Release Notes

8 Release Notes for Dell EMC XC Series Appliances and XC Core Systems | A01
2 Important SED information
2.1 Correctly removing the SED
If you incorrectly remove a Self-Encrypting Drive (SED), it puts that drive into an unusable state. To avoid this
situation, follow these instructions.
To remove a Self-Encrypting Drive (SED) from a Nutanix cluster:
Warning: Do not remove any SEDs from your key management server before properly removing them from
the Nutanix Cluster.
1. Use the Prism Web Console to prepare to remove the drive for replacement.
1. As part of the disk removal process, the data encryption key (DEK) for that SED automatically cycles
on the drive controller. The previous DEK is lost and all new disk reads are indecipherable.
2. After this process completes, a yellow LED indicator blinks on the drive to be removed.
Note: Data previously written to the drive will be inaccessible after securely reverting an SED.
2.1.1 Reverting the drive to a usable state
You can securely revert the drive to a usable state using the SED's PSID serial number. You do this using the
self_encrypting_drive secure_revert command from the Nutanix CVM.
Note: Data previously written to the drive will be inaccessible after securely reverting an SED.
2.1.1.1 Nutanix KB articles
For more information, about this issue, see Nutanix Knowledge Base (KB) Article Number 1940,Resetting
Self-Encrypted Drives,” and Nutanix KB Article Number 2554, “About Self-Encrypting Drives (SEDs) in a
Nutanix Cluster. You must log in using the Nutanix Portal to access KB articles, go to https://my.nutanix.com
.