Created on
‎06-16-2022
11:35 AM
Edited on
‎12-12-2025
12:34 AM
By
Jean-Philippe_P
| Description |
This article describes what a split-brain scenario is in an HA setup and common causes. |
| Scope | FortiGate, High Availability. |
| Solution |
'Split-brain' is the term for when FortiGates in an HA cluster cannot communicate with each other on the heartbeat interface, causing each FortiGate to assume that it is the Primary. When in a split-brain scenario, each unit will have the same MAC addresses, which will cause an outage in the network.
Common symptoms of split-brain:
To avoid a split-brain scenario:
config system ha
Common causes of split-brain:
Congestion on the heartbeat link can be caused when using the same link for session sync. For better latency, it is recommended to use another link/interface for session sync. See this KB article for more info: Technical Tip: HA session-sync-dev configuration. If the management PC used to access the FortiGates (via GUI or SSH) is located behind a switch connected to the cluster, this MAC duplication causes intermittent or failed administrative connectivity. The switch cannot reliably forward traffic to the correct FortiGate because it sees the same MAC address being advertised on multiple ports.
Below are the troubleshooting steps:
show system ha
diagnose hardware deviceinfo nic xxx <----- Where xxx is the port name.
To stop the sniffer, use CTRL+C. Verify HA configurations match between the HA members; settings such as HA mode, group-name, group-id, and passwords should be the same.
Assuming that packets are seen going both ways on the previous step, the following debug run on each unit may have more information on why they are not able to communicate:
diagnose debug reset diagnose debug enable
If no output is generated after initiating the debug command above, restart the hatalk process by initiating the command 'fnsysctl killall hatalk'.
To stop debugging:
diagnose debug disable diagnose debug reset
get system status
diagnose sys ha history read
Or check HA event logs for the 'Heartbeat device interface down' / 'Heartbeat device interface up'.
For example:
date="2024-09-05" time="05:16:40" devid="FG9xxxxxxxxxxxxx" vd="root" type="event" subtype="ha" bid=200306912 csf="fabric" devintfname="ha" devname="fgc-01" dstepid=3 dsteuid=3 dvid=1066 epid=104 euid=3 eventtime=1725506200934159092 ha_role="secondary" id=7410992715225104424 level="critical" logdesc="Heartbeat device interface down" logid="0108037901" logver=702081639 msg="Heartbeat device(interface) down" tz="+0200"
Primary:
diagnose sys ha history read
version=1.1
HA state change time: 2022-06-16 12:55:36
message_count=8/512
<2022-06-16 12:55:36> FGVMEVIJGWSKGW55 is elected as the cluster primary of 1 member
<2022-06-16 12:55:36> member FGVMEV_FDLRD6Y15 lost heartbeat on hbdev port2
<2022-06-16 12:55:36> heartbeats from FGVMEV_FDLRD6Y15 are lost on all hbdev
<2022-06-16 12:55:32> hbdev port2 link status changed: 1->0
Secondary:
diagnose sys ha history read
version=1.1
HA state change time: 2022-06-16 12:55:36
message_count=6/512
<2022-06-16 12:55:36> member FGVMEVIJGWSKGW55 lost heartbeat on hbdev port2
<2022-06-16 12:55:36> FGVMEV_FDLRD6Y15 is elected as the cluster primary of 1 member
<2022-06-16 12:55:36> heartbeats from FGVMEVIJGWSKGW55 are lost on all hbdev
Note: In the Event of Heartbeat packet loss, it will result in a split-brain state where both FortiGates send their GARP packet to the connecting network devices (Router, switch, etc).
diagnose sniffer packet port1 ' ' 6 0 a
This example uses port1 to showcase the behavior:
As seen on the packet capture, it exhibits the IP is 10.47.3.120, which is the IP address assigned to Port1, and by right, the HA primary FortiGate should have a virtual MAC address mapped to it, but since it is in a split-brain condition, it is observed to show there is detection of duplication of this IP.
Note: This capture can be taken on either of the FortiGates.
Related document:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.