Managing Cluster Membership
Last updated
Last updated
When new nodes join the network, they are added to existing clusters.
The system ensures that the addition of new members maintains the required security thresholds.
If a node needs to be removed—due to maintenance, failure, or security concerns—the system carefully redistributes its key shares.
This ensures that the integrity and security of the cluster remain intact even after changes in membership.
Node Addition Protocol
Verification of new node credentials
Integration into existing cluster structure
Distribution of necessary key shares
Update of cluster configuration
Node Removal Workflow
Secure deactivation of target node
Recovery of assigned key shares
Redistribution of responsibilities
Update of cluster security parameters
Security Maintenance
Continuous monitoring of cluster health
Automatic threshold adjustments
Regular security audits
Backup procedures for critical data