Best Practices 14 min read by syncopio Team

Dell Isilon Migration Guide: Complete Walkthrough for 2026

End-to-end guide for Dell EMC Isilon (PowerScale) migrations β€” covering OneFS assessment, multiprotocol ACLs, SmartConnect cutover, and post-migration verification.

Dell EMC Isilon (now PowerScale) is one of the most widely deployed scale-out NAS platforms in enterprise environments. Whether you’re consolidating storage, refreshing hardware, or moving to a new platform, migrating off Isilon requires careful planning around OneFS-specific features like SmartConnect, multiprotocol ACLs, and access zones. This guide walks through the full migration lifecycle: from assessment through cutover and post-migration verification.

Pre-Migration Assessment

Before moving a single file, you need a complete inventory of what you’re migrating and how it’s configured.

OneFS Version and Cluster Inventory

Start with a full picture of your cluster:

# Cluster overview
isi status

# Node inventory with hardware details
isi devices list --format=table

# OneFS version (shown in isi status output, or use uname)
uname -a

# License inventory (what you're paying for)
isi license list

Document the OneFS version carefully. Version 8.x and 9.x have different ACL behaviors, protocol defaults, and API capabilities that affect your migration strategy.

SmartConnect Zone Mapping

SmartConnect is Isilon’s DNS-based load balancing. Every SmartConnect zone that clients use needs a cutover plan.

# List all SmartConnect zones
isi network pools list --format=table

# Detailed zone configuration
isi network pools view <pool_name>

# Get DNS settings per groupnet
isi network groupnets list --format=table

Map every DNS entry

Create a spreadsheet mapping each SmartConnect zone to: subnet, IP range, client count, NFS exports served, SMB shares served. This becomes your cutover checklist β€” miss a zone and a group of clients silently loses access.

For each zone, note:

FieldWhy It Matters
Zone nameDNS delegation target
SubnetNetwork topology for destination
IP allocation methodStatic, dynamic, or SmartConnect
SC DNS zoneFQDN clients use to connect
Connection policyRound-robin, connection count, etc.

NFS Export Inventory

# List all NFS exports
isi nfs exports list --format=table

# Export details with security settings
isi nfs exports view <export_id>

# Check which zones serve each export
isi nfs exports list --format=json | python3 -m json.tool

Key fields to capture per export:

  • Path β€” the directory being exported
  • Clients β€” allowed client networks/hosts
  • Root clients β€” hosts with root squash disabled
  • Map root β€” identity mapping for root user
  • Security flavors β€” sys, krb5, krb5i, krb5p
  • Read-only status

SMB Share Inventory

# List all SMB shares
isi smb shares list --format=table

# Share details including permissions
isi smb shares view <share_name>

# Check share-level ACLs
isi smb shares permission list <share_name>

Quota Audit

OneFS quotas don’t migrate automatically. You need to recreate them on the destination.

# List all quotas
isi quota quotas list --format=table

# Export quota details
isi quota quotas list --format=json > quotas_export.json

Quota types differ across platforms

Isilon supports directory quotas, user quotas, group quotas, and default quotas β€” all with advisory, soft, and hard limits. Your destination may not support all types. Map each quota to the closest equivalent on your target platform before migration.

Snapshot Audit

Snapshots cannot be migrated directly. Decide what to do with them before starting.

# List all snapshots
isi snapshot snapshots list --format=table

# Check snapshot schedules
isi snapshot schedules list --format=table

# Calculate snapshot space usage
isi snapshot snapshots list --format=json | python3 -c "
import json, sys
data = json.load(sys.stdin)
total = sum(s.get('size', 0) for s in data)
print(f'Total snapshot space: {total / (1024**3):.1f} GB')
"

Options for snapshots:

  1. Delete before migration β€” reduces data volume, fastest approach
  2. Export snapshot data β€” mount the .snapshot directory and copy specific point-in-time data
  3. Recreate schedules on destination β€” new snapshots start after migration

Multiprotocol Considerations

This is often the hardest part of an Isilon migration. OneFS has a unified ACL model that stores both POSIX and Windows-style permissions on a single file. Most other platforms don’t.

How OneFS Handles Permissions

OneFS uses an internal permission model that bridges both Unix and Windows worlds. Files can be in either POSIX mode (standard Unix mode bits) or ACL mode (a richer ACL stored on disk). When accessed via NFS, OneFS presents POSIX mode bits; when accessed via SMB, it presents Windows-style security descriptors. The access zone’s ACL policy controls how changes from each protocol interact.

# Check the global ACL policy
isi auth settings acls view

# Check per-zone ACL settings
isi zone zones view <zone_name>

Three ACL policy environments:

ModeBehavior
UNIX onlyPOSIX permissions are authoritative; prevents ACL creation; SMB sees synthesized ACLs
Windows onlyNTFS ACLs are authoritative; chmod operations may be rejected
BalancedBoth coexist; OneFS merges permission changes from either protocol

Balanced mode is the danger zone

If your cluster uses balanced/multiprotocol ACL mode, permissions are more complex than they appear. A chmod 755 via NFS and a Windows ACL edit via SMB produce different on-disk results than the same operations on a pure POSIX or pure NTFS system. Test permission migration thoroughly on a sample dataset before the full migration.

For a deep dive into migrating these permissions correctly, see our Isilon multiprotocol permissions guide.

Identity Mapping

OneFS maps between Unix UIDs/GIDs and Windows SIDs using:

  • Active Directory β€” for domain-joined clusters
  • LDAP β€” RFC2307 attributes for UID/GID mapping
  • Local users/groups β€” for standalone clusters
  • Auto-mapping β€” algorithmic SID↔UID translation
# Check identity mapping configuration
isi auth ads list
isi auth ldap list
isi auth mapping view

Your destination must resolve the same identities. If you’re moving to a Linux-only platform, Windows SIDs won’t exist β€” you need a mapping table.

Migration Approaches

The Traditional Approach: rsync and Robocopy

Many admins start with rsync (for NFS) or Robocopy (for SMB). These tools are familiar and work, but they hit limitations quickly at Isilon scale:

  • rsync is single-threaded β€” one directory at a time, no parallelism across exports. A 50TB cluster with 20 exports runs as one serial stream.
  • Robocopy is Windows-only and has no checksum verification. You’re trusting the copy without proof.
  • Neither tool provides a dashboard, ETA, or audit trail. You’re watching terminal output and hoping.
  • No incremental awareness β€” both tools re-scan the entire tree on every run, which gets slow as file counts grow into the millions.

For small Isilon clusters (under 5TB, a handful of exports), these tools are fine. For enterprise-scale migrations, you need something purpose-built.

syncopio: Parallel Dataset Migration

syncopio approaches Isilon migration differently: each NFS export or SMB share becomes a separate dataset within a migration job. Datasets transfer in parallel across multiple workers, with per-file checksum verification.

Isilon Cluster                    syncopio                     Destination
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ /ifs/marketing │─── NFS ────▢│ Worker 1 │──── NFS ───▢│ /data/marketingβ”‚
β”‚ /ifs/finance   │─── NFS ────▢│ Worker 2 │──── NFS ───▢│ /data/finance  β”‚
β”‚ /ifs/media     │─── NFS ────▢│ Worker 3 │──── NFS ───▢│ /data/media    β”‚
β”‚ /ifs/archive   │─── NFS ────▢│ Worker 1 │──── NFS ───▢│ /data/archive  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                     β”‚
                              β”Œβ”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”
                              β”‚ Controller  β”‚
                              β”‚ Progress,   β”‚
                              β”‚ Checksums,  β”‚
                              β”‚ Audit Trail β”‚
                              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Why syncopio for Isilon migrations:

  • Parallel transfers β€” multiple exports migrate simultaneously across workers
  • Built-in discovery scans β€” inventory your data before moving it
  • Checksum verification β€” every file verified during transfer, not as a separate pass
  • Web UI β€” real-time progress, throughput, and ETA per dataset
  • Audit trail β€” compliance-ready logs of what was moved, when, and verification status
  • Incremental updates β€” only changed files transfer on subsequent runs

Parallel dataset transfers

For Isilon clusters with dozens of NFS exports, syncopio’s parallel dataset model means you don’t serialize the entire migration through a single rsync process. Each export transfers independently, and the web UI shows per-dataset progress, throughput, and ETA.

Cutover Planning

The cutover is the highest-risk phase. Plan it carefully.

Pre-Cutover Checklist

  • Final incremental sync completed (delta < 1 hour of changes)
  • Destination permissions verified on sample directories
  • Destination quotas configured
  • Destination snapshot schedules configured
  • DNS TTL reduced to 60 seconds (do this 48 hours before cutover)
  • Rollback procedure documented and tested
  • Maintenance window communicated to users
  • Monitoring configured on destination

SmartConnect DNS Cutover

This is the critical step. SmartConnect zones are typically implemented as DNS delegations from your corporate DNS to the Isilon’s SmartConnect service.

Step 1: Stop writes to Isilon

# Option A: Set exports read-only
isi nfs exports modify <export_id> --read-only=true

# Option B: Restrict client access at the export level
isi nfs exports modify <export_id> --clients=127.0.0.1

Step 2: Final sync

Run your final incremental transfer to capture any remaining changes.

Step 3: Update DNS

# Remove DNS delegation to SmartConnect
# Point the same FQDN to destination IP(s)

# Example: update corporate DNS
# Old: isilon-data.corp.com β†’ delegated to SmartConnect
# New: isilon-data.corp.com β†’ 10.0.1.100 (destination)

DNS TTL is your friend

Reduce the TTL on SmartConnect DNS records to 60 seconds at least 48 hours before cutover. This ensures clients pick up the new DNS entries quickly. After cutover is verified, increase TTL back to normal (e.g., 3600 seconds).

Step 4: Verify client access

# From multiple client machines
ls -la /mnt/data/  # Verify mount works
touch /mnt/data/test_write  # Verify write access
rm /mnt/data/test_write

Client Mount Updates

Not all clients use SmartConnect DNS. Some may have hardcoded Isilon IP addresses in:

  • /etc/fstab entries
  • Autofs maps (/etc/auto.master, /etc/auto.nfs)
  • Application configuration files
  • Container volume mounts
  • Kubernetes PersistentVolumes

Search for hardcoded IPs

Run grep -r β€œISILON_IP” /etc/ on every client machine. Hardcoded IPs in fstab, autofs, and application configs are the #1 cause of post-cutover outages. If you have configuration management (Ansible, Puppet, Chef), search your playbooks too.

Rollback Strategy

Always have a rollback plan:

  1. Keep Isilon running for at least 2 weeks post-cutover
  2. Don’t delete Isilon data until the migration is fully verified
  3. DNS rollback β€” keep the old SmartConnect delegation config documented so you can re-enable it in minutes
  4. Test rollback before the cutover window β€” verify you can switch DNS back and clients reconnect

Post-Migration Verification

Migration isn’t complete until you’ve verified the data.

File Count and Size Verification

# Source (Isilon)
find /mnt/isilon -type f | wc -l
du -sh /mnt/isilon

# Destination
find /mnt/dest -type f | wc -l
du -sh /mnt/dest

Differences in du output are normal due to filesystem block size differences. File counts should match exactly.

Checksum Verification

For critical data, verify file integrity with checksums:

# Generate checksums on source
find /mnt/isilon -type f -exec sha256sum {} + > source_checksums.txt

# Verify on destination
cd /mnt/dest
sha256sum -c source_checksums.txt | grep -v ": OK$"

This is slow for large datasets. syncopio performs checksum verification during transfer, eliminating the need for a separate verification pass. See why checksums matter for more on verification approaches.

Permission Spot-Checks

# Compare permissions on key directories
diff <(ls -laR /mnt/isilon/finance/ | head -50) \
     <(ls -laR /mnt/dest/finance/ | head -50)

# Check ACLs (NFSv4)
nfs4_getfacl /mnt/dest/finance/restricted/

# Check extended attributes
getfattr -d -m - /mnt/dest/finance/restricted/

Performance Baseline

Establish a performance baseline on the destination so you have a reference point:

# Sequential write
fio --name=seq-write --rw=write --bs=1M --size=10G \
    --directory=/mnt/dest --numjobs=4

# Sequential read
fio --name=seq-read --rw=read --bs=1M --size=10G \
    --directory=/mnt/dest --numjobs=4

# Metadata operations
mdtest -C -T -r -F -d /mnt/dest/mdtest -n 10000 -i 3

Migration Timeline Template

For a typical 100TB Isilon migration:

PhaseDurationActivities
Assessment1-2 weeksInventory, quota audit, permission mapping
Destination setup1-2 weeksPlatform deployment, network config, export/share creation
Initial sync3-7 daysFull data copy (depends on network bandwidth)
Incremental syncs1-2 weeksDaily syncs to reduce delta
Permission verification2-3 daysSpot checks, access testing
Cutover2-4 hoursFinal sync, DNS switch, client validation
Monitoring2 weeksPerformance monitoring, issue resolution
Decommission1 dayIsilon shutdown (after verification period)

Plan for 2x your estimate

Enterprise migrations consistently take longer than planned. Permission issues, overlooked mounts, application-specific path dependencies, and unexpected data growth all add time. Build buffer into your timeline and communicate conservative dates to stakeholders.

Common Pitfalls

  1. Forgetting SmartConnect zones β€” every zone needs a cutover plan
  2. Ignoring multiprotocol ACLs β€” POSIX flattening silently breaks Windows access
  3. Not testing application access β€” applications may rely on Isilon-specific behaviors
  4. Skipping incremental syncs β€” a single large cutover window is risky
  5. Deleting Isilon data too early β€” keep it running until verification is complete
  6. Overlooking snapshots β€” clients accessing .snapshot directories will lose access
  7. Quota gaps β€” quotas don’t migrate; users may fill the destination without limits

Next Steps

Ready to simplify your migrations?

See how syncopio can save you hours on every migration project.

Request a Demo