Configuring TLS for the communication between primary and standby HADR servers
SSL is supported between the HADR primary and standby servers on environments that do not use IBM® Db2® pureScale®.
Before you begin
- Configuring TLS on all instances
-
To use TLS for the transmission of transaction logs between HADR primary and standby, you need to configure TLS (Transport Layer Security) on all instances in HADR environment. The procedures are similar to the ones described in Configuring TLS support in a Db2 instance. In particular, the steps that describe how to set up your TLS key database and certificate must be done for all the instances. The steps for configuring the HADR environment by using a self-signed certificate are described in the following section.
Considerations for implementing TLS for HADR:- It is possible to implement TLS via a shared key database. For example, the SSL_SVR_KEYDB and SSL_SVR_STASH configuration parameters on all instances are set to a shared location. When implementing TLS via a shared key database, it is important that the shared key database itself is also highly available to avoid having a single point of failure.
- It is also possible to implement TLS on each instance via a separate key database. This can be done either by executing the same set of commands on each instance to set up TLS key database and certificate, or by creating the TLS key database and certificate on the first instance then copy them to the other instance(s).
- When implementing TLS on each instance as a separate key database, it is important to have completed all certificate updates to the key databases on all instances prior to making use of those certifications in Db2.
An activated connection concentrator does not inhibit the use of TLS for HADR communications.
- Prior to configuring TLS support, perform the following steps on each primary and standby in the HADR configuration
-
Ensure that the path to the IBM Global Security Kit (GSKit) libraries appear in the LIBPATH, SHLIB_PATH, or LD_LIBRARY_PATH environment variables on Linux® and UNIX operating systems. GSKit is automatically included when you install a Db2 database server product.
On UNIX and Linux operating systems, the GSKit libraries are located in sqllib/lib/gskit. On Linux platforms, the GSKit is installed locally when Db2 is installed. The GSKit libraries are located in sqllib/lib/gskit or sqllib/lib64/gskit. It is unnecessary to have another copy of GSKit installed in a global location to start the instance. If a global copy of GSKit does exist, keep the version of the global GSKit at the same version of the local GSKit.
For information about the GSKit tool GSKCapiCmd, see the GSKCapiCmd User's Guide, available at ftp://ftp.software.ibm.com/software/webserver/appserv/library/v80/GSK_CapiCmd_UserGuide.pdf.
About this task
- Configuring TLS support
-
The general steps for configuring TLS support are:
- Create a key database on the primary and each standby instance to manage your digital certificates. These certificates and encryption keys are used for establishing the TLS connections.
- Configure the Db2 instance for TLS support. This step is done by Db2 instance owner.
- Configured TLS for the particular database for which TLS is to be used.
The procedure section details this configuration process for the communication between primary and standby HADR servers.
Restrictions
Platform | Supported starting in Db2 Version |
---|---|
Linux on AMD64 and Intel EM64T | 11.1.1.1 |
All other platforms | 11.1.3.3 |