You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/troubleshoot-event-2866-maximum-audit-queue-size.md
+25-25Lines changed: 25 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This article describes several methods to use to fix Event ID 2866, and discusse
19
19
20
20
## Symptoms
21
21
22
-
You're modifying Active Directory Domain Services (AD DS) objects. The domain controller (DC) that you're using to make the changes has audit logging enabled and configured to audit the changes that you're making. The modifications start to fail, and on the DC, the Security log records Event ID 2866. The text of the event resembles the following example:
22
+
You're modifying Active Directory Domain Services (AD DS) objects. The domain controller (DC) that you're using to make the changes has audit logging enabled and configured to audit the changes that you're making. The modifications start to fail, and on the DC, the Security log records Event ID 2866. The event text resembles the following example:
23
23
24
24
```output
25
25
While logging audit events for the following object, the directory service reached the maximum number of audit events that could be cached in memory at any given time. As a result of reaching this limit, the operation was aborted.
@@ -49,9 +49,9 @@ Typically, this event occurs in one of the following two scenarios.
49
49
50
50
### Scenario 1
51
51
52
-
You're making changes to Active Directory Domain Services (AD DS) objects. For example, you're changing the `member` attributes of multiple group objects.
52
+
You're making bulk changes to Active Directory Domain Services (AD DS) objects. These objects have auditing turned on for multiple types of operations.
53
53
54
-
The change operation fails, and the Security log records Event ID 2866, which indicates that the DC ran out of audit queue space.
54
+
The change operation fails, and the Security log records Event ID 2866. This event indicates that the rate at which the changes generated audit events overwhelmed the ability of the transaction audit queue to manage them. As a result, the DC ran out of audit queue space.
55
55
56
56
### Scenario 2
57
57
@@ -115,7 +115,24 @@ The audit events contain information about security-related occurrences such as
115
115
116
116
Under heavy load (for example, during bulk operations), it's possible to generate multiple audit events while still writing the first one to the disk. When the number of audit events reaches the maximum for the queue, operational threads start pausing until their audit event can be inserted into the queue. AD DS logs Event ID 2866 at this point.
117
117
118
-
### Cause 1: A single transaction generates too many audit events
118
+
## Cause 1: The rate at which audit events accumulate is greater than the system can process
119
+
120
+
AD DS is generating Audit events at a rate that's consistently higher than the rate at which the DC can write them to the log file and purge them from the queue. The queue eventually reaches its maximum size.
121
+
122
+
The rate at which AD DS generates audit events depends on factors that include the following points:
123
+
124
+
- How many event sources that you configured for auditing
125
+
- The type of auditing (such as success auditing, failure auditing, or successful read auditing). For example, all the following categories of operations can generate failure or success auditing:
126
+
127
+
-[File system auditing](/windows-hardware/drivers/ifs/auditing) (this category can also generate successful read auditing)
128
+
- Directory Service auditing (this category can also generate successful read auditing)
### Cause 2: A single transaction generates too many audit events
119
136
120
137
When the DC's auditing level is set to log an audit event for each successful change, AD DS generates such events for each attribute change. When you change a linked attribute, such as `member`, the change propagates to the other objects that have related attributes. For example, suppose you modify a group object by using commands that resemble the following,
121
138
@@ -135,36 +152,19 @@ The default limit on the number of these audit events that the transaction audit
135
152
> -[Maximum Number of Accounts per LDAP Transaction](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc756101(v=ws.10)#maximum-number-of-accounts-per-ldap-transaction)
136
153
> -[Recommended Maximum Number of Users in a Group](/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc756101(v=ws.10)#recommended-maximum-number-of-users-in-a-group)
137
154
138
-
## Cause 2: The rate at which audit events accumulate is greater than the system can process
139
-
140
-
AD DS is generating Audit events at a rate that's consistently higher than the rate at which the DC can write them to the log file and purge them from the queue. The queue eventually reaches its maximum size.
141
-
142
-
The rate at which AD DS generates audit events depends on factors that include the following points:
143
-
144
-
- How many event sources that you configured for auditing
145
-
- The type of auditing (such as success auditing, failure auditing, or successful read auditing). For example, all the following categories of operations can generate failure or success auditing:
146
-
147
-
-[File system auditing](/windows-hardware/drivers/ifs/auditing) (this category can also generate successful read auditing)
148
-
- Directory Service auditing (this category can also generate successful read auditing)
The specific methods that you use to resolve this issue depend on the cause:
158
158
159
+
- The rate at which audit events accumulate is greater than the system can process
160
+
1.[Reduce the volume of audit events](#method-2-reduce-the-volume-of-audit-events).
161
+
1. If step 1 doesn't resolve the issue, consider [increasing the capacity of the transaction audit queue](#method-3-increase-the-capacity-of-the-transaction-audit-queue).
162
+
159
163
- A single transaction generates too many audit events
160
164
1. Consider [reducing the number of operations per transaction](#method-1-reduce-the-number-of-operations-per-transaction).
161
165
1.[Reduce the volume of audit events](#method-2-reduce-the-volume-of-audit-events) for the affected operations or objects.
162
166
1. If the previous steps aren't practical or effective, [increase the capacity of the transaction audit queue](#method-3-increase-the-capacity-of-the-transaction-audit-queue).
163
167
164
-
- The rate at which audit events accumulate is greater than the system can process
165
-
1.[Reduce the volume of audit events](#method-2-reduce-the-volume-of-audit-events).
166
-
1. If step 1 doesn't resolve the issue, consider [increasing the capacity of the transaction audit queue](#method-3-increase-the-capacity-of-the-transaction-audit-queue).
167
-
168
168
### Method 1: Reduce the number of operations per transaction
169
169
170
170
If you can change the way that your client application makes requests, or the way that you manage multi-valued and linked attributes, this method might be practical. Modify your client application (or the way you manage attributes) to reduce the maximum number of operations in a single transaction.
0 commit comments