G
Guest
Hello all,
Our developers are utilizing AD to provide authentication for a product
called COGNOS. It has been configured to point to one of our Global Catalog
servers. When a user logs in through the COGNOS reporting interface, the
LSASS.EXE on the GC spikes to 99% and will either remain for a few seconds
for some accounts, or will hang indefinitely at 99% CPU. It has caused me
on two occasions to have to reboot the server. Is there a way I can prevent
this from happening while still allowing COGNOS to perform its LDAP
functions against the Global Catalog? Specifically, can I find out via any
of the logs (security didn't provide much of anything) who is doing the
querying, how to determine why the LDAP response time is slow, and why the
query/login methodology is causing LSASS.EXE to spike? Is it how the query
is coded? Should I turn of the logging on the GC?
Thanks.
Our developers are utilizing AD to provide authentication for a product
called COGNOS. It has been configured to point to one of our Global Catalog
servers. When a user logs in through the COGNOS reporting interface, the
LSASS.EXE on the GC spikes to 99% and will either remain for a few seconds
for some accounts, or will hang indefinitely at 99% CPU. It has caused me
on two occasions to have to reboot the server. Is there a way I can prevent
this from happening while still allowing COGNOS to perform its LDAP
functions against the Global Catalog? Specifically, can I find out via any
of the logs (security didn't provide much of anything) who is doing the
querying, how to determine why the LDAP response time is slow, and why the
query/login methodology is causing LSASS.EXE to spike? Is it how the query
is coded? Should I turn of the logging on the GC?
Thanks.