
Cisco SourceFire
Cisco SourceFireCisco SourceFire
Cisco SourceFire
 
Gtm
GtmGtm
Gtm
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 

Similaire à HA, SRX Cluster & Redundancy Groups

Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...
Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...
Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...Valverde Computing
 
seminarembedded-150504150805-conversion-gate02.pdf
seminarembedded-150504150805-conversion-gate02.pdfseminarembedded-150504150805-conversion-gate02.pdf
seminarembedded-150504150805-conversion-gate02.pdfkarunyamittapally
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
Building a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ ApplianceBuilding a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ ApplianceAnthony Beardsmore
 
Rhel cluster basics 1
Rhel cluster basics   1Rhel cluster basics   1
Rhel cluster basics 1Manoj Singh
 
Process Synchronization And Deadlocks
Process Synchronization And DeadlocksProcess Synchronization And Deadlocks
Process Synchronization And Deadlockstech2click
 
concurrency control.ppt
concurrency control.pptconcurrency control.ppt
concurrency control.pptBikalAdhikari4
 
An introduction to_rac_system_test_planning_methods
An introduction to_rac_system_test_planning_methodsAn introduction to_rac_system_test_planning_methods
An introduction to_rac_system_test_planning_methodsAjith Narayanan
 
CLUSTERED-SYSTEM.pptx
CLUSTERED-SYSTEM.pptxCLUSTERED-SYSTEM.pptx
CLUSTERED-SYSTEM.pptxchelmingajo
 
Distributed computing
Distributed  computingDistributed  computing
Distributed computingSwetha544947
 
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...Soumya Banerjee
 
Dynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approachDynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approachIJARIIT
 
Cluster computings
Cluster computingsCluster computings
Cluster computingsRagu1033
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallVishal Kumar
 
Distributed systems and scalability rules
Distributed systems and scalability rulesDistributed systems and scalability rules
Distributed systems and scalability rulesOleg Tsal-Tsalko
 

Similaire à HA, SRX Cluster & Redundancy Groups (20)

Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...
Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...
Fundamentals Of Transaction Systems - Part 1: Causality banishes Acausality ...
 
Real Time Operating Systems
Real Time Operating SystemsReal Time Operating Systems
Real Time Operating Systems
 
seminarembedded-150504150805-conversion-gate02.pdf
seminarembedded-150504150805-conversion-gate02.pdfseminarembedded-150504150805-conversion-gate02.pdf
seminarembedded-150504150805-conversion-gate02.pdf
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
Building a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ ApplianceBuilding a Highly available messaging hub using the IBM MQ Appliance
Building a Highly available messaging hub using the IBM MQ Appliance
 
Rhel cluster basics 1
Rhel cluster basics   1Rhel cluster basics   1
Rhel cluster basics 1
 
Process Synchronization And Deadlocks
Process Synchronization And DeadlocksProcess Synchronization And Deadlocks
Process Synchronization And Deadlocks
 
concurrency control.ppt
concurrency control.pptconcurrency control.ppt
concurrency control.ppt
 
An introduction to_rac_system_test_planning_methods
An introduction to_rac_system_test_planning_methodsAn introduction to_rac_system_test_planning_methods
An introduction to_rac_system_test_planning_methods
 
Mcserviceguard2
Mcserviceguard2Mcserviceguard2
Mcserviceguard2
 
Ecbs2000
Ecbs2000Ecbs2000
Ecbs2000
 
CLUSTERED-SYSTEM.pptx
CLUSTERED-SYSTEM.pptxCLUSTERED-SYSTEM.pptx
CLUSTERED-SYSTEM.pptx
 
Distributed computing
Distributed  computingDistributed  computing
Distributed computing
 
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
 
Rtos
RtosRtos
Rtos
 
Dynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approachDynamic Load Calculation in A Distributed System using centralized approach
Dynamic Load Calculation in A Distributed System using centralized approach
 
Cluster computings
Cluster computingsCluster computings
Cluster computings
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
Rain Technology
Rain TechnologyRain Technology
Rain Technology
 
Distributed systems and scalability rules
Distributed systems and scalability rulesDistributed systems and scalability rules
Distributed systems and scalability rules
 

Plus de Kashif Latif

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming ApplicationKashif Latif
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of VarianceKashif Latif
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo ProcessorKashif Latif
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDPKashif Latif
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall FilterKashif Latif
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core SwitchKashif Latif
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFPKashif Latif
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 

Plus de Kashif Latif (16)

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming Application
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of Variance
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
DHCP
DHCPDHCP
DHCP
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo Processor
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDP
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall Filter
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core Switch
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFP
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 

Dernier

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Dernier (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

HA, SRX Cluster & Redundancy Groups

  • 1. HA, SRX Cluster & Redundancy Groups
  • 2. High Availability Cluster High-availability clusters (also known as HA clusters or failover clusters) are groups of computers that support server applications that can be reliably utilized with a minimum of down-time.  They operate by harnessing redundant computers in groups or clusters that provide continued service when system components
  • 3. Uses of HA Cluster HA clusters are often used for: 1. Critical Databases 2. File Sharing on a Network 3. Business Applications 4. Customer Services such as electronic commerce websites
  • 4. Cluster Monitoring HA clusters usually use a heartbeat private network connection which is used to monitor the health and status of each node in the cluster.
  • 5. Application Design Requirements In order to run in a high-availability cluster environment, an application must satisfy at least the following technical requirements:  There must be a relatively easy way to start, stop, force-stop, and check the status of the application.  The application must be able to use shared storage.
  • 6. Count…  Ability to restart on another node at the last state before failure using the saved state from the shared storage.  The application must not corrupt data if it crashes, or restarts from the saved state.
  • 7. Node Configurations In two-node cluster configurations can sometimes be categorized into one of the following models: 1. Active/active 2. Active/passive 3. N+1 4. N+M 5. N-to-1 6. N-to-N
  • 8. Active/active Traffic intended for the failed node is either passed onto an existing node or load balanced across the remaining nodes. This is usually only possible when the nodes utilize a homogeneous software configuration.
  • 9. Active/passive Provides a fully redundant instance of each node, which is only brought online when its associated primary node fails. This configuration typically requires the most extra hardware.
  • 10. Node Reliability HA clusters usually utilize all available techniques to make the individual systems and shared infrastructure as reliable as possible. These include: 1. Disk Mirroring 2. Redundant Network 3. Redundant Storage Area Network 4. Redundant Electrical Power 5. Redundant Power Supply Units
  • 11. Failover Strategies Systems that handle failures in distributed computing have different strategies to cure a failure. For instance, API defines three ways to configure a failover: 1. FAIL_FAST: The try fails if the first node cannot be reached. 2. ON_FAIL_TRY_ONE_NEXT_AVAILABL E: Tries one more host before giving up 3. ON_FAIL_TRY_ALL_AVAILABLE: Tries all existing nodes before giving up
  • 12. What is SRX Cluster…? SRX Cluster provides network node redundancy by grouping a pair of the same kind of supported SRX Series devices or J Series devices into a cluster.  The devices must be running the same version of Junos OS.
  • 14. SRX Plane The SRX has a separated planes. Depending on the SRX platform architecture, the separation varies from being separate processes running on separate cores to completely physically differentiated subsystems. 1. Control Plane 2. Data Plane
  • 15. Control Plane  The control plane is used in HA to synchronize the kernel state between the two REs.  It also provides a path between the two devices to send hello messages between them.  The two devices’ control planes talk to each other over a control link. This link is reserved for control plane communication.
  • 16. Count…  The control plane is always in an active/backup state. This means only one RE can be the master over the cluster’s configuration and state.  This ensures that there is only one ultimate truth over the state of the cluster. If the primary RE fails, the secondary takes over for it.  Creating an active/active control plane makes synchronization more difficult because many checks would need to be put in place to validate which RE is right.
  • 18. Data Plane  The data plane’s responsibility in the SRX is to pass data and processes based on the administrator’s configuration.  All session and service states are maintained on the data plane.  The REs and/or control plane are not responsible for maintaining state.
  • 19. Responsibilities of Data Plane  The data plane has a few responsibilities when it comes to HA implementation. First and foremost is state synchronization. The state of sessions and services is shared between the two devices.  Sessions are the state of the current set of traffic that is going through the SRX, and services are other items such as: 1. VPN 2. IPS 3. ALGs
  • 20. Chassis Cluster An SRX cluster implements a concept called chassis cluster. A chassis cluster takes the two SRX devices and represents them as a single device.  The interfaces are numbered in such a way that they are counted starting at the first chassis and then end on the second chassis.
  • 22. Chassis Cluster Functionality 1. Resilient system architecture, with a single active control plane for the entire cluster and multiple Packet Forwarding Engines. This architecture presents a single device view of the cluster. 2. Synchronization of configuration and dynamic runtime states between nodes within a cluster. 3. Monitoring of physical interfaces, and failover if the failure parameters cross a configured threshold.
  • 23. States of Cluster The different states that a cluster can be in at any given instant are as follows: 1. Hold 2. Primary 3. Secondary-Hold 4. Secondary 5. Ineligible 6. Disabled A state transition can be triggered because of any event, such as interface monitoring, SPU monitoring, failures, and manual failovers.
  • 24. Chassis Cluster Formation To form a chassis cluster, a pair of the same kind of supported SRX Series devices or J Series devices are combined to act as a single system that enforces the same overall security.  You can deploy up to 15 chassis clusters in a Layer 2 domain.
  • 25. Identification of Clusters Clusters and nodes are identified in the following way:  A cluster is identified by a cluster ID (cluster-id) specified as a number from 1 through15.  A cluster node is identified by a node ID (node) specified as a number from 0 to 1.
  • 26. Redundancy Groups A redundancy group is an abstract construct that includes and manages a collection of objects. A redundancy group contains objects on both nodes.  A redundancy group is primary on one node and backup on the other at any time.  We can create up to 128 redundancy groups.
  • 28. Primacy of Redundancy Group Three things determine the primacy of a redundancy group: 1. The priority configured for the node 2. The node ID (in case of tied priorities) 3. The order in which the node comes up. If a lower priority node comes up first, then it will assume the primacy for a redundancy group (and will stay as primary if preempt is not enabled).
  • 29. Redundancy Group Monitoring A redundancy group is automatically fail over to another node, for this it has to monitor some following components of the Chassis Cluster: 1. Interface Monitoring 2. IP Address Monitoring 3. Monitoring of Global-Level Objects i. SPU Monitoring ii. Flowd Monitoring iii. Cold-Sync Monitoring
  • 30. Chassis Cluster Redundancy Group Failover A redundancy group is a collection of objects that fail over as a group. Each redundancy group monitors a set of objects (physical interfaces), and each monitored object is assigned a weight.  Each redundancy group has an initial threshold of 255.
  • 31. Count…  When a monitored object fails, the weight of the object is subtracted from the threshold value of the redundancy group.  When the threshold value reaches zero, the redundancy group fails over to the other node. As a result, all the objects associated with the redundancy group fail over as well.
  • 32. Count…  Because back-to-back redundancy group failovers that occur too quickly can cause a cluster to exhibit unpredictable behavior, a dampening time between failovers is needed.  The default dampening time is 300 seconds (5 minutes) for redundancy group 0 and is configurable to up to 1800 seconds with the hold-down- interval statement.
  • 33. Count… Redundancy groups x (redundancy groups numbered 1 through 128) have a default dampening time of 1 second, with a range of 0 through 1800 seconds. The hold-down interval affects  manual failovers, as well as automatic failovers associated with monitoring failures.
  • 34. Chassis Cluster Redundancy Group Manual Failover We can initiate a redundancy group x failover manually. A manual failover applies until a failback event occurs. You can also initiate a redundancy group 0 failover manually if you want to change the primary node for redundancy group 0.
  • 35. State Transitions Cases There are three transition cases: 1. Reboot case—The node in the secondary-hold state transitions to the primary state; the other node goes dead (inactive).
  • 36. Count… 2. Control link failure case—The node in the secondary-hold state transitions to the ineligible state and then to a disabled state; the other node transitions to the primary state. 3. Fabric link failure case—The node in the secondary-hold state transitions directly to the disabled state.
  • 37. SNMP Failover Traps Chassis clustering supports SNMP traps, which are triggered whenever there is a redundancy group failover. The trap message can help you troubleshoot failovers. It contains the following information: 1. The cluster ID and node ID 2. The reason for the failover 3. The redundancy group that is involved in the failover 4. The redundancy group’s previous state and current state
  • 38. Chassis Cluster Interfaces A network device doesn’t help a network without participating in traffic processing. An SRX has two different interface types that it can use to process traffic that are: 1. Reth Interface 2. Local Interface
  • 39. Reth Interface  A Reth is a Junos aggregate Ethernet interface and it has special properties compared to a traditional aggregate Ethernet interface.  The Reth allows the administrator to add one or more child links per
  • 40. Reth MAC Address The MAC address for the Reth is based on a combination of the cluster ID and the Reth number.
  • 41. Count…  In the figure the first four of the six bytes are fixed. They do not change between cluster deployments.  The last two bytes vary based on the cluster ID and the Reth index.
  • 42. Local Interface  A local interface is an interface that is configured local to a specific node.  This method of configuration on an interface is the same method of configuration on a standalone device.
  • 43. Count… The significance of a local interface in an SRX cluster is that it does not have a backup interface on the other chassis, meaning that it is part of neither a Reth nor a redundancy group. If this interface were to fail, its IP address would not fail over to the other node.
  • 44. Troubleshooting the Cluster There are various methods that show the administrator how to troubleshoot a chassis cluster: 1. Identify the Cluster Status 2. Checking Interfaces 3. Verifying the Data Plane 4. Core Dumps 5. The Dreaded Priority Zero