HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 229

Replacing an HA cluster member, Case 1: Replacing a failed encryption engine in an HA cluster

Page 229 highlights

Encryption group and HA cluster maintenance 6 HA cluster name: HAC1 - 2 EE entries Status: Committed WWN Slot Number 11:22:33:44:55:66:77:00 0 10:00:00:05:1e:53:74:87 3 Status Online Online HA cluster name: HAC2 - 1 EE entry Status: Defined WWN Slot Number 10:00:00:05:1e:53:4c:91 0 Status Online In the following example, the encryption group brocade has one HA cluster HAC3. The encryption engine with the WWN of 10:00:00:05:1e:53:89:dd has failed over containers from the encryption engine with the WWN of 10:00:00:05:1e:53:fc:8a it is offline. SecurityAdmin:switch>cryptocfg --show -hacluster -all Encryption Group Name: brocade Number of HA Clusters: 1 HA cluster name: HAC3- 2 EE entries Status: Committed WWN Slot Number Status 10:00:00:05:1e:53:89:dd 0 Online - Failover active 10:00:00:05:1e:53:fc:8a 0 Offline NOTE In this particular case, the correct status of Failover active is displayed only if group leader node is queried. If the other node is queried Failover active is not displayed, which is not consistent with the actual HA status. Replacing an HA cluster member 1. Log in to the Group Leader as Admin or SecurityAdmin. 2. Enter the cryptocfg --replace -haclustermember command. Specify the HA cluster name, the node WWN of the encryption engine to be replaced, and the node WWN of the replacement encryption engine. Provide a slot number if the encryption engine is a blade. The replacement encryption engine must be part of the same encryption group as the encryption engine that is replaced. SecurityAdmin:switch>cryptocfg --replace -haclustermember HAC2 \ 10:00:00:05:1e:53:4c:91 10:00:00:05:1e:39:53:67 Replace HA cluster member status: Operation Succeeded. 3. Enter cryptocfg --commit to commit the transaction. Case 1: Replacing a failed encryption engine in an HA cluster Assume a working HA cluster with two operational encryption engines, EE1 and EE2. The target T1 is hosted on EE1 and target T2 is hosted on EE2. Refer to Figure 110. EE2 fails and generates an offline notification. The target hosted on EE2 (T2 in this case) automatically fails over to EE1. Even though the target T2 is now hosted on EE1 because of the failover process, the target association is still EE2, and the container status is displayed on the hosting node as failover. Use the cryptocfg --show -container crypto target container name -stat command to display the container status. Fabric OS Encryption Administrator's Guide 209 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

Fabric OS Encryption Administrator’s Guide
209
53-1002159-03
Encryption group and HA cluster maintenance
6
HA cluster name: HAC1 - 2 EE entries
Status:
Committed
WWN
Slot Number
Status
11:22:33:44:55:66:77:00
0
Online
10:00:00:05:1e:53:74:87
3
Online
HA cluster name: HAC2 - 1 EE entry
Status:
Defined
WWN
Slot Number
Status
10:00:00:05:1e:53:4c:91
0
Online
In the following example, the encryption group brocade has one HA cluster HAC3. The
encryption engine with the WWN of 10:00:00:05:1e:53:89:dd has failed over containers from
the encryption engine with the WWN of 10:00:00:05:1e:53:fc:8a it is offline.
SecurityAdmin:switch>cryptocfg --show -hacluster -all
Encryption Group Name: brocade
Number of HA Clusters: 1
HA cluster name: HAC3- 2 EE entries
Status: Committed
WWN
Slot Number
Status
10:00:00:05:1e:53:89:dd
0
Online - Failover active
10:00:00:05:1e:53:fc:8a
0
Offline
NOTE
In this particular case, the correct status of
Failover active
is displayed only if group leader
node is queried. If the other node is queried
Failover active
is not displayed, which is not
consistent with the actual HA status.
Replacing an HA cluster member
1.
Log in to the Group Leader as Admin or SecurityAdmin.
2.
Enter the
cryptocfg
--
replace -haclustermember
command. Specify the HA cluster name, the
node WWN of the encryption engine to be replaced, and the node WWN of the replacement
encryption engine. Provide a slot number if the encryption engine is a blade. The replacement
encryption engine must be part of the same encryption group as the encryption engine that is
replaced.
SecurityAdmin:switch>
cryptocfg --replace -haclustermember HAC2 \
10:00:00:05:1e:53:4c:91 10:00:00:05:1e:39:53:67
Replace HA cluster member status: Operation Succeeded.
3.
Enter
cryptocfg
--
commit
to commit the transaction.
Case 1: Replacing a failed encryption engine in an HA cluster
Assume a working HA cluster with two operational encryption engines, EE1 and EE2. The target T1
is hosted on EE1 and target T2 is hosted on EE2. Refer to
Figure 110
.
EE2 fails and generates an offline notification. The target hosted on EE2 (T2 in this case)
automatically fails over to EE1. Even though the target T2 is now hosted on EE1 because of the
failover process, the target association is still EE2, and the container status is displayed on the
hosting node as failover. Use the
cryptocfg
--
show -container
crypto target container name
-stat
command to display the container status.