Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

The system failed to flush data to the transaction log. Corruption may occur.

Posted on 2010-09-16
3
Medium Priority
?
1,560 Views
Last Modified: 2012-05-10

I have a USB Seagate drive, this is a 1.8TB capacity USB external harddrive, I found that the following error logged in my System log on a Windows Server 2003 server for every 20 minutes.  Based on my observation, the warning below logged while the drive is idle and at the time of logging, I heard a sound from the drive, the sound like something triggered on, then a windows pop up and asking for "Open folder to view files", the same windows as the usb key or usb drive started.

Does anyone know how to solve the problem?

The model of Seagate USB ext drive is "9sf2a8-500".

The system failed to flush data to the transaction log. Corruption may occur.
EventID : 57
Source : Ftdisk
0
Comment
Question by:KANEWONG
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Expert Comment

by:jerrypd
ID: 33694447
I would *strongly* suggest backing up any critical data - it sounds as if the drive "reset" itself, which is usually an imminent sign of failure...
0
 
LVL 1

Author Comment

by:KANEWONG
ID: 33697014
I am trying to reformat the drive by using the format function in Windows, I started the format at 10:00am this morning but the format task is incomplete, I would say 80% is done.  Is there any fast method to format it in 30 minutes?
0
 
LVL 9

Accepted Solution

by:
jerrypd earned 1000 total points
ID: 33697051
no - I am now convinced that the drive is bad though!
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question