It's hardware-based, so I think it'll be safe. My logic is the same as yours-I 
just wanted to be sure it wasn't flawed...



From: Mayo, Bill [mailto:bem...@pittcountync.gov]
Sent: Wednesday, May 05, 2010 9:00 AM
To: NT System Admin Issues
Subject: RE: Chkdsk on RAID 5

I expected to see a bunch of replies saying "sure", so maybe I am not thinking 
of something, but I don't see any reason why you should have a problem.  If the 
RAID is hardware based, Windows only sees the logical drive and the hardware 
controller should interpret things correctly.  If it is a Windows-based 
software RAID, it should likewise be able to handle it.  Chkdsk fixes the file 
system, and it shouldn't matter what the underlying hardware is.

Bill Mayo

________________________________
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Wednesday, May 05, 2010 8:42 AM
To: NT System Admin Issues
Subject: Chkdsk on RAID 5
I keep finding conflicting results on this, so I'm looking for expert insight.

I mentioned yesterday that I have a RAID 5 array that has a handful of corrupt 
files. Chkdsk in read-only mode shows:

"CHKDSK is verifying files (stage 1 of 3)...
File record segment 575200 is corrupt.0 file records processed)
2953600 file records processed.
File verification completed.
832 large file records processed.

Errors found. CHKDSK cannot continue in read-only mode."

Is it safe to run chkdsk /f on a RAID 5 array? Not chkdsk /r-I know I don't 
want chkdsk looking for bad sectors. But is the /f parameter safe?



John Hornbuckle
MIS Department
Taylor County School District
www.taylor.k12.fl.us









NOTICE: Florida has a broad public records law. Most written communications to 
or from this entity are public records that will be disclosed to the public and 
the media upon request. E-mail communications may be subject to public 
disclosure.







NOTICE: Florida has a broad public records law. Most written communications to 
or from this entity are public records that will be disclosed to the public and 
the media upon request. E-mail communications may be subject to public 
disclosure.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to