529
High availability and load balancing using clusters
Monitoring cluster status
Viewing cluster status using the bfstat utility
Bfstat is a command-line utility that resides on the security gateway. You can use the bfstat command
to monitor the current status of cluster members.
You can run bfstat from the command-line on the security gateway computer or remotely through a
standard secure shell (SSH) session. You can also use bfstat on a standalone (non-cluster) security
gateway.
The bfstat get command displays the following information:
■
The number of members in the cluster and how many members are active
■
For each active cluster member:
■
VIPs owned by the cluster member
■
Receive rate in kilobytes per second
■
Transmit rate in kilobytes per second
■
Whether the cluster member is up or down
Note:
To learn about other bfstat usage, you can use the following command:
bfstat help
However, other bfstat commands are troubleshooting commands that you should only use if instructed
by Symantec Technical Support.
Prerequisites
None.
To view cluster member status using the bfstat utility
1
Run SSH on any cluster member to open a command window.
2
Type the following command:
bfstat get status <n>
Where:
Table 14-2
bfstat get command syntax
Command Description
Syntax
get
Displays the cluster
status
bfstat get [DATA_NAME] [ARGS]
The following DATA_NAME/ARGS are allowed:
■
status [INTERVAL]
Gets the cluster member status at the specified interval.
The interval is in seconds. If an interval is not present, this command
only runs once.
Example:
bfstat get status 5
■
cfg
Displays the current cluster configuration.
Example:
bfstat get cfg
<n>
is a number that represents the frequency (in seconds) with which the monitored values are
refreshed.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...