Solved

Disk error

Posted on 2014-10-22
3
445 Views
Last Modified: 2014-10-30
Hi,

I have got the following error message from our Exchange Server.

ID= 55; Src= Ntfs; User= ; Catg= 2; D/T= 10/21/2014 17:19:08; EventDesc= The file system structure on the disk is corrupt and unusable.
Please run the chkdsk utility on the volume .

But I am not sure which disk the error message referring to? How could I check which disk it is?
At the moment, there are three hard disks, one for C:, second one for D: and last two disk which is in RAID 1 for Exchange database and log. And there is one external hard disk which does full-backup of Exchange.
0
Comment
Question by:Educad
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 22

Accepted Solution

by:
Larry Struckmeyer MVP earned 250 total points
ID: 40398488
Suggest you run chkdsk with no switches on each of the volumes.  this will not require a dismount or a reboot and will tell you which of the volumes is corrupted.

Alternately, restart and boot on alternative media and run chkdsk /? to verify the switches and run it on all the volumes simultaneously.  With no switches first will tell you which are corrupt.

Be sure to have verified backups before making any changes to your server.
0
 
LVL 31

Expert Comment

by:Gareth Gudger
ID: 40398520
Have you checked Event Viewer?
0
 
LVL 47

Assisted Solution

by:noxcho
noxcho earned 250 total points
ID: 40398764
Run the CHKDSK on all disks. It is important that you do this from time to time. Are you able to browse the content of all disks you have in the system?
As you identify the problematic drive do not run CHKDSK /f on it before you first copy out the data from it.
CHKDSK /f command often does the things worse as they were during fix.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Unified and professional email signatures help maintain a consistent company brand image to the outside world. This article shows how to create an email signature in Exchange Server 2010 using a transport rule and how to overcome native limitations …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
This video discusses moving either the default database or any database to a new volume.

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question