Created on
02-18-2025
07:45 AM
Edited on
05-19-2025
06:35 AM
By
Jean-Philippe_P
Description | This article describes the steps to configure 'Custom Health Check' for High Availability on FortiNAC-F v7.6.X. |
Scope | FortiNAC-F v7.6.X. |
Solution |
Starting from FortiNAC-F v7.6.0, it is possible to configure Custom Health Check in addition to the Predefined Health Check for High Availability. If this check fails, the primary FortiNAC will trigger a 'System Check Failed!' event and force failover to the secondary.
Troubleshooting: The 'output.processManager' log file will show the status of the health check. It can be viewed using the command:
diagnose tail -f output.processManager
In normal scenarios, when the health check is successful, the following output will be generated on the primary FortiNAC:
2025-02-18 14:57:30.271 +0100 [main] INFO yams.CampusManager - [getCustomHealthCheckResult]custom health check enabled
But when the health check fails, the following output will be generated on the primary FortiNAC.
2025-02-18 15:57:25.611 +0100 [com.bsc.server.CustomHealthCheckTaskController] INFO c.f.f.l.s.CustomHealthCheckService - Protocol check name ICMP_rule timed out, try 0
2025-02-18 15:57:30.716 +0100 [main] INFO yams.CampusManager - [getCustomHealthCheckResult]custom health check enabled
2025-02-18 15:57:31.236 +0100 [main] INFO yams.CampusManager - ******* Shutting Down - Secondary In Control *******
2025-02-18 09:57:51.651 -0500 [main] INFO yams.CampusManager - **** Primary responded with Secondary In Control ****
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.