Skip to main content
NetApp Knowledge Base

Volume creation fails in GCP as VEKs cannot be created for data SVM

Views:
27
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
CORE
Last Updated:

Applies to

  • ONTAP 9.9.1 or later
  • External Key Manager (EKM)
  • Google Cloud Key Management Service (KMS)

Issue

  • Multiple CreateVolume failures are observed with the following error: 

"Error when creating - Job completed with Error: Failed to create the volume on node \"Node-01\". Reason: Volume encryption keys (VEK) cannot be created or deleted for data SVM \"SVM_2\". External key management has been configured for data SVM \"SVM_2\" but VEKs of encrypted volumes belonging to this SVM are currently stored in the key manager configured for the admin SVM. Use the (privilege: advanced) \"security key-manager key migrate -from-vserver <admin svm_name> -to-vserver <data svm_name>\" command to start using this data SVM's key manager for any new encrypted volumes or unconfigure the key manager for this data SVM. "}".

  • The GCP KMS status reports an error while fetching the key from the GCP KMS endpoint:

::> set advanced
::*> security key-manager external gcp check -vserver SVM1

Vserver: SVM1
Node: Node-01

Category: service_reachability
              Status: FAILED
              Details: Google Cloud Key Management Service operation "ENCRYPT" failed.
                          Cryptsoft error: AUTH_FAILED
                          Cryptsoft status: SUCCESS
                          Cryptsoft reason: SUCCESS
                          Cryptsoft message:
                          HTTP response code: 400
                          HTTP payload: {"error":"invalid_grant","error_description":"Invalid grant: account not found"}
                       Issue (privilege: diag) "security key-manager
                       external <azure|aws|gcp|ikp> invoke" for more
                       information.

Category: ekmip_server
              Status: OK

Category: kms_wrapped_key_status
              Status: UNKNOWN
              Details: The top-level internal key protection key (KEK) is
                       unavailable on node Node-01.
                       Reason: The key manager is in mixed state.

  • The Key migration fails with the following error:

::*> security key-manager key migrate -from-vserver SVM_1 -to-vserver SVM_2

Starting key migration process which may take several minutes.

Error: command failed: Check that the Google Cloud Key Management Service is healthy using the (privilege: advanced) "security key-manager external gcp check -vserver SVM_2" command, and then run the (privilege: advanced) "security key-manager key migrate -from-vserver <admin vserver_name> -to-vserver SVM_2" command again to complete the migration process. Error: Failed to establish connectivity with the cloud key management service.

  • The KMS endpoint reachability looks good:

::> set diag
::*> system node systemshell -node * -command telnet storage.googleapis.com 443

Node: Node-01
Trying 199.36.153.4...
Connected to storage.googleapis.com.
Escape character is 'off'.
^CConnection closed by foreign host.

Node: Node-02
Trying 199.36.153.4...
Connected to storage.googleapis.com.
Escape character is 'off'.
^CConnection closed by foreign host.

  • The KMIP Client logs show the following:

[kern_kmip2_client:info:9536] [Jun 10 00:22:43]: [traceid:00000000000000000000000000000000,851XXXXXX-XXXX-XXXX-XXXX-bae236123456] 0x80a408100: 8803e80002889f9b: ERR: kmip2::tables::kmip_gcp_cmd: [getSmdbError]:249: GCP-KMS operation failed: ENCRYPT. Cryptsoft error: FAILED, Cryptsoft status: SUCCESS, Cryptsoft reason: SUCCESS, Cryptsoft message: , HTTP Status code: , HTTP Payload:

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.