Application operation in emergency mode

3 July 2024

ID 175375

Kaspersky Web Traffic Security switches to emergency mode if the system has two or more nodes with role Control. For example, the node with role Control became unavailable and this role was assigned to another node in the cluster. Eventually the first node with role Control became available again, leaving the system with two nodes with role Control.

Emergency mode does not affect network traffic processing. All nodes continue to process network traffic using the latest settings received from the node with role Control before the application switched to emergency mode.

Node with role Control

The emergency mode window on the node with role Control displays the following information:

  • IP address of the current node.
  • Role of the current node.
  • Table of nodes within a cluster.

The nodes table contains the following columns:

  • IP address:port is the IP address and the port for connecting to the node.
  • Role is the role of the current node in the application.
  • Control node is the IP address of the node with role Control.

    Available only for the node with role Secondary.

  • Synchronized is the time of last synchronization of the values of settings.
  • Control node connection state is the availability of the node with role Control over the network.

A kwts_icon_alarm icon in a row of the table means that a problem was encountered for this node. For example, a node with role Secondary has erroneously become a node with role Control, or the server is unavailable over the network.

If you want to transfer control of the application to another node, you can assign the Secondary node role to the current node with role Control by clicking Assign Secondary node role.

Node with role Secondary

The emergency mode window on the node with role Secondary displays the following information:

  • IP address of the current node.
  • Role of the current node.
  • IP address and availability of the node with role Control.
  • Date and time of the last synchronization of the values of settings.
  • Table of nodes within a cluster.

The nodes table contains the following columns:

  • IP address:port is the IP address and the port for connecting to the node.
  • Role is the role of the node in the application.

If you want to manage application settings on this node, you can assign the Control node role to it by clicking Change role to Control node.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.