Actions
Feature #15575
closedKea High Availability Support (IPv4 and IPv6)
Start date:
Due date:
% Done:
100%
Estimated time:
Plus Target Version:
24.11
Release Notes:
Default
Related issues
Updated by Christian McDonald 5 months ago
- Status changed from In Progress to Feedback
Updated by Jim Pingle 5 months ago
A few things I noticed so far:
- If you select a self-signed certificate for TLS, the CA file is empty and Kea fails to start. It's not clear if we should either reject/filter self-signed or maybe it might work if the self-signed cert is copied into the CA file
- The default for
max-unacked-clients
is 10 which means it waits for 10 client requests before the secondary would take over for a failed primary. On smaller/less busy networks this results in clients sitting for long periods without a lease.- Changing the value to
1
allows Kea to answer the first client after the partner fails, but until that request comes in the status doesn't appear to acknowledge that the partner is down - Docs for the Kea hook suggest setting
max-unacked-clients
to a value of0
so it transitions aggressively/immediately but the GUI currently rejects that value and only allows a minimum of1
- We should definitely allow a value of
0
to be set and that may be the ideal default. Users could always set it higher if it's too aggressive for their taste.
- Changing the value to
- The way the settings are structured can be a little confusing, since the main HA settings sync and advanced syncs, but TLS does not and is in between the two. It may be better the move the TLS options below advanced or into a separate heading denoting more prominently that they do not sync. Even keeping under the same heading they could be separated by a StaticText form row with the TLS/Sync general info.
Updated by Jim Pingle 5 months ago
A couple more notes after using it more:
- The Enabled Interfaces list on the Kea settings tab is prone to error and scales extremely poorly. It's very easy to attempt to select a new interface and accidentally deselect all of the other interfaces. On systems with many interfaces, this is a significant problem. Also the box is small, only four lines high, but increasing the size doesn't address the other issues.
- If we move this back to a per-tab checkbox, we'd lose the "hide disabled" option but it would eliminate all the other concerns, and keep the interface config on each tab where users are more likely to expect it. The setting could still be maintained as a central list internally, just exposed as a per-interface checkbox instead of a multi-select list.
- Alternately we could use a two-box+button approach like for user group membership, where one side has a list of disabled interfaces and the other has a list of enabled interfaces. Users select an entry and click a button to explicitly move an entry from one list to the other. This is much less prone to error, but still has scaling issues with many interfaces.
Updated by Jim Pingle 5 months ago
I removed the bit I had noted there about RA, it's working OK if you pick a CARP VIP for the "RA Interface" in the RA config for interfaces involved in failover, I had overlooked that somehow.
Updated by Jim Pingle 4 months ago
- Related to Feature #15650: Kea Feature Integration for parity with ISC DHCP added
Updated by Jim Pingle 4 months ago
- Status changed from Feedback to Resolved
- Target version changed from CE-Next to 2.8.0
- % Done changed from 0 to 100
Everything appears to be working properly on the latest builds. Including self-signed certs not being listed in the TLS drop-downs. I don't see anything else missing or not working as expected.
Updated by Jim Pingle about 2 months ago
- Plus Target Version changed from 24.08 to 24.11
Updated by Jim Pingle about 2 months ago
- Subject changed from Kea High Availability Support to Kea High Availability Support (IPv4 and IPv6)
Actions