Solved

MORE Backup Errors Veritas

Posted on 2006-06-30
2
509 Views
Last Modified: 2008-01-09
Please help.

Job ended: Friday, June 30, 2006 at 2:57:13 AM
Completed status: Failed
Final error: 0xa000fe1f - The device cannot be found.

Final error category: Resource Errors

 

Errors
Click an error below to locate it in the job log
Backup - FP-DC1OFO: Initialization failure on: "\\FP-DC1\Shadow?Copy?Components". Advanced Open File Option used: Yes.
OFO: Snapshot error (0xfffffe1f): The device cannot be found.


Unable to attach to \\FP-DC1\C:.
Unable to attach to \\FP-DC1\C:.
OFO: Initialization failure on: "\\FP-DC1\Shadow?Copy?Components". Advanced Open File Option used: Yes.
OFO: Snapshot error (0xfffffe1f): The device cannot be found.


Unable to attach to \\FP-DC1\E:.
Unable to attach to \\FP-DC1\E:.
OFO: Initialization failure on: "\\FP-DC1\Shadow?Copy?Components". Advanced Open File Option used: Yes.
OFO: Snapshot error (0xfffffe1f): The device cannot be found.


 
0
Comment
Question by:dijitaldemon1
2 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 500 total points
ID: 17018541
I think its the same problem as this one.

Take a look at it.

http://www.experts-exchange.com/Operating_Systems/Windows_Server_2003/Q_21592502.html
0
 

Author Comment

by:dijitaldemon1
ID: 17018590
Thanks!! I figured it out, I think, a few minutes ago.  Running a test run on it now.
Everything looked good, but the service did not run on one of the servers.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

823 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question