US 12,463,801 B2
Systems and methods for secure cluster communication
Sridharan Kuppuswamy, Bangalore (IN)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Apr. 4, 2023, as Appl. No. 18/295,328.
Prior Publication US 2024/0340174 A1, Oct. 10, 2024
Int. Cl. H04L 9/08 (2006.01); H04L 9/40 (2022.01); H04W 12/041 (2021.01)
CPC H04L 9/0833 (2013.01) [H04L 9/0891 (2013.01); H04L 63/0485 (2013.01); H04L 63/164 (2013.01); H04W 12/041 (2021.01); H04L 63/065 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method comprising:
performing, during boot up of a node of a cluster, a check to determine whether the node is a first node of the cluster, the first node being a controller node; and
responsive to a determination, by the node, that the node is a first node of the cluster:
generating, by the first node, a first key for intra-cluster communication;
updating, by the first node, a keys table with the generated first key;
generating, by the first node, a secure communication configuration file on the first node, wherein the secure communication configuration file includes the first key;
loading, by the first node, the secure communication configuration file including the first key to a security process on the first node;
determining, by the first node, whether a key exists for an inter-cluster communication with another node of another cluster; and
responsive to a determination that a key does not exist for the inter-cluster:
communication with the another node of the another cluster:
generating, by the first node, a second key for the inter-cluster communication with the another node of the another cluster;
updating, by the first node, the keys table with the generated second key;
updating, by the first node, the secure communication configuration file on the first node to include the second key; and
loading, by the first node, the secure communication configuration file updated with the second key to the security process on the first node.