Updating Cryptographic Security Platform Vault Node IP Addresses on an Individual VM
If the Cryptographic Security Platform Vault nodes in a cluster change, you need to update the IP address list on each Policy Agent unless you have specified a Cryptographic Security Platform Mapping for the VMs. Cryptographic Security Platform Mapping changes are done through Cryptographic Security Platform Vault and are communicated to each associated VM on the VM's next heartbeat. For more information, see High Availability Between a VM and the Cryptographic Security Platform Vault Cluster.
Procedure
For each VM registered with this Cryptographic Security Platform Vault cluster:
- For Linux, log into the VM as
root
. For Windows, log in as a System Administrator and open a Command Prompt or start Windows PowerShell. -
Enter the
hcl updatekc kc_hostname[:port],kc_hostname[:port],kc_hostname[:port],...
command wherekc_hostname,kc_hostname,kc_hostname...
is a comma-separated list of the Cryptographic Security Platform Vault node IP addresses or hostnames andport
is an optional port number (the default is port 443). If you are entering the command on Windows, use quotes around the list of hostnames.The first Cryptographic Security Platform Vault node in the list will be considered the primary node, and the VM will always attempt to reach Cryptographic Security Platform Vault through that node first. If that node is unavailable, the VM will try the other nodes in the list in order until it finds a Cryptographic Security Platform Vault node that it can communicate with.
For example, if you want to specify the Cryptographic Security Platform Vault node named
kc-chicago
as your primary node and the nodes10.238.66.234
andkc-bangalore
on port 447 as your second and third nodes, you would specify:Linux:
# hcl updatekc kc-chicago,10.238.66.234,kc-bangalore:447
Windows:
C:\>
(Note thehcl updatekc "kc-chicago,10.238.66.234,kc-bangalore:447"
" "
around the hostname list for Windows.)
Important: The list you specify overwrites any existing list on the Policy Agent. So if the Policy Agent is currently connected to three Cryptographic Security Platform Vault nodes and you remove one, you must specify the two remaining nodes with the updatekc
command. The third node will be removed automatically. Similarly, if you add a fourth Cryptographic Security Platform Vault node, you must specify all four IP addresses with the updatekc
command. If you only specify the new Cryptographic Security Platform Vault node, then that becomes the only node that the Policy Agent will communicate with.
To verify the connection status, enter the hcl status
command, as shown. The first line shows the Cryptographic Security Platform Vault that the VM is currently communicating with and the second line shows the three Cryptographic Security Platform Vault nodes available to the VM.
C:\> hcl status Summary --------------------------------------------------- KeyControl: kc-chicago:443 KeyControl list: kc-chicago:443,10.238.66.234:443,kc-bangalore:447 Status: Connected