Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Summary of F5 GTM configuration recovery

2025-03-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

F5 has a lot of products and modules, but what I am most familiar with is that LTM,LTM is not good at learning, and I hate few books when I use them.

The requirement is to restore the configuration from the host to the standby without affecting the host running online.

At first, the two devices had to do synchronous HA, but after the completion, it was found that the network configuration of the user's standby was inconsistent with that of the host, that is, the switch between the two computers could not be realized, so this scheme had to require the user to adjust its network environment. At that time, in the process of doing HA, part of the GTM configuration was inexplicably synchronized by pulling the configuration to the host, but they were both unavailable and incomplete. In this sensitive period of earthquake, users are required to put the standby machine in order first, so it is necessary to find a way to get the GTM configuration of the host to the standby machine to ensure that it is available as far as possible.

Due to the inconsistency of the vlan trunk self ip and other information of the active and standby machines (which is related to the user in the past), we can only use several methods

Talk about several ways:

1. Back up the configuration of the host, and then import it directly into the standby, which is equivalent to the cold backup of the host.

2. Restore the configuration of the standby before the upgrade. Since the original version is v9.3.1 and now V10.2.4, you need to overwrite the configuration.

3. Trust the certificate by command, and let the standby machine pull down the GTM configuration from the host.

4. Decompress the host configuration, take out the GTM file separately, overwrite the GTM file of the standby machine, and then load it.

The first method can be recovered directly on the page, and the second method I have also talked about in my previous article, and I will not talk about the third and fourth ways.

The third method is achieved by exchanging certificates between two devices and then configuring them synchronously:

a. Re-exchange the certificates of the two GTM and re-obtain the configuration of the host GTM on the slave:

b. Use the command on the standby: IP of the gtm_add host (synchronize the configuration of the host to the standby) c. Use the command on the host: IP of the bigip_add standby (synchronize the configuration of this machine to the host)

d. If it doesn't work, you need to empty the certificate of both GTM computers.

e. Restore these two certificates as default certificates:

Cat / dev/null > / config/gtm/server.crt cat / dev/null > / config/big3d/client.crt f. Then execute the commands gtm_add and bigip_add g. Then tick the automatic synchronization configuration of the two computers.

This approach is risky for users, who are worried that problems with the running host will affect the business and do not advocate doing so.

The fourth method is to extract the configuration of the running host and take out the GTM part to overwrite it on the slave:

a. Back up the configuration of F5 first to avoid problems

b. This is where the GTM configuration file for F5 exists.

c. Let later use the tool to open the F5 device to cover this part of the root/config/gtm, it is best to cover all, in case you can back up a copy of the original file.

d. Then execute gtmload on the command line

(if you have finished overwriting GTM or have problems, you can also execute bigstart restart gtmd and bigstart restart big3d commands to restart processes and services.)

From the point of view of my execution, there is no problem at present. The GTM configuration of the host has already covered the slave, so that the user can achieve a cold backup. When there is a problem with the host, you only need to connect the slave line to OK.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report