Updated on 2024-03-18 GMT+08:00

Deleting EVS Disks

Scenarios

If an EVS disk is no longer used, you can release the virtual resources by deleting it.

After a disk is deleted, you are no longer charged for it. EVS immediately destroys the metadata so that data can no longer be accessed. In addition, the physical storage space of the disk is reclaimed and cleared before being re-assigned. For any new disk created based on the re-assigned physical space, before data is written to the disk, EVS returns zero for all the read and write requests to the disk.

  • Pay-per-use disk:
    It can only be deleted when the following conditions are met:
    • The disk status is Available, Error, Expansion failed, Restoration failed, or Rollback failed.
    • The disk is not added to any replication pair in the Storage Disaster Recovery Service (SDRS). For any disk already added to a replication pair, you need to first delete the replication pair and then delete the disk.
    • The disk is not locked by any service.
    • The shared disk has been detached from all its servers.
  • Yearly/Monthly disk:

    It cannot be deleted, but you can unsubscribe from it if needed. For more information, see Unsubscriptions.

    The shared disk can be unsubscribed from when it has been detached from all its servers.

  • When you delete a disk, all the disk data including the snapshots created for this disk will be deleted.
  • A deleted disk cannot be recovered.

Procedure

  1. Log in to the management console.
  2. Under Storage, click Elastic Volume Service.

    The disk list page is displayed.

  3. In the disk list, locate the row that contains the target disk, click More in the Operation column, and choose Delete.
  4. (Optional) If multiple disks are to be deleted, select in front of each disk and click Delete in the upper area of the list.
  5. On the displayed page, confirm the deletion information.

    • If operation protection is enabled, select a verification method and obtain and enter the verification code.

      Supported verification methods include SMS, email, virtual MFA device. If non of these are associated, click Associate.

    • If operation protection is not enabled, enter DELETE in the text box below.

    For details about how to enable or disable operation protection, see Operation Protection.

  6. Click OK.

Related Operations

For more deletion FAQs, see Deletion.