HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 131

High Availability (HA) cluster configuration, HA cluster configuration rules, Creating an HA cluster

Page 131 highlights

High Availability (HA) cluster configuration 3 High Availability (HA) cluster configuration An HA cluster consists of two encryption engines configured to host the same CryptoTargets and to provide Active/Standby failover and failback capabilities in a single fabric. Failover is automatic (not configurable). Failback occurs automatically by default, but is configurable with a manual failback option. All encryption engines in an HA cluster share the same DEK for a disk or tape LUN. An HA cluster has the following limitations: • The encryption engines that are part of an HA cluster must belong to the same encryption group and be part of the same fabric. • An HA cluster cannot span fabrics and it cannot provide failover/failback capability within a fabric transparent to host MPIO software. NOTE Failure to ensure that HA cluster members are part of the same encryption group dissolves the HA cluster and the encryption engines lose their failover capability. HA cluster configuration rules The following rules apply when configuring an HA cluster: • All HA cluster configuration and related operations must be performed on the group leader. • Cluster links must be configured before creating an HA cluster. Refer to the section "Configuring cluster links" on page 98 for instructions. • Configuration changes must be committed before they take effect. Any operation related to an HA cluster that is performed without a commit operation will not survive across switch reboots, power cycles, CP failover, or HA reboots. • It is recommended that the HA cluster configuration be completed before you configure storage devices for encryption. • It is mandatory that the two encryption engines in the HA cluster belong to two different nodes for true redundancy. This is always the case for Brocade encryption switches, but is not true if two FS8-18 blades in the same DCX or DCX-4S chassis are configured in the same HA cluster. In Fabric OS version 6.3.0 and later releases, HA cluster creation is blocked when encryption engines belonging to FS8-18 blades in the same DCX or DCX-4S are specified. Creating an HA cluster 1. Log into the group leader as Admin or SecurityAdmin. 2. Enter the cryptocfg --create -hacluster command. Specify a name for the HA cluster and optionally add the node WWN of the encryption engine you wish to include in the HA cluster. Provide a slot number if the encryption engine is a blade. The following example creates an HA cluster named "HAC1" with two encryption engines. SecurityAdmin:switch>cryptocfg --create -hacluster HAC1 \ 11:22:33:44:55:66:77:00 10:00:00:05:1e:53:74:87 3 EE Node WWN: 11:22:33:44:55:66:77:00 Slot number: 0 Detected EE Node WWN: 10:00:00:05:1e:53:74:87 Slot number: 3 Detected Create HA cluster status: Operation succeeded. Fabric OS Encryption Administrator's Guide 113 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
113
53-1001864-01
High Availability (HA) cluster configuration
3
High Availability (HA) cluster configuration
An HA cluster consists of two encryption engines configured to host the same CryptoTargets and to
provide Active/Standby failover and failback capabilities in a single fabric. Failover is automatic
(not configurable). Failback occurs automatically by default, but is configurable with a manual
failback option. All encryption engines in an HA cluster share the same DEK for a disk or tape LUN.
An HA cluster has the following limitations:
The encryption engines that are part of an HA cluster must belong to the same encryption
group and be part of the same fabric.
An HA cluster cannot span fabrics and it cannot provide failover/failback capability within a
fabric transparent to host MPIO software.
NOTE
Failure to ensure that HA cluster members are part of the same encryption group dissolves the HA
cluster and the encryption engines lose their failover capability.
HA cluster configuration rules
The following rules apply when configuring an HA cluster:
All HA cluster configuration and related operations must be performed on the group leader.
Cluster links must be configured before creating an HA cluster. Refer to the section
“Configuring cluster links”
on page 98 for instructions.
Configuration changes must be committed before they take effect. Any operation related to an
HA cluster that is performed without a commit operation will not survive across switch reboots,
power cycles, CP failover, or HA reboots.
It is recommended that the HA cluster configuration be completed before you configure
storage devices for encryption.
It is mandatory that the two encryption engines in the HA cluster belong to two different nodes
for true redundancy. This is always the case for Brocade encryption switches, but is not true if
two FS8-18 blades in the same DCX or DCX-4S chassis are configured in the same HA cluster.
In Fabric OS version 6.3.0 and later releases, HA cluster creation is blocked when encryption
engines belonging to FS8-18 blades in the same DCX or DCX-4S are specified.
Creating an HA cluster
1.
Log into the group leader as Admin or SecurityAdmin.
2.
Enter the
cryptocfg
--
create -hacluster
command. Specify a name for the HA cluster and
optionally add the node WWN of the encryption engine you wish to include in the HA cluster.
Provide a slot number if the encryption engine is a blade. The following example creates an HA
cluster named “HAC1” with two encryption engines.
SecurityAdmin:switch>
cryptocfg --create -hacluster HAC1 \
11:22:33:44:55:66:77:00 10:00:00:05:1e:53:74:87 3
EE Node WWN: 11:22:33:44:55:66:77:00
Slot number: 0 Detected
EE Node WWN: 10:00:00:05:1e:53:74:87 Slot number: 3 Detected
Create HA cluster status: Operation succeeded.