- Overview
- Requirements
- Pre-installation
- Preparing the installation
- Installing and configuring the service mesh
- Downloading the installation packages
- Configuring the OCI-compliant registry
- Granting installation permissions
- Installing and configuring the GitOps tool
- Deploying Redis through OperatorHub
- Disaster recovery: Active/Passive configurations
- Generating the configuration file using a wizard
- input.json example
- Applying miscellaneous configurations
- Running uipathctl
- Installation
- Post-installation
- Migration and upgrade
- Upgrading Automation Suite
- Migrating standalone products to Automation Suite
- Step 1: Restoring the standalone product database
- Step 2: Updating the schema of the restored product database
- Step 3: Moving the Identity organization data from standalone to Automation Suite
- Step 4: Backing up the platform database in Automation Suite
- Step 5: Merging organizations in Automation Suite
- Step 6: Updating the migrated product connection strings
- Step 7: Migrating standalone Orchestrator
- Step 8: Migrating standalone Insights
- Step 9: Deleting the default tenant
- Performing a single tenant migration
- Migrating between Automation Suite clusters
- Monitoring and alerting
- Cluster administration
- Product-specific configuration
- Troubleshooting

Automation Suite on OpenShift installation guide
Disaster recovery: Active/Passive configurations
Some Automation Suite products are not supported in Disaster Recovery - Active/Passive . You can install these products while installing the primary cluster only. For details, see Disaster recovery - Active/Passive.
input.json
parameters:
-
For Active/Passive deployments: configure the parameters listed in the following table.
Parameter |
Description |
---|---|
fqdn |
It represents the FQDN that, at the time of installation, points to the load balancer of the primary cluster. For details, refer to DNS routing logic. |
cluster_fqdn |
It represents the cluster-specific FQDN (DNS) that points to the load balancer of the cluster you set up using the
input.json file.
For details, refer to DNS routing logic. |
|
It indicates that Automation Suite must be configured to work multi-site. It must be set to
true .
|
|
It indicates that this cluster is a primary cluster and must be set to
true . It defaults to false to denote the secondary cluster.
|
|
It indicates the base64-encoded kubeconfig file of another cluster. While installing the primary Automation Suite cluster, this value is unavailable and can be left as is. However, you must provide the value when rebuilding the primary automation suite later during recovery. |
This page describes how to set up a multi-site configuration with a primary and secondary cluster. The primary cluster is active and the secondary cluster is passive.
-
In the configuration for the primary cluster option, the
enabled
option must be set to true."multisite": { "enabled": true, "primary": true }
"multisite": { "enabled": true, "primary": true } -
In the configuration for the secondary cluster, the
primary
option must be set to false:"multisite": { "enabled": true, "primary": false, "other_kube_config": "[base64 encoded kubeconfig]" }
"multisite": { "enabled": true, "primary": false, "other_kube_config": "[base64 encoded kubeconfig]" }You must supply the primary kubeconfig in base64 encoded string.
- Services that are not compatible with being in a passive state must be disabled. For more details on services that do not support Active/Passive mode, refer to the Disaster recovery - Active/Passive page.
- Ensure the certificates are consistent across the primary and secondary cluster, as this is not automatically checked or enforced.