16-Feb-2018 09:11
We are migrating from some 6900s to ve's. I have two devices at site 1 in HA active/passive and one device at site 2 in active state. both sites are configured with dns. i have used these articles as a reference.
https://support.f5.com/csp/article/K82540512 https://devcentral.f5.com/articles/migrating-to-iseries-from-older-platforms-its-about-time-25612
I have all the ve's up and licensed. i have so far... interfaces configured, trunks configured, vlans configured with matching names of those on our 6900's, Management address configured, and Self-IP's have been configured with new addresses. i have a few things I'm confused about.
any additional info would be much appreciated. thanks
16-Feb-2018 20:41
the masterkey [f5mku -K] is used to decrypt the encrypted 'stuff' [password in auth configs, health monitors [ldap, http basic, etc..], ssl key passhphrase] in your ucs. so if you are restoring a ucs from another device, its worthwhile have this available. grab the master key from the source device and 're-key' the master key on the destination device.
not so sure.. but I would say yes.. the ucs takes care of these keys and i think dnssec keys will be included.
reusing the self ips is fine, just dont enable the interfaces [vlan/actual traffic] until you are done with initial config setup. enable only the mgmt interface. premature enabling of interfaces - same vlan on your old and new bigip - can cause you an active active state.. even if they are not in HA.
16-Feb-2018
21:32
- last edited on
05-Jun-2023
22:04
by
JimmyPackets
I went through an "in-place" physical to virtual migration recently and my general steps were as follows. This assumes that all IP addressing, hostnames, and so forth will remain the same, and allows you to use the standard HA failover method as the old active and new standby will be clustered together briefly.
modify /sys crypto master-key prompt-for-password
modify /sys crypto master-key prompt-for-password
load /sys ucs no-license no-platform-check
At this point the new system should attempt to load the config. I did this on 11.5.4 and it needed a few edits to the config file, so just make the edits needed and continue attempting
load sys config
until the errors go away. This may vary on particular software releases.
Once the configuration loads, you can then reassign your VLANs to the correct interfaces, adjusting for tagged or untagged modes. If you were running a trunk previously, you'll have to remove the VLANs from that first.
At this point if everything worked out, then you should be able to see the cluster failover status as Standby. Configsync might even work too, if your software versions are the same. Compare the network maps on each, check the logs, then you could force your active to standby, then verify things look good. If everything is OK, repeat the steps and migrate the config from the other box.
Over all this method worked pretty well for us and we migrated 10 boxes this way. The nice thing about this process is that you don't need to stage any temporary self-IPs
To speak to your question about DNSSEC, I think that as long as your masterkey values match, then you shouldn't have any trouble with loading the configuration. As with anything, try to test as best you can, but hopefully someone may have an answer for you.
Hope this helps!