Skip to content

Commit 9500067

Browse files
committed
Changes from review feedback
1 parent 86e0e29 commit 9500067

1 file changed

Lines changed: 25 additions & 25 deletions

File tree

support/windows-server/active-directory/troubleshoot-event-2866-maximum-audit-queue-size.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This article describes several methods to use to fix Event ID 2866, and discusse
1919

2020
## Symptoms
2121

22-
You're modifying Active Directory Domain Services (AD DS) objects. The domain controller (DC) that you're using to make the changes has audit logging enabled and configured to audit the changes that you're making. The modifications start to fail, and on the DC, the Security log records Event ID 2866. The text of the event resembles the following example:
22+
You're modifying Active Directory Domain Services (AD DS) objects. The domain controller (DC) that you're using to make the changes has audit logging enabled and configured to audit the changes that you're making. The modifications start to fail, and on the DC, the Security log records Event ID 2866. The event text resembles the following example:
2323

2424
```output
2525
While logging audit events for the following object, the directory service reached the maximum number of audit events that could be cached in memory at any given time. As a result of reaching this limit, the operation was aborted.
@@ -49,9 +49,9 @@ Typically, this event occurs in one of the following two scenarios.
4949

5050
### Scenario 1
5151

52-
You're making changes to Active Directory Domain Services (AD DS) objects. For example, you're changing the `member` attributes of multiple group objects.
52+
You're making bulk changes to Active Directory Domain Services (AD DS) objects. These objects have auditing turned on for multiple types of operations.
5353

54-
The change operation fails, and the Security log records Event ID 2866, which indicates that the DC ran out of audit queue space.
54+
The change operation fails, and the Security log records Event ID 2866. This event indicates that the rate at which the changes generated audit events overwhelmed the ability of the transaction audit queue to manage them. As a result, the DC ran out of audit queue space.
5555

5656
### Scenario 2
5757

@@ -115,7 +115,24 @@ The audit events contain information about security-related occurrences such as
115115

116116
Under heavy load (for example, during bulk operations), it's possible to generate multiple audit events while still writing the first one to the disk. When the number of audit events reaches the maximum for the queue, operational threads start pausing until their audit event can be inserted into the queue. AD DS logs Event ID 2866 at this point.
117117

118-
### Cause 1: A single transaction generates too many audit events
118+
## Cause 1: The rate at which audit events accumulate is greater than the system can process
119+
120+
AD DS is generating Audit events at a rate that's consistently higher than the rate at which the DC can write them to the log file and purge them from the queue. The queue eventually reaches its maximum size.
121+
122+
The rate at which AD DS generates audit events depends on factors that include the following points:
123+
124+
- How many event sources that you configured for auditing
125+
- The type of auditing (such as success auditing, failure auditing, or successful read auditing). For example, all the following categories of operations can generate failure or success auditing:
126+
127+
- [File system auditing](/windows-hardware/drivers/ifs/auditing) (this category can also generate successful read auditing)
128+
- Directory Service auditing (this category can also generate successful read auditing)
129+
- [Windows Filtering Platform auditing](/windows/win32/fwp/auditing-and-logging)
130+
- Process detailed activity auditing
131+
132+
> [!NOTE]
133+
> Success auditing is typically very verbose.
134+
135+
### Cause 2: A single transaction generates too many audit events
119136

120137
When the DC's auditing level is set to log an audit event for each successful change, AD DS generates such events for each attribute change. When you change a linked attribute, such as `member`, the change propagates to the other objects that have related attributes. For example, suppose you modify a group object by using commands that resemble the following,
121138

@@ -135,36 +152,19 @@ The default limit on the number of these audit events that the transaction audit
135152
> - [Maximum Number of Accounts per LDAP Transaction](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc756101(v=ws.10)#maximum-number-of-accounts-per-ldap-transaction)
136153
> - [Recommended Maximum Number of Users in a Group](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc756101(v=ws.10)#recommended-maximum-number-of-users-in-a-group)
137154
138-
## Cause 2: The rate at which audit events accumulate is greater than the system can process
139-
140-
AD DS is generating Audit events at a rate that's consistently higher than the rate at which the DC can write them to the log file and purge them from the queue. The queue eventually reaches its maximum size.
141-
142-
The rate at which AD DS generates audit events depends on factors that include the following points:
143-
144-
- How many event sources that you configured for auditing
145-
- The type of auditing (such as success auditing, failure auditing, or successful read auditing). For example, all the following categories of operations can generate failure or success auditing:
146-
147-
- [File system auditing](/windows-hardware/drivers/ifs/auditing) (this category can also generate successful read auditing)
148-
- Directory Service auditing (this category can also generate successful read auditing)
149-
- [Windows Filtering Platform auditing](/windows/win32/fwp/auditing-and-logging)
150-
- Process detailed activity auditing
151-
152-
> [!NOTE]
153-
> Success auditing is typically very verbose.
154-
155155
## Resolution
156156

157157
The specific methods that you use to resolve this issue depend on the cause:
158158

159+
- The rate at which audit events accumulate is greater than the system can process
160+
1. [Reduce the volume of audit events](#method-2-reduce-the-volume-of-audit-events).
161+
1. If step 1 doesn't resolve the issue, consider [increasing the capacity of the transaction audit queue](#method-3-increase-the-capacity-of-the-transaction-audit-queue).
162+
159163
- A single transaction generates too many audit events
160164
1. Consider [reducing the number of operations per transaction](#method-1-reduce-the-number-of-operations-per-transaction).
161165
1. [Reduce the volume of audit events](#method-2-reduce-the-volume-of-audit-events) for the affected operations or objects.
162166
1. If the previous steps aren't practical or effective, [increase the capacity of the transaction audit queue](#method-3-increase-the-capacity-of-the-transaction-audit-queue).
163167

164-
- The rate at which audit events accumulate is greater than the system can process
165-
1. [Reduce the volume of audit events](#method-2-reduce-the-volume-of-audit-events).
166-
1. If step 1 doesn't resolve the issue, consider [increasing the capacity of the transaction audit queue](#method-3-increase-the-capacity-of-the-transaction-audit-queue).
167-
168168
### Method 1: Reduce the number of operations per transaction
169169

170170
If you can change the way that your client application makes requests, or the way that you manage multi-valued and linked attributes, this method might be practical. Modify your client application (or the way you manage attributes) to reduce the maximum number of operations in a single transaction.

0 commit comments

Comments
 (0)