Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
|Source: NTDS Replication|
A request has been made to promote this DSA to a Global Catalog (GC). A precondition to becoming a GC is that this server host a read-only copy of all partitions in the enterprise. This server should hold a copy of partition DC=child,DC=h,DC=com but it does not. This system will not be promoted to a GC until this condition is met.
This may be because the KCC has not run, or that it is unable to add a replica of the partition because all of its sources are down. Please check the event log for KCC errors.
The KCC will retry adding the replica.
|English: Request a translation of the event description in plain English.|
This event occurs when promoting a domain controller to a global catalog server. See ME810089 and ME910204 for additional information about this event.
See ME842208, ME889711, and the link to "EventID 1559 from source Active Directory" for details on this problem.
|Private comment: Subscribers only. See example of private comment|
|Links: ME810089, ME842208, ME889711, ME910204, EventID 1559 from source Active Directory|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated