Solved

what happens after removing a lun from lvm under linux

Posted on 2010-08-29
3
487 Views
Last Modified: 2012-06-21
Hi:

     We have been undergoing some disk problems on a type 6 raid.
     We have 4 luns and want to move the data to another lun. Then remove
     the problematic lun.
     This is run under Centos 5.3 and the 4 luns are grouped together by lvm.
     We added lun5 and put it under the lvm so linux now sees
     5 devices /dev/dm-0 through /dev/dm-4. I added /dev/dm-4 to the volume group.
    And am currently running pvmove. to move the extents from the problematic pv. (dm-1).

   The question is after I remove dm-1 from the volume group and then remove the lun
   will I have problems recognizing my data.

   The reason I ask is that normally linux may see the following disks:
  /dev/sda, /dev/sdb. /dev/sdc. When /dev/sdb is removed /dev/sdc will become
  /dev/sdb on a rescan. So I was wondering if I will see the same problems here.

  I have
    1 - luns, 2 - multipath mapping, and 3 - lvm.

  Thank you for your help.
   
           
0
Comment
Question by:kot_linuxoid
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
jmslagle earned 500 total points
ID: 33558520
If you are using LVM, then LVM will figure out the disk identities by metadata stored on disk, not the device name.  Additionally, it's usually wise to tell your FSTAB to mount by uuid or label for the same reason.
0
 

Author Comment

by:kot_linuxoid
ID: 33564617
thank  you very much.
0
 

Author Closing Comment

by:kot_linuxoid
ID: 33564639
He answered my concerns, and I knew that the
multipath drivers depend on a wwid to map.
So I didn't need info on the multipath. But to have been complete referring to the multipath(s) should
have been discussed as well.

In either case thanks to imslagle for his answer.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Solid State Drive Performance Tips: Solid state storage technology is now a standard.  After testing and using several different brands and revisions of SSD's over the years I have put together a collection of tips,tools and suggestions that I ha…
Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now