InfoScale™ Cluster Server 9.0 Bundled Agents Reference Guide - Linux
- Introducing bundled agents
- Storage agents
- DiskGroup agent
- DiskGroupSnap agent
- Notes for DiskGroupSnap agent
- Sample configurations for DiskGroupSnap agent
- Volume agent
- VolumeSet agent
- Sample configurations for VolumeSet agent
- LVMLogicalVolume agent
- LVMVolumeGroup agent
- LVMVolumeGroup agent notes
- Sample configurations for LVMVolumeGroup agent
- Mount agent
- Sample configurations for Mount agent
- VMwareDisks agent
- SFCache agent
- Network agents
- About the network agents
- IP agent
- NIC agent
- Notes for the NIC agent
- Sample configurations for NIC agent
- IPMultiNIC agent
- MultiNICA agent
- IP Conservation Mode (ICM) for MultiNICA agent
- Performance Mode (PM) for MultiNICA agent
- Sample configurations for MultiNICA agent
- DNS agent
- Agent notes for DNS agent
- About using the VCS DNS agent on UNIX with a secure Windows DNS server
- Sample configurations for DNS agent
- AWSIP agent
- AWSRoute53 agent
- AzureDNSZone agent
- File share agents
- NFS agent
- NFSRestart agent
- Share agent
- About the Samba agents
- NetBios agent
- Service and application agents
- Apache HTTP server agent
- Application agent
- Notes for Application agent
- Sample configurations for Application agent
- AzureAuth agent
- CoordPoint agent
- KVMGuest agent
- Notes for KVMGuest agent
- Sample configurations for KVMGuest environment
- Sample configurations for RHEV environment
- Process agent
- Usage notes for Process agent
- Sample configurations for Process agent
- ProcessOnOnly agent
- RestServer agent
- Infrastructure and support agents
- Testing agents
- Replication agents
- RVG agent
- RVGPrimary agent
- RVGSnapshot
- RVGShared agent
- RVGLogowner agent
- RVGSharedPri agent
- VFRJob agent
- Dependencies for VFRJob agent
- Notes for the VFRJob agent
AzureIP agent
The AzureIP agent manages the following networking resources in an Azure environment:
Private IP - A private IP is a private numerical address that networked devices use to communicate with one another. It is used for communication between an Azure virtual network (VNet) and an on-premises network. To extend an on-premises network to Azure, you use a VPN gateway or an ExpressRoute circuit.
Public IP - A public IP is a numerical address that is used for communication over the internet, including Azure public-facing services.
Overlay IP - An overlay IP provides IP failover functionality for the nodes that are spread across subnets. It lets you redirect IP address traffic to another cluster node belonging to different subnet within the same VNet. An overlay IP must be defined outside the VNet Classless Inter-Domain Routing (CIDR) block.
Note:
An overlay IP cannot be used to provide failover across Regions if VNet-to-VNet tunneling is used.
The AzureIP agent performs the following activities:
Gets the NIC details, creates the IP configuration, and associates and disassociates the private IP address.
Associates and disassociates the Public IP address with the Private IP address.
Manages the route table entries of the Overlay IP for failover across subnets.
The AzureIP agent uses Azure Python APIs to associate IP resources with an Azure VM.
An InfoScale deployment in Azure does not support IPv6 because of the following limitations:
Existing virtual machines (VMs) that are configured with IPv4 addresses cannot use IPv6 addresses; you must deploy new VMs and configure them with IPv6 addresses.
Public IPv6 addresses cannot be assigned to a VM.
VMs with IPv6 addresses cannot be members of an Azure cloud service. However, they can communicate with each other over their respective IPv4 addresses.
Configure the AzureAuth agent.
See AzureAuth agent.
Configure an authentication method for authenticating Azure subscription:
To use the AzureAuth agent for a service principal-based authentication, configure the AzureAuth agent.
See AzureAuth agent.
To use an Azure managed identity-based authentication, configure a user-assigned managed identity in the cluster.
To configure a public IP, create a static public IP resource in the Azure portal.
To configure an overlay IP, create a route table, and associate the subnets where the overlay IP fails over with the route table.
Note:
The subnets can be associated with a single route table.
The AzureIP resources depend on the AzureAuth resources.
If an Azure managed identity is configured for authenticating Azure subscription, the AzureIP resources do not depend on the AzureAuth resource.
If the AzureAuth agent is configured for a service principal-based authentication, the AzureIP resources depend on the AzureAuth resources.
Online |
|
|
|
Monitor |
|
ONLINE |
|
OFFLINE |
|
UNKNOWN | One of the following might be true:
|
FAULTED | Indicates that the IP resources cannot be brought online or abruptly stopped outside of VCS control. |
Table: Required attributes
Attribute | Description |
---|---|
PrivateIP | Secondary private IP address of the Azure VM. This value is mandatory if OverlayIP is not provided. Type and dimension: string-scalar |
NICDevice | Name of the network device. Enter ip addr to list all network adapters. Example: eth0 Here, eth0 is specified to assign the private IP address to the next available alias of eth0. Type and dimension: string-scalar |
OverlayIP | Overlay IP provides IP failover functionality for the nodes that are spread across subnets. Overlay IP must be outside of the VNet CIDR block in which the nodes are present. This value is mandatory if PrivateIP is not provided. Type and dimension: string-scalar |
RouteTableResourceIds | Describes all route tables. You can add one or more route table IDs separated by a space. This attribute is required if the OverlayIP attribute is configured for the resource. Type and dimension: string-vector |
AzureAuthResName | Name of the authentication agent resource that handles Azure related authentication. This attribute is required only if the AzureAuth agent is configured for using a service principal-based authentication for Azure subscription. This attribute is not required if using managed identities for Azure authentication. Note: If both AzureAuth agent and user-assigned managed identity are configured in the cluster, the AzureAuth agent configuration takes precedence. The cluster defaults to using the AzureAuth service principal-based Azure authentication. Type and dimension: string-scalar |
ManagedIdentityClientID | ID of the user-assigned managed identity that is obtained from the Azure portal. This attribute is required only if using managed identity-based authentication for Azure subscription. This attribute is not required if the AzureAuth agent is configured for using a service principal for Azure authentication. Note: If both AzureAuth agent and user-assigned managed identity are configured in the cluster, the AzureAuth agent configuration takes precedence. The cluster defaults to using the AzureAuth service principal-based Azure authentication. Type and dimension: string-scalar |
Table: Optional attributes
Attribute | Description |
---|---|
PublicIP | Static public IP created from the Azure Portal. This IP is used in IP configuration to map the Public IP address to a secondary private IP address. Type and dimension: string-scalar |
AzureVMName | Name of the VM in Azure on which agent is running. Type and dimension: string-scalar |
VMResourceGroup | Azure resource group where the Azure VM resides. Type and dimension: string-scalar |
type AzureIP ( static str ArgList[] = { tempVMName, PrivateIP, NICDevice, PublicIP, tempPublicIPResourceId, AzureVMName, VMResourceGroup, OverlayIP, RouteTableResourceIds, "AzureAuthResName:SubscriptionId", AzureAuthResName:ClientId", "AzureAuthResName:SecretKey", AzureAuthResName:TenantId", tempVMResourceGroupName } str PrivateIP str NICDevice str PublicIP temp str tempPublicIPResourceId str AzureVMName str VMResourceGroup str OverlayIP str RouteTableResourceIds[] str AzureAuthResName temp str tempVMName temp str tempVMResourceGroupName )
type AzureIP ( static int FaultOnMonitorTimeouts = 0 static str ArgList[] = { tempVMName, PrivateIP, NICDevice, PublicIP, tempPublicIPResourceId, AzureVMName, VMResourceGroup, OverlayIP, RouteTableResourceIds, "AzureAuthResName:SubscriptionId", "AzureAuthResName:ClientId", "AzureAuthResName:SecretKey", "AzureAuthResName:TenantId", tempVMResourceGroupName, ManagedIdentityClientID, tempSubscriptionId } str PrivateIP str NICDevice str PublicIP temp str tempPublicIPResourceId str AzureVMName str VMResourceGroup str OverlayIP str RouteTableResourceIds[] str AzureAuthResName temp str tempVMName temp str tempVMResourceGroupName str ManagedIdentityClientID temp str tempSubscriptionId )
Sample configuration with Private IP:
AzureIP azure-ip-res ( PrivateIP = "10.1.5.42" NICDevice @ CLOUDVM1 = "eth0" NICDevice @ CLOUDVM2 = "eth0" AzureAuthResName = Auth_Res )
Sample configuration with Public IP:
AzureIP azure-ip-res ( PrivateIP = "10.1.5.52" NICDevice @ CLOUDVM1 = "eth0" NICDevice @ CLOUDVM2 = "eth0" PublicIP = "52.173.243.126" AzureAuthResName = Auth_Res )
Sample configuration with Overlay IP:
AzureIP overlay-ip-res ( NICDevice @ CLOUDVM1 = "eth0" NICDevice @ CLOUDVM2 = "eth0" OverlayIP = "192.168.3.88" RouteTableResourceIds = { "/subscriptions/6940a326-abc6-40dd-b616-d3f9bbdf1d63/ resourceGroups/azureRG/providers/Microsoft.Network/ routeTables/azureroute1", "/subscriptions/6940a326-abc6-40dd-b616-d3f9bbdf1d63/ resourceGroups/azureRG/providers/Microsoft.Network/ routeTables/azureroute2"} AzureAuthResName = Auth_Res )
Sample configuration with Private IP:
AzureIP azure-ip-res ( PrivateIP = "10.1.5.42" NICDevice @ CLOUDVM1 = "eth0" NICDevice @ CLOUDVM2 = "eth0" ManagedIdentityClientID = 1da89bd2-9735-4266-b920-27c23b98f022 )
Sample configuration with Public IP:
AzureIP azure-ip-res ( PrivateIP = "10.1.5.52" NICDevice @ CLOUDVM1 = "eth0" NICDevice @ CLOUDVM2 = "eth0" PublicIP = "52.173.243.126" ManagedIdentityClientID = 1da89bd2-9735-4266-b920-27c23b98f022 )
Sample configuration with Overlay IP:
AzureIP overlay-ip-res ( NICDevice @ CLOUDVM1 = "eth0" NICDevice @ CLOUDVM2 = "eth0" OverlayIP = "192.168.3.88" RouteTableResourceIds = {"/subscriptions/6940a326-abc6-40dd-b616- d3f9bbdf1d63/resourceGroups/azureRG/providers/Microsoft.Network/ routeTables/azureroute1", "/subscriptions/6940a326-abc6-40dd-b616-d3f9bbdf1d63/resourceGroups /azureRG/providers/Microsoft.Network/routeTables/azureroute2"} ManagedIdentityClientID = 1da89bd2-9735-4266-b920-27c23b98f022 )
The AzureIP agent uses the DBG_1 and the DBG_2 debug log levels.