Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products

Troubleshooting Active Directory and DNS Replication

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms


Article Summary: This article provides information on troubleshooting Active Directory and DNS replication.


Table of Contents:

1. Find the Flexible Single Master Operations (FSMO) role holders
2. Narrow down the problem
3. Visually inspect DNS
4. Visually inspect sites and services
5. Use event IDs to narrow troubleshooting
6. Other tools available



 

Issue 1. Find the Flexible Single Master Operations (FSMO) role holders

Begin by finding the domain controllers (DCs) in the organization. Focus on the health of your forest root and work your way out.

Find the FSMO role holders by opening an elevated command prompt and typing:

 netdom query fsmo

 

This will return a list of the DCs holding each role:

 

         SLN156253_en_US__11372348956762.fsmos

 


 

Issue 2. Narrow down the problem

 

To narrow down the problem, it is important to be systematic. Use the following tools to test various DCs, their connection to the root domain or role holder, their ability to resolve names to IP addresses, open ports, and replication results.

Try to pinpoint a specific server that does not communicate and determine if the source or destination server is the cause. Event logs and replication results are ways to gain additional information.

  • dcdiag /v /c /d /e /s: > c:\dcdiag.txt
  • ipconfig /all (from all DCs and DNS servers)
  • repadmin /showrepl (from each DC)
  • repadmin /replsum
  • dcdiag /test:dns /s: /dnsbasic
  • repadmin /syncall /aped
  • Ping each DC by name and verify that the name resolves to the correct IP address.
  • Use nslookup to test DNS across different DCs.
  • Use tracert to test the routes between servers.
  • repadmin /bind servername - Can the DCs bind to each other?

 

Issue 3. Visually inspect DNS


Open the DNS console by going to Start -> Administrative Tools -> DNS. Click the DNS server in the left pane.

Review the forward lookup zones and all other zones related to the forest and domain partitions.

Guidance is available from Microsoft TechNet using this link: Troubleshooting DNS

 

Some things to look for in the DNS console include:

  • Start of authority (properties) - multiple names for servers that do not exist.
  • Records that have incorrect IP addresses.
  • Stale records that have not been deleted.
  • "(Same as parent folder)" host records that do not refer to DCs.
  • Find the start of authority (SOA) and name server (NS) records in the domain forward lookup zone (see image below).
    • Right-click each and select Properties.
    • Verify the name servers and other information are correct.
  • Look in the _msdcs folder.
  • Are there missing entries?

 

SLN156253_en_US__21363225462328.Untitled

You can find more information about the DNS infrastructure from the Microsoft TechNet DNS Server page.

 

 


 

Issue 4. Visually inspect sites and services

 

The Active Directory Sites and Services console contains several items that may help troubleshoot replication failures. Inspect and open every folder and look for the following:

  • Verify subnets have been created and assigned to the correct sites.
  • Ensure that each site object contains the correct servers.
  • Inspect the NTDS settings to verify the replication connections.
  • Verify the server names exist.

 

Issue 5. Use event ID's to narrow troubleshooting

 
AD-related errors can be found in the Event Viewer console. 
The fastest way to get there is to go to Start -> Run and type eventvwr.msc.
Relevant event logs include the System, DNS, Directory Service, and File Replication Service log.

Use the following articles to help determine the next steps, based on errors found in the logs:


 

Issue 6. Other tools available

 

Nltest is a useful command-line tool that can return many kinds of information about an AD domain. 
The metadata cleanup process is used to remove AD references to DCs that were taken offline without being properly demoted.
Lingering objects are AD objects that have been deleted from one DC but remain on another due to a replication failure.
Removing these objects is a necessary step in restoring proper replication.

 

Affected Products

Servers
Article Properties
Article Number: 000178954
Article Type: Solution
Last Modified: 23 Sept 2024
Version:  5
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.