storage encryption disk destroy
Cryptographically destroy a self-encrypting disk
Description
The storage encryption disk destroy command cryptographically destroys a self-encrypting disk (SED), making it incapable of performing I/O operations. This command performs the following operations:
- Employs the inherent erase capability of SEDs to cryptographically sanitize the disk
- Permanently locks the disk to prevent further data access
- Changes the data and FIPS authentication keys to random values that are not recorded except within the SED.
The destroy command requires you to enter a confirmation phrase before proceeding with the operation.
The command releases the cluster shell after launching the operation. Monitor the output of the storage encryption disk show-status command for command completion.
Upon command completion, remove the destroyed SED from the system.
Parameters
- -disk <disk path name> - Disk Name
- This parameter specifies the name of the disk you want to cryptographically destroy. See the man page for the storage disk modify command for information about disk-naming conventions.
- [-force-all-states [true]] - Destroy All Matching Disks
- When this parameter is false or not specified, the operation defaults to spare and broken disks only, as reported in the output of the storage disk show command. When you specify this parameter as true, it allows you to cryptographically destroy all matching disk names regardless of their state, including those in active use in aggregates. This allows a quick destroy of all system disks if you use the -disk parameter with the asterisk wildcard (*). If you destroy active disks, the nodes might not be able to continue operation, and might halt or panic.
Examples
The following command cryptographically destroys the disk 1.10.20:
cluster1::> storage encryption disk destroy 1.10.20
Warning: This operation will cryptographically destroy 1 spare or broken
self-encrypting disks on 1 node.
You cannot reuse destroyed disks unless you revert
them to their original state using the PSID value.
To continue, enter
destroy disk
:destroy disk
Info: Starting destroy on 1 disk.
View the status of the operation by using the
"storage encryption disk show-status" command.
cluster1::>
If you do not enter the correct confirmation phrase, the operation is aborted:
cluster1::> storage encryption disk destroy 1.10.2*
Warning: This operation will cryptographically destroy 5 spare or broken
self-encrypting disks on 1 node.
You cannot reuse destroyed disks unless you revert
them to their original state using the PSID value.
To continue, enter
destroy disk
:yes
No disks destroyed.
cluster1::>
The following command quickly cryptographically destroys all system disks, including those in active use in aggregates and shared devices:
cluster1::> storage encryption disk destroy -force-all-states -disk *
Warning: This operation will cryptographically destroy 96
self-encrypting disks on 4 nodes.
To continue, enter
destroy disk
:destroy disk
Info: Starting destroy on 96 disks.
View the status of the operation by using the
<span className="keyword cmdname">storage encryption disk show-status</span> command.
cluster1::>