BackupPC-users

Re: [BackupPC-users] Disk space used far higher than reported pool size

2013-10-31 14:51:21
Subject: Re: [BackupPC-users] Disk space used far higher than reported pool size
From: <backuppc AT kosowsky DOT org>
To: "General list for user discussion, questions and support" <backuppc-users AT lists.sourceforge DOT net>
Date: Thu, 31 Oct 2013 14:50:03 -0400
Les Mikesell wrote at about 10:15:42 -0500 on Thursday, October 31, 2013:
 > On Thu, Oct 31, 2013 at 9:47 AM, Craig O'Brien <cobrien AT fishman DOT com> 
 > wrote:
 > >> What is the underlying storage here - nfs?
 > >
 > > Local SATA disks in a RAID 5 (5 disks, 3TB each in capacity)
 > 
 > I think I'd force an fsck just on general principles even though it
 > will take a long time to complete.   Google turns up a few hits on
 > similar problems, but I don't see a definitive answer.   RStmp is
 > supposed to be used to hold an uncompressed copy of the previous
 > version of a large file with changes so rsync can seek to match up the
 > changed block positions, so this error probably has something to do
 > with your compressed copy being corrupted and not uncompressing
 > properly.

And this would explain why the elements are not being linked properly
to the pool -- though I would have thought the more likely result
would be a duplicate pool entry than an unlinked pool entry...

It might be interesting to look for pool chains with the same
(uncompressed) content and with links < HardLinkMax (typically 31999)
to see if pool entries are being unnecessarily duplicated.

Try:
(cd /var/lib/BackupPC/cpool; find . -type f -links -3198 -name "*_*"
-exec md5sum {} \;) | sort | uniq -d -w32

Note this will find if there are any unnecessarily duplicated pool
chains (beyond the base one). Note to keep it fast and simple I am
skipping the elements without a suffix... with the assumption being
that if there are duplicated elements then there will probably be
whole chains of them...

------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
BackupPC-users mailing list
BackupPC-users AT lists.sourceforge DOT net
List:    https://lists.sourceforge.net/lists/listinfo/backuppc-users
Wiki:    http://backuppc.wiki.sourceforge.net
Project: http://backuppc.sourceforge.net/

<Prev in Thread] Current Thread [Next in Thread>