Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel6
outlinefalse
stylenone
typelist
printabletrue

...

In environments where automatic failover is desired, it is possible to enhance automatic failover to monitor for additional events via a Hardware Management Console (HMC) using cluster monitors. See Advanced Node Failure Detection for additional information.

...

PowerHA uses the Power Virtual Server API to manage and control resources in IBM Power Virtual Server.

Configuring PowerHA to Accept Digital Certificates from IBM Cloud Services

All communication between PowerHA and the IBM Cloud uses TLS for communication. This communication uses digital certificates to both encrypt and protect the communication.

Create a *SYSTEM certificate store to hold the digital certificates

To create the *SYSTEM certificate store, use the following steps:

Expand
titleCreating the *SYSTEM certificate store
  1. In a web browser, enter http://mysystem:2001/dcm, where mysystem is the host name or IP address of the system. This opens IBM Digital Certificate Manager for i.

  2. Log in with an IBM i profile with sufficient authority.

  3. Click on Create Certificate Store on the left-hand navigation menu

  4. On the right-hand side of the page select *SYSTEM.

    Image Added
Info

Note: If the *SYSTEM option is not available in the list, it indicates that there is a *SYSTEM store already created on this system, and these steps have already been performed.

  1. Create a password for the *SYSTEM store and click Create.

Info

Note: The password is case-sensitive. It is recommended not to use special characters. This password is not attached to a user profile and it will not lock you out of the system after too many attempts.

Panel
panelIconIdatlassian-light_bulb_on
panelIcon:light_bulb_on:
panelIconText:light_bulb_on:
bgColor#E3FCEF

Tip: The system certificate store must be created on all nodes in the cluster. Ensure the *SYSTEM certificate store is created on all nodes in the cluster before continuing.

Trusting the IBM Cloud Certificate Authority

There are two options for trusting the IBM Cloud Certificate Authority:

  • Recommended: Populate digital certificate manager with well known CAs.

Expand
titlePopulate digital certificate manager with well known CAs.

Open the *SYSTEM certificate store in Digital Certificate Manager

Info

If the *SYSTEM certificate store was created in the previous step, simply select it in the left-hand menu in Digital Certificate Manager and continue on to the next section.

  1. In a web browser, enter http://mysystem:2001/dcm, where mysystem is the host name or IP address of the system. This opens IBM Digital Certificate Manager for i.

  2. Log in with an IBM i profile with sufficient authority.

  3. Click Open Certificate Store.

  4. Select the *SYSTEM option, click continue.

Info

If *SYSTEM does not appear in the list, the system certificate store either does not exist, or is already open. If it does not exist, see Creating the *SYSTEM Certificate Store. If it is already open, select it in the left-hand menu.

  1. Sign in with the password for the certificate store and click Open.

Populate the *SYSTEM certificate store in Digital Certificate Manager with CAs

  1. Click the Populate with CAs link in Digital Certificate Manager

    image-20250120-150242.pngImage Added
  2. Click the Select All button to select all certificates

  3. Click the Populate button to populate the system certificate store with all well known CAs.

  4. Repeat these steps on all nodes in the cluster.

  • Bypassing strict-certificate checking in PowerHA using a PowerHA Policy

Expand
titleBypassing strict-certificate checking in PowerHA using a PowerHA Policy
Note

Warning: While this step only needs to be performed on one node, it is not as secure as the option for trusting well-known certificates. While this option still uses encrypted communication between PowerHA and IBM Cloud services, it does not protect against a man-in-the-middle attack.

Add a PowerHA policy to bypass strict certificate checking in PowerHA. For example, the following policy would bypass strict certificate checking for any configuration description:

ADDHAPCY PCY(QHA_COMM_STRICT_CERT_CHECK) PCYDMN(*NONE) QUAL('CFGD(*ALL)') VALUE(*NO)

This step only needs to be performed on one node as the policy applies to the entire PowerHA cluster.

Creating an API Key

The API key at a minimum must have the following access levels to the Workspace for Power Virtual Server service:

...

  1. In the IBM Cloud console, go to Manage > Access (IAM) and select Service IDs.

  2. If you don’t have a service ID created, create the service ID.

  3. Click the Actions icon > Manage service ID.

  4. Click API keys.

  5. Click create

  6. Add a name and description to easily identify the API key.

  7. Click Create.

  8. Save your API key by copying or downloading it to a secure location.

Panel
panelIconId1f512
panelIcon:lock:
panelIconText🔒
bgColor#DEEBFF

For security reasons, the API key is only available to be copied or downloaded at the time of creation. If the API key is lost, you must create a new API key.

...