Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CFE incorrectly removes secondary IP addresses from AWS ENI's when VIP is in traffic group 1 #64

Open
mikeoleary opened this issue Apr 15, 2021 · 3 comments
Labels
bug Something isn't working
Milestone

Comments

@mikeoleary
Copy link

Do you already have an issue opened with F5 support?

No

Description

In a previous version of CFE we enforced the use of traffic group None for VIP's that are intended to failover between AZ's in AWS. However now we see this unwanted behavior when using CFE:

  1. Customer deploys our CFT in AWS for HA across AZ's.
  2. Customer configures 2x VIPs in BIG-IP, one in each AZ. Because they are not intimate with our CFE requirements, they put these VIP's in traffic-group-1 which is default when using the GUI.
  3. Customer configures secondary IP addresses on her ENI's in AWS to match the VIP configuration.
  4. Customer configures an EIP with the correct tags so that this EIP is associated/re-associated with her 2x secondary IP addresses configured in Step 3. Everything is configured correctly except the VIPs are in Traffic Group 1, not None.
  5. Customer tests failover. Because she has not created her VIP's in traffic group None, CFE does not perform failover successfully, and further it deletes the secondary IP addresses she had created for her VIPs.

Environment information

For bugs, enter the following information:

  • Cloud Failover Extension Version: 1.7
  • BIG-IP version: unknown
  • Cloud provider: AWS when failover is set up across AZ's with 1x EIP and 2x VIPs.

Severity Level

For bugs, enter the bug severity level. Do not set any labels.

Severity: 3

@shyawnkarim shyawnkarim added the bug Something isn't working label Apr 16, 2021
@shyawnkarim
Copy link

Thanks for reporting this issue. We are tracking this bug internally with ID AUTOSDK-534.

@shyawnkarim shyawnkarim added this to the backlog milestone Apr 16, 2021
@mikeoleary
Copy link
Author

@shyawnkarim you asked me for a qkview but the customer is using an eval key and is unable to open a support case and provide a qkview - sorry about that.

@shyawnkarim
Copy link

@mikeoleary thanks for checking.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants