MAP4980 Disk encryption, encryption key management server SRCs, and repairs
The encryption key management server works with IBM encryption-enabled storage components (DDMs, device adapter, and functional code) in generating, protecting, storing, and maintaining encryption keys that are used to encrypt information being written to and decrypt information being read from storage media. Disk encryption gives the customer an added layer of protection for their data. The combination of data encryption on the DS8000® and the customer data encryption key stored on the customer's encryption key management server external to the DS8000 ensures that if the DS8000 or any DDMs with encrypted data are stolen, data cannot be accessed.
About this task
To enable encryption, you must have encryption-capable DDMs along with supporting encryption software stack installed on the DS8000. The customer must have configured at least two encryption key management servers.
- Encryption key server
- Key server
- IBM Security Key Lifecycle Manager
- IBM Tivoli Key Lifecycle Manager key server
MAP4980-Section 1
About this task
| SRC | SRC Description | Service action/machine state when serviceable event is generated | Action |
|---|---|---|---|
| BE14CFE1 | DS8000 management console regained access to the customer's encryption key management servers. Automatic dual cluster reboot is initiated. No further action is needed. | Dual cluster IML | This is an informational serviceable event. |
| BE14CFE5 | Base page mismatch detected and recovered by automatic dual cluster reboot. ESC=0xCFE5 | Dual cluster IML | This is an informational serviceable event. |
| BE14CFEB | DS8000 microcode detected less than two encryption key management servers can be accessed by the LPARs. DS8000 management console should be configured with at least two encryption key management servers. | Periodic key retrieval |
If the periodic key retrieval completes successfully, close the existing BE14CFEB serviceable event. Otherwise, check for any open serviceable events that begin with BE14E0 or BE14EA and repair that serviceable event. |
| BE14E004 | The DS8000 management console cannot retrieve encryption keys from the customer's encryption key management server because the DS8000 management console could not detect any active encryption key management server paths. Suspected configuration error. | Dual cluster IML; Periodic key retrieval |
|
| BE14E008 | The DS8000 management console cannot retrieve encryption keys from the customer's encryption key management server(s) because of communication errors between the DS8000 Hardware Management Console (HMC) and encryption key management servers. A suspected network error. | Dual cluster IML; Periodic key retrieval – ESSNI is running on the HMC but is encountering a socket open error with the encryption key management servers. |
|
| BE14E009 | The DS8000 management console cannot retrieve encryption keys from the configured encryption key management server because of communication errors between the DS8000 partitions (LPARs) and the Hardware Management Console (HMC). | Dual cluster IML; Periodic key retrieval |
|
| BE14E00B | The DS8000 management console cannot retrieve encryption keys from the configured encryption key management server. A command timeout has occurred between DS8000 partitions (LPARs) and the hardware management console (HMC). | Dual cluster IML; Periodic key retrieval | Contact your next level of support for resolution. |
| BE14E011 | Encryption key management server error: All configured encryption key management servers are unable to unwrap keys provided by the DS8000 management console ESC=0XCFE0; Reason Code=0xF1 | Dual cluster IML; Periodic key retrieval | Contact your next level of support for resolution. |
| BE14E012 | Encryption key management server error: Microcode unable to unwrap keys received from all configured encryption key management servers. | Dual cluster IML; Periodic key retrieval |
|
| BE14E0F1 | The DS8000 management console cannot access the customer's encryption key management server. | Dual cluster IML |
|
| BE14E1F6 | DS8000 partitions IMLed with the configured encryption key management servers not available. The encryption key management server is available and DS8000 partitions must be re-IMLed to allow data access. | DS8000 partitions regained access to encryption key management servers. However, a dual cluster reboot and IML was not attempted because of a service action in progress. | Dual cluster IML could not be attempted on the DS8000 partitions because of the service action in
progress. The DS8000 partitions must be
re-IMLed (shutdown and rebooted) using the following steps:
Valid state should be "quiesce." Click Quiesce SFI, then monitor by refreshing the panel. When valid state is "shutdown," click Shutdown SFI, then monitor by refreshing the panel. When valid state is "resume," click Resume SFI, then monitor by refreshing the panel. |
| BE14E3F7 | DS8000 data encryption key repository reported a permanent error. Failure to read record or certificate. | Contact your next level of support for resolution. | |
| BE14EA0B | Encryption key management server error: The DS8000 management console cannot retrieve encryption keys from some of the configured encryption key management servers. A command timeout has occurred between DS8000 partitions (LPARs) and the hardware management console (HMC). | Periodic key retrieval | Contact your next level of support for resolution. |
| BE14EA11 | Encryption key management server error: One or more encryption key management servers have an invalid key, or a record is corrupted in the key repository, or a failure to unwrap keys. ESC = 0xCFEA; Reason Code =0XF1 | Periodic key retrieval |
|
| BE14EA12 | Encryption key management server error: Microcode cannot unwrap keys received from one or more encryption key management servers. | Periodic key retrieval |
|
| BE14EA13 | Key retrieved from the encryption key management server failed signature verification. | Periodic key retrieval | Contact your next level of support for resolution. |
| BE14EAF1 | DS8000 management console has failed to communicate with the encryption key management server. If the communication continues to fail after four hours, a request for service will occur. |
|
|
| BE14EAF2 | DS8000 management console has failed to communicate with the encryption key management server for four hours. | Refer to actions for BE14EAF1. | |
| BE316023 | A severe software error has been discovered. | Contact your next level of support for resolution. | |
| BE31CFE8 | A severe software error has been discovered. | Contact your next level of support for resolution. | |
| BE31F004 | Failed to initialize the replacement encryption-capable DDM to the existing configured encryption group during its repair. The more likely cause was a DDM hardware problem. | Access credential migration failed after DDM
repair during the DDM resume operation. Access credential migration
was initiated because of one of the following conditions:
|
Use this procedure to do software checks before replacing the DDM:
|
| BE34009E | An encryption-capable DDM was not cryptographically erased during a DDM repair, DDM install, rank removal, or recovery after a failed rank creation. | A DDM repair; storage enclosure/DDM Install MES operation; rank removal appeared successful to the customer. Recovery after a failed rank creation. |
|
| BE34009F | One or more encryption-capable DDMs were not automatically cryptographically erased after the customer removed one or more ranks. | This serviceable event is generated when a SF Discontinue utility queries the cryptographically erase status of all FDE drives and detects that one ore more drives are security degraded. | This condition is only detected during a check for a storage facility removal process. If the customer removed all their data and logical configuration including ranks, the encrypted DDMs should have been automatically cryptographically erased. Contact your next level of support for resolution. |
| BE3400A2 | Failed to initialize the replacement encryption-capable DDM to the existing configured encryption group during its repair. The existing encryption group is inaccessible. | RAS initiated an issraid exchange Smart rebuild. | Perform the following software checks before replacing the
DDM:
|
| BE3400A3 | Adding or replacing an encryption-capable DDM and the DDM FRU is already in a configured state. A cryptographic erase could not be initiated. | This should not occur during any RAS-initiated service action. A probable cause for this serviceable event is a cryptographic erase that was attempted on a drive that stores customer data during manual recovery. | Contact your next level of support for resolution. |
| BE3400B3 | Hourly health checks on the partitions detected one or more encryption-capable drives inaccessible (security degraded). | This serviceable event is generated during a RAS hourly health check running on the partitions. | Perform the following software checks:
|
| Other SRCs | Contact your next level of support for resolution. |
- DDM pseudo repair implies attempting a DDM repair using the Exchange FRU option and continuing through the repair without unseating and reseating the drive.
- The customer can use either the DS CLI or DS Storage
Manager to query the list of configured encryption key management
servers and the path status of each configured encryption key management
server:
- DS CLI: The customer can enter the lskeymgr command to obtain the list
of configured encryption key management servers and the path status of each configured encryption
key management server. Sample lskeymgr output:
dscli> lskeymgr Date/Time: October 28, 2008 8:04:45 PM MST IBM DSCLI Version: 5.4.2.221 DS: ID state status addr port =============================== 1 active normal tens 3801 2 active failed automan 3801 - DS Storage Manager : The customer can use the key manager option to obtain the list of
configured encryption key management servers and the path status of each configured encryption key
manager server. Figure 1 shows an example of a key manager window.
Figure 1. Window: Key Managers

- DS CLI: The customer can enter the lskeymgr command to obtain the list
of configured encryption key management servers and the path status of each configured encryption
key management server.
- IBM support or service representative can use the
Manage Storage Facility Image (SFI) Resources utility to determine
the state of the configured encryption group. Figure 2 shows the encryptionGroupsStates
value {3,0} indicating that the customer configured encryption group
is accessible. To display the Manage SFI Resources utility:
- From the navigation area, click
- From the Task area, select
Figure 2. Window: Manage SFI Resources
- Figure 3 show an example of a serviceable event text with encryption
key management server error code detected by the DS8000 management console. Figure 4 is a continuation of Figure 3
intended to show additional serviceable event text that displays by the DS8000 management console. Figure 3. Window: Manage Serviceable Events
Figure 4. Window: Manage Serviceable Events (continued)
- The DS8000 partitions that
reported BE14E004, BE14E008, or BE14E009 will query for encryption key management servers
connectivity every 12 minutes. When connectivity is regained, a dual cluster IML (that is, a
shutdown; reboot; IML) will be attempted if, and only if, both of the following are true:
- There is no service action in progress
- There is no access to customer data; that is, IML is "complete" but global data is inaccessible due to lack of encryption key management server access
Note: The BE14CFE1 serviceable event will be auto-closed along with any other BE14E0xx serviceable events reported against the same partitions. - Figure 5 shows a sample serviceable
event with an encryption key management server ID and IP address in the location code field of the
serviceable event.Figure 5. Window: Serviceable Event with an ID and an IP address in the location code field

- Example of the key server utilities
and retrieval status.Figure 6. Window: Key Server Utilities Test Key Retrieval panel
Figure 7. Window: Test Key Retrieval status
- Upon successful resolution of the BE14xxxx serviceable event, the serviceable event has to be closed manually.