Forum Discussion
GTM Device groups
Hello,
I have 2 F5 DNS clusters in two datacenters acting as external DNS server. Each cluster should be able to operate fully standalone to server requests for a specific domain. How I see it I should create a device group for both units in DC_US and a another device group for both units in DC_EU. Each device group wil only synchronize configuration data within the local cluster.
Besides this, is there an option to synchronize data between both DNS groups (like GSLB pools per DC) within impacting the 'local'cluster?
Thanks :-)
- PeteWhiteEmployee
There are many ways to do this - GTM does not often use LTM failover for the listener ( though it can ). Ideally, you want your GTMs to all be in sync so if this were me then i would have 4 GTMs, all in a single sync group.
- jwilkesNimbostratus
How do you setup GTMs to do LTM failover for listener?
- David__PaschAltostratus
The HA configuration "local" has no relation with GTM Sync Group. You can have an HA configuration,... active/standby, active/active.
GTM is always standalone (and implicitly active). If you have more than one GTM, they will work together. For example, splitting work (like monitor), and sharing data (DNS zone files, WIPs, DNS pools).
When you have LTM and GTM together, LTM will still work independently from the GTM, but you can configure the GTM to take advantage of "local" HA clustering.
The GTM listener is a LTM virtual server for all intents and purposes. If you use the floating IP, only the active unit will respond to queries. If you configure the GTM devices with Listeners using the non-floating self IP, both can process DNS requests. Keep in mind the last scenario means that the DNS clients will have both IPs configured for DNS Servers.
More simply put, the HA "local" clustering, and the GTM Sync group clustering are completely separate.
Based on your overview, I would think you would want two HA clusters with one listener each. And all 4 GTM devices, in a sync group, sharing all DNS information (Bind, WIPs, GTM Pools,,.. and so on.). Also, depending on how you monitor the resources, use prober pools to keep the heavy lifting localized.
Hope it helps!
Good luck!
GTM Troubleshooting steps for GTM sync
- Have you checked if GTM sync group is working between both the GTMs you are expecting to see each other
tmsh show /gtm iquery all
tail -f /var/log/gtm | grep -i -e -n iquery
run iqdump from bash mode on both the GTMs and see If the iQuery channel is not established, iqdump returns with an SSL error similar to the following example:
iqdump 10.178.3.120
In the case of the BIG-IP DNS device not properly setup, you may want to re-run the gtm_add utility on the affected BIG-IP DNS device again
- BIG-IP DNS synchronization group members must be running the same software version
- Synchronization must be enabled and each device must have the same synchronization group name. You can define the synchronization parameters by navigating to:
BIG-IP DNS 11.5.0 and later:
DNS > Settings > GSLB > General
- NTP must be configured on each device
You can configure NTP by navigating to System > Configuration > Device > NTP
tmsh list /sys ntp servers
Check the logs
tail -f /var/log/gtm | grep -i -e -n ntp
tail -f /var/log/ltm | grep -i -e -n ntp
- Port Lockdown must be set properly for the relevant self IP addresses
You can configure port lockdown by navigating to Network > Self IPs.
tmsh list /net self allow-service
- Check if these port are able to communicate between both the GTMs on the specific self IP
Allowed Protocol Service Service Definition
TCP 4353 iQuery
TCP 22 SSH
TCP 53 DNS
UDP 53 DNS
UDP 1026 Network Failover
from bash check netstat and see if they can see each other IP there
netstat -na | grep 4353
tail -f /var/log/gtm | grep -i -e -n 4353
- try tcpdump on port 4353
tcpdump -nni 0.0:nnn -s0 tcp port 4353 -w "/var/tmp/$(/bin/hostname)_$(date +%Y-%m-%d-%H-%M-%S)_iquery.pcap"
- BIG-IP DNS synchronization group members use TCP port 4353 to communicate. You must verify that port 4353 is allowed between BIG-IP DNS systems.
- Compatible big3d versions must be installed on synchronization group members , run following from bash mode
big3d -v /shared/bin/big3d -v
tail -f /var/log/gtm | grep -i -e -n big3d
- A valid device certificate must be installed on all members
The default device certificate, /config/httpd/conf/ssl.crt/server.crt, must be installed on each sync group member. You can verify the certificate validity by navigating to System > Device Certificates.
Check the status of the device certificate by entering the following command:
openssl x509 -noout -text -in /config/httpd/conf/ssl.crt/server.crt
- Check for the system logs a successful iQuery connection to the /var/log/gtm file.
tail -f /var/log/gtm | grep -i -e -n iquery
Check If the iQuery protocol is blocked by router or firewall ACL ;
- Check the GTM specific daemons
tmsh show sys service tmm mcpd big3d gtmd
tail -f /var/log/gtm | grep -i -e -n mcpd
tail -f /var/log/gtm | grep -i -e -n big3d
tail -f /var/log/gtm | grep -i -e -n gtmd
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com