HP Brocade 8/12c Brocade Fabric OS Documentation Updates - Supporting Fabric O - Page 27
Best Practices and Special Topics, Key Vault Best Practices
View all HP Brocade 8/12c manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 27 highlights
Documentation updates for RKM 6 Chapter 5, Best Practices and Special Topics Key Vault Best Practices • When encrypted disk LUNs are to be configured or moved to an Encryption Group that uses a different key vault, make sure to decommission the encrypted LUNs from the old Encryption Group. Chapter 6, Maintenance and Troubleshooting Manually synchronizing the security database This operation can resolve problems with master key propagation (and connectivity issues between peer node encryption engines in an encryption group). The synchronization occurs every time this command is executed regardless of whether or not the security database was synchronized across all nodes in the encryption group. Use the - -sync -securitydb command to distribute the security database from the group leader node to all member nodes. This command is valid only on the group leader. In scenarios where this master key propagation issue still persists, exporting the master key to a file and recovering it resolves the issue. To do this, use the following commands: • Use the cryptocfg --exportmasterkey -file option to export the master key to a file. • Use the cryptocfg --recovermasterkey currentMK -srcfile to recover the master key. Fabric OS Documentation Updates 17 53-1002165-05