[Gluster-users] IO Errors with latest version

Will Rouesnel supremeoverlordofcreation at gmail.com
Thu Jun 26 02:25:35 PDT 2008


I've attached the log files and current vol-spec files. I've also only just
noticed the logs noting the need to use the posix locks translator, but
there's also odd behavior from unify with a duplicated file ("Universal
Password.kdb") since I've been able to read/write that file on the cluster.
 
- Will

  _____  

From: amarts at gmail.com [mailto:amarts at gmail.com] On Behalf Of Amar S.
Tumballi
Sent: Thursday, June 26, 2008 6:28 PM
To: Will Rouesnel
Cc: gluster-users at gluster.org
Subject: Re: [Gluster-users] IO Errors with latest version


Hi Rouesnel,
 logically self-heal should fix this issue when you remount, or a server
goes down and comes back up. Can you send me spec files? also are there any
other logs?

Regards,
Amar


2008/6/25 Will Rouesnel <supremeoverlordofcreation at gmail.com>:


Having just patched up my version of gluster to the latest available in the
source repository, I'm now finding I'm getting odd rolling errors like the
following:
 
2008-06-25 22:33:38 E [unify.c:938:unify_open] unify:
/home/will/documents/Development/Invaders Development
Archive/invaders-improved/data/textures/Explosion3/Explosion30047.tga:
entry_count is 1
2008-06-25 22:33:38 E [unify.c:941:unify_open] unify:
/home/will/documents/Development/Invaders Development Archive/invaders-im
proved/data/textures/Explosion3/Explosion30047.tga: found on brick4
2008-06-25 22:33:38 E [unify.c:945:unify_open] unify: returning EIO as file
found on only one node

I've tried clearing out the namespace directory but the errors keep
re-occurring. They only appear to occur for a specific directory, however
unmounting gluster and clearing out the directory before allowing unison to
re-propagate it to the cluster doesn't seem to work. Any ideas?
 

- Will

_______________________________________________
Gluster-users mailing list
Gluster-users at gluster.org
http://zresearch.com/cgi-bin/mailman/listinfo/gluster-users






-- 
Amar Tumballi
Gluster/GlusterFS Hacker
[bulde on #gluster/irc.gnu.org]
http://www.zresearch.com - Commoditizing Super Storage! 

No virus found in this incoming message.
Checked by AVG.
Version: 8.0.101 / Virus Database: 270.4.1/1519 - Release Date: 25/6/2008
4:13 PM


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0001.htm 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: glusterfs.log
Type: application/octet-stream
Size: 1747358 bytes
Desc: not available
Url : http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0003.obj 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: glusterfs-server.vol
Type: application/octet-stream
Size: 1953 bytes
Desc: not available
Url : http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0004.obj 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: glusterfs-client.vol
Type: application/octet-stream
Size: 1588 bytes
Desc: not available
Url : http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0005.obj 


More information about the Gluster-users mailing list