Solved

Event ID:26 Application popup: Windows - Corrupt File :...

Posted on 2008-10-06
2
1,825 Views
Last Modified: 2013-12-05
Starting getting these event errors last Thursday.

Event Type:      Information
Event Source:      Application Popup
Event Category:      None
Event ID:      26
Date:            10/6/2008
Time:            3:36:38 PM
User:            N/A
Computer:      ****
Description:
Application popup: Windows - Corrupt File : The file or directory G:\Path\File is corrupt and unreadable. Please run the Chkdsk utility.  

I censored the computer name and network path.  These errors are isolated on G: drive of our files server.  It is a extending drive on our SAN that is connected to the file server with and iSCSI initiator.  anyone have any idea what happened.  Everything was running find until last thursday
0
Comment
Question by:CityofKerrville
2 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 500 total points
ID: 22656198
DId you run diagnostics and any SAN utils to check the file system ?

 
I hope this helps !
 
0
 

Author Closing Comment

by:CityofKerrville
ID: 31503618
Yes, the disk was corrupt.  We finished the file relocation early this morning and are now working on re-establishing shares and permissions.  ugh!!!!!
0

Featured Post

Make managing Office 365 email signatures a breeze

Are you using Office 365? Having trouble trying to set up email signatures for your users? Getting stressed out managing multiple signatures? Need an easier way to manage? We have a solution for you, try the most-user friendly and powerful signature management tool on the market.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We all have limited time to study long and complicated information about RAID theories, but you may be interested as to how RAID 5 works. We made it simple for you by providing the shortest and easiest explanation ever.   First we need to remind …
This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now