HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 210

A member node lost connection to all other nodes in the encryption group

Page 210 highlights

6 Encryption group and HA cluster maintenance A member node lost connection to all other nodes in the encryption group Assumptions N1, N2 and N3 form an encryption group and N2 is the group leader node. N3 and N1 are part of an HA cluster. Assume that N3 lost connection with all other nodes in the group. Node N3 finds itself isolated from the encryption group and, following the group leader succession protocol, elects itself as group leader. This action splits the encryption group into two encryption group islands. EG1 includes the original encryption group minus the member node N3 that lost connection to the encryption group. EG2 consists of a single node N3, which functions as the group leader. Impact • The two encryption group islands keep functioning independently of each other as far as host I/O encryption traffic is concerned. • Each encryption group registers the missing members as "offline". • The isolation of N3 from the group leader breaks the HA cluster and failover capability between N3 and N1. • You cannot configure any CryptoTargets, LUN policies, tape pools, or security parameters on any of the group leaders. This would require communication with the "offline" member nodes. You cannot start any re-key operations (auto or manual) on any of the nodes. Refer to the section "Configuration impact of encryption group split or node isolation" on page 194 for more information on which configuration changes are allowed. Recovery 1. Restore connectivity between the two separate encryption group islands. When the lost connection is restored, an automatic split recovery process begins. The current group leader and the former group leader (N3 and N2 in this example) arbitrate the recovery, and the group leader with the majority number of members (N2) becomes group leader. If the number of member nodes is the same, the group leader node with the highest WWN becomes group leader. 2. After the encryption group enters the converged state, execute the cryptocfg --commit command on the group leader node to distribute the crypto-device configuration from the group leader to all member nodes. Should you decide to remove the isolated node N3, follow the procedures described in the section "Removing a node from an encryption group" on page 181. Several member nodes split off from an encryption group Assumptions N1, N2, N3, and N4 form an encryption group and N2 is the group leader node. N3 and N1 are part of an HA cluster. Assume that both N3 and N4 lost connection with the encryption group but can still communicate with each other. Following the group leader succession protocol, N3 elects itself as group leader to form a second encryption group with itself and N4 as group members. We now have two encryption groups, EG1 (group leader N2 + N1), and EG2 (group leader N3 + N4). Impact • The two encryption groups continue to function independently of each other as far as host I/O encryption traffic is concerned. 192 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

192
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Encryption group and HA cluster maintenance
6
A member node lost connection to all other nodes in the encryption group
Assumptions
N1, N2 and N3 form an encryption group and N2 is the group leader node. N3 and N1 are part of
an HA cluster. Assume that N3 lost connection with all other nodes in the group. Node N3 finds
itself isolated from the encryption group and, following the group leader succession protocol, elects
itself as group leader. This action splits the encryption group into two encryption group islands.
EG1 includes the original encryption group minus the member node N3 that lost connection to the
encryption group. EG2 consists of a single node N3, which functions as the group leader.
Impact
The two encryption group islands keep functioning independently of each other as far as host
I/O encryption traffic is concerned.
Each encryption group registers the missing members as “offline”.
The isolation of N3 from the group leader breaks the HA cluster and failover capability between
N3 and N1.
You cannot configure any CryptoTargets, LUN policies, tape pools, or security parameters on
any of the group leaders. This would require communication with the “offline” member nodes.
You cannot start any re-key operations (auto or manual) on any of the nodes. Refer to the
section
“Configuration impact of encryption group split or node isolation”
on page 194 for
more information on which configuration changes are allowed.
Recovery
1.
Restore connectivity between the two separate encryption group islands.
When the lost connection is restored, an automatic split recovery process begins. The current
group leader and the former group leader (N3 and N2 in this example) arbitrate the recovery,
and the group leader with the majority number of members (N2) becomes group leader. If the
number of member nodes is the same, the group leader node with the highest WWN becomes
group leader.
2.
After the encryption group enters the
converged
state, execute the
cryptocfg
--
commit
command on the group leader node to distribute the crypto-device configuration from the
group leader to all member nodes.
Should you decide to remove the isolated node N3, follow the procedures described in the section
“Removing a node from an encryption group”
on page 181.
Several member nodes split off from an encryption group
Assumptions
N1, N2, N3, and N4 form an encryption group and N2 is the group leader node. N3 and N1 are part
of an HA cluster. Assume that both N3 and N4 lost connection with the encryption group but can
still communicate with each other. Following the group leader succession protocol, N3 elects itself
as group leader to form a second encryption group with itself and N4 as group members. We now
have two encryption groups, EG1 (group leader N2 + N1), and EG2 (group leader N3 + N4).
Impact
The two encryption groups continue to function independently of each other as far as host I/O
encryption traffic is concerned.