Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Unable to read local EventLog. Reason: The event log file has changed between reads.
|English: Request a translation of the event description in plain English.|
This happens when SQL Server attempts to write to the NT Event log and it has been purged since the last time it opened it. This will happen if you clear the log in the Event Viewer. This event is followed by events 311 and 312 (same source).
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated