Search
Report Types:
Products
Updates
Logs
Bugs
Files
Encounters:
Only Reports that have Encounters
Encounters must contain resolution
Home
Products
Updates
Logs
Bugs
Files
Sign In
Create an Account
Action Links
Create a Product Report
Create a Update/Patch Report
Create a Log/Event Report
Create a Bug Report
Create a File Report
Recent Search Results
No Search results are currently available to display.
Your last search results will be displayed here for the duration of your browser session.
Latest Reports
FOO aaa1 Test Product zzz 1.0 test
FOO aaa1 Test Product XXX 1.0 funky
Microsoft Excel 2010
NINTENDO OF AMERICA KIRBY SUPER STAR ULTRA NINTENDO DS
HP LaserJet 9040 series
Adobe Acrobat Reader 3
HP Desktop PC Series dx2420
HP Designjet Z6100
Microsoft Small Business Server 2000
Adobe Flash CS 5
...
6
7
8
9
10
...
Log Report
Print
Edit This Record
Create New
Revision
1
Template
General
Log Name
DNS Server
Type
Error
Source
DNS
Entry ID
4016
Average Threat Rating
Average Threat Rating Help
X
Loading...
Encounters
More Info
Related Content
Alert Me
Discuss
Add Your Encounter
Hide Encounters without Resolutions
joverland
Posts: 41
4/6/2011
Revision
2
Threat Rating:
Contains Resolution:
The symptoms that we encountered with this error were Authentication failures and AD Communication Errors. This was most likely because DNS was failing to resolve the domain name. We have two DNS servers, one on each domain controller. We initially thought the secondary DNS Server was the problem DC because of the High CPU. But after failing to make a connection to the primary via Active Directory Users and Computers we determined it was not the secondary. The Event Logs on the primary contained the 4016 event Ids. We believe clients at some point were beginning to fail over to the second DNS server in there DNS Server list putting heavy load on the secondary server.
We resolved the issue by restarting the DNS service. The service did not successfully stop and we had to Kill the DNS.exe process. The service then started successfully and proper DNS and AD functionality returned.
Follow-up notes: It was later determined that the root cause was a large number of user and computer accounts (200+) all at once being added to a security group causing the Infrastruture Master to be overworked. The Directory Services log included the following events:
1)
ID - 2094,
Source - NTDS Replication,
Description - Performance warning: replication was delayed while applying changes to the follwoing object...
2)
ID - 1792
Source - NTDS Database
Description - A transaction lasts 39 minutes and 41 seconds, much longer thabn expected.
Peer Reviews (0)
Peer Review Help
X
Loading...
No reviews have been post for this Encounter
Post a Peer Review:
Copyright (c) 2011
About Us
Contact Us
Privacy
Disclaimer
FAQs