Technical Forum
Ask questions. Discover Answers.
cancel
Showing results for 
Search instead for 
Did you mean: 

GTM Device groups

Kees_Smit
Nimbostratus
Nimbostratus

Hello,

 

I have 2 F5 DNS clusters in two datacenters acting as external DNS server. Each cluster should be able to operate fully standalone to server requests for a specific domain. How I see it I should create a device group for both units in DC_US and a another device group for both units in DC_EU. Each device group wil only synchronize configuration data within the local cluster.

 

Besides this, is there an option to synchronize data between both DNS groups (like GSLB pools per DC) within impacting the 'local'cluster?

 

Thanks 🙂

 

4 REPLIES 4

PeteWhite
F5 Employee
F5 Employee

There are many ways to do this - GTM does not often use LTM failover for the listener ( though it can ). Ideally, you want your GTMs to all be in sync so if this were me then i would have 4 GTMs, all in a single sync group.

 

How do you setup GTMs to do LTM failover for listener?

David__Pasch
Altostratus
Altostratus

The HA configuration "local" has no relation with GTM Sync Group. You can have an HA configuration,... active/standby, active/active.

 

GTM is always standalone (and implicitly active). If you have more than one GTM, they will work together. For example, splitting work (like monitor), and sharing data (DNS zone files, WIPs, DNS pools).

 

When you have LTM and GTM together, LTM will still work independently from the GTM, but you can configure the GTM to take advantage of "local" HA clustering.

 

The GTM listener is a LTM virtual server for all intents and purposes. If you use the floating IP, only the active unit will respond to queries. If you configure the GTM devices with Listeners using the non-floating self IP, both can process DNS requests. Keep in mind the last scenario means that the DNS clients will have both IPs configured for DNS Servers.

 

More simply put, the HA "local" clustering, and the GTM Sync group clustering are completely separate.

 

Based on your overview, I would think you would want two HA clusters with one listener each. And all 4 GTM devices, in a sync group, sharing all DNS information (Bind, WIPs, GTM Pools,,.. and so on.). Also, depending on how you monitor the resources, use prober pools to keep the heavy lifting localized.

 

Hope it helps!

 

Good luck!

 

GTM Troubleshooting steps for GTM sync

 

 

  1. Have you checked if GTM sync group is working between both the GTMs you are expecting to see each other

 

tmsh show /gtm iquery all

tail -f  /var/log/gtm | grep -i -e -n iquery

 

run iqdump from bash mode on both the GTMs and see If the iQuery channel is not established, iqdump returns with an SSL error similar to the following example:

 

iqdump 10.178.3.120

 

 

In the case of the BIG-IP DNS device not properly setup, you may want to re-run the gtm_add utility on the affected BIG-IP DNS device again

 

 

  1. BIG-IP DNS synchronization group members must be running the same software version

 

  1. Synchronization must be enabled and each device must have the same synchronization group name. You can define the synchronization parameters by navigating to:

 

BIG-IP DNS 11.5.0 and later:

 

DNS > Settings > GSLB > General

 

 

  1. NTP must be configured on each device

You can configure NTP by navigating to System > Configuration > Device > NTP

 

tmsh list /sys ntp servers

 

 

Check the logs

 

tail -f  /var/log/gtm | grep -i -e -n ntp

tail -f  /var/log/ltm | grep -i -e -n ntp

 

  1. Port Lockdown must be set properly for the relevant self IP addresses

You can configure port lockdown by navigating to Network > Self IPs.

 

tmsh list /net self allow-service

 

  1. Check if these port are able to communicate between both the GTMs on the specific self IP

 

Allowed Protocol              Service Service Definition

TCP        4353       iQuery

TCP        22                           SSH

TCP        53                           DNS

UDP       53                           DNS

UDP       1026       Network Failover

 

from bash check netstat and see if they can see each other IP there

 

netstat -na | grep 4353

 

tail -f  /var/log/gtm | grep -i -e -n 4353

 

  1. try tcpdump on port 4353

 

tcpdump -nni 0.0:nnn -s0 tcp port 4353 -w "/var/tmp/$(/bin/hostname)_$(date +%Y-%m-%d-%H-%M-%S)_iquery.pcap"

 

 

 

 

  1. BIG-IP DNS synchronization group members use TCP port 4353 to communicate. You must verify that port 4353 is allowed between BIG-IP DNS systems.

 

 

  1. Compatible big3d versions must be installed on synchronization group members , run following from bash mode

 

big3d -v /shared/bin/big3d -v

 

tail -f  /var/log/gtm | grep -i -e -n big3d

 

  1. A valid device certificate must be installed on all members

 

The default device certificate, /config/httpd/conf/ssl.crt/server.crt, must be installed on each sync group member. You can verify the certificate validity by navigating to System > Device Certificates.

 

Check the status of the device certificate by entering the following command:

openssl x509 -noout -text -in /config/httpd/conf/ssl.crt/server.crt

 

 

  1. Check for the system logs a successful iQuery connection to the /var/log/gtm file.

 

tail -f  /var/log/gtm | grep -i -e -n iquery

 

 

Check If the iQuery protocol is blocked by router or firewall ACL ;

 

 

  1. Check the GTM specific daemons

 

tmsh show sys service tmm mcpd big3d gtmd

 

tail -f  /var/log/gtm | grep -i -e -n mcpd

tail -f  /var/log/gtm | grep -i -e -n big3d

tail -f  /var/log/gtm | grep -i -e -n gtmd