Our Cyberark HAVault Cluster demo is almost finished.
We’ve configured our network, deployed 2 disks for SharedStorage and Quorum, and installed Vault_1.
In this post We’ll be installing Vault_2, our Node 2, and testing the HighAvailability feature.
1. Prepare Node 1 Stop all Services in Node 1 Cluster Vault Management The Cluster Vault Management should look like this Cluster Vault Management - Offline For Both Disks, SharedStorage and Quorum set them offline.
1. Vault Cluster Installation At this point we’ve created 2 disks, one for our Shared Storage (safes and metadata) and the second one for Quorum. After that, we have connected those two disk to our Vault_1 host.
In this post we’ll review the installation of the Cyberark Vault in Vault_1 node.
Prepare your node according with Cyberark PreInstallation tasks and start de Cyberark Vault Installer as usual. When promted for Vault Installation mode, choose Cluster-node Vault Installation Vault installation Mode Warning Vault hardening at this point can break the iSCSI connection, wait to end installation for vault hardening.
1. Preinstalation tasks This time we’ll be connecting our Quorum and Shared Storage disks to our Vault 1
Let’s check the Network configuration for Vault 1. Let’s make sure we have 2 IPs configured as shown.
Vault 1 Network config Start the iSCSI Disk Initiator, we can start the console by running iscsicpl.exe. Here we need to “Discover” a portal so after hitting the Discovery Portal button, we need to provide IP 10.
Implementing a Cyberark High Availability (HA) Vault cluster is crucial for large organizations to ensure seamless and uninterrupted access to privileged account management. This robust setup minimizes downtime by providing failover capabilities, thereby enhancing operational continuity and security. Moreover, the HA architecture ensures data integrity and protection against single points of failure, safeguarding sensitive credentials and reducing the risk of breaches. Ultimately, Cyberark HA Vault clusters are vital for maintaining the resilience and efficiency of enterprise security infrastructures.