The purpose of high availability (HA) is to limit the impact of failures—both hardware and software— within a system. The Cisco NX-OS operating system is designed for high availability at the network, system, and service levels.
The following Cisco NX-OS features minimize or prevent traffic disruption in the event of a failure:
Redundancy—Redundancy at every aspect of the software architecture.
Isolation of processes—Isolation between software components to prevent a failure within one process disrupting other processes.
Restartability—Most system functions and services are isolated so that they can be restarted independently after a failure while other services continue to run. In addition, most system services can perform stateful restarts, which allow the service to resume operations transparently to other services.
Supervisor stateful switchover—Active/standby dual supervisor configuration. The state and configuration remain constantly synchronized between two Virtual Supervisor Modules (VSMs) to provide a seamless and stateful switchover in the event of a VSM failure.
Starting with Release 4.2(1)SV2(1.1), the high availability functionality is enhanced to support the split active and standby Cisco Nexus 1000V Virtual Supervisor Modules (VSMs) across two data centers to implement the cross-DC clusters and the VM mobility while ensuring high availability.
The Cisco Nexus 1000V system is made up of the following:
One or two VSMs that run within Virtual Machines (VMs)
Virtual Ethernet Modules (VEMs) that run within virtualization servers. VEMs are represented as modules within the VSM.
A remote management component. VMware vCenter Server.
The following figure shows the HA components and the communication links between them.
Figure 1. HA Components and Communication Links
Service-Level High Availability
Isolation of Processes
The Cisco NX-OS software has independent processes, known as services, that perform a function or set of functions for a subsystem or feature set. Each service and service instance runs as an independent, protected process. This way of operating provides a highly fault-tolerant software infrastructure and fault isolation between services. A failure in a service instance does not affect any other services that are running at that time. Additionally, each instance of a service can run as an independent process, which means that two instances of a routing protocol can run as separate processes.
Cisco NX-OS processes run in a protected memory space independently of each other and the kernel. This process isolation provides fault containment and enables rapid restarts. Process restartability ensures that process-level failures do not cause system-level failures. In addition, most services can perform stateful restarts. These stateful restarts allow a service that experiences a failure to be restarted and to resume operations transparently to other services within the platform and to neighboring devices within the network.
System-Level High Availability
The Cisco Nexus 1000V supports redundant VSM virtual machines—a primary and a secondary—running as an HA pair. Dual VSMs operate in an active/standby capacity in which only one of the VSMs is active at any given time, while the other acts as a standby backup. The VSMs are configured as either primary or secondary as a part of the Cisco Nexus 1000V installation.
The state and configuration remain constantly synchronized between the two VSMs to provide a stateful switchover if the active VSM fails.
Network-Level High Availability
The Cisco Nexus 1000V high availability at the network level includes port channels and the Link Aggregation Control Protocol (LACP). A port channel bundles physical links into a channel group to create a single logical link that provides the aggregate bandwidth of up to eight physical links. If a member port within a port channel fails, the traffic previously carried over the failed link switches to the remaining member ports within the port channel.
Additionally, LACP allows you to configure up to 16 interfaces into a port channel. A maximum of eight interfaces can be active, and a maximum of eight interfaces can be placed in a standby state.
VSM to VSM Heartbeat
The primary and secondary VSM use a VSM to VSM heartbeat to do the following within their domain:
Broadcast their presence
Detect the presence of another VSM
Negotiate active and standby redundancy states
When a VSM first boots up, it broadcasts discovery frames to the domain to detect the presence of another VSM. If no other VSM is found, the booting VSM becomes active. If another VSM is found to be active, the booting VSM becomes the standby VSM. If another VSM is found to be initializing (for example, during a system reload), the primary VSM has priority over the secondary to become the active VSM.
After the initial contact and role negotiation, the active and standby VSMs unicast the following in heartbeat messages at one-second intervals:
Control flags requesting action by the other VSM
The following intervals apply when sending heartbeat messages.
Interval at which heartbeat requests are sent.
Interval after which missed heartbeats indicate degraded communication on the control interface so that heartbeats are also sent on the management interface.
The standby VSM resets automatically when the active VSM is no longer able to synchronize with it. This means the interval varies depending on how long the active VSM can buffer the data to be synchronized when
the communication is interrupted.
If the active VSM does not receive a heartbeat response over the control interface for a period of 3 seconds, communication is seen as degraded and the VSM begins sending requests over the management interface in addition to the control interface. In this case, the management interface provides redundancy by preventing both VSMs from becoming active, also called an active-active or split-brain situation.
The communication is not fully redundant, however, because the management interface only handles heartbeat requests and responses.
AIPC and the synchronization of data between VSMs is done through the control interface only.
The secondary VSM is not immediately rebooted when communication over the control interface is interrupted because the HA mechanism tolerates brief interruptions in communication. When communication is first interrupted on the control interface, the heartbeat messages are sent over the management interface, as well. If communication over the management interface is successful, the VSMs enter into a degraded mode, as displayed in the show system internal redundancy trace command output. If, however, communication is interrupted on both interfaces for too
long, the two VSMs get out of sync and, when they do,
the standby VSM is forced to reboot.
A transition from active to standby always requires a reload in both the Cisco Nexus 1000V and the Cisco Nexus Cloud Services Platform.
Loss of Communication
When there is no communication between redundant VSMs or Cisco Nexus Cloud Services Platforms, they cannot detect the presence of the other. The standby VSM will be removed from the list of inserted modules
at the active VSM. The standby interprets the lack of heartbeats as a sign that the active has failed and it also becomes active. This process is what is referred to as active-active or split-brain, as both are trying to control the system by connecting to vCenter and communicating with the VEMs.
Because redundant VSMs or Cisco Nexus Cloud Services Platforms use the same IP address for their management interface, remote Secure Shell (SSH)/Telnet connections might fail, as a result of the path to this IP address changing in the network. For this reason, we recommend that you use the consoles during a split-brain conflict.
The following parameters are used to select the VSM to be rebooted during the split-brain resolution: the module count, the vCenter Server connectivity status, the last configuration time, and the last active time.
Depending on the specific network failure that caused it, each VSM might reach a different, possibly overlapping, subset of Virtual Ethernet Modules (VEMs). When the VSM that was in the standby state becomes a new active VSM, it broadcasts a request to all VEMs to switch to it as the current active device. Whether a VEM switches to the new active VSM, depends on the following:
The connectivity between each VEM and the two VSMs.
Whether the VEM receives the request to switch.
A VEM remains attached to the original active VSM even if it receives heartbeats from the new active VSM. However, if the VEM also receives a request to switch from the new active VSM, it detaches from the original active VSM and attaches to the new VSM.
If a VEM loses connectivity to the original active device and only receives heartbeats from the new one, it ignores those heartbeats until it goes into headless mode, which occurs approximately 15 seconds after it stops receiving heartbeats from the original active VSM. At that point, the VEM attaches to the new active VSM if it has connectivity to it.
If a VEM loses the connection to its VSM, VMotions to that particular VEM are blocked. The VEM shows vCenter Server a degraded (yellow) status.
If a network communication failure occurs where the standby VSM receives heartbeat requests but the active VSM does not receive a response, the following occurs:
The active VSM declares that the standby VSM is not present.
The standby VSM remains in a standby state and continues receiving heartbeats from the active VSM.
In this scenario, the redundancy state is inconsistent (show system redundancy state) and the two VSMs lose synchronization. When two-way communication is resumed, the standby VSM will detect that the redundancy state is out of sync and it will ask to be reset.
If a one-way communication failure occurs in the active to standby direction, it is equivalent to a total loss of communication because a standby VSM sends heartbeats only in response to active VSM requests.
When the connectivity between two Virtual Supervisor Modules (VSMs) is broken, this loss of communication can cause both VSMs to take the
active role. This condition is called active-active or split-brain condition. When the communication is restored between the VSMs, both VSMs exchange
information to decide which one of them would have a lesser impact
on the system, if rebooted.
The process resolves the split-brain resolution when the secondary VSM has a proper configuration and all the Virtual Ethernet Modules (VEMs) are properly connected. If the secondary VSM does not have a proper configuration, it might overwrite the valid configuration of the primary VSM. As a result, both VSMs might have an invalid configuration after the split-brain resolution.
Both primary and secondary VSMs process the same data to select the VSM (primary or secondary) that needs to be rebooted. When the selected VSM is rebooted and attaches itself back to the system, high availability is back to normal. The VSM uses the following parameters in order of precedence to select the VSM to be rebooted during the split-brain resolution:
Module count—The number of modules that are attached to the VSM.
vCenter status— Status of the connection between the VSM and vCenter.
Last configuration time—The time when the last configuration is done on the VSM.
Last standby-active switch—The time when the VSM last switched from
standby to active state. (VSM with a longer active time gets higher
Checking the Accounting Logs and the Redundancy Traces
During the split-brain resolution, when a VSM reboots, the accounting logs that are stored on the VSM are lost. Starting with Release 4.2(1)SV2(1.1), you can display the accounting logs that were backed up during the split-brain resolution. You can also check the redundancy traces that are stored on the local and remote VSMs.
n1000v# show system internal active-active accounting logs
Displays the accounting logs that are stored on a local VSM during the last split-brain resolution.
n1000v# show system internal active-active redundancy traces
Displays the redundancy traces that are stored on a local VSM during the last split-brain resolution.
n1000v# show system internal active-active remote accounting logs
Displays the remote accounting logs that are stored on a remote VSM during the last split-brain resolution.
n1000v# show system internal active-active remote redundancy traces
Displays the remote redundancy traces that are stored on a remote VSM during the last split-brain resolution.
n1000v# clear active-active accounting logs
Clears the accounting logs that are stored on a local VSM during the split-brain resolution.
n1000v# clear active-active redundancy traces
Clears the redundancy traces that are stored on a local VSM during the split-brain resolution.
Clears the remote redundancy traces that are stored on a remote VSM during the split-brain resolution.
VSM Role Collision Detection
In the Cisco Nexus 1000V, if a VSM is configured or installed with the same role as the existing VSM and with the same domain ID, the new VSM and the existing VSM exchange heartbeats to discover each other. Both VSMs detect a role collision when they exchange heartbeats.
Due to this issue, the HA-paired VSM cannot communicate with the correct VSM. This problem can occur on a primary or a secondary VSM depending on whether the newly configured or the installed VSM has the primary or the secondary role assigned to it.
The collisions are detected on the control and the management interfaces. The maximum number of role collisions reported is eight.
After the eighth role collision, the problem is still logged and the MAC address entry is overwritten. The show system redundancy status command displays the overwrite details.
The colliding VSMs might also report a collision detection from the original VSM. Because the colliding VSMs can use the same IP address for their management interfaces, the remote SSH/Telnet connections might fail. Therefore, we recommend that you use the consoles during a role collision detection.
Enter the show system redundancy status command on both the primary and secondary VSM consoles to display the MACs of the detected VSMs with same role and domain id, if any. When the VSM stops communicating in the domain, the collision time is not updated anymore. After an hour elapses since the last collision, the collision MAC entries are removed.
Displaying the Role Collision
Use the show system redundancy status CLI command to display the VSM role collision:
n1000v# show system redundancy status
Displays a detected role collision A warning is highlighted in the CLI output. Along with the MAC addresses, the latest collision time is also displayed in the output. If no collisions are detected, the highlighted output does not appear.
This example shows how to display the detected traffic collision:
n1000v# show system redundancy status
This supervisor (sup-2)
Redundancy state: Active
Supervisor state: Active
Internal state: Active with HA standby
Other supervisor (sup-1)
Redundancy state: Standby
Supervisor state: HA standby
Internal state: HA standby
WARNING! Conflicting sup-2(s) detected in same domain
MAC Latest Collision Time
00:50:56:97:02:3b 2012-Sep-11 18:59:17
00:50:56:97:02:3c 2012-Sep-11 18:59:17
00:50:56:97:02:2f 2012-Sep-11 18:57:42
00:50:56:97:02:35 2012-Sep-11 18:57:46
00:50:56:97:02:29 2012-Sep-11 18:57:36
00:50:56:97:02:30 2012-Sep-11 18:57:42
00:50:56:97:02:36 2012-Sep-11 18:57:46
00:50:56:97:02:2a 2012-Sep-11 18:57:36
NOTE: Please run the same command on sup-1 to check for conflicting(if any) sup-1(s) in the same domain.
Cisco Nexus 1000V Installation and Upgrade Guide
Cisco Nexus 1000V Port Profile Configuration Guide