Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The File Replication Service has detected a duplicate connection object between this computer "Computer 1" and a computer named "Computer 2". This was detected for the following replica set: "DOMAIN SYSTEM VOLUME (SYSVOL SHARE)"
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is the role of File Replication Service?
What is a replica set?
This is an invalid condition, preventing replication between the two computers. It is possible that the condition is transient, caused by Active Directory replication delays. See "JSI Tip 3347" for details on solving this issue.
As per Microsoft: "Duplicate NTDS connections objects can block replication of files and folders between FRS replica members when duplicate connection objects exist."
The solution is to "Delete duplicate connections objects between direct replication partners that are noted in the event text."
|Private comment: Subscribers only. See example of private comment|
|Links: ME251250, ME257338, JSI Tip 3347|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated