Microsoft Windows: Error 1988 Appears in the Directory Service event log of an Active Directory domain controller

Summary: Error 1988 may appear in the Directory Service event log of an Active Directory (AD) domain controller (DC). This error indicates that AD replication failed because at least one lingering object is detected on a partner domain controller. This article discusses the causes of lingering objects and tells how to remove them. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Error 1988 appears in the Directory Service event log of a domain controller (DC):
 
Active Directory Domain Services Replication encountered the existence of objects in the following partition that have been deleted from the local domain controllers (DCs) Active Directory Domain Services database. Not all direct or transitive replication partners replicated in the deletion before the tombstone lifetime number of days passed. Objects that have been deleted and garbage collected from an Active Directory Domain Services partition but still exist in the writable partitions of other DCs in the same domain, or read-only partitions of global catalog servers in other domains in the forest are known as "lingering objects."

Further text in the event description indicates the source DC, the lingering object that is detected, and a recommended course of action. The full event description is long.

Other warnings and errors may appear in the Directory Service event log of an affected DC.

Cause

Lingering objects are deleted and garbage collected from the AD database on a DC but still exist on at least one other DC. This occurs as a result of persistent replication failure between DCs, as shown in the following example.

Suppose that there are three DCs in a domain; DC1, DC2, and DC3. Strict replication consistency is enabled on all three DCs, but all three are allowed to replicate with divergent partners. (See below for more information about these concepts.) Their AD databases are synchronized. The following events then occur in chronological order:
  1. DC1 is taken offline, either deliberately or by some sort of malfunction.
  2. A preexisting object with the name User1 is deleted on DC2. DC3 replicates the deletion from DC2 as a tombstone object. DC1 remains offline and does not receive the tombstone object.
  3. The tombstone lifetime (TSL) passes, and DC1 remains offline. The User1 tombstone object is permanently deleted ("garbage collected") from DC2 and DC3. User1 no longer exists on these two DCs.
  4. DC1 is brought online. It contains a lingering object (User1), although this has no effect for now.
  5. An edit is made to an attribute of User1 on DC1.
  6. DC2 and DC3 are notified of a change (the edit to User1).
  7. When DC2 and DC3 attempt to replicate the changes from DC1, they do each discover that User1 does not exist in their local databases.
  8. The replication attempt from DC1 is prevented on DC2 and DC3, and error 1988 is logged in their Directory Service event logs.
The DC with error 1988 is not the DC that contains lingering objects. The error indicates that lingering objects are detected on one of its replication partners. A DC with this error does not replicate AD data from the partner DC indicated in the error but may still replicate from other partners.

This error implies that strict replication consistency is enabled on the local DC, since the attempted replication does not occur. Strict replication consistency is enabled by default. It is intended to detect lingering objects and prevent them from being reintroduced into the domain after deletion.

The error also implies that divergent replication is enabled. When this is enabled, a DC may replicate from a partner that is unreachable for longer than the TSL of the forest. Divergent replication is not enabled by default, but an administrator may enable it manually.

Resolution

Attempting to resolve the issue by disabling strict replication consistency is not recommended. This allows lingering objects to replicate, potentially reintroducing permanently deleted objects into the domain.

Instead, lingering objects should be removed from the DCs on which they exist. The event description of error 1988 contains instructions for removing them using repadmin commands. However, these commands can be cumbersome, as the Globally Unique Identifier (GUID) of at least one DC must be known. Further, only one naming context can be scanned at a time. Microsoft has published a tool, the Lingering Object Liquidator (LOL) This hyperlink is taking you to a website outside of Dell Technologies., that greatly simplifies this process. It provides a graphical interface for locating and removing lingering objects throughout an AD forest.

The link above provides an overview of the tool, its requirements, and a link to its download page. The following walkthrough assumes the LOL and its prerequisites are already installed on a DC.

  1. Ensure that the Remote event log Management (RPC) firewall rule is enabled on all DCs that are scanned.
  2. Launch the LOL.
  3. Click Detect AD Topology. The tool gathers information about the DCs in the AD forest.
  4. From the Naming Context dropdown, select the naming context in which one or more lingering objects exist. This is obtained from the description of error 1988. Alternatively, select [Scan All NCs] to scan all naming contexts for lingering objects.
  5. From the Reference DC dropdown, select the DC which has error 1988 in its Directory Service log.
  6. From the Target DC dropdown, select a DC which contains lingering objects. This is determined from the description of error 1988, but it mentions the source DC by its hexadecimal GUID rather than its name. You may select each replication partner of the reference DC in turn.
  7. Once a reference DC and target DC are chosen, click Detect Lingering Objects. All lingering objects detected are listed and automatically selected in the upper pane. A log of the scan is produced in the lower pane and written to a file. If no lingering objects are detected, check the firewall rule in step 1.
  8. If any lingering objects are not removed, clear them.
  9. Click Remove Selected Lingering Objects. All selected lingering objects are removed.
  10. Perform further scans as needed.
IMPORTANT: When all lingering objects are removed, force replication between the DCs again and confirm its success. Once all DCs have converged, run the following command on one of them to disable divergent replication on all of them. This prevents DCs from replicating with partners that are unreachable for longer than the TSL.
repadmin /regkey * -allowdivergent

Affected Products

Microsoft Windows Server 2016, Microsoft Windows Server 2019, Microsoft Windows Server 2022, Microsoft Windows 2008 Server R2, Microsoft Windows 2012 Server, Microsoft Windows 2012 Server R2
Article Properties
Article Number: 000218612
Article Type: Solution
Last Modified: 19 Dec 2024
Version:  5
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.