Solved

how can make for one of my 2 DC(domain controler) are CG when my 2 dc not have this role ?

Posted on 2011-09-19
4
333 Views
Last Modified: 2012-06-21
hello
after crash server My Principal DC without backup can't be recreated.
I have forced the promot of my DC 2 and after I have remake new server with new DC 1.
I have after repromot my dc1
but my probleme now is : I not have DC with CG
you can see information and role of my dc here :
C:\DOCUME~1\ADMINI~1>nltest /dsgetdc:sup.local /server:LA-ARN6SZYTMTUJ
           DC: \\LA-ARN6SZYTMTUJ.sup.local
      Address: \\192.168.0.40
     Dom Guid: 2617fa9c-2b5a-4702-be87-7611f1a6a08e
     Dom Name: sup.local
  Forest Name: sup.local
 Dc Site Name: Default-First-Site
Our Site Name: Default-First-Site
        Flags: PDC DS LDAP KDC TIMESERV WRITABLE DNS_DC DNS_DOMAIN DNS_FOREST CLOSE_SITE
The command completed successfully

C:\DOCUME~1\ADMINI~1>nltest /dsgetdc:sup.local /server:MGF-WNC1HNL0OYU
           DC: \\mgf-wnc1hnl0oyu.sup.local
      Address: \\192.168.0.14
     Dom Guid: 2617fa9c-2b5a-4702-be87-7611f1a6a08e
     Dom Name: sup.local
  Forest Name: sup.local
 Dc Site Name: Default-First-Site
Our Site Name: Default-First-Site
        Flags: DS LDAP KDC TIMESERV GTIMESERV WRITABLE DNS_DC DNS_DOMAIN DNS_FOREST CLOSE_SITE
The command completed successfully

Open in new window

My DC1 is : LA-ARN6SZYTMTUJ

My question is how I can make for LA-ARN6SZYTMTUJ are CG ?


0
Comment
Question by:thierry91
  • 2
  • 2
4 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 36561668
Go into sites and services and check the GC box   http://www.petri.co.il/configure_a_new_global_catalog.htm

In a single domain a GC doesn't play a big role.

Thanks

Mike
0
 
LVL 1

Author Comment

by:thierry91
ID: 36563228
now I have new error. before Add role GC I not have this errors :
LA-ARN6SZYTMTUJ failed test KnowsOfRoleHolders
and this other error :

      Starting test: KnowsOfRoleHolders
         Role Schema Owner = CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Warning: CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local is the Schema Owner, but is deleted.
         Role Domain Owner = CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Warning: CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local is the Domain Owner, but is deleted.
         Role PDC Owner = CN=NTDS Settings,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Role Rid Owner = CN=NTDS Settings,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=MGF-WNC1HNL0OYU,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         ......................... LA-ARN6SZYTMTUJ failed test KnowsOfRoleHolders

Open in new window


and :
      Starting test: KnowsOfRoleHolders
         Role Schema Owner = CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Warning: CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local is the Schema Owner, but is deleted.
         Role Domain Owner = CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Warning: CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local is the Domain Owner, but is deleted.
         Role PDC Owner = CN=NTDS Settings,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Role Rid Owner = CN=NTDS Settings,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=MGF-WNC1HNL0OYU,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         ......................... LA-ARN6SZYTMTUJ failed test KnowsOfRoleHolders

Open in new window

you know why ?
0
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 500 total points
ID: 36563269
You need to seize the FSMO roles    http://www.petri.co.il/seizing_fsmo_roles.htm

Run a metadata cleanup for that old "dead/crashed dc"   http://www.petri.co.il/delete_failed_dcs_from_ad.htm


Don't bring the dead one online again.

Thanks

Mike
0
 
LVL 1

Author Comment

by:thierry91
ID: 36563276
now I have new error. before Add role GC I not have this errors :
LA-ARN6SZYTMTUJ failed test KnowsOfRoleHolders
and this other error :

      Starting test: KnowsOfRoleHolders
         Role Schema Owner = CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Warning: CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local is the Schema Owner, but is deleted.
         Role Domain Owner = CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Warning: CN=NTDS Settings\0ADEL:de85d158-44cf-4128-87b6-3428d958d59a,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local is the Domain Owner, but is deleted.
         Role PDC Owner = CN=NTDS Settings,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Role Rid Owner = CN=NTDS Settings,CN=LA-ARN6SZYTMTUJ,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         Role Infrastructure Update Owner = CN=NTDS Settings,CN=MGF-WNC1HNL0OYU,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=sup,DC=local
         ......................... LA-ARN6SZYTMTUJ failed test KnowsOfRoleHolders

Open in new window


and :

   Starting test: systemlog
         * The System Event log test
         An Error Event occured.  EventID: 0xC0002719
            Time Generated: 09/19/2011   21:31:17
            (Event String could not be retrieved)
         An Error Event occured.  EventID: 0xC0002719
            Time Generated: 09/19/2011   21:32:05
            (Event String could not be retrieved)
         An Error Event occured.  EventID: 0xC0002719
            Time Generated: 09/19/2011   21:32:52
            (Event String could not be retrieved)
         ......................... LA-ARN6SZYTMTUJ failed test systemlog

Open in new window

0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A quick step-by-step overview of installing and configuring Carbonite Server Backup.
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question