Before You Begin

To assemble an HA cluster, you must install Veeam Software Appliance on the Linux-based servers that you plan to use as HA nodes, configure your HA network environment, and enable the High Availability option for both Linux-based servers using Veeam Host Management web UI. If you use Kerberos authentication, you must create the .keytab file and import it to the Veeam Host Management web UI.

Configuring HA Nodes and HA Network Environment

To configure Linux-based servers that you plan to use as HA nodes and the HA network environment, do the following:

  1. [Optional] Install Veeam Software Appliance on a Linux-based server that you plan to use as a primary node of your HA cluster.
  2. Install Veeam Software Appliance on a Linux-based machine that you plan to use as a secondary node of your HA cluster.

Important

This machine must have a fresh Veeam Software Appliance installation with no existing backup data. If any backup data is present, it will be permanently deleted once you assemble the HA cluster.

  1. Assign static IP addresses to both Linux-based servers on your DNS server.
  2. Reserve a static IP address for an HA cluster on your DNS server. This IP address will be used to connect to the HA cluster.

Important

If you use Kerberos authentication, you must reserve a static IP address for the cluster within the same network as the Kerberos Key Distribution Center (KDC).

  1. [Optional] If you would like to use the DNS name to access your HA cluster, configure this DNS name to resolve to the HA cluster IP address.
  2. [For Kerberos authentication] Join both Linux-based servers to a domain where Kerberos authentication is configured. For more information, see Managing Domain Settings.

Enabling High Availability

After you configure the HA nodes, submit a request to enable the High Availability option for both Linux-based servers. Note that if you have disassembled the HA cluster, you will need to resubmit the request.

To submit the request, do the following:

  1. Log in to the Veeam Host Management web UI.
  2. In the management pane, click Backup Infrastructure.
  3. In the High Availability section, click Submit Request:
    • If you did not configure the Security Officer account during the Veeam Software Appliance installation, the request is approved automatically.
    • If you configured the Security Officer account, you must wait until the security officer approves your request. This approval expires in 8 hours; ensure that you assemble the cluster within this period.
  1. [For Kerberos authentication] If you use the Kerberos environment, you must create a .keytab file and import it to the Veeam Host Management web UI.

Important

If you do not upload the .keytab file, you will not be able to authenticate using the Kerberos protocol against your HA cluster.

Before You Begin 

Creating Keytab File

To create the .keytab file, do the following:

  1. Create a service account in your Active Directory. For information on service accounts, see Microsoft Docs.
  2. On your Domain Controller (DC), generate the .keytab file. For information on the parameters, see Microsoft Docs.

ktpass [/out <filename>] [/princ <principalname>] [/mapuser <useraccount>] [/crypto {AES256-SHA1}] [/ptype {KRB5_NT_PRINCIPAL}] [/pass {password|*|{-|+}rndpass}] [{-|+}setpass <password>] [{-|+}setupn]

Important

We recommend that you specify the following values for these parameters:

  • For the /crypto parameter — specify the AES256-SHA1 value to use the AES256-CTS-HMAC-SHA1-96 encryption type.
  • For the /ptype parameter — specify the KRB5_NT_PRINCIPAL value to use the general principal type.

Keytab Files Examples

Generating Keytab File Using UPN

This command generates the .keytab file using UPN.

ktpass -princ my-ha-cluster-acc$@DOMAIN.LOCAL -mapuser DOMAIN\my-ha-cluster-acc -crypto AES256-SHA1 -ptype KRB5_NT_PRINCIPAL -pass password123 -setPass -setUpn -out custom.keytab

Specify the following parameters:

  • Specify the Kerberos principal name for which the .keytab file is generated. Provide the princ parameter value in the host/computer.tech.com@DOMAIN.LOCAL format. Note: This parameter is case-sensitive.
  • Specify the Kerberos principal to associate with a Windows user account. Provide the mapuser parameter value in the DOMAIN\my-ha-cluster-acc format.
  • Specify the encryption type key that is generated in the .keytab file. Set the AES256-SHA1 value for the crypto parameter.
  • Specify the principal type. Set the KRB5_NT_PRINCIPAL value for the ptype parameter.
  • Specify the password for the principal user name. This password is used to generate the key in the .keytab file. Set the password123 value for the pass parameter.  Note: Use * to prompt for a password.
  • Set the ktpass command to use the password specified in the pass on the user account in Active Directory. Provide the setPass parameter.
  • Set the UPN on the account to match the SPN. Provide the setUpn parameter.
  • Specify the name of the .keytab file that you want to generate. Set the custom.keytab value for the out parameter.

Page updated 11/18/2025

Page content applies to build 13.0.1.180