Forum Replies Created

Viewing 15 posts - 61 through 75 (of 257 total)
  • Author
    Posts
  • Avatar photoTelium Support Group
    Participant
    Post count: 262

    This may be possible but it really depends on:

    • If the endpoints use TCP for the SIP connection then they may detect the cluster failover (as the TCP connection closes, possibly with a FIN)
    • If the endpoints generate SIP traffic (eg: reregistering) then the lack of response or out of sequence response may cause the endpoint to terminate RTP connections

    Telium does not provide assistance for creating this type of configuration – but we know clients have made this work. Telium only endorses the method used by HAAst OEM edition, as this is the only proper means for call continuity.

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    Once you have received the USB dongle(s) containing your license,

    1. Plug each dongle into the appropriate physical machine. (The dongle will have a tag attached showing the machine name, in case you have multiple dongles).

    2. From the VMware console edit the virtual machine, and add a new USB device:
    ESXi step 1

    3. Select the device name which should be something similar to “Phillips Elite”, and click save. (On some occasions you have to shut down and restart the VM for the hardware to be added).
    ESXi step 2

    4. From the VM’s command line, confirm in Linux that the USB dongle is present using the “lsusb” command. Notice the Phillips (NXP) device is present – that is the USB dongle.
    ESXi step 3

    5. Telnet to the local HAAst/SecAst instance and issue the “license usbdongle” command and follow the steps presented on screen.

    • This reply was modified 4 years, 4 months ago by WebMaster.
    Avatar photoTelium Support Group
    Participant
    Post count: 262

    Once you have received the USB dongle(s) containing your license,

    1. Plug each dongle into the appropriate physical machine. (The dongle will have a tag attached showing the machine name, in case you have multiple dongles).

    2. From the VMware console edit the virtual machine, and add a new USB device:
    ESXi step 1

    3. Select the device name which should be something similar to “Phillips Elite”, and click save. (On some occasions you have to shut down and restart the VM for the hardware to be added).
    ESXi step 2

    4. From the VM’s command line, confirm in Linux that the USB dongle is present using the “lsusb” command. Notice the Phillips (NXP) device is present – that is the USB dongle.
    ESXi step3

    5. Telnet to the local PBXSync instance and issue the “license usbdongle” command and follow the steps presented on screen.

    • This reply was modified 4 years, 4 months ago by WebMaster.
    Avatar photoTelium Support Group
    Participant
    Post count: 262
    in reply to: Asterisk 16 support #6829

    PBXSync fully supports Asterisk 16.

    Avatar photoTelium Support Group
    Participant
    Post count: 262
    in reply to: Asterisk 16 support #6813

    Asterisk 16 has numerous architectural changes that impact connected products. Our development team has implemented Asterisk 16 compatibility, but will not release thr code until Asterisk 16 has stabilized, and we see companies implementing Asterisk 16 in production.

    As of March 2019 Asterisk 16 is not widely placed into production yet, and so we advise you to NOT upgrade to Asterisk 16 at this time. Since you are a registered HAAst user you are welcome to download a pre-release version of HAAst which supports Asterisk 16.

    Asterisk 16 has undergone some significant changes since initial release, and until the product has stabilized we do not recommend placing Asterisk 16 in production.[/i][/color]

    Avatar photoTelium Support Group
    Participant
    Post count: 262
    in reply to: Asterisk 16 support #6810

    Yes – you will need HAAst version 2.5.0 or later for Asterisk 16 support

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    The problem you are encountering has nothing to do with HAAst, and everything to do with the basics of networking. You have setup 2 NIC’s in each PC, but they are on the same subnet! That means that Linux has no idea where (out which NIC) to route traffic for your 192.168.1.0/24 subnet. You should not do this as it confuses Linux. This topic is part of what’s known as “multihoming”, and I would suggest you research this topic a bit further before you continue to setup your networks. As well, reread the HAAst installation guide – there’s a bit more information on this topic there. (This isn’t the first time we’ve seen this issue in the support group).

    By shutting down NIC1 on either PC you allow Linux to figure out how to properly route, but then your management NIC is gone so the cluster fails over.

    The solution (for 2 NIC’s per PBX) is to ensure that each NIC is on it’s own subnet. For example:

    Correct Implementation

    Incorrect Implementation

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    Telium’s software is an standalone product, which can run with pure Asterisk, as well as with configuration generators like Issabel, FreePBX, PIAF, etc. Telium’s software is not a plug-in module of FreePBX. (Sangoma signing applies only to FreePBX modules. ) HAAst operates between the operating system and Asterisk levels, while FreePBX operates above Asterisk as a ‘configuration generator’ that presents a pretty GUI and creates Asterisk config files for you.

    You should also be aware that some companies use module signing to protect their system, while other companies use module signing solely as a way of generating profits. In the latter case any developer can have their module signed if they pay for a signing key – even a bad module which steals your data or crashes your PBX can be signed. So signing is not always meaningful, but will always increase your cost.

    So module signing does not apply to HAAst, but be sure you understand the benefits really provided by module signing in the case of FreePBX.

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    Whenever you switch from a standalone to a clustered PBX there will be an outage. This can last from seconds to an hours depending on how to perform the cutover.

    It is possible to install HAAst into a live environment, but the “best” way depends a bit on your situation. If you cannot tolerate downtime, then you need to:

    1. Install HAAst on the live system but do not start the HAAst service
    2. Setup the second node (Asterisk and HAAst) but do not start the HAAst service
    3. Fully configure HAAst so the nodes will see each other
    4. At the next failure, maintenance window, or opportunity you chose, start the HAAst service on both nodes and the cluster will form

    If you are running FreePBX as your configuration generator we do not generally recommend the above approach, as FreePBX will crash/misbehave if you synchronize configuration data from (even slightly) different versions / enabled options / installed options. (And it’s very easy to accidentally install/enable different modules on FreePBX nodes). For this reason if you run FreePBX we recommend the following procedure:

    1. Install HAAst on the live system (per the installation guide)
    2. Configure HAAst on the live system
    3. Apply any Asterisk updates you wish
    4. Finalize your Asterisk dialplan and ensure Asterisk works as you wish
    5. During your maintenance window shutdown the PBX
    6. Use ‘dd’ or similar tool to mirror the PBX to a second PBX
    7. Restart both PBX’s (leave the new PBX unplugged from the network)
    8. Customize the second PBX with unique network and HAAst information
    9. Reconnect the second PBX to the network and the nodes should find each other
    10. The nodes should now report the cluster is live

    At a high level this should get you up and running with a working cluster. Our detailed installation guide has more specifics that take you through each of the steps above. As well, be sure to read the maintenance guide for instructions on updating.

    When Telium performs a live site installation, we bring up the cluster with minimal interruption in phone service (unless of course the customer approves more extensive failover test) as described above.

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    I’ll start by answering this question in the context of ANY cluster (eg: gateway cluster, router cluster, file server cluster, etc.). If the nodes which make up the cluster cannot talk to one another then they have no way of knowing if the other node is dead or alive. As such, the correct action for any isolated cluster node is to promote to active and assume the other node is dead. Once the nodes contact each other again they discover that multiple nodes are active (a situation called “dual-active contention”). Then the nodes should negotiate who should remain active, and who should demote itself.

    This is exactly what happens with HAAst. If the management connection between nodes is lost, then there is no way for either node to know that the other is alive. And so both nodes try to take over telephony service. Once the nodes reconnect then one node will automatically demote itself.

    You will find this scenario plays out identically with any commercial HA product (eg: CISCO routers with HSRP). Dual-active contention is the worst case scenario for any cluster as the two nodes are competing, and they will both contend for the resources / traffic / data / etc.

    There is a workaround called STONITH – available using event handlers in the Commercial Unlimited edition of HAAst. STONITH is an acronym for “Short The Other Node In The Head”, which basically tells one node to power off the other node. Although HAAst supports STONITH this functionality is disabled by default as the concept of STONITH is hotly debated as risky (a failing node may mistaking shoot the healthy node). And there are many scenarios where STONITH does not work (eg: two isolated nodes) without another out of band connection (eg: serial, 3rd network connection, etc)

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    HAAst depends on Asterisk to report the number of calls in progress. From the Asterisk CLI issue the command “core show calls” and you will see how call are calculated/reported.

    If you are running a configuration generator (eg: PIAF, FreePBX) then you will discover that the configuration generator triggers automatic internal (local) calls every X seconds to handle time variable updates and other checks. (Not a good design as they are loading up your PBX with background “calls”). There have been an number of discussions about this topic (on various websites) and causing a lot of frustration with users who are seeing their PBX being loaded up with CPU/disk activity to do little more than update a variable. Since some product vendors only have PHP development experience they must solve every problem using PHP scripts, call files, etc. Other vendors are quite sophisticated (eg: code in C++/C) and their products (eg: XCally) use minimal system resources.

    If you are running only Asterisk then check for channels not being released. (There are some documented bugs in Asterisk – depending on the version you are running).

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    This message means that the operating system is having trouble enumerating hardware on your host. This is due to a bug in your BIOS or Linux OS.

    Telium software tries to work around this bug, and everything SHOULD work fine. But if you have any problem with hardware failure detection or licensed features please contact Telium support and we’ll try to incorporate a fix specific to your BIOS/Linux.

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    HAAst is correctly NOT failing over because your PBX is operational and in-progress calls remain up. From HAAst’s perspective your PBX has reached capacity (but is still operational).

    First of all, be careful you don’t try to solve a security problem with an HA solution. Even if HAAst fails over to the other node, then that other node will subsequently be subject to those same DoS attacks and it will fail back, etc. So HA failover is not a solution. If you want HAAst to failover once your number of RTP ports in use reach a threshold you set, you can setup a HAAst sensor to monitor the number of RTP ports in use and factor this into each node’s health score. Then, HAAst will failover once the threshold you set for that sensor has been reached.

    Second, a more appropriate solution is to block the DoS attacked. Have a look at our Security for Asterisk product (http://www.telium.io/?secast) which is designed to block DoS attacks (and a lot more).

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    All of our support services are in English. We have some native French, German, and Hindi language skills, but that depends on the support representatives on duty.

    However, for customers who can’t speak English we try to support them through Google Translate, translating each message in/out to the language of the customer’s choice.

    (Sin embargo, para los clientes que no hablan inglés, intentamos ayudarlos a través de Google Translate, traduciendo cada mensaje de entrada / salida al idioma que elija el cliente.)

    Avatar photoTelium Support Group
    Participant
    Post count: 262

    We would be happy to SSH into your hosts to help with configuration.

    Our support machines have pre-installed VPN clients for the most popular protocols: Microsoft Windows protocols (PPTP/L2TP/IPSec/IKEv2), and Cisco VPN protocols (IPSec, PPTP/MPPE, L2TP/IPSec).

    If you chose not to use one of these protocols, or you require that we install a VPN client that is locked to your VPN concentrator / host, then we must build a virtual machine for our support techs to use when connecting to your system. Our support techs cannot (and may not) install any other software on their machines, in order to protect our computing environment.

    If you cannot use one of the pre-installed VPN protocols above, and you cannot port forward SSH from your public IP to your nodes, then we will have to charge you an additional 2 hours of support time to build and maintain a support VM dedicated to your environment. We will also archive this VM (while your maintenance agreement is active) to ensure we can continue to support you going forward.

    See FAQ 10042 for additional information: https://telium.io/faq1042

Viewing 15 posts - 61 through 75 (of 257 total)