Solved

Shadow Copies not working

Posted on 2006-07-14
5
4,232 Views
Last Modified: 2012-05-05
I tried doing a search on this and found a lot on Shadow Copies but nothing that pertained to me. I have tried some things that I have found on Microsofts site but this did not help either. Here is what I have.

The Shadow Copies are setup and scheduled. They run but there are no shadow copies shown for the volume. The time changes for next run like it actually kicked off but nothing. If we do a create now the copy is actually created but will not do so based on the schedule.

I have looked through the event viewer and the only thing that I have found is this event:

Event ID 2001:  lsass (716) Shadow copy 9 freeze started.
Event ID 2003: lsass (716) Shadow copy 9 freeze stopped.

Based on this I re-registered an SQL DLL but this did not help. Other than that there are no other events in the event viewer. Any help would be appreciated.

Dave
0
Comment
Question by:GASAI
  • 2
5 Comments
 
LVL 23

Accepted Solution

by:
Erik Bjers earned 250 total points
ID: 17115170
I remember from earlier research that Shadow Copy would not work if you had SQL on your system unless you had SQL set for a certin type of backup.  Unfortunatly I can't remember any more details, but this may point you in the right direction.

eb
0
 
LVL 14

Assisted Solution

by:FriarTuk
FriarTuk earned 250 total points
ID: 17132486
0
 
LVL 14

Expert Comment

by:FriarTuk
ID: 17255092
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question