Site iconAxway Blog

SecureTransport Cluster Models Part 2: Standard Cluster model

Standard cluster models

Standard cluster models

In Part 1 of this blog series, SecureTransport Cluster Models Overview, I introduced the reasons to consider clustering a SecureTransport Managed File Transfer (MFT) environment and an overview of the different clustering models. In Part 2, we will dig into the Standard Cluster model and the three modes in which it can be configured.

Active-Active Standard Cluster

In this mode, the cluster operates in a hub-spoke pattern with one server as the primary server and up to two secondary servers. The primary server serves as the dispatcher for all server-initiated jobs by assigning jobs from the event queue to the different servers in the cluster. The primary server also owns the Scheduler and Folder Monitors.

If the primary server goes down, one of the remaining secondary server(s) becomes the primary server and its Transaction Manager unsuspends its own Scheduler and Folder Monitors. Note, the primary server and order of the secondary servers are defined in the configuration file <FILEDRIVEHOME>/lib/admin/config/servers. This “new” primary server then takes over as dispatcher. This failover happens automatically and does not require any human intervention. Any jobs in the event queue will not be lost and will start being dispatched by the new primary server. 

However, any User (partner external to SecureTransport) initiated protocol sessions TO the SecureTransport server that went down will be lost and the partner will need to restart the session. Inflight protocol sessions initiated by the SecureTransport server that went down will also fail but the normal retry capabilities of SecureTransport will retry the protocol session on another server.

Figure 1. Active-Active Standard Cluster

Primary benefits of this mode are:

There are a few things to be aware of with the operation of the active-active Standard Cluster model:

Active-Passive Standard Cluster

The active-passive Standard Cluster is essentially an active-active Standard Cluster in which only the primary server is processing jobs. The Transaction Manager is suspended on the secondary server and no inbound communication sessions are being routed to the secondary server (configured at the Load Balancer or network level). All the same, information is being synchronized between the primary server and the secondary server and the secondary server is active but not processing anything.

In the event of the primary server going down, the secondary server becomes the primary server and unsuspends its own Transaction Manager, Scheduler and Folder Monitors. Just as with the active-active Standard Cluster, this failover happens automatically and does not require any human intervention. Any jobs in the event queue will not be lost and will start being dispatched by the new primary server.

However, any User (partner external to SecureTransport) initiated protocol sessions to the SecureTransport server that went down will be lost and the partner will need to restart the session. In-flight protocol sessions initiated by the SecureTransport server that went down will also fail but the normal retry capabilities of SecureTransport will retry the protocol session on the new primary server.

Figure 2. Active-Passive Standard Cluster

Primary benefits of this mode are:

Secondary server(s) are active meaning that they can not only process existing load but are already available to assume more load and take over as the primary if the primary server fails.

Some considerations with the active-passive Standard Cluster are:

Primary reasons to consider an active-passive Standard Cluster versus an active-active cluster are:

Active-Passive Standard Cluster (Legacy mode)

This is the oldest active-passive clustering model. In this mode only the configuration data is synchronized between the primary and secondary servers—the Event Queue and Sentinel link data are not synchronized.

Only synchronizing the Configuration data, and not the Event Queue or Sentinel link data greatly reduces the amount of data that needs to be synchronized between the servers as synchronization of these tables typically accounts for 60 to 80% of the chatter between the servers. This has both positive and negative ramifications.

Primary benefits of this mode are:

Some considerations with this mode include:

Standard Cluster Synchronization

All Standard Cluster models require synchronization of data between the primary server and the secondary server(s). For the active-active and active-passive modes, the synchronization is of both configuration data, event data, and Sentinel link data. For the active-passive (legacy) mode only configuration data is being synchronized. The synchronization process propagates configuration data from the primary server to the secondary server(s).

Tip: Configuration can be performed from any server in the cluster. However, if it is done on a secondary server, the changes are first replicated to the primary server and then pushed back out to the secondary server(s) resulting in a double-hop and additional load. Therefore, whenever possible, perform configuration activities on the primary node so that the data only needs to be pushed out to the secondary node(s).

During normal operations, the synchronization is handled automatically by SecureTransport. However, there are some circumstances when a manual synchronization is required including:

Manual synchronization can take significant time and dynamic updates are suspended during this time. Therefore, it is recommended that the system is under light load during the synchronization process.

In Part 3 of this blog series, I will cover our flagship clustering model-Enterprise Cluster, Disaster Recovery considerations for the different clustering models and a tabular summary of the different clustering models.

Read part one in this series: MFT SecureTransport Cluster Models.

 

 

Exit mobile version