Solved

The system failed to flush data to the transaction log. Corruption may occur.

Posted on 2010-09-16
3
1,535 Views
Last Modified: 2012-05-10

I have a USB Seagate drive, this is a 1.8TB capacity USB external harddrive, I found that the following error logged in my System log on a Windows Server 2003 server for every 20 minutes.  Based on my observation, the warning below logged while the drive is idle and at the time of logging, I heard a sound from the drive, the sound like something triggered on, then a windows pop up and asking for "Open folder to view files", the same windows as the usb key or usb drive started.

Does anyone know how to solve the problem?

The model of Seagate USB ext drive is "9sf2a8-500".

The system failed to flush data to the transaction log. Corruption may occur.
EventID : 57
Source : Ftdisk
0
Comment
Question by:KANEWONG
  • 2
3 Comments
 
LVL 9

Expert Comment

by:jerrypd
Comment Utility
I would *strongly* suggest backing up any critical data - it sounds as if the drive "reset" itself, which is usually an imminent sign of failure...
0
 
LVL 1

Author Comment

by:KANEWONG
Comment Utility
I am trying to reformat the drive by using the format function in Windows, I started the format at 10:00am this morning but the format task is incomplete, I would say 80% is done.  Is there any fast method to format it in 30 minutes?
0
 
LVL 9

Accepted Solution

by:
jerrypd earned 250 total points
Comment Utility
no - I am now convinced that the drive is bad though!
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now