Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS General|
A Directory Service operation failed because the database has run out of version storage. If this error repeats frequently it most likely indicates that an object that is too large for the Directory Service to handle is attempting to replicate in. This object must be deleted or shrunk on a Directory Server where it already exists.
The internal id is <ID>.
|English: Request a translation of the event description in plain English.|
|Concepts to understand:|
What is NTDS and what are the roles of its components?
What is a directory service?
This behavior can occur when the directory service notifier is triggered on an object and calls Security Accounts Manager (SAM), but SAM is waiting on a resource. See ME255013 and ME325705 for two hotfixes applicable to Microsoft Windows 2000.
See ME257459 and "EventID 1519 from source Active Directory" for additional information on this event.
See ME265089 for a situation in which this event might occur.
|Private comment: Subscribers only. See example of private comment|
|Links: ME255013, ME257459, ME265089, ME325705, EventID 1519 from source Active Directory|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated