2 Replies Latest reply on Jan 10, 2012 10:51 AM by angel68

    Traffic generation on a Management cluster on 7.x

      Traffic generation between configuration management clustersin 7.x


      Since there is no Master, sub-master or node instance withinthe configuration management clusters for MWG 7.x, we could pretty much logonto any individual appliance within the cluster group to modify theconfigurations, correct?



      1. How quicklydoes the configs change propagate to other appliances within the cluster group?
      2. What is the amount of traffic that is generatedduring the propagation of changes within management cluster? The configs datais encrypted, and the updates happen independently on each appliance.
      3. How does the configuration management cluster trackconfigs changes to avoid two different changes simultaneous on the same clustergroup if priority is the same (say 10)?
      4. Are there any logs related to configs changes management?



        • 1. Re: Traffic generation on a Management cluster on 7.x
          Jon Scholten

          Hi Angel,


          1. The configuration is synced immediately throughout the whole cluster.


          2. There is not a huge ammount of traffic generated during this time, it is simply propigating the current configuration folder which I dont imagine to be over 1mb (would need to double check that). I dont understand the second part completley, but the sync of the config happens over a secure connection (port 12346, defined under Configuration > Central Managment Configuration).


          3. It safeguards it with timestamps, and currently you are only able to login to one "GUI" node at a time. So if you login in to nodeA, then you cannot login to nodeB (it will tell you to login to nodeA, although priority may take precedence). To further elaborate on the timestamps, starting in 7.1, the cluster will establish its own shared time (similar if not exactly the same as NTP), this will ensure that any system time differences will be accounted for.


          4. There is no "global" log for all these changes, but each appliance has it's own audit, and storage log. The audit log would be the more human readable of the two. The storage log is a more verbose log which tells you what files have been modified among other things.