Solved

question in Linux

Posted on 2014-10-07
2
188 Views
Last Modified: 2014-10-16
Hi ,


I have these two physical volumes  on OL6 version :

 --- Physical volume ---
  PV Name               /dev/sdd1
  VG Name               H800A
  PV Size               4.91 TB / not usable 31.97 MB
  Allocatable           yes (but full)
  PE Size (KByte)       32768
  Total PE              160811
  Free PE               0
  Allocated PE          160811
  PV UUID               TdGdUZ-JiIQ-r2zl-DJry-dq3b-rCcQ-PkKnEk
   
  --- Physical volume ---
  PV Name               /dev/sdc1
  VG Name               H800A-R5
  PV Size               2.00 TB / not usable 1.23 MB
  Allocatable           yes (but full)
  PE Size (KByte)       4096
  Total PE              524287
  Free PE               0
  Allocated PE          524287
  PV UUID               zCsKqD-6FBs-502U-2mnj-kXA4-tXhi-gdQo2m



I need to create a mount point that will combine both of them and size should be almost 7TB or so....


I used the commands

fdisk /dev/sdc
pvcreate /dev/sdc1
vgcreate  H800A-R5 /dev/sdc1
lvcreate -l100%FREE -n data  H800A-R5
mkfs.ext3 -L data /dev/H800A-R5/data
tune2fs -c 0 -i 0 /dev/H800A-R5/data

 /dev/H800A-R5/data      /data                  ext3    noatime,noacl   0 0


but apparently created a /data of a size of 2TB

How can i re create the entire thing combining the size of both physical volumes ?
0
Comment
Question by:c_hockland
2 Comments
 
LVL 76

Accepted Solution

by:
arnold earned 500 total points
ID: 40367691
You would use pvcreate /dev/sdd1
Vgextend h800A-r5 /dev/sdd1
The h800a-r5 volume group will now have the two.
You would then use lvcreate if you need another volume, or lvresize to increase the existing logical volume data by the additional amount.

Note make sure you have a good backup whenever you are .........


Note, should one of these fail, there is no data protection
0
 
LVL 13

Expert Comment

by:Sandy
ID: 40367713
i would suggest to format the LV with ext4.

TY/SA
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now