[Gluster-users] IO Errors with latest version
Will Rouesnel
supremeoverlordofcreation at gmail.com
Thu Jun 26 09:25:35 UTC 2008
I've attached the log files and current vol-spec files. I've also only just
noticed the logs noting the need to use the posix locks translator, but
there's also odd behavior from unify with a duplicated file ("Universal
Password.kdb") since I've been able to read/write that file on the cluster.
- Will
_____
From: amarts at gmail.com [mailto:amarts at gmail.com] On Behalf Of Amar S.
Tumballi
Sent: Thursday, June 26, 2008 6:28 PM
To: Will Rouesnel
Cc: gluster-users at gluster.org
Subject: Re: [Gluster-users] IO Errors with latest version
Hi Rouesnel,
logically self-heal should fix this issue when you remount, or a server
goes down and comes back up. Can you send me spec files? also are there any
other logs?
Regards,
Amar
2008/6/25 Will Rouesnel <supremeoverlordofcreation at gmail.com>:
Having just patched up my version of gluster to the latest available in the
source repository, I'm now finding I'm getting odd rolling errors like the
following:
2008-06-25 22:33:38 E [unify.c:938:unify_open] unify:
/home/will/documents/Development/Invaders Development
Archive/invaders-improved/data/textures/Explosion3/Explosion30047.tga:
entry_count is 1
2008-06-25 22:33:38 E [unify.c:941:unify_open] unify:
/home/will/documents/Development/Invaders Development Archive/invaders-im
proved/data/textures/Explosion3/Explosion30047.tga: found on brick4
2008-06-25 22:33:38 E [unify.c:945:unify_open] unify: returning EIO as file
found on only one node
I've tried clearing out the namespace directory but the errors keep
re-occurring. They only appear to occur for a specific directory, however
unmounting gluster and clearing out the directory before allowing unison to
re-propagate it to the cluster doesn't seem to work. Any ideas?
- Will
_______________________________________________
Gluster-users mailing list
Gluster-users at gluster.org
http://zresearch.com/cgi-bin/mailman/listinfo/gluster-users
--
Amar Tumballi
Gluster/GlusterFS Hacker
[bulde on #gluster/irc.gnu.org]
http://www.zresearch.com - Commoditizing Super Storage!
No virus found in this incoming message.
Checked by AVG.
Version: 8.0.101 / Virus Database: 270.4.1/1519 - Release Date: 25/6/2008
4:13 PM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://supercolony.gluster.org/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: glusterfs.log
Type: application/octet-stream
Size: 1747358 bytes
Desc: not available
URL: <http://supercolony.gluster.org/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: glusterfs-server.vol
Type: application/octet-stream
Size: 1953 bytes
Desc: not available
URL: <http://supercolony.gluster.org/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0001.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: glusterfs-client.vol
Type: application/octet-stream
Size: 1588 bytes
Desc: not available
URL: <http://supercolony.gluster.org/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0002.obj>
More information about the Gluster-users
mailing list