Authentication between Maestro Orchestrators

Warnings:

  • To avoid synchronization issues between Orchestrators, do not configure Security Groups before making sure all Orchestrators are authenticated.

  • Make sure only one administrator configures the authentication between Orchestrators at any time.

    This prevents an issue when different administrators configure the authentication on different Orchestrators.

Important - After you configure authentication between Orchestrators, you must configure it again in these cases:

  • One of the Orchestrators was installed from scratch (clean install) or restored to factory defaults.

  • An existing authenticated Orchestrator was replaced with another Orchestrator.

  • Site ID or Orchestrator ID changed on an existing authenticated Orchestrator.

Introduction

Starting in R82, you can configure mutual authentication between all Maestro Orchestrators on your Maestro Sites to make sure their communication is secure and encrypted over Internal Sync ports (sync in the same Maestro Site) and External Sync ports (sync between Maestro Sites).

This authentication is based on SSH keys and SSL certificates. These SSL certificates are valid for one year. Orchestrators renew these SSL certificates automatically.

This authentication is a two-way mesh process - each Orchestrator authenticates all other Orchestrators.

Explanation for a Dual Site Maestro configuration:

Site

Orchestrator

Authentication with

other Orchestrators

1

1_1

  • 1_2

  • 2_1

  • 2_2

 

1_2

  • 1_1

  • 2_1

  • 2_2

2

2_1

  • 1_1

  • 1_2

  • 2_2

 

2_2

  • 1_1

  • 1_2

  • 2_1

Note - This popup appears when you connect to Gaia Portal on an Orchestrator, and not all Orchestrators are authenticated in this Maestro environment:

<Number> orchestrators are pending authentication, would you like to authenticate them now?

If you click Yes, the Authentication window opens.

Authentication statuses in Gaia Portal and CLI

Status

Description

Authenticated

The local Orchestrator that shows this status has authenticated the remote Orchestrator.

Unknown

The local Orchestrator that shows this status cannot determine the status for the remote Orchestrator.

Unreachable

The local Orchestrator that shows this status cannot connect to the remote Orchestrator over the External Sync port (between Maestro Sites) or over the Internal Sync port (on the same Maestro Site).

Untrusted

The local Orchestrator that shows this status does not trust the remote Orchestrator.

Configuring new authentication between Maestro Orchestrators

The procedure below is for a Dual Site Maestro environment with four Orchestrators.

The same steps apply in a Single Site Maestro environment with two Orchestrators.

Forcing existing authentication between Maestro Orchestrators

This action is helpful in these cases:

  • You revoked trust with an Orchestrator and need to establish trust again.

  • There are communication issues between authenticated Orchestrators.

Revoking existing authentication between Maestro Orchestrators

Warning - For security reasons, perform this procedure before you remove an authenticated Orchestrator from the Maestro environment.

This procedure revokes the existing authentication of the selected Orchestrator on all other Orchestrators.

The example procedures below are for revoking trust with the Orchestrator 1_2.

Blocking authentication with a Maestro Orchestrator

This procedure configures the selected Orchestrator as untrusted.

You can do this to prevent an untrusted Orchestrator from accidentally becoming trusted in the future.

Troubleshooting

  1. Run the "orch_stat" command:

    Step

    Instructions

    1

    Connect to the command line on each Orchestrator.

    2

    Log in to the Expert mode.

    3

    Run the command:

    orch_stat -Av

  2. Run the HealthCheck Point (HCP) tool (see sk171436) and refer to the test "Maestro Orchestrator Authentication":

    Step

    Instructions

    1

    Connect to the command line on each Orchestrator.

    2

    Log in to the Expert mode.

    3

    Run the test:

    hcp -r "Maestro Orchestrator Authentication"

    4

    View the detailed report:

    hcp --show-last