Skip to main content
NetApp Response to Russia-Ukraine Cyber Threat
In response to the recent rise in cyber threat due to the Russian-Ukraine crisis, NetApp is actively monitoring the global security intelligence and updating our cybersecurity measures. We follow U.S. Federal Government guidance and remain on high alert. Customers are encouraged to monitor the Cybersecurity and Infrastructure Security (CISA) website for new information as it develops and remain on high alert.
NetApp Knowledge Base

CLUSTER NETWORK DEGRADED reported with Nexus 3132Q-V switches utilizing 40G breakout cables

Views:
2,209
Visibility:
Public
Votes:
0
Category:
metrocluster
Specialty:
core
Last Updated:

Applies to

  • 40G -> 4x10G breakout cables used to connect to the switch
  • NX-OS 7.0(3)I7(5a) and earlier
  • NX-OS 9.2(3) and earlier
  • Cisco Nexus 3132Q-V

Issue

  • "Cluster Network Degraded" EMS/AutoSupport messages being generated

    [CLUSTER-01: vifmgr: vifmgr.cluscheck.droppedlarge:alert]: Partial packet loss when pinging from cluster lif CLUSTER-01_clus1 (node CLUSTER-01) to cluster lif CLUSTER-02_clus2 (node CLUSTER-02). 

    [CLUSTER -01: vifmgr: callhome.clus.net.degraded:alert]: Call home for CLUSTER NETWORK DEGRADED: Large MTU Packet Loss - Ping failures detected between CLUSTER -01_clus1 ( 169.254.0.1 ) on CLUSTER-01 and CLUSTER-02_clus2 ( 169.254.0.2 ) on CLUSTER-02 

  • Possible impact to cluster network traffic, including indirect data access

 

Scan to view the article on your device
CUSTOMER EXCLUSIVE CONTENT

Registered NetApp customers get unlimited access to our dynamic Knowledge Base.

New authoritative content is published and updated each day by our team of experts.

Current Customer or Partner?

Sign In for unlimited access

New to NetApp?

Learn more about our award-winning Support