Solved

Disk corruption error on server 2003

Posted on 2014-03-25
5
521 Views
Last Modified: 2014-03-26
My backup failed last night. Found event id 55 in system log, with message
"The file system structure on the disk is corrupt and unusable. Please run the chkdsk utility on the volume \Device\DF2K_SnapShot\Volume2."

It repeated several times, and the backup froze. Not sure how to determine which drive "\Device\DF2K_SnapShot\Volume2." refers to, so I can run chkdsk. I would just run it on both drives, but the second one is about 1TB in size, and would take forever, with the server being down for an extended amount of time, potentially. I attached a screen shot of Disk Management and the event log message. Any help would be appreciated. Thanks.
Drive-error.jpg
Event-log-error.jpg
0
Comment
Question by:BScott52
  • 3
5 Comments
 
LVL 16

Assisted Solution

by:Emmanuel Adebayo
Emmanuel Adebayo earned 100 total points
ID: 39954041
Is your server disk presented from the SAN? If this is a local disk. You might need to check that VSS is not enabled.

You don't need to worry about this, Windows we do the chkdsk utility the next time you reboot your server and it will not take long time except  there errors or sectors that need to be corrected.

Regards
0
 

Author Comment

by:BScott52
ID: 39954254
This is a local disk. I'll check it out. Thanks.
0
 
LVL 46

Accepted Solution

by:
noxcho earned 400 total points
ID: 39955376
Run the CHKDSK x: on all partitions you have there. X: is the drive letter of the partition. As long as you do not provide /f /r keys the CHKDSK will run in read only mode. So no fix will be done.
And thus no reboot is required. But this way you will know which drive exactly needs to be fixed with CHKDSK X:/f
0
 

Author Comment

by:BScott52
ID: 39955558
That's what I needed, noxcho. Thank you.
0
 

Author Closing Comment

by:BScott52
ID: 39955565
Did not mean to include my own comment as solution.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Patch Management is administrated by page 129 of  the following document:     http://support.dell.com/support/edocs/software/smdmc/11/en/ug/ug.pdf However, there are issues with Patch Management with FTP (for instance, a slow Internet connectio…
The 6120xp switches seem to have a bug when you create a fiber port channel when you have a UCS fabric interconnects talking to them.  If you follow the Cisco guide for the UCS, the FC Port channel will never come up and it will say that there are n…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now