Search
Report Types:
Products
Updates
Logs
Bugs
Files
Encounters:
Only Reports that have Encounters
Encounters must contain resolution
Home
Products
Updates
Logs
Bugs
Files
Sign In
Create an Account
Action Links
Create a Product Report
Create a Update/Patch Report
Create a Log/Event Report
Create a Bug Report
Create a File Report
Recent Search Results
No Search results are currently available to display.
Your last search results will be displayed here for the duration of your browser session.
Latest Reports
test test test test
test test test
test test test
UBISOFT test test test test
Default Gateway cleared after every reboot following Windows 2008 upgrade to 2008 R2
Directory Service Error NTDS KCC 1311
Windows System Event ID 7024, Service Control Manager Eventlog Provider, Error
Windows System Event ID 10016, DistributedCOM, Error
test name test Information
Windows Application Event ID 1085, Userenv, Error
1
2
3
4
5
...
Log Report
Print
Edit This Record
Create New
Revision
1
Template
General
Log Name
DNS Server
Type
Error
Source
DNS
Entry ID
4016
Average Threat Rating
Average Threat Rating Help
X
Loading...
Encounters
More Info
Related Content
Alert Me
Discuss
Add Your Encounter
Hide Encounters without Resolutions
joverland
Posts: 41
4/6/2011
Revision
2
Threat Rating:
Contains Resolution:
The symptoms that we encountered with this error were Authentication failures and AD Communication Errors. This was most likely because DNS was failing to resolve the domain name. We have two DNS servers, one on each domain controller. We initially thought the secondary DNS Server was the problem DC because of the High CPU. But after failing to make a connection to the primary via Active Directory Users and Computers we determined it was not the secondary. The Event Logs on the primary contained the 4016 event Ids. We believe clients at some point were beginning to fail over to the second DNS server in there DNS Server list putting heavy load on the secondary server.
We resolved the issue by restarting the DNS service. The service did not successfully stop and we had to Kill the DNS.exe process. The service then started successfully and proper DNS and AD functionality returned.
Follow-up notes: It was later determined that the root cause was a large number of user and computer accounts (200+) all at once being added to a security group causing the Infrastruture Master to be overworked. The Directory Services log included the following events:
1)
ID - 2094,
Source - NTDS Replication,
Description - Performance warning: replication was delayed while applying changes to the follwoing object...
2)
ID - 1792
Source - NTDS Database
Description - A transaction lasts 39 minutes and 41 seconds, much longer thabn expected.
Peer Reviews (0)
Peer Review Help
X
Loading...
No reviews have been post for this Encounter
Post a Peer Review:
Copyright (c) 2011
About Us
Contact Us
Privacy
Disclaimer
FAQs