Creating a Cluster Node Mapping

Cluster Node Mapping is used in both the Cryptographic Security Platform Vault for Databases and the

A Cluster Node Mapping lets you create a list of Cryptographic Security Platform Vault for Databases IP addresses that you maintain in Cryptographic Security Platform Vault for Databases. Each Cryptographic Security Platform Vault for Databases node in the Node Mapping is associated with an externally-visible IP address or hostname that the VMs can use to access that Cryptographic Security Platform Vault for Databases node. If you ever change the list of Cryptographic Security Platform Vault for Databases nodes in the Node Mapping, Cryptographic Security Platform Vault for Databases automatically disseminates the changes to the each associated VM at its next heartbeat.

  1. Log into the Cryptographic Security Platform Vault for Databases webGUI using an account with Cloud Admin privileges.
  2. In the top menu bar, click Workloads.
  3. Click the Mappings tab.
  4. Select Actions > Create Mapping.
  5. On the Mapping dialog box, specify the options you want to use.

  6. When you are done, click Next.
  7. On the Servers tab, create an entry for the first Cryptographic Security Platform Vault for Databases node by specifying the options you want to use.

  8. If you want to add another node, click the + button and enter the appropriate information.
  9. When you are done adding nodes, make sure that the order is correct because the order of the IP addresses in the list determines the order of precedence. The first node in a Cluster Node Mapping is considered the preferred node, and all VMs will use that node as long as it is available. If the preferred node is offline when a VM heartbeats, the VM will try the other IP addresses in the Node Mapping, starting with the second IP address in the list and working downwards. Once the VM finds an available Cryptographic Security Platform Vault for Databases node, it will use that node to complete the current heartbeat, and it will continue to use that node until the cluster returns to a healthy state. After the cluster becomes healthy, the VM will resume using the preferred node at its next heartbeat.

    If you need to change the order, click and hold on the arrow icon at the beginning of the line to drag the entry to the proper position. Release the mouse to drop the entry in the new location.

  10. When all nodes are included and the order is correct, click Create.
  11. At the Mapping Successfully Created message, click Close.
  12. If you want to associate the Cluster Node Mapping with an existing VM that already has the Policy Agent installed:

    1. Log into the VM as an administrator.
    2. Enter the command hcl updatekc -a and enter the credentials for a Cryptographic Security Platform Vault for Databases user account with Cloud Admin privileges at the prompt. Cryptographic Security Platform Vault for Databases displays a list of available Cluster Node Mapping that you can use with the VM.

    3. Select the Cluster Node Mapping you want to use from the list. Cryptographic Security Platform Vault for Databases echoes the IP addresses in the list for confirmation.

    Note: For details about specifying a Cluster Node Mapping when you install the Policy Agent, see Linux Policy Agent Installation or Windows Policy Agent Installation.