Manage storage encryption using the Onboard Key Manager
You can use the Onboard Key Manager (OKM) to manage encryption keys. If you have the OKM set up, you must record the passphrase and backup material before beginning the upgrade.
-
Record the cluster-wide passphrase.
This is the passphrase that was entered when the OKM was configured or updated using the CLI or REST API.
-
Verify the passphrase and the key-manager operation:
security key-manager onboard syncWhen prompted, enter the cluster-wide OKM passphrase that you recorded in the previous step.
-
Verify that cc-mode is enabled by reviewing the output of the following command:
security key-manager config show -
Back up the key-manager information:
security key-manager onboard show-backup
Quiesce the SnapMirror relationships (optional)
Before continuing with the procedure, you must confirm that all the SnapMirror relationships are quiesced. When a SnapMirror relationship is quiesced, it remains quiesced across reboots and failovers.
-
Verify the SnapMirror relationship status on the destination cluster:
snapmirror showIf the status is "Transferring", you must abort those transfers:
snapmirror abort -destination-vserver vserver_nameThe abort fails if the SnapMirror relationship is not in the "Transferring" state.
-
Quiesce all relationships between the cluster:
snapmirror quiesce -destination-vserver *