Manual Chapter :
Setting up F5 Guided
Configuration for SSL Orchestrator in High Availability
Applies To:
Show VersionsF5 SSL Orchestrator
- 15.1.9
Setting up F5 Guided
Configuration for SSL Orchestrator in High Availability
Overview: Setting up F5
Guided Configuration for SSL Orchestrator in high availability
This section describes how to deploy F5 SSL Orchestrator high availability (HA).
SSL Orchestrator HA configuration and deployment ensures a decrease in downtime and eliminates
single points of failure. The deployment of SSL Orchestrator’s HA works with the BIG-IP
device groups support to sync the SSL
Orchestrator specific configuration items, and is transparent to the user.
The deployment occurs after completing a configuration change and
selecting Deploy. The deployment request is first routed to one of the devices in the HA
device group. This first device configures the device where the request is received. After
successful deployment on that device, the request is repeated on other BIG-IP devices.
With SSL Orchestrator installed onto a dedicated system with failover, it
automatically takes over in case of system failure. Data is synchronized between the two
systems, ensuring high availability and consistent protection.
When upgrading SSL Orchestrator in HA, make sure to read all of the applicable notes and
warnings regarding the procedure. The HA upgrade process will break your current HA setup to
prevent the other device from performing an auto upgrade.
SSL Orchestrator high
availability deployment is supported for use only with SSL Orchestrator versions 2.1 and
later.
Setting up BIG-IP ISO with F5 Guided Configuration for SSL Orchestrator in high
availability
To ensure that your F5 SSL Orchestrator high availability (HA)
deployment succeeds, it is critical that you closely follow each deployment step, as well as the
assumptions and dependencies, for both devices in the device group. In addition, you should
adhere to all prerequisites. If the systems in the device group are not configured consistently,
the deployment synchronization process might suffer errors or fail.
To install and setup the BIG-IP ISO with SSL Orchestrator Guided Configuration
in HA, you will perform the following tasks to ensure your HA deployment succeeds:
- Install the BIG-IP ISO and SSL Orchestrator Guided Configuration.
- Configure the network for HA.
- Configure the ConfigSync and Failover IP address.
- Add a device to the local trust domain.
- Create a Sync-Failover device group.
- Synchronize the device group.
- Set up a basic configuration for deployment.
Assumptions and
dependencies
To ensure that your SSL Orchestrator HA deployment succeeds, it is
critical that you closely review and follow all assumptions and dependencies.
- HA Setup: BIG-IP HA (CMI) must be set to Active-Standby mode with network failover. See theBIG-IP Device Service Clustering: Administrationdocument for detailed information on Active-Standby HA mode.
- HA Setup: If the deployed device group is not properly synced or RPM packages are not properly syncing, make sure your HA self IP (for example,ha_self)Port Lockdownsetting is not set toAllow None. On the Main tab, click and click yourha_self. IfPort Lockdownis set toAllow Custom, check that the HA network port 443 is open on self IP.
- BIG-IP HA Devices: Only manual sync is supported.
- BIG-IP HA Devices: Devices in each BIG-IP HA pair must be the same model and run the same version of TMOS® (including any hotfixes). Except for the management interface, you must configure both devices to use the same arrangement of network interfaces, trunks, VLANs, self IPs (address and subnet mask), and routes. For example, if one BIG-IP device is connected to a specific VLAN/subnet using interface 1.1, the other BIG-IP device must also be connected to that VLAN/subnet using interface 1.1. If the BIG-IP device configurations do not match, this implementation will not deploy correctly, and HA failover will not work.
- User Experience: Deployment must be initiated from the active HA BIG-IP device.
- User Experience: If the environment is changed from non-HA to HA, or from HA to non-HA, the application must be redeployed.
- User Experience: You can refresh the SSL Interception Rules screen () for each peer device in order to see all modified changes.
Prerequisites
Before configuring the network for HA, make sure these prerequisites are in
place:
- The information used to configure your devices is identical on both devices. Without identical information on both devices, the HA deployment process can suffer from errors or fail.
- The latest version of BIG-IP SSL Orchestrator is successfully installed on the first device (the Active device). See the sectionInstalling and Upgrading F5 SSL Orchestratorto ensure that this prerequisite has been properly completed.
- Successfully set up an HA ConfigSync device group prior to starting the configuration. See the sectionConfiguring the network for high availabilityand its subsections to ensure that this prerequisite has been properly completed. For additional information, refer to theBIG-IP Device Service Clustering: Administrationdocument, sectionManaging Configuration Synchronization.
- SSL Orchestrator is installed with the appropriate license information using the SSL Orchestrator Setup Utility (or the CLI) and made sure your device setup information is identical on both devices:
- While using the SSL Orchestrator Setup Utility, you have noted the details used for NTP and DNS setup and made sure they will be identical on both devices. To verify duplication, on the Main tab, clickand selectNTPorDNS.
- Ensure that any certificates used in the configuration are copied to all devices.
- Ensure that information is identical on all devices. This information should include any of the following that are needed:
- Client network
- External network
- Decrypt zone network
- Decrypt zone control network
- Networks providing access to ICAP devices and Receive-only devices
- Ensure that the log publishers are configured and named the same.
- Ensure that all systems use the same interfaces for any services. (If interface 1.1 is used to send traffic to an inline Layer 2 device on system A, then interface 1.1 must also be used on systems B, C, and D.)
Do not attempt to duplicate the configuration by saving and restoring a user configuration set (UCS) file from one machine to the other, or any other cloning approach. There are several IDs that must be unique that will also be duplicated, causing additional problems.For more detailed information on using the SSL Orchestrator setup utility, see theUsing the SSL Orchestrator setup utilitysection.
Installing the BIG-IP
ISO and F5 Guided Configuration for SSL Orchestrator
Create a backup of your current configuration to ensure your settings are not lost
if the update fails.
Having the latest version of F5 BIG-IP SSL Orchestrator establishes the version that later appears
on your other BIG-IP HA peer device. After
downloading the latest version of the SSL Orchestrator from downloads.F5.com, return to your SSL Orchestrator deployment settings.
To install the latest version, refer to
Installing the new BIG-IP ISO image
section in this
guide or follow the steps shown below. - Go to https://downloads.f5.com and clickDownloads. The Downloads Overview screen opens.
- ClickFind a Download. The Select a Product Line screen opens.
- In theF5 Product Familycolumn, find the Security section.
- In theProduct Linecolumn, clickSSL Orchestrator. The Select a Product Version and Container for SSL Orchestrator screen opens.
- Select15.1.0from the list of BIG-IP version numbers and then click SSL Orchestrator. The Software Terms and Conditions screen opens.
- ClickI Accept. The Select a Download screen appears.
- Click the appropriate filename to download BIG-IP SSL Orchestrator.
- To install BIG-IP SSL Orchestrator, on the Main tab, click. The Images List screen opens.
- From theAvailable Imagessection, select the check box next the to BIG-IP 15.1.0 ISO image.
- ClickInstall. The Install Software Image popup screen opens.
- In theVolume set namelist, type a Boot Location name or number.
- ClickInstall. The Images List screen opens.If necessary, click the browser Refresh button if the BIG-IP version 15.1.0 image does not appear in the Installed Images list.
- The BIG-IP installation is complete once theInstall Statuscolumn for version 15.1.0 indicatescomplete.
See
the section
Installing and Configuring the System for F5 SSL
Orchestrator
in this guide for more additional detailed installation
instructions that may be required after completing this set of installation tasks.Make sure to install SSL Orchestrator on the active system
only. That system will copy it to the other systems in the ConfigSync
group.
Later, after a successful SSL Orchestrator HA
deployment, you should verify that the same version appears on the BIG-IP HA peer
device.
Configuring the network for high
availability
You can specify the settings for VLAN HA and self IP addresses on the active device
to configure your network for high availability. If needed, you can configure all
devices involved in the high availability group for HA.
This network connects the various
devices and must be a common Layer-2 network between all devices.
- On the Main tab, click.The VLAN List screen opens.
- ClickCreate.A New VLAN screen opens where you can configure your new VLAN.
- In theNamefield, type the name (for example,ha_vlan).
- For theInterfacessetting:
- From theInterfacelist, select an interface number.
- From theTagginglist, selectTaggedfor traffic for that interface to be tagged with a VLAN ID.
- ClickAdd.The interface you selected appears in theInterfaceslist as a tagged service.
- ClickFinished.Next to the F5 logo, your device status appears showingONLINE (ACTIVE)andStandalonewith green indicators showing their status as up and running.
- On the Main tab, click.The Self IP List screen opens.
- ClickCreate.A New Self IP screen opens where you can configure your new self IP.
- In theNamefield, type the self IP name (for example,ha_self).
- In theIP Addressfield, type the IP address for the device.
- In theNetmaskfield, type the netmask for the device.
- From theVLAN/Tunnellist, select the VLAN name (ha_vlan).
- ClickFinished.
Configuring ConfigSync and failover IP
addresses
Before creating the device group, you should configure the configuration
synchronization (ConfigSync) and Failover IP addresses for each
BIG-IP system in the device group. The ConfigSync address is the IP
address that the system uses when synchronizing configuration with peer devices, and
the failover address is the IP address that the system uses for network
failover.
- On the Main tab, click.The Devices List screen opens.
- Click your device in the device list.The properties screen for the device opens.
- ClickConfigSync.The screen shows the ConfigSync Configuration area, with the local address of the device.
- From theLocal Addresslist, select the VLAN address (ha_vlan).
- ClickUpdate.
- ClickFailover Network, and then clickAdd.The New Failover Unicast Address screen opens.
- In theAddressfield, make sure that the VLAN address (ha_vlan) is present.
- ClickRepeat.
- After the screen refreshes, from theAddresslist, select the Management Address.Connection Mirroring is not supported.
- ClickFinished.The Failover Unicast Configuration area lists both the VLAN HA (ha_vlan) and Management Address devices.
Adding a device to local trust
domain
Any BIG-IP devices that you intend to add to a device group
must first be members of the same local trust domain. When a BIG-IP device joins the
local trust domain, it establishes a trust relationship with peer BIG-IP devices
that are members of the same trust domain. For example, if you are creating a device
group with two members, you must log in to one of the devices and join the other
device to that system's local trust domain. The devices can then exchange their
device properties and device connectivity information.
- On the Main tab, click.The Device Trust screen opens.
- On the menu bar, clickDevice Trust Membersto view peer and subordinate device settings.The Device Trust Members screen opens.
- ClickAdd.The Device Trust screen opens, showing Retrieve Device Credentials (Step 1 of 3).
- From theDevice Typelist, selectPeer.
- In theDevice IP Addressfield, type the IP address of your device.
- ClickRetrieve Device Information.The screen shows Verify Device Certificates (Step 2 of 3).
- ClickDevice Certificate Matches.The screen shows Add Device (Step 3 of 3).
- In theNamefield, type the name of the device you are adding.
- ClickAdd Device.At the upper right, next to the F5 logo, the status of your device should showONLINE (ACTIVE)andConnected, with a green indicator next to them showing its active and connected status.
Creating a sync-failover device
group
For an HA configuration, you need to establish failover capability between two or
more BIG-IP devices. Then, if an active device in a
sync-failover device group becomes unavailable, the configuration objects fail over
to another member of the device group, and traffic processing is unaffected. You
perform this task on any one of the authority devices within the local trust
domain.
- On the Main tab, click.The Device Group List screen opens.
- ClickCreate.The New Device Group screen opens.
- In the General Properties area, name your new device group and select the group type.
- In theNamefield, type the name of your device group.
- From theGroup Typelist, selectSync-Failover.
- For theConfigurationsetting, retain theBasicconfiguration type, and then select members and define the sync type.
- In theMemberssetting, select available devices from theAvailablelist and add them to theIncludeslist.
- From theSync Typelist, selectManual with Incremental Sync.You must do a manual sync. If you selectAutomatic with Incremental Sync, your HA deployment will fail.
- ClickFinished.
The Device Groups list screen opens,
listing your new device group. The ConfigSync Status column will indicate
waiting
Initial Sync
.Synchronizing the device group
For an HA configuration, you need to synchronize the BIG-IP®
configuration data from the local device to the devices in the device group. This
synchronization ensures that devices in the device group operate properly. When
synchronizing self IP addresses, the BIG-IP system synchronizes floating self IP
addresses only.
- Next to the F5 logo, clickAwaiting Initial Sync.On the Main tab, you can also click.The Device Management Overview screen opens, showing your Device Groups.
- In the Sync Issues area, selecthato expand the Devices and Sync Options areas of the screen.
- In the Devices area, select the device showingChanges Pending.
- In the Sync Options area, selectPush the selected device configuration to the group.
- ClickSync.
You have now completed your F5® SSL Orchestrator™ HA deployment.
Next, set up a basic configuration for deployment on your active device.
Setting up a basic configuration for
deployment
You must create identical information
on each device before deploying the configuration.
You can now setup a basic
configuration for deployment on your active device.
- On the Main tab, click.The Deployment Settings screen opens.
- Refer to theConfiguring deployment settingssection for complete instructions.After you deploy your configuration on the active device, the system automatically synchronizes the configuration with all of the other devices in the device group. Since some errors may not be apparent, it is critical that you thoroughly test and diagnose the success or failure of the deployment. Refer toTask summary for diagnosing and fixing high availability deploymentfor steps to test and verify your HA deployment.
Upgrading BIG-IP ISO with F5 Guided Configuration
for SSL Orchestrator in high availability
When upgrading SSL Orchestrator in High Availability (HA), the upgrade process will
break your current HA setup to prevent the other device from performing an auto
upgrade.
Before you begin, create a backup of your current configuration to
ensure your settings are not lost if the update fails.
Use the following tasks to upgrade your BIG-IP ISO with SSL Orchestrator
Guided Configuration in HA:
- Verify that gossip is working between the HA device pair.
- Upgrade the BIG-IP ISO to a major or point release version for SSL Orchestrator Guided Configuration.
- Upgrade the BIG-IP ISO from 14.1.x to Hotfix-BIGIP-14.1.x.x.x.x.x for SSL Orchestrator Guided Configuration.
This section applies to the following upgrade scenarios:
- BIG-IP ISO upgrade from point version (14.1.x.x) release to major version (15.x.x) release.
- BIG-IP ISO upgrade from 14.1.x to Hotfix-BIGIP-14.1.x.x.x.x.x (SSL Orchestrator RPM May be same or different as packaged with HF ISO).
- BIG-IP ISO upgrade from major version (14.1.0) release to point version (14.1.x.x.x) release.
- BIG-IP ISO upgrade from point version (14.1.x.x) release to another point version (14.1.x.x.x) release.
Assumptions and dependencies
To ensure that your SSL Orchestrator HA upgrade succeeds, it is
critical that you closely review and follow all assumptions and dependencies.
- HA Setup: This chapter only addresses the SSL Orchestrator module upgrade.
- HA Setup: This chapter guides you through the upgrade process using the management IP and the SSL Orchestrator Guided Configuration UI.
- HA Setup: You must ensure you have adequate space for installing the new ISO.
- BIG-IP HA Devices: If any other modules are used and configured on the BIG-IP, refer to their respective upgrade guide before starting the upgrade. Some of the modules may require specific pre-upgrade and post-upgrade procedural steps.
- BIG-IP HA Devices: Existing traffic will be impacted during upgrade.
- BIG-IP HA Devices: Existing configurations are copied to the new partition during installation of a new ISO and not when booting into the new partition. In the new partition, the user will see the configuration which was present at the time of the ISO installation.F5 recommends you do not perform any SSL Orchestrator configurations after installing the new software image.
- BIG-IP HA Devices: SSL Orchestrator will only successfully upgrade if the ISO upgrade is successful. If there are any issues with the new partition or software installation in the new partition, the SSL Orchestrator upgrade may fail or behave in an unexpected manner.
- User Experience: Do not click on the SSL Orchestrator menu, or sub menu, until both HA devices are successfully upgraded and running the same version of ISO.
- User Experience: Do not use the iAppsLx menu for upgrade or modify any SSL Orchestrator iAppsLx instances.
- User Experience: Only active and standby modes are supported in HA mode (assuming there will be only two devices in HA).
Prerequisites
Before upgrading the network for high availability, make sure
these prerequisites are in place:
- You must have access to theUI through the management IP with administrator access privileges.
- You must have access privileges to SSH a device.
- Both devices should be synchronized.
- Gossip should be in a working stage.
- The HA pair should be in a “good state”. Check the logs (restnoded, restjavad, TMM) for any errors before starting the upgrade. Also make sure to perform a CMI synchronization.
- When HA breaks with an HA Layer 2 wired device setup, it may cause a Layer 2 loop that may result in network failure. To ensure there is no network failure in this instance, make sure the STP is properly configured.
Verifying gossip is working between the high availability device
pair
- On the Main tab, clickto check the HA sync failover group settings:
- If the group is not present, then you must create one.
- TheGrouptype should displaySync-Failover.
- All HA devices should be present in theIncludesfield.
- The sync type should displayManual with Incremental Sync.
- Using any web browser, open the URLhttps://<Management IP>/mgmt/shared/gossipfor all the HA devices. Change the <Management IP> with the management IP belonging to the HA devices and verify that the status shows asACTIVE.
- Using any web browser, open the URLhttps://<Management IP>/mgmt/tm/cm/devicefor all the HA devices. Change the <Management IP> with the management IP belonging to the HA devices and verify the following:
- Verify that the item’s count, returned on both the devices, are same.
- Verify that the attributeconfigsyncIpis present for all of the devices and that they match the HA VLAN IP of the corresponding device.
- Verify for each device that the attributeunicastAddressis present and that theconfigsyncIpvalue is an entry ofunicastAddress. In addition, the management IP should also be an entry ofunicastAddress.
- Using any web browser, open the URLhttps://<Management IP>/mgmt/shared/resolver/device-groups/tm-shared-all-big-ips/devicesfor all of the HA devices in the browser. Change the <Management IP> with the management IP belonging to the HA devices. This will give the list of devices participating in the gossip so you can validate the following:
- Validate that all of the devices are present and are consistent with the results shown in step 2 and step 3.
- Validate that the attributeaddressis present and it matches the corresponding device HAconfigsyncIp.
- Check the portLockdownsettings on all the HA devices by performing the following:
- Use any browser and log in to all HA devices using the management IP.
- On the Main tab, clickand then select the Self IP used with HA VLAN.
- Verify that thePort LockdowndisplaysAllow AllorAllow Default.
- Using any web browser, open the URLhttps://<<Management IP>>/mgmt/tm/shared/bigip-failover-statefor all of the HA devices. Change the <Management IP> with the management IP of the HA devices and verify the following:
- Verify that the attributefailoverStateis set toActivefor active device andStandbyfor the standby device.
- Verify that the attributenetworkFailoverDeviceGroupmatches the corresponding HA device.
- If there is still an error or verification is not working correctly, perform the following to troubleshoot issues:
- Check whether the currently installed.isoand.rpmversions of each device are identical.
- Ping device B'sconfigsyncIpat device A.If this does not work, check if the VLAN for the HA setup is bound to correct network interface, and/or the selfIP (used asconfigsyncIp) of this VLAN is set correctly.
- Check that theNTPandDNSsettings of each device are identical.
- On the Main tab, clickand review the resulting status. Make sure there are no warnings or errors.
Upgrading BIG-IP ISO to a major or point release version with F5
Guided Configuration for SSL Orchestrator in high availability
Verify all Prerequisites before starting the
upgrade.
When upgrading SSL Orchestrator in High Availability (HA), the upgrade
process will break your current HA setup to prevent the other device from performing
an auto upgrade.
This section applies to the following upgrade
scenarios:
- Upgrading from main release to point release (From 14.1.x to 14.1.x.x)
- Upgrading from main release to next main release (From 14.1.x to 15.x.x)
- Upgrading from main release to next point and main release (From 14.1.x to 15.x.x.x)
- Upgrading from point release to next main release or point release (From 14.1.x .x to 15.x.x.x or 15.x.x)
- If your HA device pair are not in sync, perform a manual configuration sync and take a UCS backup on to both devices.
- Download the target ISO from https://downloads.f5.com/esd/product.jsp?sw=BIG-IP&pro=big-ip_v14.x and select14.1.0from the list to see all the available downloads for the 14.1.x version of BIG-IP.
- To upload the new ISO on both devices, perform the following steps (this process can be initiated on both of the devices in parallel and in any sequence):
- Using the management IP, on the Main tab, clickand clickImport.
- ClickChoose Fileand select the newly downloaded ISO and clickImport.
- Update the standby box
- Remove all devices from the device group by performing the following steps (this will break HA and prevent the other box from performing an auto upgrade):
- Log in to theStandBydevice using the management IP and on the Main tab, click .
- Click on theInclude Selfdevice.
- Select all the device members and move it to theAvailablesection and clickUpdate.
- To install the new ISO, perform the following:
- From the Main tab, click.
- Select the check box next to the software image to be installed and clickInstall.Wait until the image installation is complete. This page will continue to refresh to display the install status.
- After the image installation successfully completes, perform the following steps to boot into the new partition:
- On the Main tab, click.
- Click on theBoot Locationwhere the new software image is installed. The General Properties screen appears.
- ClickActivateandOKon the confirmation dialog and wait until the device is fully booted into the new partition.This step is not applicable to the Viprion chassis.
- After the standby device successfully boots, verify that the software upgrade was successful by checking the logs (restnoded, restjavad, ltm) for errors.At this time, do not click on any part of the SSL Orchestrator menu or submenu in UI.
- After you have verified that ISO upgrade was successful, on the Main tab, click.
- This will automatically upgrade SSL Orchestrator with the new RPM that is packaged with the ISO.Once the SSL Orchestrator screen loads, do not click on any tab or link on the menu, submenu, or screen.
- On the Main tab, clickand validate the SSL Orchestrator RPMVersionnumber showing in the top right banner. You can also hover your mouse over the information icon for more detailed information.
- On the Main tab, clickand validate that the system is still deploying a configuration. If system is deploying a configuration then wait on this screen until all deployments are complete before moving to next step.
- In case of an error, perform the following troubleshooting steps:
- Correct the configuration and deploy again.
- If the above step does not resolve the issue, delete all SSL Orchestrator configurations and restore the UCS backup by restartingrestnoded.
- If the UCS backup does not resolve the issue, open a support case to debug.
- Update the active device by installing the new ISO
- On the Main tab, clickand select the software image that needs to be installed by selecting its corresponding checkbox.
- ClickInstalland wait until the image installation completes. This page will continue to refresh to display the install status.
- After the image install is complete, perform the following steps to boot into the new partition:
- On the Main tab, click.
- Select theBoot Locationthe new software image is installed (this will appear on the General Properties screen).
- ClickActivateandOKand wait until the device fully boots into the new partition.
- After the active device successfully boots, verify the software successfully upgrades on the active device and review the logs for errors.Do not click on any tab or link on the SSL Orchestrator menu, submenu, or screen.
- After verifying a successful ISO upgrade, on the Main tab, clickto auto upgrade SSL Orchestrator with the new RPM.Once the SSL Orchestrator screen loads, do not click on any tab or link on the menu, submenu, or screen.
- On the Main tab, clickand validate the SSL Orchestrator RPMVersionnumber showing in the top right banner. You can also hover your mouse over the information icon for more detailed information.
- On the Main tab, clickto validate the system is deploying a configuration. If system is deploying a configuration, wait on this screen until all deployments are complete.
- In case of an error, perform the following troubleshooting steps:
- Correct the configuration and deploy again.
- If the above step does not resolve the issue, delete all SSL Orchestrator configurations and restore the UCS backup by restartingrestnoded.
- If the UCS backup does not resolve the issue, open a support case to debug.
- To add devices to a device group, perform the following steps:
- On the Main tab, clickand click on theInclude Selfdevice.
- Select all the device group members and move them to theIncludessection and clickUpdate.
- Verify that the Observer Box status at the top left of the screen changes fromActiveandStandbymode.
- If any changes are pending after the upgrade, initiate a configuration sync.
- After a successful upgrade, to install a different version of the SSL Orchestrator RPM, perform the following steps:
- On the Main tab of an active box, clickand click on theUpgrade SSL Orchestratorlink.
- Select a new RPM and clickUpload and install.
- Wait until the installation completes and the screen is refreshed.Before continuing with any further configurations, log in to the standby device and validate that the standby device also upgraded to the new RPM version.
Upgrading BIG-IP ISO from 14.1.x to Hotfix-BIGIP-14.1.x.x.x.x.x with
F5 Guided Configuration for SSL Orchestrator in high availability
Verify all Prerequisites
before starting the upgrade.
When upgrading SSL Orchestrator in High Availability
(HA), the upgrade process will break your current HA setup to prevent the other
device from performing an auto upgrade.
The SSL Orchestrator
RPM may be the same as or different than the one packaged with the HF ISO.
- If your HA device pair are not in sync, perform a manual configuration sync and take a UCS backup on to both devices.
- Download the target HF ISO from https://downloads.f5.com.
- To upload the EHF ISO on both devices, perform the following steps (this process can be initiated on both of the devices in parallel and in any sequence):
- Using the management IP, on the Main tab, clickand clickImport.
- ClickChoose Fileand select the newly downloaded ISO and clickImport.
- Update the standby box
- Remove all devices from the device group by performing the following steps (this will break HA and prevent the other box from performing an auto upgrade):
- Log in to theStandBydevice using the management IP and on the Main tab, click .
- Click on theInclude Selfdevice.
- Select all the device members and move it to theAvailablesection and clickUpdate.
- To install the new EHF ISO, perform the following:
- From the Main tab, click.
- Select the check box next to the software image to be installed and clickInstall.Wait until the image installation is complete. This page will continue to refresh to display the install status.
- After the image installation successfully completes, perform the following steps to boot into the new partition:
- On the Main tab, click.
- Click on theBoot Locationwhere the new HF software image is installed. The General Properties screen appears.
- ClickActivateandOKon the confirmation dialog and wait until the device is fully booted into the new partition.This step is not applicable to the Viprion chassis.
- After the standby device successfully boots, verify that the software upgrade was successful by checking the logs (restnoded, restjavad, ltm) for errors.At this time, do not click on any part of the SSL Orchestrator menu or submenu in UI.
- After you have verified that ISO upgrade was successful, on the Main tab, click.
- This will automatically upgrade SSL Orchestrator with the new RPM that is packaged with the ISO.Once the SSL Orchestrator screen loads, do not click on any tab or link on the menu, submenu, or screen.
- On the Main tab, clickand validate the SSL Orchestrator RPMVersionnumber showing in the top right banner. You can also hover your mouse over the information icon for more detailed information.
- On the Main tab, clickand validate that the system is still deploying a configuration. If system is deploying a configuration then wait on this screen until all deployments are complete before moving to next step.
- In case of an error, perform the following troubleshooting steps:
- Correct the configuration and deploy again.
- If the above step does not resolve the issue, delete all SSL Orchestrator configurations and restore the UCS backup by restartingrestnoded.
- If the UCS backup does not resolve the issue, open a support case to debug.
- Update the active device by installing the new ISO
- On the Main tab, clickand select the software image that needs to be installed by selecting its corresponding checkbox.
- ClickInstalland wait until the image installation completes. This page will continue to refresh to display the install status.
- After the image install is complete, perform the following steps to boot into the new partition:
- On the Main tab, click.
- Select theBoot Locationthe new software image is installed (this will appear on the General Properties screen).
- ClickActivateandOKand wait until the device fully boots into the new partition.
- After the active device successfully boots, verify the HF software successfully upgrades on the active device and review the logs for errors.Do not click on any tab or link on the SSL Orchestrator menu, submenu, or screen.
- After verifying a successful ISO upgrade, on the Main tab, clickto auto upgrade SSL Orchestrator with the new RPM.Once the SSL Orchestrator screen loads, do not click on any tab or link on the menu, submenu, or screen.
- On the Main tab, clickand validate the SSL Orchestrator RPMVersionnumber showing in the top right banner. You can also hover your mouse over the information icon for more detailed information.
- On the Main tab, clickto validate the system is deploying a configuration. If system is deploying a configuration, wait on this screen until all deployments are complete.
- In case of an error, perform the following troubleshooting steps:
- Correct the configuration and deploy again.
- If the above step does not resolve the issue, delete all SSL Orchestrator configurations and restore the UCS backup by restartingrestnoded.
- If the UCS backup does not resolve the issue, open a support case to debug.
- To add devices to a device group, perform the following steps:
- On the Main tab, clickand click on theInclude Selfdevice.
- Select all the device group members and move them to theIncludessection and clickUpdate.
- Verify that the Observer Box status at the top left of the screen changes fromActiveandStandbymode.
- If any changes are pending after the upgrade, initiate a configuration sync.
- After a successful upgrade, to install a different version of the SSL Orchestrator RPM, perform the following steps:
- On the Main tab of an active box, clickand click on theUpgrade SSL Orchestratorlink.
- Select a new RPM and clickUpload and install.
- Wait until the installation completes and the screen is refreshed.Before continuing with any further configurations, log in to the standby device and validate that the standby device also upgraded to the new RPM version.
Diagnosing and fixing a high availability deployment
Use the following methods to help diagnose, verify, and fix a failed high
availability (HA) deployment:
- Verify your deployment and view the logs.
- Verify the RPM file version on both devices.
- Configure your deployment settings and redeploy.
- Review the error logs and perform any necessary recovery steps.
Verifying deployment and viewing
logs
You can verify your deployment by
verifying that the required virtuals, profiles, and
BIG-IP LTM and network objects have been created, checking that the RPM
files are in sync, and reviewing logs for failures, for example.
Because the initial device in the HA
device group repeats the configuration requests and propagates the configuration to
other BIG-IP devices, make sure you verify the initial configured device first,
followed by each device in the HA device group. If the initial device deployment
configuration fails, all other device configuration deployments will not
successfully be configured.
- Verify that all expected and required virtuals, profiles, and BIG-IP LTM and network objects (route-domains, VLANs, self IPs) have been created on each device in the HA device group.These will be items beginning with the name given to the application (for example, if the application was named SSLO, verify that all of the items named | Summary SSL Orchestrator 15.1.0 | 9 SSLO_* are the same on all devices).
- Ensure that all RPM file versions are identical.
- Verify your deployment with, or without, services.
- Review the following logs for failures:
- /var/log/restnoded/restnoded.log
- /var/log/restjavad.0.log
Verifying the RPM file version on both
devices
After a successful F5® SSL Orchestrator™ HA deployment, verify that the latest version
of the SSL Orchestrator zip file is installed on both devices.
The following details are for SSL Orchestrator versions 14.1.x-5.x or
higher.
- On the Main tab, click.The SSL Orchestrator screen opens.
- For both devices, validate the SSL Orchestrator RPM Version number showing in the top right banner. You can also hover your mouse over the information icon for more detailed version information.
If the versions are not identical, you must install an updated RPM file and verify
that both devices are identically configured.
Configuring deployment
settings and redeploying
If your configured deployment continues to fail, you can remove
and reconfigure all deployment settings.
- Remove all configurations present on all devices.
- For all devices, individually configure each section in the F5® SSL Orchestrator™ deployment settings and selectFinished. Verify that all new objects are properly synced and deployed.If synchronization or deployment issues persist after deploying after each section, attempt to deploy after updating each item (instead of after each section) in the SSL Orchestrator deployment settings and verify that all new objects are properly synced and deployed.
Reviewing error logs and performing
recovery steps
You can review log messages to help you debug system activity and
perform recovery steps. Refer to the
Setting up F5
Guided Configuration for SSL Orchestration logs settings
section of this
document for more information on generating logs and setting the level of logging
you want the system to perform.- Verify that all BIG-IP® LTM®and network objects are present on each of the devices in the HA device group.
- If the configuration deployment fails on each device, review the logs:
- /var/log/restnoded/restnoded.log
- /var/log/restjavad.0.log
- Use the following REST GET command to determine the state of the deployed device block in the REST storage:
- curl -s -k -u admin:adminhttps://localhost/mgmt/shared/iapp/blocks| json-format
- Since failure scenarios can vary, after reviewing the logs, attempt the following recovery steps:
- Redeploy SSL Orchestrator.If this succeeds, you have recovered from the failure situation.
- Undeploy SSL Orchestrator.By undeploying, a cleanup of MCP objects on each of the devices occurs while also cleaning up required data properties within the block stored in REST storage. If this succeeds, attempt to redeploy again.
- If redeploy or undeploy fails, do the following:
- From command line (back door),run > touch /var/config/rest/iapps/enable.
- Refresh the SSL Orchestrator menu UI.
- Select the deployed application from the list and delete the application.
- Redeploy and undeploy again.
- Once done, remove the filerm -f /var/config/rest/iapps/enable.
- If these recovery steps do not work, you may need to clean up the REST storage.
For more detailed information on
setting up HA, see the
BIG-IP Device Service Clustering: Administration
document.