Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
This instance of SQL Server has been using a process id of 636 since 1/27/2003 8:46:48 PM (local) 1/28/2003 2:46:48 AM (UTC).
|English: Request a translation of the event description in plain English.|
This event occurs if a Backup Exec job runs for an unusually long period of time and might indicate a problem with Backup Exec. It should stop appearing after either the job finishes or is cancelled. On the server where I first observed this event, it first appeared at 12:00 AM local time on the day that followed the job's launch and continued to occur at 12:00 AM local time each day. A problem was causing the job to hang and EventID 33152 from source Backup Exec filled up the Application event log.
This event does not need troubleshooting as it is just an informational event. It helps tracking server availability and reports the time from when SQL Server instance has been using the process.
|Private comment: Subscribers only. See example of private comment|
|Links: EventID 33152 from source Backup Exec|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated