Event Id | 1568 |
Source | Microsoft-Windows-FailoverClustering |
Description | Cluster disk resource '%1' found the disk identifier to be stale. This may be expected if a restore operation was just performed or if this cluster uses replicated storage. The DiskSignature or DiskUniqueIds property for the disk resource has been corrected. |
Event Information | According to Microsoft : Cause : This event is logged when Cluster disk resource found the disk identifier to be stale. Resolution : Confirm disk identifier After the cluster software automatically corrects the DiskSignature or DiskUniqueIds property (after a disk has been restored, or in a cluster that uses replicated storage), no action is necessary. However, it can be appropriate to check the storage configuration. If you do not currently have Event Viewer open, see "Opening Event Viewer and viewing events related to failover clustering." To perform the following procedure, you must be a member of the local Administrators group on each clustered server, and the account you use must be a domain account, or you must have been delegated the equivalent authority. Opening Event Viewer and viewing events related to failover clustering To open Event Viewer and view events related to failover clustering:
Confirm that the disk resource can come online. If there have been recent problems with writing to the disk, it can be appropriate to monitor event logs and monitor the function of the corresponding clustered service or application, to confirm that the problems have been resolved. To perform the following procedures, you must be a member of the local Administrators group on each clustered server, and the account you use must be a domain account, or you must have been delegated the equivalent authority. Confirming that a disk resource can come online To confirm that a disk resource can come online:
To use a command to check the status of a resource in a failover cluster:
|
Reference Links | Event ID 1568 from Microsoft-Windows-FailoverClustering |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.