HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 78

Re-balancing the encryption engine

Page 78 highlights

2 Re-balancing the encryption engine 8. Select the desired encryption mode. • If you change a LUN policy from Native Encryption or DF-Compatible Encryption to Clear Text, you disable encryption. • The LUNs of the target which are not enabled for encryption must still be added to the CryptoTarget container with the Clear Text encryption mode option. NOTE The Re-keying interval can only be changed for disk LUNs. For tape LUNs, expiration of the re-keying interval simply triggers the generation of a new key, to be used on future tape volumes. Tapes that are already made are not re-keyed. To re-key a tape, you would need to read the tape contents using a host application that decrypts the tape contents using the old key, and then re-write the tape, which re-encrypts the data with the new key. 9. Click OK. The selected tape LUNs are added to the encryption target container. Re-balancing the encryption engine If you are currently using encryption and running Fabric OS version 6.3.x or earlier, you are hosting tape and disk target containers on different encryption switches or blades. Beginning with Fabric OS version 6.4, disk and tape target containers can be hosted on the same switch or blade. Hosting both disk and tape target containers on the same switch or blade may result in a drop in throughput, but it can reduce cost by reducing the number of switches or blades needed to support encrypted I/O in environments that use both disk and tape. The throughput drop can be mitigated by re-balancing the tape and disk target containers across the encryption engine. This ensures that the tape and disk target containers are distributed within the encryption engine for maximum throughput. All nodes within an encryption group must be upgraded to Fabric OS version 6.4 or a later release to support hosting disk and tape target containers on the same encryption engine. If any node within an encryption group is running an earlier release, disk and tape containers must continue to be hosted on separate encryption engines. During re-balancing operations, be aware of the following: • You may notice a slight disruption in Disk I/O. In some cases, manual intervention may be needed. • Backup jobs to tapes may need to be restarted after re-balancing completes. To determine if re-balancing is recommended for an encryption engine, check the encryption engine properties. Beginning with Fabric OS version 6.4, a field is added that indicates whether or not re-balancing is recommended You may be prompted to rebalance during the following operations: • When adding a new disk or tape target container. • When removing an existing disk or tape target container. • After failover to a backup encryption engine in an HA cluster. • After an failed encryption engine in an HA cluster is recovered, and failback processing has taken place. To rebalance an encryption engine, do the following. 60 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

60
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Re-balancing the encryption engine
2
8.
Select the desired encryption mode.
If you change a LUN policy from
Native Encryption
or
DF-Compatible Encryption
to
Clear
Text
, you disable encryption.
The LUNs of the target which are not enabled for encryption must still be added to the
CryptoTarget container with the
Clear Text
encryption mode option.
NOTE
The Re-keying interval can only be changed for disk LUNs. For tape LUNs, expiration of the
re-keying interval simply triggers the generation of a new key, to be used on future tape
volumes. Tapes that are already made are not re-keyed. To re-key a tape, you would need to
read the tape contents using a host application that decrypts the tape contents using the old
key, and then re-write the tape, which re-encrypts the data with the new key.
9.
Click
OK
.
The selected tape LUNs are added to the encryption target container.
Re-balancing the encryption engine
If you are currently using encryption and running Fabric OS version 6.3.x or earlier, you are hosting
tape and disk target containers on different encryption switches or blades. Beginning with Fabric
OS version 6.4, disk and tape target containers can be hosted on the same switch or blade.
Hosting both disk and tape target containers on the same switch or blade may result in a drop in
throughput, but it can reduce cost by reducing the number of switches or blades needed to support
encrypted I/O in environments that use both disk and tape.
The throughput drop can be mitigated by re-balancing the tape and disk target containers across
the encryption engine. This ensures that the tape and disk target containers are distributed within
the encryption engine for maximum throughput.
All nodes within an encryption group must be upgraded to Fabric OS version 6.4 or a later release
to support hosting disk and tape target containers on the same encryption engine. If any node
within an encryption group is running an earlier release, disk and tape containers must continue to
be hosted on separate encryption engines.
During re-balancing operations, be aware of the following:
You may notice a slight disruption in Disk I/O. In some cases, manual intervention may be
needed.
Backup jobs to tapes may need to be restarted after re-balancing completes.
To determine if re-balancing is recommended for an encryption engine, check the encryption
engine properties. Beginning with Fabric OS version 6.4, a field is added that indicates whether or
not re-balancing is recommended
You may be prompted to rebalance during the following operations:
When adding a new disk or tape target container.
When removing an existing disk or tape target container.
After failover to a backup encryption engine in an HA cluster.
After an failed encryption engine in an HA cluster is recovered, and failback processing has
taken place.
To rebalance an encryption engine, do the following.