Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Volume name is offline for shadow copy protection. A shadow copy meta data corruption was detected. Please try clearing the protection fault or restart the computer. If all else fails, revert out of shadow copy protection mode to reclaim the use of the volume while losing the shadow copies.
|English: Request a translation of the event description in plain English.|
In a support forum, a MS engineer said the following: "This means that VSS can no longer track changes to the replica volume, so it took it offline to prevent any further changes. Unfortunatly, the recovery point volume that holds the shadow copies is corrupted, so you will unfortunatly need to remove the data source from protection, but this time remove the replica so both volumes get deleted. Yes, you wil loose all RP's (recovery points), then when you add it back into protection new volumes will get created and you can continue to get new RP's."
* * *
ME2279787 indicates that this event may be recorded in the System log after you extend the protected dynamic volume. A hotfix is available from Microsoft for Windows Vista and Windows 2008.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated