Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The worker process for application pool 'CtxScriptsPool' encountered an error 'Failed to decrypt attribute 'password' trying to read configuration data from file '\\?\C:\inetpub\temp\apppools\CtxScriptsPool.config', line number '150'. The data field contains the error code.
|English: Request a translation of the event description in plain English.|
According to CTX131137, this event may be recorded when the Extensible Transformation Engine (XTE) Service connection fails on cloned server and opening the Web Interface gives the “503 Service Unavailable” error. The article provides 3 workarounds.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated