Solved

Syntax for repadmin /delete

Posted on 2007-12-04
2
2,976 Views
Last Modified: 2008-05-30
I had a second domain controller and demoted it. now when I tried to add a new user in AD  I get:
The directory service was unable to allocate a relative identifier.

I run readmin /showreps I get:

Default-First-Site-Name\LACOFS1
DC Options: IS_GC
Site Options: (none)
DC object GUID: f3f5033b-21c2-4a69-8945-253e50cb8fe6
DC invocationID: 938799eb-0078-46ae-a4d3-8dfa2defaa22

==== INBOUND NEIGHBORS ======================================

DC=laco,DC=local
    Default-First-Site-Name\LACOTEMPDC via RPC
        DC object GUID: 49d5eb0a-cdce-4224-988e-97fb68dcfb23
        Last attempt @ 2007-12-04 06:59:43 failed, result 8524 (0x214c):
            The DSA operation is unable to proceed because of a DNS lookup failu
re.
        633 consecutive failure(s).
        Last success @ 2007-10-08 13:31:50.

CN=Configuration,DC=laco,DC=local
    Default-First-Site-Name\LACOTEMPDC via RPC
        DC object GUID: 49d5eb0a-cdce-4224-988e-97fb68dcfb23
        Last attempt @ 2007-12-04 06:59:46 failed, result 8524 (0x214c):
            The DSA operation is unable to proceed because of a DNS lookup failu
re.
        633 consecutive failure(s).
        Last success @ 2007-10-08 13:29:58.

CN=Schema,CN=Configuration,DC=laco,DC=local
    Default-First-Site-Name\LACOTEMPDC via RPC
        DC object GUID: 49d5eb0a-cdce-4224-988e-97fb68dcfb23
        Last attempt @ 2007-12-04 06:59:48 failed, result 8524 (0x214c):
            The DSA operation is unable to proceed because of a DNS lookup failu
re.
        633 consecutive failure(s).
        Last success @ 2007-10-08 12:54:24.

DC=DomainDnsZones,DC=laco,DC=local
    Default-First-Site-Name\LACOTEMPDC via RPC
        DC object GUID: 49d5eb0a-cdce-4224-988e-97fb68dcfb23
        Last attempt @ 2007-12-04 06:59:43 failed, result 1256 (0x4e8):
            The remote system is not available. For information about network tr
oubleshooting, see Windows Help.
        633 consecutive failure(s).
        Last success @ 2007-10-08 12:54:24.

DC=ForestDnsZones,DC=laco,DC=local
    Default-First-Site-Name\LACOTEMPDC via RPC
        DC object GUID: 49d5eb0a-cdce-4224-988e-97fb68dcfb23
        Last attempt @ 2007-12-04 06:59:43 failed, result 1256 (0x4e8):
The question is I am trying to use repadmin /delete but the example is:
repadmin /delete CN=Schema,CN=Configuration,DC=contoso,DC=com DC01 97c68f88-3864-4a12-9962-ca389937e237._msdcs.contoso.com /localonly

What is DC=com DC01? When I try DC=local or DC=LACOTEMPDC I get:
Unknown option "DC=local"

Any help would be greatly appreciated.

0
Comment
Question by:ckocndra
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 51

Accepted Solution

by:
Netman66 earned 500 total points
ID: 20404210
Sounds like that DC held the RID Master roles.

Find all 5 FSMO roles so you know what you're missing.
Seize the missing roles.
Use a Metadata cleanup to get rid of the old DC.
Check/delete any instance of the old server from DNS, AD Sites and Services and AD itself (if you find any).

http://support.microsoft.com/kb/255504
http://support.microsoft.com/kb/216498
0
 

Author Comment

by:ckocndra
ID: 20408058
Thanks!!!
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today it’s fairly well known that high-performing websites and applications bring in more visitors, higher SEO, and ultimately more sales. By the same token, downtime is disastrous for companies and can lead to major hits on a brand, reputation, an…
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question