Skip to main content
NetApp Knowledge Base

Cluster peer failures after encryption changes

Views:
170
Visibility:
Public
Votes:
0
Category:
snapmirror
Specialty:
DP
Last Updated:

Applies to

  • ONTAP 9.11.1P8
  • Encryption
  • Cluster peering

Issue

  • Cluster peering fails after updating the encryption ciphers suites on one cluster in a cluster peer.
  • When cluster peer health show -bypass-cache true is run we see the connection to the nodes as:
cluster1::> cluster peer health show -bypass-cache true
Node       Cluster-Name                 Node-Name
             Ping-Status               RDB-Health Cluster-Health Availability
---------- --------------------------- --------- --------------- ------------
c1node-01    cluster2                  c2node-01
             Data: unreachable
             ICMP: interface_reachable true      true            false
                                       c2node-02
             Data: unreachable
             ICMP: interface_reachable true      true            false
c1node-02    cluster2                  c2node-01
             Data: unreachable
             ICMP: interface_reachable true      true            false
                                       c2node-02
             Data: unreachable
             ICMP: interface_reachable true      true            false
4 entries were displayed.

  • After adding the required cipher suite to both clusters the failure persists
  • KTLS handshake alerts can be seen

ktls.cnxnHandshakeLimit: ONTAP reached the maximum limit of 170 concurrent TLS connection handshakes

[cluster: ktlsd: ktls.failed:notice]: "The TLS connections have failed several times with remote host 'xx.xx.xx.xxx' in IPspace 'xxxxxxx', 
for which the latest reason given is: OpenSSL: error:0A000102:SSL routines::unsupported protocol."

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.