Users Guide
• To convert to Non-RAID mode, use the racadm storage converttononraid command.
NOTE: On the S140 controller, you can only use the RACADM interface to convert the drives from non-RAID to RAID
mode. The supported Software RAID modes are Windows or Linux Mode.
For more information about the commands, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
Erasing physical disks
The System Erase feature allows you to erase the contents of the physical drives. This feature is accessible using RACADM or the LC GUI.
Physical drives on the server are grouped into two categories.
• Secure erase drives— Includes drives that provide cryptographic erase such as ISE and SED SAS and SATA drives, and PCIe SSDs.
• Overwrite erase drives— Includes all drives that do not support cryptographic erase.
The RACADM SystemErase sub-command includes options for the following categories:
• The SecureErasePD option cryptographically erases all the secure erase drives.
• The OverwritePD option overwrites data on all drives.
Before performing SystemErase, use the following command to check the erase capability of all physical disks for a server:
# racadm storage get pdisks –o –p SystemEraseCapability
To erase ISE and SED drives, use this command:
# racadm systemerase –secureerasepd
To erase overwrite erase drives, use the following command:
# racadm systemerase -overwritepd
NOTE:
RACADM SystemErase removes all the virtual disks from the physical disks that are erased by the above
commands.
NOTE: RACADM SystemErase causes the server to restart in order to perform the erase operations.
NOTE: Individual PCIe SSD or SED devices can be erased using the iDRAC GUI or RACADM. For more information, see
the
Erasing PCIe SSD device data
and the
Erasing SED device data
section.
For information on the System Erase function within the Lifecycle Controller GUI, see the Lifecycle Controller User's Guide available at
www.dell.com/idracmanuals.
Erasing SED device data
NOTE:
This operation is not supported when SED device is a part of a Virtual Disk. The target SED device must be
removed from the virtual disk prior to performing device erase.
Cryptographic Erase permanently erases all data present on the disk. Performing a Cryptographic Erase on an SED overwrites all blocks
and results in permanent loss of all data on the SED. During Cryptographic Erase, the host is unable to access the SED. SED device erase
can be performed either in real time or be applied after a system reboot.
If the system reboots or experiences a power loss during cryptographic erase, the operation is canceled. You must reboot the system and
restart the process.
Before erasing SED device data, ensure that:
• Lifecycle Controller is enabled.
• You have Server Control and Login privileges.
• Selected SED drive is not part of a virtual disk.
NOTE:
• Erasing SEDs can be performed either as a real time or as a staged operation.
• After the SED drive is erased, it may still be displayed as active within the OS due to data caching. If this occurs,
reboot the OS and the erased SED drive will no longer be displayed or report any data.
Managing storage devices 207