HP StorageWorks Storage Mirroring Scripting Guide (T2558-96327, April 2009)

10 - 4
Deleting a snapshot
Because Storage Mirroring uses the Microsoft
®
Volume Shadow Copy service to create snapshots, the
snapshots can be managed through the Volume Shadow Copy command line administrator. You can
also view, copy, or restore files from the Previous Version tab by accessing the file properties through
a share using Windows Explorer. See your Volume Shadow Copy documentation for details.
Additionally, you can use the Storage Mirroring commands to delete snapshots on the target.
1. View the snapshots on the target by using the snapshot list command.
2. Delete snapshots on the target by using the snapshot delete command.
Command SNAPSHOT LIST
Description Displays a list of snapshots associated with a connection
Syntax
SNAPSHOT LIST <con_id> [ON <target>]
Options
con_id—Connection ID assigned to the source/target connection
target—Name of the target, an IP address on the target, or a virtual IP
address
Examples
snapshot list 1
Notes Target names that contain non-alphanumeric characters must be enclosed in
quotation marks.
Command SNAPSHOT DELETE
Description Deletes the specified snapshot(s) from the target
Syntax
SNAPSHOT DELETE <con_id> <snapshot_list_number | ALL | OLD
[ GOOD | BAD ] > [ON <target>]
Options
con_id—Connection ID assigned to the source/target connection
snapshot_list_number—The snapshot number retrieved from the
SNAPSHOT LIST command
ALL—Deletes all snapshots
OLD—Deletes only the oldest snapshot
GOOD—If specified, deletes only good snapshot. If used with ALL, all
good snapshots will be deleted. If used with OLDEST, only the oldest good
snapshot will be deleted.
BAD—If specified, deletes only bad snapshots. If used with ALL, all bad
snapshots will be deleted. If used with OLDEST, only the oldest bad
snapshot will be deleted.
target—Name of the target, an IP address on the target, or a virtual IP
address
Examples
snapshot delete 1 3
snapshot delete 1 all bad
snapshot delete 1 oldest
Notes
Snapshots are labeled as good or bad depending on the state of the target
at the time the snapshot was taken.
Target names that contain non-alphanumeric characters must be
enclosed in quotation marks.