Solved

MORE Backup Errors Veritas

Posted on 2006-06-30
2
507 Views
Last Modified: 2008-01-09
Please help.

Job ended: Friday, June 30, 2006 at 2:57:13 AM
Completed status: Failed
Final error: 0xa000fe1f - The device cannot be found.

Final error category: Resource Errors

 

Errors
Click an error below to locate it in the job log
Backup - FP-DC1OFO: Initialization failure on: "\\FP-DC1\Shadow?Copy?Components". Advanced Open File Option used: Yes.
OFO: Snapshot error (0xfffffe1f): The device cannot be found.


Unable to attach to \\FP-DC1\C:.
Unable to attach to \\FP-DC1\C:.
OFO: Initialization failure on: "\\FP-DC1\Shadow?Copy?Components". Advanced Open File Option used: Yes.
OFO: Snapshot error (0xfffffe1f): The device cannot be found.


Unable to attach to \\FP-DC1\E:.
Unable to attach to \\FP-DC1\E:.
OFO: Initialization failure on: "\\FP-DC1\Shadow?Copy?Components". Advanced Open File Option used: Yes.
OFO: Snapshot error (0xfffffe1f): The device cannot be found.


 
0
Comment
Question by:dijitaldemon1
2 Comments
 
LVL 13

Accepted Solution

by:
prashsax earned 500 total points
ID: 17018541
I think its the same problem as this one.

Take a look at it.

http://www.experts-exchange.com/Operating_Systems/Windows_Server_2003/Q_21592502.html
0
 

Author Comment

by:dijitaldemon1
ID: 17018590
Thanks!! I figured it out, I think, a few minutes ago.  Running a test run on it now.
Everything looked good, but the service did not run on one of the servers.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now