Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Server <CitrixServerName> has reported 5 data collector elections within one hour. Election alerting will be temporarily suspended on this server.
|English: Request a translation of the event description in plain English.|
As per CTX118742, this is a high rate of elections and the state of the farm should be investigated. Check for preceding events of source IMAService and ID 4033 to identify which server(s) called for the elections.
|Private comment: Subscribers only. See example of private comment|
|Links: Citrix document ID CTX118742|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated