Solved

Jett_errBadLogSignature

Posted on 2008-10-07
3
161 Views
Last Modified: 2010-04-13
After running an ESEUTIL /D I tried to restart the IS. I got the error that the logs dont match. I moved the logs and ran an ISINTEG -patch. The error is jett_errbadlogsignature.

0
Comment
Question by:kulisncc
  • 2
3 Comments
 
LVL 16

Expert Comment

by:robrandon
ID: 22678433
Can you provide more information on the error for when you ran ESEUTIL /D before moving the log files?

What was the reason for moving them?
0
 

Accepted Solution

by:
kulisncc earned 0 total points
ID: 22679619
Damn- I feel stupid. After running the ESEutil /d I moved the wrong logs .There was a copy from a previous restore in a another folder.

All is well! 89GB info store down to 38gb in one defrag.
0
 

Author Comment

by:kulisncc
ID: 22768425
Damn- I feel stupid. After running the ESEutil /d I moved the wrong logs .There was a copy from a previous restore in a another folder.

All is well! 89GB info store down to 38gb in one defrag.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The advancement in technology has been a great source of betterment and empowerment for the human race, Nevertheless, this is not to say that technology doesn’t have any problems. We are bombarded with constant distractions, whether as an overload o…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question