Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Foundation Agents|
Cluster Agent: The cluster resource <resource> has become degraded.
|English: This information is only available to subscribers. An example of English, please!|
Resource: SNMP TRAP: 15005 in CPQCLUS.MIB - See EV100498 (Yuval Sinay MVP Blog) and EV100499 (Virtual Machine stopped without cluster error message) on how to resolve some instances of this problem.
A support forum suggests that many cluster problems related to issues with the shared storage (including those that report that a resource is "degraded") may be fixed by installing the latest firmware for their controllers.
This message in itself does not provide any details about the nature of the failure that led to the cluster resource being degraded. It is just a warning for the administrator to verify what is causing the problem. There should additional messages in the event log with more specific details about the nature of the problem.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated