Solved

"Improper termination or faulty cable detected. Please rectify!" on console upon boot with Linux OS

Posted on 2008-06-13
4
1,077 Views
Last Modified: 2010-04-21
Hello,
We have our internal wiki on a Linux OS machine. Nothing has been changed on the machine. Upon reboot, I see "Improper termination or faulty cable detected. Please rectify!". Also error message comes up for "connot find operating system". There is a RAID 5 configuration on the machine and there are 4 internal SCSI drives. I dont have a problem scrapping the machine altogeher, but want the info within.

Essentially what we want to do is to get to some of the Public folders in the machine and access it. I know how to proceed for machines with windows, but have litle experience with linux disaser recovery and also RAID. Any help would be apprciated to know where I can look first. Would I be able to take out the drives and terminate on another machine and expect it to mount? Please help!!
0
Comment
Question by:smi-admin
4 Comments
 
LVL 87

Assisted Solution

by:rindi
rindi earned 50 total points
Comment Utility
Make sure your SCSI cables and the terminators are attached properly, if they seem properly attached, replace them.
0
 
LVL 16

Assisted Solution

by:btassure
btassure earned 100 total points
Comment Utility
And if one of the hard disks is set to be the terminator (with a jumper probably) then remove the jumper and use a real terminator.
0
 
LVL 91

Accepted Solution

by:
nobus earned 150 total points
Comment Utility
you can boot from a bootable linux cd, like knoppix, or ubuntu, and copy your data from there (usb is supported) :
ftp://ftp.uni-kl.de/pub/linux/knoppix/KNOPPIX_V5.1.0CD-2006-12-30-EN.iso
if the data can't be accessed, probably one of the disks corrupted the array
0
 

Author Closing Comment

by:smi-admin
Comment Utility
Thanks Guys,.. all were good suggestions, but I was able to get the machine up and running upon rebooting the machine manually a few times which initiated the disk check utility and RAID check
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
vSphere client error 503 5 75
IBM DSA3512 Array expansion 1 46
Dell poweredge R610 raid mirrro 3 36
USB Drives Missing? 5 54
In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
Learn about cloud computing and its benefits for small business owners.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now