Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The internal directory replication agent (DRA) Dispatcher thread is waiting in a remote procedure call (RPC) to directory <server name>. The directory has attempted to cancel the call and recover the thread, with status 0x0. If this condition persists, stop and restart that Microsoft Exchange Server computer.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of the Microsoft Exchange Directory service?
As per Microsoft: "This behavior occurs if the directory replication agent (DRA) waits for more than 35 minutes for directory replication to complete within a site. This default timeout is normally sufficient and is exceeded only if a very large distribution list is being replicated or if there is limited usable bandwidth between the servers within the Exchange Server site". See ME166544, ME240385 and ME246276 for more details.
|Private comment: Subscribers only. See example of private comment|
|Links: ME166544, ME240385, ME246276|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated