[Contents] [Prev] [Next] [Index] [Report an Error]

Detecting Corrupt File Configurations

You can detect corruption of running configuration files and CNF files on both the primary and the standby SRP when the corruption is due to a fatal duplicate key error. CNF files must be present on the active file system to monitor them; you cannot monitor CNF files that reside alone on the standby SRP.

You can use the service check-configcommand to control the mode of detection for corruption detection of the running configuration. Auto mode provides a background monitoring task that periodically checks the validity of running configurations. The service config-monitor-periodictycommand enables you to set the time for background monitoring of the active and standby SRP. By default, background monitoring is not running. Manual mode is the default detection mode. For corruption detection of the CNF files, you must use manual mode.

A critical message to take further corrective action is logged in all the cases of corruption detection to ensure that an SRP reset does not occur and that the system recovers with the last known good configuration.

When duplicate key corruption is detected in either the active or standby SRP:

File synchronization and monitoring the file system are separate operations. Depending on the wake up time of the monitoring task, there is a period of time when corruption can occur and the file systems are synchronized. We recommend that you run the manual command to check the file system before you enable HA or perform any unified ISSU-related operations

service check-config

service config-monitor-periodicity

show service config-monitor-periodicity


[Contents] [Prev] [Next] [Index] [Report an Error]