NAS reboot caused No Pools Found

I’m starting wonder if there is some sort of drive encryption going on here…

I don’t know if this means anything or applies to your drive, or even that you are somehow using this feature:

I was reading about their encryption stuff as well and saw something about “instantaneous erase” :skull:

4.6 Cryptographic erase
A significant feature of SEDs is the ability to perform a cryptographic erase. This involves the host telling the drive to change the data
encryption key for a particular band. Once changed, the data is no longer recoverable since it was written with one key and will be
read using a different key. Since the drive overwrites the old key with the new one, and kee ps no history of key changes, the user
data can never be recovered. This is tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or
redispositioned.

Have you used Seagate’s SeaChest before? You might be able to gather more information about the drives and their status from Seagate’s own tool.

i have not used any Seagate software on these drives - i essentially left the drives in the NAS system all this time - with the exception of removing 1 of the drives to try and read through ubuntu

I meant as in your familiarity of using the software. You might be able to gather more information about the drives by using SeaChest, either in a live Ubuntu session or downloading and extract it to a temporary working directory while still in SCALE.

:warning: Only to gather information. Not to make any changes.

Im not familiar with it at all - and im not sure how I would go about loading it into SCALE

It’s a .zip file that contains the entire suite of prebuilt libraries and executables for Windows and Linux.

As the root/admin user, you can make a temporary directory to work inside:

mkdir /seagate

cd /seagate

Then use wget to retrieve the file:

wget https://www.seagate.com/content/dam/seagate/migrated-assets/old-support-files/seachest/SeaChestUtilities.zip

Then use 7z to extract the archive:

7z x SeaChestUtilities.zip

Then navigate to to the folder that contains the binaries:

cd SeaChestUtilities/SeaChestUtilities/Linux/Non-RAID/x86_64

Then make the binaries executable:

chmod +x *

Then use a particular binary in this form:

./SeaChest_Info --scan

Retrieve info about a particular drive (“sg0”):

./SeaChest_Security -d /dev/sg0 --ataSecurityInfo

./SeaChest_Security -d /dev/sg0 --tcgInfo

I’m just giving examples. You need to be 100% sure you’re not doing any destructive or modification commands. You want to only stick with “info” or “query” commands.

1 Like

Would this require me to remove and plug the harddrives into my working PC?

I am honestly not entirely confident about this, but I am willing to try if guided with some help.

On another note - couple days before my NAS crashed i was messing with trying to create a VM - there were some issues then - and thats when i went into the BIOS to edit some settings such as IOMMU, APS modes, CPU phase controls, C1E, and some power saving controls like “AMD Cool’n’quiet” - However, i didnt get anywhere, and i just left them. I continued to use the NAS for file copy after - as my recap goes. Copying to Android - then NAS restarted when using media encoder

Plug harddrives into my working windows PC to do this?

Since SCALE is based on Debian, the command-line tools should be able to work in SCALE.

I guess my question is - if i were using the Shell to do thse commands - would creating those diretories overwrite any of the information on the drives right now? where would it be downloading the files to? where is the directory being created

It would be on the OS’s (SCALE’s) root filesystem, which is on your boot-pool.

It’s like how NVIDIA’s Windows installer creates a temporary directory called “NVIDIA” in the root of the C:\ drive.

Nothing is touching the Seagate drives. The only time they are involved is when you run a command against them, such as:

./SeaChest_Security -d /dev/sg0 --tcgInfo

I will try this shortly - thanks

I would need 7z on scale as well? NVM managed to just unzip
kind of lost from this point on tho

Should be preinstalled already. You could also do unzip SeaChestUtilities.zip.

1 Like
root@truenas[...aChestUtilities/Linux/Non-RAID/x86_64]# ./SeaChest_Info --scan
==========================================================================================
 SeaChest_Info - Seagate drive utilities - NVMe Enabled
 Copyright (c) 2014-2024 Seagate Technology LLC and/or its Affiliates, All Rights Reserved
 SeaChest_Info Version: 2.7.0-8_0_1 X86_64
 Build Date: Sep 26 2024
 Today: 20250224T151850 User: root
==========================================================================================
Vendor   Handle       Model Number            Serial Number          FwRev
ATA      /dev/sg0     Patriot P220 128GB      P220NIBB2406062815     HT3618C1
ATA      /dev/sg1     ST12000NM0127           ZJV4YHA1               G006
ATA      /dev/sg2     ST12000NM0127           ZJV59MC0               G006
root@truenas[...aChestUtilities/Linux/Non-RAID/x86_64]# ./SeaChest_Security -d /dev/sg1 --ataSecurityInfo
==========================================================================================
 SeaChest_Security - Seagate drive utilities - NVMe Enabled
 Copyright (c) 2014-2024 Seagate Technology LLC and/or its Affiliates, All Rights Reserved
 SeaChest_Security Version: 3.4.1-8_0_1 X86_64
 Build Date: Sep 26 2024
 Today: 20250224T152004 User: root
==========================================================================================

/dev/sg1 - ST12000NM0127 - ZJV4YHA1 - G006 - ATA

====ATA Security Information====
Security State: 2
        Enabled: False
        Locked: False
        Frozen: True
        Password Attempts Exceeded: False
Master Password Capability: High
Master Password Identifier: 65533
Enhanced Erase Time Estimate:  2 minutes
Security Erase Time Estimate:  17 hours 48 minutes
All user data is encrypted: True
Restricted Sanitize Overrides ATA Security: False
SAT security protocol supported: False

is this the bad part?

1 Like
root@truenas[...aChestUtilities/Linux/Non-RAID/x86_64]# ./SeaChest_Security -d /dev/sg2 --ataSecurityInfo
==========================================================================================
 SeaChest_Security - Seagate drive utilities - NVMe Enabled
 Copyright (c) 2014-2024 Seagate Technology LLC and/or its Affiliates, All Rights Reserved
 SeaChest_Security Version: 3.4.1-8_0_1 X86_64
 Build Date: Sep 26 2024
 Today: 20250224T152140 User: root
==========================================================================================

/dev/sg2 - ST12000NM0127 - ZJV59MC0 - G006 - ATA

====ATA Security Information====
Security State: 2
        Enabled: False
        Locked: False
        Frozen: True
        Password Attempts Exceeded: False
Master Password Capability: High
Master Password Identifier: 65533
Enhanced Erase Time Estimate:  2 minutes
Security Erase Time Estimate:  17 hours 28 minutes
All user data is encrypted: True
Restricted Sanitize Overrides ATA Security: False
SAT security protocol supported: False