Restore NSE/NVE on systems running ONTAP 9.6 and later
1. Connect the console cable to the target node.
2. Use the boot_ontap command at the LOADER prompt to boot the node.
3. Check the console output:
If the console displays… Then…
The login prompt Go to step 7.
Waiting for giveback… a. Log into the partner node.
b. Confirm the target node is ready for giveback with the storage
failover show command.
4. Move the console cable to the partner node and give back the target node storage using the storage
failover giveback -fromnode local -only-cfo-aggregates true local command.
◦ If the command fails because of a failed disk, physically disengage the failed disk, but leave the disk in
the slot until a replacement is received.
◦ If the command fails because of an open CIFS sessions, check with customer how to close out CIFS
sessions.
Terminating CIFS can cause loss of data.
◦ If the command fails because the partner is "not ready", wait 5 minutes for the NVMEMs to
synchronize.
◦ If the command fails because of an NDMP, SnapMirror, or SnapVault process, disable the process. See
the appropriate content for more information.
5. Wait 3 minutes and check the failover status with the storage failover show command.
6. At the clustershell prompt, enter the net int show -is-home false command to list the logical interfaces that
are not on their home node and port.
If any interfaces are listed as
false, revert those interfaces back to their home port using the net int revert
command.
7. Move the console cable to the target node and run the version -v command to check the ONTAP versions.
8. Restore automatic giveback if you disabled it by using the storage failover modify -node local -auto
-giveback true command.
9. Use the storage encryption disk show at the clustershell prompt, to review the output.
10. Use the security key-manager key query command to display the key IDs of the authentication keys that
are stored on the key management servers.
◦
If the
Restored column = yes/true, you are done and can proceed to complete the replacement
process.
◦
If the
Key Manager type = external and the Restored column = anything other than yes/true,
use the security key-manager external restore command to restore the key IDs of the authentication
keys.
37