Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Clustered Mailbox Server: <mailbox server> Physical Server: <server name>
The database in storage group <server>\<storage group> will not be automatically mounted because the number of logs lost was greater than the amount specified by "AutoDatabaseMountDial".
* The log file generated before the move operation or failover was: <file>
* The log file successfully replicated to the passive node was: <file>
* "AutoDatabaseMountDial" is set to: Lossless
|English: Request a translation of the event description in plain English.|
Deleting the log files from the storage group on the passive node then update the storage copy on the storage group from the exchange management console copy status should now appear healthy log files will get re-seeded from the active node.
To resolve this problem, download and install Update Rollup 3 for Exchange 2007 Service Pack. See ME950153 for details.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated