Dell Isilon Migration Guide: Complete Walkthrough for 2026
End-to-end guide for Dell EMC Isilon (PowerScale) migrations β covering OneFS assessment, multiprotocol ACLs, SmartConnect cutover, and post-migration verification.
Dell EMC Isilon (now PowerScale) is one of the most widely deployed scale-out NAS platforms in enterprise environments. Whether youβre consolidating storage, refreshing hardware, or moving to a new platform, migrating off Isilon requires careful planning around OneFS-specific features like SmartConnect, multiprotocol ACLs, and access zones. This guide walks through the full migration lifecycle: from assessment through cutover and post-migration verification.
Pre-Migration Assessment
Before moving a single file, you need a complete inventory of what youβre migrating and how itβs configured.
OneFS Version and Cluster Inventory
Start with a full picture of your cluster:
# Cluster overview
isi status
# Node inventory with hardware details
isi devices list --format=table
# OneFS version (shown in isi status output, or use uname)
uname -a
# License inventory (what you're paying for)
isi license list
Document the OneFS version carefully. Version 8.x and 9.x have different ACL behaviors, protocol defaults, and API capabilities that affect your migration strategy.
SmartConnect Zone Mapping
SmartConnect is Isilonβs DNS-based load balancing. Every SmartConnect zone that clients use needs a cutover plan.
# List all SmartConnect zones
isi network pools list --format=table
# Detailed zone configuration
isi network pools view <pool_name>
# Get DNS settings per groupnet
isi network groupnets list --format=table
Map every DNS entry
Create a spreadsheet mapping each SmartConnect zone to: subnet, IP range, client count, NFS exports served, SMB shares served. This becomes your cutover checklist β miss a zone and a group of clients silently loses access.
For each zone, note:
| Field | Why It Matters |
|---|---|
| Zone name | DNS delegation target |
| Subnet | Network topology for destination |
| IP allocation method | Static, dynamic, or SmartConnect |
| SC DNS zone | FQDN clients use to connect |
| Connection policy | Round-robin, connection count, etc. |
NFS Export Inventory
# List all NFS exports
isi nfs exports list --format=table
# Export details with security settings
isi nfs exports view <export_id>
# Check which zones serve each export
isi nfs exports list --format=json | python3 -m json.tool
Key fields to capture per export:
- Path β the directory being exported
- Clients β allowed client networks/hosts
- Root clients β hosts with root squash disabled
- Map root β identity mapping for root user
- Security flavors β
sys,krb5,krb5i,krb5p - Read-only status
SMB Share Inventory
# List all SMB shares
isi smb shares list --format=table
# Share details including permissions
isi smb shares view <share_name>
# Check share-level ACLs
isi smb shares permission list <share_name>
Quota Audit
OneFS quotas donβt migrate automatically. You need to recreate them on the destination.
# List all quotas
isi quota quotas list --format=table
# Export quota details
isi quota quotas list --format=json > quotas_export.json
Quota types differ across platforms
Isilon supports directory quotas, user quotas, group quotas, and default quotas β all with advisory, soft, and hard limits. Your destination may not support all types. Map each quota to the closest equivalent on your target platform before migration.
Snapshot Audit
Snapshots cannot be migrated directly. Decide what to do with them before starting.
# List all snapshots
isi snapshot snapshots list --format=table
# Check snapshot schedules
isi snapshot schedules list --format=table
# Calculate snapshot space usage
isi snapshot snapshots list --format=json | python3 -c "
import json, sys
data = json.load(sys.stdin)
total = sum(s.get('size', 0) for s in data)
print(f'Total snapshot space: {total / (1024**3):.1f} GB')
"
Options for snapshots:
- Delete before migration β reduces data volume, fastest approach
- Export snapshot data β mount the
.snapshotdirectory and copy specific point-in-time data - Recreate schedules on destination β new snapshots start after migration
Multiprotocol Considerations
This is often the hardest part of an Isilon migration. OneFS has a unified ACL model that stores both POSIX and Windows-style permissions on a single file. Most other platforms donβt.
How OneFS Handles Permissions
OneFS uses an internal permission model that bridges both Unix and Windows worlds. Files can be in either POSIX mode (standard Unix mode bits) or ACL mode (a richer ACL stored on disk). When accessed via NFS, OneFS presents POSIX mode bits; when accessed via SMB, it presents Windows-style security descriptors. The access zoneβs ACL policy controls how changes from each protocol interact.
# Check the global ACL policy
isi auth settings acls view
# Check per-zone ACL settings
isi zone zones view <zone_name>
Three ACL policy environments:
| Mode | Behavior |
|---|---|
| UNIX only | POSIX permissions are authoritative; prevents ACL creation; SMB sees synthesized ACLs |
| Windows only | NTFS ACLs are authoritative; chmod operations may be rejected |
| Balanced | Both coexist; OneFS merges permission changes from either protocol |
Balanced mode is the danger zone
If your cluster uses balanced/multiprotocol ACL mode, permissions are more complex than they appear. A chmod 755 via NFS and a Windows ACL edit via SMB produce different on-disk results than the same operations on a pure POSIX or pure NTFS system. Test permission migration thoroughly on a sample dataset before the full migration.
For a deep dive into migrating these permissions correctly, see our Isilon multiprotocol permissions guide.
Identity Mapping
OneFS maps between Unix UIDs/GIDs and Windows SIDs using:
- Active Directory β for domain-joined clusters
- LDAP β RFC2307 attributes for UID/GID mapping
- Local users/groups β for standalone clusters
- Auto-mapping β algorithmic SIDβUID translation
# Check identity mapping configuration
isi auth ads list
isi auth ldap list
isi auth mapping view
Your destination must resolve the same identities. If youβre moving to a Linux-only platform, Windows SIDs wonβt exist β you need a mapping table.
Migration Approaches
The Traditional Approach: rsync and Robocopy
Many admins start with rsync (for NFS) or Robocopy (for SMB). These tools are familiar and work, but they hit limitations quickly at Isilon scale:
- rsync is single-threaded β one directory at a time, no parallelism across exports. A 50TB cluster with 20 exports runs as one serial stream.
- Robocopy is Windows-only and has no checksum verification. Youβre trusting the copy without proof.
- Neither tool provides a dashboard, ETA, or audit trail. Youβre watching terminal output and hoping.
- No incremental awareness β both tools re-scan the entire tree on every run, which gets slow as file counts grow into the millions.
For small Isilon clusters (under 5TB, a handful of exports), these tools are fine. For enterprise-scale migrations, you need something purpose-built.
syncopio: Parallel Dataset Migration
syncopio approaches Isilon migration differently: each NFS export or SMB share becomes a separate dataset within a migration job. Datasets transfer in parallel across multiple workers, with per-file checksum verification.
Isilon Cluster syncopio Destination
ββββββββββββββββββ ββββββββββββ ββββββββββββββββββ
β /ifs/marketing ββββ NFS βββββΆβ Worker 1 βββββ NFS ββββΆβ /data/marketingβ
β /ifs/finance ββββ NFS βββββΆβ Worker 2 βββββ NFS ββββΆβ /data/finance β
β /ifs/media ββββ NFS βββββΆβ Worker 3 βββββ NFS ββββΆβ /data/media β
β /ifs/archive ββββ NFS βββββΆβ Worker 1 βββββ NFS ββββΆβ /data/archive β
ββββββββββββββββββ ββββββββββββ ββββββββββββββββββ
β
ββββββββ΄βββββββ
β Controller β
β Progress, β
β Checksums, β
β Audit Trail β
βββββββββββββββ
Why syncopio for Isilon migrations:
- Parallel transfers β multiple exports migrate simultaneously across workers
- Built-in discovery scans β inventory your data before moving it
- Checksum verification β every file verified during transfer, not as a separate pass
- Web UI β real-time progress, throughput, and ETA per dataset
- Audit trail β compliance-ready logs of what was moved, when, and verification status
- Incremental updates β only changed files transfer on subsequent runs
Parallel dataset transfers
For Isilon clusters with dozens of NFS exports, syncopioβs parallel dataset model means you donβt serialize the entire migration through a single rsync process. Each export transfers independently, and the web UI shows per-dataset progress, throughput, and ETA.
Cutover Planning
The cutover is the highest-risk phase. Plan it carefully.
Pre-Cutover Checklist
- Final incremental sync completed (delta < 1 hour of changes)
- Destination permissions verified on sample directories
- Destination quotas configured
- Destination snapshot schedules configured
- DNS TTL reduced to 60 seconds (do this 48 hours before cutover)
- Rollback procedure documented and tested
- Maintenance window communicated to users
- Monitoring configured on destination
SmartConnect DNS Cutover
This is the critical step. SmartConnect zones are typically implemented as DNS delegations from your corporate DNS to the Isilonβs SmartConnect service.
Step 1: Stop writes to Isilon
# Option A: Set exports read-only
isi nfs exports modify <export_id> --read-only=true
# Option B: Restrict client access at the export level
isi nfs exports modify <export_id> --clients=127.0.0.1
Step 2: Final sync
Run your final incremental transfer to capture any remaining changes.
Step 3: Update DNS
# Remove DNS delegation to SmartConnect
# Point the same FQDN to destination IP(s)
# Example: update corporate DNS
# Old: isilon-data.corp.com β delegated to SmartConnect
# New: isilon-data.corp.com β 10.0.1.100 (destination)
DNS TTL is your friend
Reduce the TTL on SmartConnect DNS records to 60 seconds at least 48 hours before cutover. This ensures clients pick up the new DNS entries quickly. After cutover is verified, increase TTL back to normal (e.g., 3600 seconds).
Step 4: Verify client access
# From multiple client machines
ls -la /mnt/data/ # Verify mount works
touch /mnt/data/test_write # Verify write access
rm /mnt/data/test_write
Client Mount Updates
Not all clients use SmartConnect DNS. Some may have hardcoded Isilon IP addresses in:
/etc/fstabentries- Autofs maps (
/etc/auto.master,/etc/auto.nfs) - Application configuration files
- Container volume mounts
- Kubernetes PersistentVolumes
Search for hardcoded IPs
Run grep -r βISILON_IPβ /etc/ on every client machine. Hardcoded IPs in fstab, autofs, and application configs are the #1 cause of post-cutover outages. If you have configuration management (Ansible, Puppet, Chef), search your playbooks too.
Rollback Strategy
Always have a rollback plan:
- Keep Isilon running for at least 2 weeks post-cutover
- Donβt delete Isilon data until the migration is fully verified
- DNS rollback β keep the old SmartConnect delegation config documented so you can re-enable it in minutes
- Test rollback before the cutover window β verify you can switch DNS back and clients reconnect
Post-Migration Verification
Migration isnβt complete until youβve verified the data.
File Count and Size Verification
# Source (Isilon)
find /mnt/isilon -type f | wc -l
du -sh /mnt/isilon
# Destination
find /mnt/dest -type f | wc -l
du -sh /mnt/dest
Differences in du output are normal due to filesystem block size differences. File counts should match exactly.
Checksum Verification
For critical data, verify file integrity with checksums:
# Generate checksums on source
find /mnt/isilon -type f -exec sha256sum {} + > source_checksums.txt
# Verify on destination
cd /mnt/dest
sha256sum -c source_checksums.txt | grep -v ": OK$"
This is slow for large datasets. syncopio performs checksum verification during transfer, eliminating the need for a separate verification pass. See why checksums matter for more on verification approaches.
Permission Spot-Checks
# Compare permissions on key directories
diff <(ls -laR /mnt/isilon/finance/ | head -50) \
<(ls -laR /mnt/dest/finance/ | head -50)
# Check ACLs (NFSv4)
nfs4_getfacl /mnt/dest/finance/restricted/
# Check extended attributes
getfattr -d -m - /mnt/dest/finance/restricted/
Performance Baseline
Establish a performance baseline on the destination so you have a reference point:
# Sequential write
fio --name=seq-write --rw=write --bs=1M --size=10G \
--directory=/mnt/dest --numjobs=4
# Sequential read
fio --name=seq-read --rw=read --bs=1M --size=10G \
--directory=/mnt/dest --numjobs=4
# Metadata operations
mdtest -C -T -r -F -d /mnt/dest/mdtest -n 10000 -i 3
Migration Timeline Template
For a typical 100TB Isilon migration:
| Phase | Duration | Activities |
|---|---|---|
| Assessment | 1-2 weeks | Inventory, quota audit, permission mapping |
| Destination setup | 1-2 weeks | Platform deployment, network config, export/share creation |
| Initial sync | 3-7 days | Full data copy (depends on network bandwidth) |
| Incremental syncs | 1-2 weeks | Daily syncs to reduce delta |
| Permission verification | 2-3 days | Spot checks, access testing |
| Cutover | 2-4 hours | Final sync, DNS switch, client validation |
| Monitoring | 2 weeks | Performance monitoring, issue resolution |
| Decommission | 1 day | Isilon shutdown (after verification period) |
Plan for 2x your estimate
Enterprise migrations consistently take longer than planned. Permission issues, overlooked mounts, application-specific path dependencies, and unexpected data growth all add time. Build buffer into your timeline and communicate conservative dates to stakeholders.
Common Pitfalls
- Forgetting SmartConnect zones β every zone needs a cutover plan
- Ignoring multiprotocol ACLs β POSIX flattening silently breaks Windows access
- Not testing application access β applications may rely on Isilon-specific behaviors
- Skipping incremental syncs β a single large cutover window is risky
- Deleting Isilon data too early β keep it running until verification is complete
- Overlooking snapshots β clients accessing
.snapshotdirectories will lose access - Quota gaps β quotas donβt migrate; users may fill the destination without limits
Next Steps
- Isilon multiprotocol permissions guide β deep dive into ACL migration
- Scale-out NAS compared β Qumulo vs NetApp vs VAST Data
- Data migration compliance checklist β GDPR, HIPAA & SOC 2 requirements
- NFS vs SMB comparison β protocol performance and security trade-offs
- The complete migration guide β general migration planning framework