Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: Active Directory|
The Directory Service consistency checker has noticed that <value> successive replication attempts with CN=NTDS Settings,CN=DESCARTES,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=altairtech,DC=net have failed over a period of <value> minutes. The connection object for this server will be kept in place, and new temporary connections will established to ensure that replication continues. The Directory Service will continue to retry replication with CN=NTDS Settings,CN=DESCARTES,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=altairtech,DC=net; once successful the temporary connection will be removed.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is a directory service?
As per Microsoft: "The Knowledge Consistency Checker (KCC) detected that repeated attempts to replicate with the specified domain controller failed. The Connection object for this domain controller will be ignored, and a new temporary connection will be established to ensure that replication continues. The temporary connection will be removed when replication with the domain controller resumes". See MSW2KDB for more details on this event.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated