Enabling private-data-encryption
on an HA cluster Example
When using an HA cluster, the keys used for private-data-encryption
are synchronized among all the cluster members.
In a redundant setup (HA), the units must have the same key so that the encrypted elements are properly synchronized. |
To enable private-data-encryption
before the HA cluster is formed:
- In the CLI console, on each member of the HA cluster to be formed, enter the following commands:
config system global set private-data-encryption enable end Please type the private data encryption key (32 hexadecimal numbers): 0123456789abcdef0123456789abcdef Please re-enter the private data encryption key (32 hexadecimal numbers) again: 0123456789abcdef0123456789abcdef The private data encryption key is accepted.
To enable private-data-encryption
on the HA cluster:
- In the CLI console, on any member of the HA cluster, enter the following commands:
config system global set private-data-encryption enable end Please type the private data encryption key (32 hexadecimal numbers): 0123456789abcdef0123456789abcdef Please re-enter the private data encryption key (32 hexadecimal numbers) again: 0123456789abcdef0123456789abcdef The private data encryption key is accepted.
The setting and the key is pushed to all the members in the HA cluster.