Testing and Troubleshooting the High Availability Cluster Configuration

You can use the APIs to retrieve information about the clusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. resource group.

Use the cluster configuration test script on each Cluster Member to confirm that it is configured correctly.

The script verifies:

To check the configuration, run the following script on each Cluster Member:

  1. Connect to the command line.

  2. Log in to the Expert mode.
  3. Run the script with this command (do not change the syntax):

    $FWDIR/scripts/google_ha_test.py

    If all tests were successful, this message opens: All tests were successful! Otherwise, an error message is displayed with information about how to troubleshoot the problem.

Common configuration errors:

Message Recommended Action

The attribute (ATTRIBUTE) is missing in the configuration

Make sure the configuration file is correct.

Primary DNS server is not configuredFailed to resolve (host)

The Cluster Member is not configured with a DNS server.

Failed in DNS resolving test

Confirm that DNS resolution on the Cluster Member works.

You do not seem to have a valid cluster configuration

Make sure the Cluster Member configuration on the Check Point Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. is complete, and that the Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. is installed.

IP forwarding is not enabled on Interface (Interface-name)

Use PowerShell to enable IP forwarding on all the network interfaces of the Cluster Member.

Failed to read configuration file: $FWDIR/conf/gcp-ha.json

The GCP Cluster Member configuration is not up-to-date, or is written incorrectly.

Testing credentials

Failed to login with the credentials provided. See the exception text to understand why.

Testing authorization

(Exception)

Make sure the GCP daemon has access to GCP.

Using the GCP High Availability Daemon

The cluster solution in GCP uses the daemon to make API calls to GCP when a cluster failoverClosed Transferring of a control over traffic (packet filtering) from a Cluster Member that suffered a failure to another Cluster Member (based on internal cluster algorithms). Synonym: Fail-over. takes place. This daemon uses a configuration file, $FWDIR/conf/gcp-ha.json, on each Cluster Member.

When you deploy the above solution from the supplied template , a configuration file is automatically created .

The configuration file is in JSON format and contains these attributes:

Attribute's Name Type Value

debug

Boolean

True or False

public ip

String

Name of the cluster's external, primary public IP address

secondary public ip

String

Name of the cluster's external, secondary public IP address

dest ranges

String

IP range for updating

You can confirm that the daemon in charge of communicating with GCP runs on each Cluster Member.

From Expert Mode, run:

cpwd_admin list | grep -E "PID|GCP_HAD"

The output should be similar to this example:

The debug output is written to $FWDIR/log/gcp_had.elg* files.