I've attached the log files and current vol-spec files. I've also only just noticed the logs noting the need to use the posix locks translator, but there's also odd behavior from unify with a duplicated file ("Universal Password.kdb") since I've been able to read/write that file on the cluster. - Will _____ From: amarts at gmail.com [mailto:amarts at gmail.com] On Behalf Of Amar S. Tumballi Sent: Thursday, June 26, 2008 6:28 PM To: Will Rouesnel Cc: gluster-users at gluster.org Subject: Re: IO Errors with latest version Hi Rouesnel, logically self-heal should fix this issue when you remount, or a server goes down and comes back up. Can you send me spec files? also are there any other logs? Regards, Amar 2008/6/25 Will Rouesnel <supremeoverlordofcreation at gmail.com>: Having just patched up my version of gluster to the latest available in the source repository, I'm now finding I'm getting odd rolling errors like the following: 2008-06-25 22:33:38 E [unify.c:938:unify_open] unify: /home/will/documents/Development/Invaders Development Archive/invaders-improved/data/textures/Explosion3/Explosion30047.tga: entry_count is 1 2008-06-25 22:33:38 E [unify.c:941:unify_open] unify: /home/will/documents/Development/Invaders Development Archive/invaders-im proved/data/textures/Explosion3/Explosion30047.tga: found on brick4 2008-06-25 22:33:38 E [unify.c:945:unify_open] unify: returning EIO as file found on only one node I've tried clearing out the namespace directory but the errors keep re-occurring. They only appear to occur for a specific directory, however unmounting gluster and clearing out the directory before allowing unison to re-propagate it to the cluster doesn't seem to work. Any ideas? - Will _______________________________________________ Gluster-users mailing list Gluster-users at gluster.org http://zresearch.com/cgi-bin/mailman/listinfo/gluster-users -- Amar Tumballi Gluster/GlusterFS Hacker [bulde on #gluster/irc.gnu.org] http://www.zresearch.com - Commoditizing Super Storage! No virus found in this incoming message. Checked by AVG. Version: 8.0.101 / Virus Database: 270.4.1/1519 - Release Date: 25/6/2008 4:13 PM -------------- next part -------------- An HTML attachment was scrubbed... URL: http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0001.htm -------------- next part -------------- A non-text attachment was scrubbed... Name: glusterfs.log Type: application/octet-stream Size: 1747358 bytes Desc: not available Url : http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0003.obj -------------- next part -------------- A non-text attachment was scrubbed... Name: glusterfs-server.vol Type: application/octet-stream Size: 1953 bytes Desc: not available Url : http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0004.obj -------------- next part -------------- A non-text attachment was scrubbed... Name: glusterfs-client.vol Type: application/octet-stream Size: 1588 bytes Desc: not available Url : http://zresearch.com/pipermail/gluster-users/attachments/20080626/0dbb7cd5/attachment-0005.obj