Solved

Re-named AD Site -- manually delete DNS entries ?

Posted on 2011-03-21
6
1,464 Views
Last Modified: 2012-05-11
I just re-named an AD site and it seemingly went fine.

However, in AD-DNS I still have both entries for the old site name and  the newly re-named site name.

Do I have to manually delete old dns entries for the old site name?

It shows up in:

_msdcs -> dc ->  _sites
_msdcs -> gc -> _sites
_sites
DomainDNSZones -> _sites
ForestDNSZones -> _sites



thanks
0
Comment
Question by:jarak08
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 8

Accepted Solution

by:
ActiveDirectoryman earned 500 total points
ID: 35183126

It should update in the background. This change will be done automatically.  the new should be written to dns and replicate to your other dns servers.

I would wait for replication to complete. if you still have problems check out this article:

You may experience problems when you rename sites in the Active Directory forest
http://support.microsoft.com/kb/920718
0
 

Author Comment

by:jarak08
ID: 35185218
Hmmm.  The old site DNS records are still there (7 hours later)...

 I even tried:

nltest /dsregdns
Flags: 0
Connection Status = 0 0x0 NERR_Success
The command completed successfully

but I still have the old site info in DNS

btw, i'm running W2008 R2 std.
0
 
LVL 8

Assisted Solution

by:ActiveDirectoryman
ActiveDirectoryman earned 500 total points
ID: 35185628

if the new records have been created dns scavenging sould take care of the stale records.   Do you have dns scavenging enabled on your dns servers ?  if you do the records will be removed according to refresh and no referesh interval you have set on the server.  check to see if you have scavenging enabled on your server and your dns zones.

dns scavenging
http://technet.microsoft.com/en-us/library/cc755716(WS.10).aspx
0
Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

 

Author Comment

by:jarak08
ID: 35190596
Yes, I do have scavenging enabled. The next scheduled time is two days from today.  I just checked the properties and the records should be deleted on the next scavenging cycle.  I guess I'll just be patient and wait to see if it cleans up correctly.

Can I keep this question open for a couple of days while I'm waiting?  I hope so.

thx.
0
 
LVL 8

Expert Comment

by:ActiveDirectoryman
ID: 35190732
sure
0
 

Author Comment

by:jarak08
ID: 35232937
old site info was cleaned up from dns.

thx.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question