Dell DR4300 DR Series System Administrator Guide - Page 147

Dell DR Series System Command Line Reference Guide, Creating a Cleaner Schedule

Page 147 highlights

3. Encryption process. After encryption is enabled, the data on the DR Series system that gets backed up is encrypted and is kept encrypted until it is expired and cleaned by the system cleaner. Note that the encryption process is irreversible. 4. Encryption of pre-existing data. Any pre-existing data on a DR Series system will also be encrypted using the currently set mode of key management. This encryption occurs as part of the system cleaner process. Encryption is scheduled as the last action item in the cleaner workflow. You must launch the cleaner manually using the maintenance command to reclaim space. It then encrypts all pre-existing unencrypted data. The cleaner can also be scheduled as per the existing pre-defined cleaner schedule. NOTE: The cleaner can take some time to start the encryption process if the system is nearing full system capacity. Encryption starts only after the cleaner processes data slated for cleaning and the related logs. This ensures that space reclamation is prioritized when free space is low and also ensures that data stores are not redundantly encrypted. Refer to the following topics for more information about enabling encryption and using the system cleaner in the GUI. • Managing Encryption Operations • Creating a Cleaner Schedule Refer to the Dell DR Series System Command Line Reference Guide for information about the CLI commands used for encryption. 147

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186

3.
Encryption process.
After encryption is enabled, the data on the DR Series system that gets backed up is encrypted and is kept
encrypted until it is expired and cleaned by the system cleaner. Note that the encryption process is irreversible.
4.
Encryption of pre-existing data
. Any pre-existing data on a DR Series system will also be encrypted using the
currently set mode of key management. This encryption occurs as part of the system cleaner process. Encryption is
scheduled as the last action item in the cleaner workflow. You must launch the cleaner manually using the
maintenance command to reclaim space. It then encrypts all pre-existing unencrypted data. The cleaner can also
be scheduled as per the existing pre-defined cleaner schedule.
NOTE:
The cleaner can take some time to start the encryption process if the system is nearing full system
capacity. Encryption starts only after the cleaner processes data slated for cleaning and the related logs.
This ensures that space reclamation is prioritized when free space is low and also ensures that data stores
are not redundantly encrypted.
Refer to the following topics for more information about enabling encryption and using the system cleaner in the GUI.
Managing Encryption Operations
Creating a Cleaner Schedule
Refer to the
Dell DR Series System Command Line Reference Guide
for information about the CLI commands used for
encryption.
147