Steps
1. Connect the console cable to the impaired node.
2.
Check whether NVE is configured for any volumes in the cluster:
volume show -is-encrypted true
If any volumes are listed in the output, NVE is configured and you need to verify the NVE configuration. If
no volumes are listed, check whether NSE is configured.
3.
Check whether NSE is configured:
storage encryption disk show
â—¦ If the command output list the drive details with Mode & Key ID information, NSE is configured and you
need to verify the NSE configuration.
◦ If NVE and NSE are not configured, it’s safe to shut down the impaired node.
Verifying NVE configuration
Steps
1.
Display the key IDs of the authentication keys that are stored on the key management servers:
security
key-manager query
â—¦
If the
Restored column displays yes and all key managers display available, it’s safe to shut down
the impaired node.
â—¦
If the
Restored column displays anything other than yes, or if any key manager displays
unavailable, you need to complete some additional steps.
â—¦ If you see the message This command is not supported when onboard key management is enabled,
you need to complete some other additional steps.
2.
If the
Restored column displayed anything other than yes, or if any key manager displayed
unavailable:
a.
Retrieve and restore all authentication keys and associated key IDs:
security key-manager
restore -address *
If the command fails, contact NetApp Support.
mysupport.netapp.com
b.
Verify that the
Restored column displays yes for all authentication keys and that all key managers
display
available: security key-manager query
c. Shut down the impaired node.
3. If you saw the message This command is not supported when onboard key management is enabled,
display the keys stored in the onboard key manager:
security key-manager key show -detail
a.
If the
Restored column displays yes manually backup the onboard key management information:
â–ª
Go to advanced privilege mode and enter
y when prompted to continue: set -priv advanced
â–ª
Enter the command to display the OKM backup information:
security key-manager backup
show
▪ Copy the contents of the backup information to a separate file or your log file. You’ll need it in
disaster scenarios where you might need to manually recover OKM.
â–ª
Return to admin mode:
set -priv admin
93