ADC | Service Status Down on HA Secondary Appliance
book
Article ID: CTX263791
calendar_today
Updated On:
Description
- LB Service Status shows Down on Secondary but is UP on Primary
- Secure RPC is in use
- Packet trace between the nodes show SSL handshake failure between the nodes on port 3009
Resolution
Enabled TLS1.1 and TLS1.2 on the "ns_default_ssl_profile_backend" profile, to match with the Enabled TLS Versions on the front-end profile
Caution:
Please first evaluate the impact of the change i.e. what services this profile is bound to and any other dependencies, if unsure, create a separate ssl profile and bind to internal service nskrpcs-127.0.0.1-3009 and enable the same TLS versions as the Front-end profile
Problem Cause
SSF connections are not forming between the nodes on port 3009, so state information is not being synced, as secure RPC is enabled SSL handshake is done first and that was failing between the nodes
From Configuration we see SSL default profile is enabled and the back-end profile has only TLS1.0 ENABLED and Front-end profile only has TLS1.1 and TLS1.2 enabled
=============
Name: ns_default_ssl_profile_frontend (Front-End)
SSLv3: DISABLED TLSv1.0: DISABLED TLSv1.1: ENABLED TLSv1.2: ENABLED TLSv1.3: DISABLED
Name: ns_default_ssl_profile_backend (Back-End)
SSLv3: DISABLED TLSv1.0: ENABLED TLSv1.1: DISABLED TLSv1.2: DISABLED TLSv1.3: DISABLED
====
When node-1 (client) is connecting to node-2 (server), it will use the ns_default_ssl_profile_backend profile, it uses TLS1.0, now node-2 rejects it because it will check the ns_default_ssl_profile_frontend for incoming ssl connections where only TLS1.1 and TLS1.2 are enabled. (The same applies when node2 is connecting to node2).
Was this article helpful?
thumb_up
Yes
thumb_down
No