Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Event ID: 1045 Source: ClusSvc

Source
Level
Description
Cluster IP Address resource <IP Address> could not create the required TCP/IP interface.
Comments
 
This event may be registered if you replace a network adapter with a different model and continue to use the old or inappropriate driver. As a result, the IP address resource cannot be bound to the specified network. See ME240271 for details on this problem.

The Cluster service tried to bring an IP address online. The resource properties may specify a network that is not valid or a malfunctioning adapter. This error may occur if you replace a network adapter with a different model and continue to use an old or inappropriate driver. As a result, the IP address resource cannot be bound to the specified network. See the link to "Windows Cluster Service Troubleshooting and Maintenance" to download a white paper on the cluster service.
As per Microsoft: "Some versions of the Intel SNMP Agent (ILansnmp.dll) lock the Windows registry and other resources cannot access the registry. This may cause cluster functioning to fail.

Note ILansnmp.dll is not a Microsoft component.

When the ILansnmp.dll file causes this problem, the IP addresses of network adapters are unbound. This result in communication failure in cluster IP addresses.

To resolve this problem, obtain the latest version of the ILansnmp.dll from the provider". See ME811876 for more details.

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net.

Read more...

 

Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.

Read more...