IBM Cloud Docs
Understanding high availability for VPN for VPC

Understanding high availability for VPN for VPC

High availabilityThe ability of a service or workload to withstand failures and continue providing processing capability according to some predefined service level. For services, availability is defined in the Service Level Agreement. Availability includes both planned and unplanned events, such as maintenance, failures, and disasters. (HA) is the ability for a service to remain operational and accessible in the presence of unexpected failures.

VPN for VPC is a regional service and you can find the available region and data center locations in the Service and infrastructure availability by location documentation. As a regional service, VPN for VPC fulfills the defined Service Level Objectives (SLO) with the Standard plan. The SLO is not a warranty and IBM will not issue credits for failure to meet an objective.

To enable HA in a VPN gateway, you must deploy a VPN gateway in each zone associated with the subnet that you select. This ensures that the VPN gateway can connect only to virtual server instances within that specific zone. For fault tolerance across multiple zones, you should create a separate VPN gateway in each zone. For example, in a VPC with three zones (us-south1, us-south2, and us-south3), each zone requires its own VPN gateway (gateway1 for us-south1, gateway2 for us-south2, and gateway3 for us-south3).

When you provision a VPN gateway, two appliances are created automatically within the zone, functioning in an active/active or active/standby configuration. In the case of a policy-based VPN, you must explicitly choose HA, while for route-based VPNs, HA is the default behavior. If one appliance fails, the other automatically takes over to ensure uninterrupted service. However, VPN gateways do not support multiple zone redundancy (MZR) and are confined to a single zone, meaning that a VPN gateway cannot connect across different zones.

High availability architecture

This section provides an overview of the high availability architecture for a VPN gateway, starting with a depiction of a single-zone configuration followed by a discussion of a multi-zone region setup for enhanced redundancy and fault tolerance.

VPN gateway high availability in a single-zone

A VPN gateway is composed of two back-end instances within the same zone to ensure high availability. The VPN service continuously monitors these instances and automatically fails over to the other instance in the event of a failure. Routine maintenance of the VPN is conducted through rolling upgrades of the two back-end instances. During maintenance, the VPN’s private IP address might change, but the public IP addresses remain unaffected, and your VPN connections will automatically switch to the available instance.

VPN gateway HA in single zone
VPN gateway HA in single zone

VPN gateway high availability in a multizone region

In the event of a network outage in a specific zoneA location within a region that acts as an independent fault domain and has decreased latency to other zones in the region., you might lose network access to all resources within that zone, including the VPN gateway. To ensure high availability, it is recommended to distribute your workload across multiple zones, with a VPN gateway in each zone, and implement load balancing between zones.

The following diagram illustrates how to distribute your workload across multizone regionsA region that is spread across physical locations in multiple zones to increase fault tolerance.. ach VPN gateway is dedicated to providing access to the VPC network within the same zone, ensuring resilience and minimizing the impact of localized outages.

VPN gateway HA in multiple zones
VPN gateway HA in multiple zones