Self-Encrypted Drives (SEDs) provide hardware-level security for sensitive on-disk data. Data on SEDs is encrypted using a combination of an internal key and a drive access password. Using SEDs is simple. After performing initial drive set-up, you don’t have to do anything: SEDs handle data encryption and decryption automatically. If you want to access the data, you have to know the password. And without that password, the protected on-disk data is inaccessible.
But what if something goes wrong? Can you recover the encrypted data if the password or internal keys are lost or deleted? What if someone removes a SED from a powered-on node, or a SED becomes corrupt or is otherwise defective? What if business reasons require that you completely erase the drive? How do you safely go about doing that, and how do you verify the erasure?
Looking for Isilon troubleshooting information? We’ve got some great resources for you! Read on.
EMC Isilon Customer Troubleshooting Guides
We’re very pleased to announce the availability of the first set of new EMC Isilon Customer Troubleshooting Guides! These guides provide step-by-step troubleshooting instructions to help you solve issues that may affect Isilon clusters, or to walk you through the steps needed to gather important data to help EMC Customer Support solve your problem quickly.
The initial set of guides covers a wide range of topics including Isilon hardware, networking, protocols, upgrades, authentication, cluster configuration and administration, capacity, quotas, and more!
Check out the new and most popular EMC Isilon customer support content for August. Each month I’ll post a summary of newly published content for Isilon customers, as well as the Isilon Top 10’s:
Top 10 Knowledgebase articles
Top 10 Customer Support documents
Top 10 Isilon Info Hubs
New Isilon support content
Here are links to new customer support content that was published in August 2015. Enjoy!
LINK AND DESCRIPTION
Cluster Talk Podcast
Episode 6: How video games drive innovation in cloud computing, data center consolidation in the banking industry, an interview with Isilon engineer Daniel Chee, a cool command that actually does something (hey, that’s what they said!), and host Chris Adiletta grants co-host Scott Pinzon his fondest wish. Bonus: listen closely for a rare cameo by recording engineer Silent Todd!
Superna Eyeglass with SyncIQ Info Hub”: Everything you need to know about using Superna Eyeglass with SyncIQ. Superna Eyeglass is a virtual appliance that simplifies disaster recovery with Isilon clusters.
Top 10 Knowledgebase Articles
Here are August’s top 10 most-viewed Knowledgebase articles, including ETAs and ESAs.
There’s a new series in town: the Multiprotocol Concepts series on the EMC Community Network (ECN)Isilon community. If you’ve ever wondered how OneFS handles multiprotocol data access or even what it is, this series will be a great place to start learning all about it. The first blog post introduces basic multiprotocol concepts, setting the stage for subsequent posts that explore those concepts in more depth. We’ll post new series topics approximately every two weeks. Topics include:
Data access tokens, also known as unified access tokens
OneFS storage of file and share permissions
Access control list (ACL) policies
Verifying your multiprotocol environment and some basic troubleshooting
I’ll list the series posts here as they become available. So take a look at the multiprotocol series. And please let us know what you think!
The opinions and interests expressed on Dell EMC employee blogs are the employees' own and do not necessarily represent Dell EMC's positions, strategies or views. Dell EMC makes no representation or warranties about employee blogs or the accuracy or reliability of such blogs. When you access employee blogs, even though they may contain the Dell EMC logo and content regarding Dell EMC products and services, employee blogs are independent of Dell EMC and Dell EMC does not control their content or operation. In addition, a link to a blog does not mean that EMC endorses that blog or has responsibility for its content or use.