Solved

Shadow Copies not working

Posted on 2006-07-14
5
4,288 Views
Last Modified: 2012-05-05
I tried doing a search on this and found a lot on Shadow Copies but nothing that pertained to me. I have tried some things that I have found on Microsofts site but this did not help either. Here is what I have.

The Shadow Copies are setup and scheduled. They run but there are no shadow copies shown for the volume. The time changes for next run like it actually kicked off but nothing. If we do a create now the copy is actually created but will not do so based on the schedule.

I have looked through the event viewer and the only thing that I have found is this event:

Event ID 2001:  lsass (716) Shadow copy 9 freeze started.
Event ID 2003: lsass (716) Shadow copy 9 freeze stopped.

Based on this I re-registered an SQL DLL but this did not help. Other than that there are no other events in the event viewer. Any help would be appreciated.

Dave
0
Comment
Question by:GASAI
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 23

Accepted Solution

by:
Erik Bjers earned 250 total points
ID: 17115170
I remember from earlier research that Shadow Copy would not work if you had SQL on your system unless you had SQL set for a certin type of backup.  Unfortunatly I can't remember any more details, but this may point you in the right direction.

eb
0
 
LVL 14

Assisted Solution

by:FriarTuk
FriarTuk earned 250 total points
ID: 17132486
0
 
LVL 14

Expert Comment

by:FriarTuk
ID: 17255092
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question