Veritas Storage Foundation Intelligent Storage Provisioning 5.0 AdministratorÆs Guide, HP-UX 11i v3, First Edition, May 2008

82 Administering application volumes
Removing a volume
The next example evacuates any disks in columns 0 or 1 that lie on controller
c2:
# vxassist -g mydg evacuate column vol01 column=0,1 \
evac_storage=’"Controller"="c1"’
This command specifies that both columns 0 and 1 are to be evacuated to disks
on controller c2:
# vxassist -g mydg evacuate column vol01 column=0,1 \
use_storage=’"Controller"="c2"’
In the final example, volume data is evacuated from subdisks that are connected
to controller c1 to disks on any other controller:
# vxassist -g mydg evacuate subdisk vol01 \
evac_storage=’allof("Controller"="c1")’ \
use_storage=’noneof("Controller"="c1")’
If the specified volume is currently enabled, the data in enabled plexes and their
component enabled plexes is moved without interrupting the availability of the
volume and without changing its redundancy. Subdisks that are within detached
plexes, disabled plexes, detached logs, or RAID-5 subdisks are moved without
any attempt to recover the data.
If the specified volume is not currently enabled, stale or offline plexes are moved
without recovery. The evacuation fails if a non-enabled volume contains other
subdisks that need to be moved.
Removing a volume
Once a volume is no longer required, you can use the following command to
delete it and make its storage available for re-use:
# vxassist [-g
diskgroup
] remove volume
volume
For example, the following command removes the volume, vol1:
# vxassist -g mydg remove volume vol1
Performing online relayout on a volume
ISP does not support online relayout of an application volume in the same way
as when the
vxassist relayout command is used on a traditional volume. ISP
can perform relayout internally if this is necessary to preserve the intent of a
volume, or to support operations such as changing the number of mirrors,
columns or logs that are associated with a volume. However, you should note
that such operations may destroy the intent of a volume by changing its desired
data redundancy or performance capabilities.
The nearest equivalent in ISP to the online relayout operation is capability
transformation. This changes the capabilities of a volume in a controlled
fashion, and preserves the size of the volume but not its intent. This operation is