--- layout: docs page_title: Performance Standby Nodes - Vault Enterprise description: Performance Standby Nodes - Vault Enterprise --- # Performance Standby Nodes -> **Note**: This feature requires [Vault Enterprise Premium](https://www.hashicorp.com/products/vault/). Vault supports a multi-server mode for high availability. This mode protects against outages by running multiple Vault servers. High availability mode is automatically enabled when using a data store that supports it. You can learn more about HA mode on the [Concepts](/docs/concepts/ha) page. Vault Enterprise offers additional features that allow HA nodes to service read-only requests on the local standby node. Read-only requests are requests that do not modify Vault's storage. ## Server-to-Server Communication Performance Standbys require the request forwarding method described in the [HA Server-to-Server](/docs/concepts/ha#server-to-server-communication) docs. A performance standby will connect to the active node over the existing request forwarding connection. If selected by the active node to be promoted to a performance standby it will be handed a newly-generated private key and certificate for use in creating a new mutually-authenticated TLS connection to the cluster port. This connection will be used to send updates from the active node to the standby. ## Request Forwarding A Performance Standby will attempt to process requests that come in. If a storage write is detected the standby will forward the request over the cluster port connection to the active node. If the request is read-only the Performance Standby will handle the requests locally. Sending requests to Performance Standbys that result in forwarded writes will be slightly slower than going directly to the active node. A client that has advanced knowledge of the behavior of the call can choose to point the request to the appropriate node. ### Direct Access A Performance Standby will tag itself as such in consul if service registration is enabled. To access the set of Performance Standbys the `performance-standby` tag can be used. For example to send requests to only the performance standbys `https://performance-standby.vault.dc1.consul` could be used (host name may vary based on consul configuration). ### Behind Load Balancers Additionally, if you wish to point your load balancers at performance standby nodes, the `sys/health` endpoint can be used to determine if a node is a performance standby. See the [sys/health API](/api-docs/system/health) docs for more info. ## Disabling Performance Standbys To disable performance standbys the `disable_performance_standby` flag should be set to true in the Vault config file. This will both tell a standby not to attempt to enable performance mode and an active node to not allow any performance standby connections. This setting should be synced across all nodes in the cluster. ## Monitoring Performance Standbys To verify your node is a performance standby the `vault status` command can be used: ```shell-session $ vault status Key Value --- ----- Seal Type shamir Sealed false Total Shares 1 Threshold 1 Version 0.11.0+prem Cluster Name vault-cluster-d040e74c Cluster ID 9f82e03b-71fb-97a6-9c5a-46fa6715d6e4 HA Enabled true HA Cluster https://127.0.0.1:8201 HA Mode standby Active Node Address http://127.0.0.1:8200 Performance Standby Node true Performance Standby Last Remote WAL 380329 ```