Home
%3CLINGO-SUB%20id%3D%22lingo-sub-386021%22%20slang%3D%22en-US%22%3EFailover%20Detection%20Utility%20-%20Availability%20Group%20Failover%20Analysis%20Made%20Easy%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-386021%22%20slang%3D%22en-US%22%3E%0A%20%26lt%3Bmeta%20http-equiv%3D%22Content-Type%22%20content%3D%22text%2Fhtml%3B%20charset%3DUTF-8%22%20%2F%26gt%3B%3CSTRONG%3EFirst%20published%20on%20MSDN%20on%20Nov%2019%2C%202018%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20To%20analyze%20the%20root%20cause%20for%20the%20failover%20of%20an%20Availability%20group%2C%20users%20are%20required%20to%20perform%20coordinated%20analysis%20of%20various%20logs%20including%20the%20Cluster%20Logs%2C%20SQL%20Error%20Logs%2C%20and%20the%20Availability%20groups%20extended%20events%20logs.%20This%20coordinated%20analysis%20of%20the%20logs%20can%20be%20difficult%20and%20requires%20extensive%20knowledge%20of%20the%20internals%20and%20the%20various%20logs%20associated%20with%20Availability%20Groups.%20The%20failover%20detection%20utility%20is%20meant%20to%20make%20this%20analysis%20easier%20and%20provide%20a%20quick%20root%20cause%20analysis%20for%20the%20unexpected%20failovers%20and%2For%20failed%20failovers.%20The%20failover%20detection%20utility%20currently%20only%20supports%20analysis%20of%20Availability%20groups%20on%20Windows.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CSTRONG%3EFailover%20Detection%20Utility%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20The%20failover%20detection%20utility%20can%20be%20downloaded%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FMicrosoft%2Ftigertoolbox%2Ftree%2Fmaster%2FAlways-On%2FFailoverDetection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20here%20%3C%2FA%3E%20.%20The%20download%20consists%20of%20the%20following%20files.%20%3CBR%20%2F%3E%3COL%3E%3CBR%20%2F%3E%3CLI%3EFailoverDetector.exe%20%E2%80%93%20The%20Failover%20analysis%20utility.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EConfiguration.json%20%E2%80%93%20The%20configuration%20file%20for%20the%20failover%20analysis%20utility.%20The%20file%20consists%20of%20the%20following%20fields.%20%3CBR%20%2F%3E%20%7B%20%3CBR%20%2F%3E%20%22Data%20Source%20Path%22%3A%20%22F%3A%5C%5CDataLocation%5C%5CData%22%2C%20%3CBR%20%2F%3E%20%22Health%20Level%22%3A%203%2C%20%3CBR%20%2F%3E%20%22Instances%22%3A%20%3CBR%20%2F%3E%20%5B%20%3CBR%20%2F%3E%20%22Replica1%22%2C%20%3CBR%20%2F%3E%20%22Replica2%22%2C%20%3CBR%20%2F%3E%20%22Replica3%22%20%3CBR%20%2F%3E%20%5D%20%3CBR%20%2F%3E%20%7D%20%3CBR%20%2F%3E%20%3CEM%3E%20%3CSTRONG%3E%20Data%20Source%20Path%20%3C%2FSTRONG%3E%20%3C%2FEM%3E%20%E2%80%93%20Location%20for%20the%20Logs%20from%20the%20different%20replicas%20in%20the%20Availability%20Group.%20%3CBR%20%2F%3E%20%3CEM%3E%3CSTRONG%3EHealth%20Level%20%3C%2FSTRONG%3E%20%3C%2FEM%3E%20%E2%80%93%20The%20failover%20policy%20level%20configured%20for%20the%20availability%20group.%20More%20information%20on%20the%20different%20failover%20conditions%20can%20be%20found%20here.%20%3CBR%20%2F%3E%20%3CEM%3E%3CSTRONG%3EInstance%20%3C%2FSTRONG%3E%20%3C%2FEM%3E%20%E2%80%93%20The%20list%20of%20replicas%20in%20the%20availability%20groups.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ESupporting%20DLL%E2%80%99s%20%E2%80%93%20Supporting%20DLLs%20for%20the%20Failover%20analysis%20utility.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EData%20and%20Reports%20Folders%20%E2%80%93%20The%20Data%20and%20Analysis%20reports%20folders.%3C%2FLI%3E%3CBR%20%2F%3E%3C%2FOL%3E%3CBR%20%2F%3E%20%3CSTRONG%3EPreparing%20for%20Failover%20Analysis%20with%20the%20Failover%20Detection%20Utility%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20The%20first%20step%20in%20using%20the%20utility%20is%20to%20configure%20the%20configuration.json%20file%20to%20include%20the%20location%20of%20the%20data%20files%20and%20the%20details%20of%20the%20availability%20group%20for%20which%20analysis%20is%20being%20done.%20For%20a%20correct%20analysis%2C%20all%20replicas%20in%20the%20availability%20groups%20needs%20to%20be%20listed%20in%20the%20configuration%20file.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20The%20next%20step%20is%20to%20capture%20the%20various%20logs%20from%20each%20of%20the%20replicas%20and%20add%20those%20under%20the%20data%20folder.%20The%20following%20files%20are%20required%20for%20the%20analysis.%20%3CBR%20%2F%3E%3CUL%3E%3CBR%20%2F%3E%3CLI%3ESQL%20error%20logs%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EAlways%20On%20Availability%20Groups%20Extended%20Event%20Logs%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ESystem%20Health%20Extended%20Event%20Logs%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ESystem%20log%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EWindows%20cluster%20log%3C%2FLI%3E%3CBR%20%2F%3E%3C%2FUL%3E%3CBR%20%2F%3E%20The%20first%20three%20categories%20of%20logs%20can%20be%20found%20in%20the%20LOG%20folder%20of%20the%20SQL%20instance%20installation%20path.%20For%20example%2C%20if%20you%20have%20a%20SQL%20Server%202017%20instance%20named%20%22SQL17RTM01%22%20and%20If%20the%20installation%20path%20is%20on%20C%20drive%2C%20you%20will%20find%20the%20above%20three%20categories%20of%20logs%20under%20%22C%3A%5CProgram%20Files%5CMicrosoft%20SQL%20Server%5CMSSQL14.SQL17RTM01%5CMSSQL%5CLog%22%2C%20and%20copy%20all%20AlwaysOn%20XEvent%2C%20System%20Health%20XEvent%20and%20SQL%20ERRORLOG%20files.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20The%20last%20two%20categories%20of%20logs%20can%20be%20found.%20You%20can%20use%20commands%20mentioned%20below%20to%20collect%20these%20logs.%20%3CBR%20%2F%3E%3CP%3E%3CEM%3E%20Get-ClusterLog%20-Node%20%24server.ComputerNamePhysicalNetBIOS%20-Destination%20%24server.ErrorLogPath%20%3C%2FEM%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CEM%3E%20Get-Eventlog%20-ComputerName%20%24server.ComputerNamePhysicalNetBIOS%20-LogName%20System%20%7C%20Export-CSV%20-Path%20%24SystemLogExportPath%20%3C%2FEM%3E%3C%2FP%3E%3CBR%20%2F%3E%20%3CSTRONG%3EOrganizing%20the%20files%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20The%20log%20files%20collected%20in%20the%20previous%20step%20should%20be%20placed%20in%20a%20folder%20with%20correct%20subfolder%20structure.%20This%20folder%20should%20be%20the%20folder%20path%20specified%20in%20the%20%22Data%20Source%20Path%22%20section%20of%20the%20configuration%20file%20%22Configuration.json%22.%20The%20following%20is%20an%20example%20of%20the%20subfolder%20structure%2C%20assuming%20there%20are%20two%20replicas%20(instances)%20in%20the%20AG.%20One%20is%20%22Replica1%22%20and%20another%20one%20is%20%22Replica2%22.%20%3CBR%20%2F%3E%3CP%3E%C2%A6%20%2B---Data%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%2B---Replica1%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20AlwaysOn_health_0_131532583880140000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20AlwaysOn_health_0_131532634780070000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20AlwaysOn_health_0_131532680183890000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20AlwaysOn_health_0_131532701164380000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20ERRORLOG%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20ERRORLOG.1%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20ERRORLOG.2%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20ERRORLOG.3%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20SQLDUMPER_ERRORLOG.log%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20system_health_0_131532583879830000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20system_health_0_131532634779760000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20system_health_0_131532680183430000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20system_health_0_131532701164070000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20Replica1_system.log%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%20Replica1_cluster.log%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%C2%A6%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20%2B---Replica2%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20AlwaysOn_health_0_131532571347210000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20AlwaysOn_health_0_131532578226200000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20AlwaysOn_health_0_131532586348180000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20AlwaysOn_health_0_131532725682240000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20ERRORLOG%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20ERRORLOG.1%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20ERRORLOG.2%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20ERRORLOG.3%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20ERRORLOG.4%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20ERRORLOG.5%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20ERRORLOG.6%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20system_health_0_131532571346430000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20system_health_0_131532578225950000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20system_health_0_131532586347860000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20system_health_0_131532725681930000.xel%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20Replica2_system.csv%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%A6%20Replica2_cluster.log%3C%2FP%3E%3CBR%20%2F%3E%20%3CSTRONG%3EExecuting%20the%20Utility%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20The%20FailoverDetection.exe%20can%20be%20executed%20with%20the%20following%20flags%20(or%20default%20mode%20without%20any%20flags)%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CSTRONG%3E%20Default%20Mode%20(No%20execution%20flags%20defined)%20-%20%3C%2FSTRONG%3E%20In%20the%20default%20mode%2C%20where%20no%20parameters%20are%20passed%20to%20the%20utility%2C%20the%20analysis%20tool%20will%20load%20the%20configuration%20file%2C%20copy%20log%20data%20from%20data%20source%20path%20to%20local%20workspace%20data%20folder%2C%20examine%20the%20files%20with%20the%20configuration%20settings%2C%20perform%20the%20analysis%2C%20and%20write%20the%20analysis%20result%20to%20a%20JSON%20report%20file.%20User%20should%20make%20sure%20the%20execution%20credential%20running%20tool%20has%20access%20to%20share%20folder%20defined%20in%20Configuration.json.%20When%20tool%20runs%20into%20access%20denial%20issues%20or%20the%20directory%20does%20not%20exist%2C%20the%20tool%20will%20exit%20with%20proper%20error%20message.%20After%20the%20tool%20copies%20the%20log%20files%20to%20the%20local%20tool%20directory%2C%20it%20scans%20the%20local%20data%20folder%20and%20compare%20with%20the%20AG%20configuration%20in%20Configuration.json.%20If%20it%20finds%20log%20data%20is%20not%20complete%2C%20the%20tool%20will%20show%20which%20files%20are%20missing.%20The%20tool%20will%20also%20alert%20the%20user%20that%20the%20failover%20root%20cause%20might%20not%20be%20properly%20identified%20due%20to%20missing%20files.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20If%20analysis%20is%20successful%2C%20the%20utility%20persists%20the%20analysis%20result%20report%20as%20JSON%20file%20in%20Result%20directory.%20Analysis%20result%20will%20NOT%20be%20presented%20on%20the%20console%2C%20unless%20the%20%22--Show%22%20parameter%20is%20specified.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CSTRONG%3E--Analyze%20-%20%3C%2FSTRONG%3E%20When%20%22--Analyze%22%20is%20specified%20as%20a%20parameter%2C%20the%20utility%20will%20load%20configuration%20file%20without%20copying%20log%20data.%20It%20assumes%20the%20log%20files%20have%20already%20been%20copied%20over.%20It%20does%20everything%20as%20default%20mode%20except%20copying%20log%20data.%20This%20option%20is%20useful%20if%20you%20already%20have%20the%20data%20in%20the%20local%20tool%20execution%20subdirectories%20and%20want%20to%20rerun%20the%20analysis.%20%3CSTRONG%3E%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20-%20%3CSTRONG%3E%20-Show%20%3C%2FSTRONG%3E%20-The%20utility%20after%20analyzing%20log%20data%20will%20display%20the%20results%20in%20the%20command%20console.%20Additionally%2C%20the%20results%20will%20be%20persisted%20to%20a%20JSON%20file%20in%20the%20results%20folder.%20%3CSTRONG%3E%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CSTRONG%3ECurrently%20supported%20failover%20root%20causes%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20The%20tool%20in%20current%20form%20can%20analyze%20and%20report%20failover%20reason%20if%20a%20failover%20is%20due%20to%20the%20following%20causes.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CSTRONG%3E%20Planned%20Failovers%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CUL%3E%3CBR%20%2F%3E%3CLI%3EStopping%20SQL%20service%3A%20Admin%20or%20other%20process%20gracefully%20shuts%20down%20SQL%20Server%20hosting%20the%20AG%20primary.%20In%20this%20case%2C%20if%20automatic%20failover%20is%20enabled%2C%20Windows%20notifies%20WSFC%20to%20initiate%20a%20failover%20and%20picks%20one%20secondary%20as%20new%20primary.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EShutting%20down%20Windows%20Server%3A%20The%20Windows%20Server%20which%20hosts%20the%20SQL%20Server%20that%20has%20the%20primary%20replica%20is%20shut%20down%20or%20restarted.%20In%20this%20case%2C%20if%20automatic%20failover%20is%20enabled%2C%20Windows%20notifies%20WSFC%20to%20initiate%20a%20failover%20and%20picks%20one%20secondary%20as%20new%20primary.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EManual%20failover%3A%20An%20administrator%20performs%20a%20manual%20failover%20through%20Management%20Studio%20or%20through%20a%20direct%20Transact-SQL%20statement%20%22ALTER%20AVAILABILITY%20GROUP%20%3CAG%20name%3D%22%22%3E%20FAILOVER%22%20or%20%22ALTER%20AVAILABILITY%20GROUP%20%3CAG%20name%3D%22%22%3E%20FAILOVER%20WITH%20DATA_LOSS%22%20on%20the%20secondary%20replica%20that%20will%20become%20the%20primary%20replica.%3C%2FAG%3E%3C%2FAG%3E%3C%2FLI%3E%3CBR%20%2F%3E%3C%2FUL%3E%3CBR%20%2F%3E%20%3CSTRONG%3E%20SQL%20Service%20Internal%20Health%20Issue%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CUL%3E%3CBR%20%2F%3E%3CLI%3EToo%20many%20memory%20dumps%20generated%20on%20the%20SQL%20Server%20hosting%20the%20primary%20replica%3A%20There%20are%20more%20than%20100%20SQL%20Server%20dumps%20on%20the%20primary%20replica%20since%20the%20last%20SQL%20Server%20restart%2C%20and%20there%20is%20at%20least%20one%20dump%20in%20the%20last%2010%20seconds.%20In%20this%20case%2C%20sp_server_diagnostics%20running%20in%20SQL%20Server%20determines%20that%20SQL%20Server%20system%20component%20is%20in%20error%20state%20and%20notifies%20failover%20WSFC%20to%20initiate%20a%20failover.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EMemory%20scribbler%3A%20SQL%20Server%20has%20a%20write%20access%20violation%20and%20the%20write%20address%20is%20more%20than%2064KB.%20If%20there%20are%20more%20than%20three%20such%20memory%20corruptions%20since%20SQL%20Server%20was%20started%2C%20sp_server_diagnostics%20running%20in%20SQL%20Server%20determines%20that%20SQL%20Server%20system%20component%20is%20in%20error%20state%20and%20notifies%20failover%20WSFC%20to%20initiate%20a%20failover.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ESick%20Spinlock%3A%20After%20an%20access%20violation%2C%20a%20spinlock%20is%20marked%20as%20sick%20if%20it%20backs%20off%20more%20than%20three%20times%2C%20which%20is%20the%20threshold.%20In%20this%20case%2C%20sp_server_diagnostics%20running%20in%20SQL%20Server%20determines%20that%20SQL%20Server%20system%20component%20is%20in%20error%20state%20and%20notifies%20failover%20WSFC%20to%20initiate%20a%20failover.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EOut%20of%20Memory%3A%20If%20no%20memory%20has%20been%20freed%20in%202%20minutes%2C%20sp_server_diagnostics%20running%20in%20SQL%20Server%20determines%20that%20SQL%20Server%20system%20component%20is%20in%20error%20state%20and%20notifies%20failover%20WSFC%20to%20initiate%20a%20failover.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EUnresolved%20deadlock%3A%20If%20sp_server_diagnostics%20detects%20unresolved%20deadlock%20from%20query%20processing%20component%2C%20it%20determines%20that%20SQL%20Server%20system%20component%20is%20in%20error%20state%20and%20notifies%20failover%20WSFC%20to%20initiate%20a%20failover.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EDeadlocked%20scheduler%3A%20If%20sp_server_diagnostics%20detects%20deadlocked%20schedulers%20from%20query%20processing%20component%2C%20it%20determines%20that%20SQL%20Server%20system%20component%20is%20in%20error%20state%20and%20notifies%20failover%20WSFC%20to%20initiate%20a%20failover.%3C%2FLI%3E%3CBR%20%2F%3E%3C%2FUL%3E%3CBR%20%2F%3E%20%3CSTRONG%3E%20System%20Wide%20Issues%20%3CBR%20%2F%3E%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CUL%3E%3CBR%20%2F%3E%3CLI%3EUnexpected%20crash%3A%20SQL%20Server%20service%20was%20shut%20down%20unexpectedly.%20Resources%20host%20service%20(rhs.exe)%20does%20not%20detect%20lease%20check%20from%20SQL%20Server%20about%20availability%20group%20lease.%20This%20results%20an%20AG%20lease%20timeout%20signal%20to%20WSFC%20and%20WSFC%20will%20initiate%20a%20failover.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ELong%20dump%3A%20SQL%20Server%20is%20creating%20a%20dump%20file.%20During%20the%20process%2C%20threads%20handling%20the%20AG%20lease%20are%20frozen%20and%20which%20may%20result%20in%20a%20lease%20timeout.%20This%20results%20an%20AG%20lease%20timeout%20signal%20to%20WSFC%20and%20WSFC%20will%20initiate%20a%20failover%20if%20automatic%20failover%20is%20enabled.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EQuorum%20loss%3A%20AG%20resource%20is%20brought%20offline%20because%20quorum%20is%20lost.%20This%20could%20be%20because%20of%20a%20plethora%20of%20issues%2C%20which%20would%20need%20to%20be%20determined%20by%20a%20closure%20examination%20of%20the%20cluster%20logs.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ENetwork%20interface%20failure%3A%20Network%20interface%20used%20to%20communicate%20between%20cluster%20nodes%20fails.%20Primary%20and%20secondary%20replicas%20cannot%20communicate.%20WSFC%20will%20initiate%20quorum%20vote%20and%20determine%20a%20new%20primary%20to%20fail%20over%20to.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ECluster%20disk%20failure%3A%20Network%20interface%20used%20to%20communicate%20between%20cluster%20nodes%20has%20failed%2C%20resulting%20in%20a%20communication%20loss%20between%20the%20cluster%20nodes.%20Cluster%20will%20initiate%20quorum%20vote%20and%20determine%20a%20new%20primary%20failover%20to.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ECluster%20Service%20paused%3A%20Cluster%20service%20on%20primary%20was%20paused%2C%20resulting%20in%20primary%20unable%20to%20communicate%20with%20other%20nodes%20in%20the%20cluster.%20Cluster%20will%20initiate%20quorum%20vote%20and%20determine%20a%20new%20primary%20to%20fail%20over%20to.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3ENode%20offline%3A%20When%20primary%20node%20is%20frozen%20or%20loses%20power%2C%20WSFC%20loses%20connection%20from%20and%20to%20the%20primary.%20Failover%20cluster%20decide%20to%20initiate%20failover%20and%20pick%20a%20primary%20from%20other%20possible%20nodes.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EHigh%20CPU%20utilization%3A%20System%20wide%20performance%20issue%20causes%20SQL%20Server%20service%20to%20be%20unable%20to%20respond%20to%20AG%20lease%20handler.%20For%20example%2C%20it%20is%20possible%20that%20some%20process%20on%20the%20node%20is%20consuming%20100%25%20CPU%20and%20hence%20the%20lease%20renewal%20threads%20cannot%20execute.%20This%20is%20a%20best%20effort%20estimation%20based%20on%20the%20inputs%20from%20the%20Cluster%20logs.%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EHigh%20I%2FO%3A%20System%20wide%20performance%20issue%20causes%20SQL%20Server%20service%20to%20be%20unable%20to%20respond%20to%20AG%20lease%20handler.%20For%20example%2C%20it%20is%20possible%20that%20some%20process%20on%20the%20node%20is%20throttling%20the%20disks%20on%20the%20system%20and%20as%20such%20the%20lease%20renewal%20cannot%20be%20completed.%20This%20is%20again%20a%20best%20effort%20estimate%20based%20on%20the%20inputs%20from%20the%20cluster%20logs.%3C%2FLI%3E%3CBR%20%2F%3E%3C%2FUL%3E%3CBR%20%2F%3E%20The%20Failover%20Detection%20utility%20can%20be%20used%20to%20analyze%20SQL%20Server%202012%2C%202014%2C%202016%20and%202017%20Availability%20groups%2C%20provided%20the%20servers%20are%20on%20the%20latest%20service%20packs%20and%20cumulative%20updates.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CSTRONG%3EUpdate%2011%2F21%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20A%20few%20users%20have%20reported%20the%20following%20error%20while%20using%20the%20utility.%20We%20are%20looking%20into%20this%20and%20will%20post%20an%20update%20shortly.%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%E2%80%9CAn%20unhandled%20exception%20of%20type%20%E2%80%98System.BadImageFormatException%E2%80%99%20occurred%20in%20FailoverDetector.exe%20%3CBR%20%2F%3E%20Could%20not%20load%20file%20or%20assembly%20%E2%80%98Microsoft.SqlServer.XEvent.Linq%2C%20Version%3D14.0.0.0%2C%20Culture%3Dneutral%2C%20PublicKeyToken%3D89845dcd8080cc91%E2%80%99%20or%20one%20of%20its%20dependencies.%20An%20attempt%20was%20made%20to%20load%20a%20program%20with%20an%20incorrect%20format.%E2%80%9D%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CSTRONG%3E%20Update%2011%2F27%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20New%20updated%20binaries%20for%20the%20Failover%20Detector%20Utility%20have%20been%20uploaded%20to%20GitHub.%20Before%20running%20the%20utility%2C%20please%20install%20the%20%22Microsoft%20Visual%20C%2B%2B%20Redistributable%20for%20Visual%20Studio%202017%22%20from%20%3CA%20href%3D%22https%3A%2F%2Fvisualstudio.microsoft.com%2Fdownloads%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20here%20%3C%2FA%3E%20.%20On%20the%20download%20page%2C%20scroll%20down%20to%20the%20%22Other%20Tools%20and%20Frameworks%22%20section%20to%20download%20the%20redistributable%20(x64%20version).%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20You%20may%20encounter%20the%26nbsp%3B%22Strong%20name%20validation%20failed%22%20error%20while%20using%20the%26nbsp%3Butility.%26nbsp%3BTo%20resolve%20the%20error%20use%20%3CSTRONG%3E%20sn.exe%20%3C%2FSTRONG%3E%20(available%20in%20the%20zip%20file)%20to%26nbsp%3Bdisable%20strong%20name%20validation.%20To%20disable%20strong%20name%20use%20the%20following%20command%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CEM%3E%20sn.exe%20-Vr%20%26lt%3B%3CPATH%20to%3D%22%22%20the%3D%22%22%20dlls%3D%22%22%3E%26gt%3B%20%3C%2FPATH%3E%3C%2FEM%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20Sourabh%20Agarwal%20%3CBR%20%2F%3E%20Senior%20PM%2C%20SQL%20Server%20Tiger%20Team%20%3CBR%20%2F%3E%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2FSQLSourabh%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20Twitter%20%3C%2FA%3E%20%7C%20%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fnapsterreturns%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20LinkedIn%20%3C%2FA%3E%20%3CBR%20%2F%3E%20Follow%20us%20on%20Twitter%3A%20%3CA%20href%3D%22https%3A%2F%2Fna01.safelinks.protection.outlook.com%2F%3Furl%3Dhttp%253a%252f%252ftwitter.com%252fmssqltiger%26amp%3Bdata%3D01%257c01%257camit.banerjee%2540microsoft.com%257c547e7df7513448a8226908d3a6b9fcab%257c72f988bf86f141af91ab2d7cd011db47%257c1%26amp%3Bsdata%3DR9901KBBJUefMA0ih0XatUJ7lyyTCq4KPOCuyVRSfhI%253d%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20%40mssqltiger%20%3C%2FA%3E%20%7C%20Team%20Blog%3A%20%3CA%20href%3D%22https%3A%2F%2Fna01.safelinks.protection.outlook.com%2F%3Furl%3Dhttp%253a%252f%252faka.ms%252fsqlserverteam%26amp%3Bdata%3D01%257c01%257camit.banerjee%2540microsoft.com%257c547e7df7513448a8226908d3a6b9fcab%257c72f988bf86f141af91ab2d7cd011db47%257c1%26amp%3Bsdata%3DgvN1P32cTULsy3V1nGutsMi7wVrOg9K2VO9GbKCwxAA%253d%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20Aka.ms%2Fsqlserverteam%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-386021%22%20slang%3D%22en-US%22%3EFirst%20published%20on%20MSDN%20on%20Nov%2019%2C%202018%20To%20analyze%20the%20root%20cause%20for%20the%20failover%20of%20an%20Availability%20group%2C%20users%20are%20required%20to%20perform%20coordinated%20analysis%20of%20various%20logs%20including%20the%20Cluster%20Logs%2C%20SQL%20Error%20Logs%2C%20and%20the%20Availability%20groups%20extended%20events%20logs.%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-386021%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESQLServerTiger%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-400628%22%20slang%3D%22en-US%22%3ERe%3A%20Failover%20Detection%20Utility%20-%20Availability%20Group%20Failover%20Analysis%20Made%20Easy%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-400628%22%20slang%3D%22en-US%22%3E%3CP%3EI've%20copied%20the%20cluster%20log%20from%20each%20node%20into%20the%20respective%20sub-directory%20under%20data%2C%20but%20when%20I%20run%20the%20tool%20I%20get%20the%20message%20repeated%20for%20each%20node%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CPRE%3ECluster%20Log%20is%20missingRoot%20Cause%20analysis%20may%20not%20be%20complete%20in%20some%20cases%2C%20please%20refer%20log%20for%20more%20information.%3C%2FPRE%3E%3CP%3EIs%20there%20a%20more%20verbose%20option%20to%20find%20out%20why%20it%20is%20not%20detecting%20the%20Cluster%20log%20being%20available%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-672776%22%20slang%3D%22en-US%22%3ERe%3A%20Failover%20Detection%20Utility%20-%20Availability%20Group%20Failover%20Analysis%20Made%20Easy%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-672776%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%20I%20am%20also%20having%20the%20same%20issue%20with%20the%20cluster%20logs%20and%20get%20the%20same%20message%20-%26nbsp%3BCluster%20Log%20is%20missingRoot%20Cause%20analysis%20may%20not%20be%20complete%20in%20some%20cases%2C%20please%20refer%20log%20for%20more%20information.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20files%20are%20named%20-%26nbsp%3BPrimaryNodeServerName_Cluster.log%20and%26nbsp%3BSecondaryNodeServerName_Cluster.log%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHopefully%20someone%20can%20advise%20what%20to%20check%20here.%20Thanks%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft
First published on MSDN on Nov 19, 2018
To analyze the root cause for the failover of an Availability group, users are required to perform coordinated analysis of various logs including the Cluster Logs, SQL Error Logs, and the Availability groups extended events logs. This coordinated analysis of the logs can be difficult and requires extensive knowledge of the internals and the various logs associated with Availability Groups. The failover detection utility is meant to make this analysis easier and provide a quick root cause analysis for the unexpected failovers and/or failed failovers. The failover detection utility currently only supports analysis of Availability groups on Windows.

Failover Detection Utility

The failover detection utility can be downloaded here . The download consists of the following files.

  1. FailoverDetector.exe – The Failover analysis utility.

  2. Configuration.json – The configuration file for the failover analysis utility. The file consists of the following fields.
    {
    "Data Source Path": "F:\\DataLocation\\Data",
    "Health Level": 3,
    "Instances":
    [
    "Replica1",
    "Replica2",
    "Replica3"
    ]
    }
    Data Source Path – Location for the Logs from the different replicas in the Availability Group.
    Health Level – The failover policy level configured for the availability group. More information on the different failover conditions can be found here.
    Instance – The list of replicas in the availability groups.

  3. Supporting DLL’s – Supporting DLLs for the Failover analysis utility.

  4. Data and Reports Folders – The Data and Analysis reports folders.


Preparing for Failover Analysis with the Failover Detection Utility

The first step in using the utility is to configure the configuration.json file to include the location of the data files and the details of the availability group for which analysis is being done. For a correct analysis, all replicas in the availability groups needs to be listed in the configuration file.

The next step is to capture the various logs from each of the replicas and add those under the data folder. The following files are required for the analysis.

  • SQL error logs

  • Always On Availability Groups Extended Event Logs

  • System Health Extended Event Logs

  • System log

  • Windows cluster log


The first three categories of logs can be found in the LOG folder of the SQL instance installation path. For example, if you have a SQL Server 2017 instance named "SQL17RTM01" and If the installation path is on C drive, you will find the above three categories of logs under "C:\Program Files\Microsoft SQL Server\MSSQL14.SQL17RTM01\MSSQL\Log", and copy all AlwaysOn XEvent, System Health XEvent and SQL ERRORLOG files.

The last two categories of logs can be found. You can use commands mentioned below to collect these logs.

Get-ClusterLog -Node $server.ComputerNamePhysicalNetBIOS -Destination $server.ErrorLogPath


Get-Eventlog -ComputerName $server.ComputerNamePhysicalNetBIOS -LogName System | Export-CSV -Path $SystemLogExportPath


Organizing the files


The log files collected in the previous step should be placed in a folder with correct subfolder structure. This folder should be the folder path specified in the "Data Source Path" section of the configuration file "Configuration.json". The following is an example of the subfolder structure, assuming there are two replicas (instances) in the AG. One is "Replica1" and another one is "Replica2".

¦ +---Data


¦ ¦


¦ ¦


¦ +---Replica1


¦ ¦ AlwaysOn_health_0_131532583880140000.xel


¦ ¦ AlwaysOn_health_0_131532634780070000.xel


¦ ¦ AlwaysOn_health_0_131532680183890000.xel


¦ ¦ AlwaysOn_health_0_131532701164380000.xel


¦ ¦ ERRORLOG


¦ ¦ ERRORLOG.1


¦ ¦ ERRORLOG.2


¦ ¦ ERRORLOG.3


¦ ¦ SQLDUMPER_ERRORLOG.log


¦ ¦ system_health_0_131532583879830000.xel


¦ ¦ system_health_0_131532634779760000.xel


¦ ¦ system_health_0_131532680183430000.xel


¦ ¦ system_health_0_131532701164070000.xel


¦ ¦ Replica1_system.log


¦ ¦ Replica1_cluster.log


¦ ¦


¦ +---Replica2


¦ AlwaysOn_health_0_131532571347210000.xel


¦ AlwaysOn_health_0_131532578226200000.xel


¦ AlwaysOn_health_0_131532586348180000.xel


¦ AlwaysOn_health_0_131532725682240000.xel


¦ ERRORLOG


¦ ERRORLOG.1


¦ ERRORLOG.2


¦ ERRORLOG.3


¦ ERRORLOG.4


¦ ERRORLOG.5


¦ ERRORLOG.6


¦ system_health_0_131532571346430000.xel


¦ system_health_0_131532578225950000.xel


¦ system_health_0_131532586347860000.xel


¦ system_health_0_131532725681930000.xel


¦ Replica2_system.csv


¦ Replica2_cluster.log


Executing the Utility


The FailoverDetection.exe can be executed with the following flags (or default mode without any flags)

Default Mode (No execution flags defined) - In the default mode, where no parameters are passed to the utility, the analysis tool will load the configuration file, copy log data from data source path to local workspace data folder, examine the files with the configuration settings, perform the analysis, and write the analysis result to a JSON report file. User should make sure the execution credential running tool has access to share folder defined in Configuration.json. When tool runs into access denial issues or the directory does not exist, the tool will exit with proper error message. After the tool copies the log files to the local tool directory, it scans the local data folder and compare with the AG configuration in Configuration.json. If it finds log data is not complete, the tool will show which files are missing. The tool will also alert the user that the failover root cause might not be properly identified due to missing files.

If analysis is successful, the utility persists the analysis result report as JSON file in Result directory. Analysis result will NOT be presented on the console, unless the "--Show" parameter is specified.

--Analyze - When "--Analyze" is specified as a parameter, the utility will load configuration file without copying log data. It assumes the log files have already been copied over. It does everything as default mode except copying log data. This option is useful if you already have the data in the local tool execution subdirectories and want to rerun the analysis.


- -Show -The utility after analyzing log data will display the results in the command console. Additionally, the results will be persisted to a JSON file in the results folder.


Currently supported failover root causes


The tool in current form can analyze and report failover reason if a failover is due to the following causes.

Planned Failovers


  • Stopping SQL service: Admin or other process gracefully shuts down SQL Server hosting the AG primary. In this case, if automatic failover is enabled, Windows notifies WSFC to initiate a failover and picks one secondary as new primary.

  • Shutting down Windows Server: The Windows Server which hosts the SQL Server that has the primary replica is shut down or restarted. In this case, if automatic failover is enabled, Windows notifies WSFC to initiate a failover and picks one secondary as new primary.

  • Manual failover: An administrator performs a manual failover through Management Studio or through a direct Transact-SQL statement "ALTER AVAILABILITY GROUP <AG name> FAILOVER" or "ALTER AVAILABILITY GROUP <AG name> FAILOVER WITH DATA_LOSS" on the secondary replica that will become the primary replica.


SQL Service Internal Health Issue


  • Too many memory dumps generated on the SQL Server hosting the primary replica: There are more than 100 SQL Server dumps on the primary replica since the last SQL Server restart, and there is at least one dump in the last 10 seconds. In this case, sp_server_diagnostics running in SQL Server determines that SQL Server system component is in error state and notifies failover WSFC to initiate a failover.

  • Memory scribbler: SQL Server has a write access violation and the write address is more than 64KB. If there are more than three such memory corruptions since SQL Server was started, sp_server_diagnostics running in SQL Server determines that SQL Server system component is in error state and notifies failover WSFC to initiate a failover.

  • Sick Spinlock: After an access violation, a spinlock is marked as sick if it backs off more than three times, which is the threshold. In this case, sp_server_diagnostics running in SQL Server determines that SQL Server system component is in error state and notifies failover WSFC to initiate a failover.

  • Out of Memory: If no memory has been freed in 2 minutes, sp_server_diagnostics running in SQL Server determines that SQL Server system component is in error state and notifies failover WSFC to initiate a failover.

  • Unresolved deadlock: If sp_server_diagnostics detects unresolved deadlock from query processing component, it determines that SQL Server system component is in error state and notifies failover WSFC to initiate a failover.

  • Deadlocked scheduler: If sp_server_diagnostics detects deadlocked schedulers from query processing component, it determines that SQL Server system component is in error state and notifies failover WSFC to initiate a failover.


System Wide Issues


  • Unexpected crash: SQL Server service was shut down unexpectedly. Resources host service (rhs.exe) does not detect lease check from SQL Server about availability group lease. This results an AG lease timeout signal to WSFC and WSFC will initiate a failover.

  • Long dump: SQL Server is creating a dump file. During the process, threads handling the AG lease are frozen and which may result in a lease timeout. This results an AG lease timeout signal to WSFC and WSFC will initiate a failover if automatic failover is enabled.

  • Quorum loss: AG resource is brought offline because quorum is lost. This could be because of a plethora of issues, which would need to be determined by a closure examination of the cluster logs.

  • Network interface failure: Network interface used to communicate between cluster nodes fails. Primary and secondary replicas cannot communicate. WSFC will initiate quorum vote and determine a new primary to fail over to.

  • Cluster disk failure: Network interface used to communicate between cluster nodes has failed, resulting in a communication loss between the cluster nodes. Cluster will initiate quorum vote and determine a new primary failover to.

  • Cluster Service paused: Cluster service on primary was paused, resulting in primary unable to communicate with other nodes in the cluster. Cluster will initiate quorum vote and determine a new primary to fail over to.

  • Node offline: When primary node is frozen or loses power, WSFC loses connection from and to the primary. Failover cluster decide to initiate failover and pick a primary from other possible nodes.

  • High CPU utilization: System wide performance issue causes SQL Server service to be unable to respond to AG lease handler. For example, it is possible that some process on the node is consuming 100% CPU and hence the lease renewal threads cannot execute. This is a best effort estimation based on the inputs from the Cluster logs.

  • High I/O: System wide performance issue causes SQL Server service to be unable to respond to AG lease handler. For example, it is possible that some process on the node is throttling the disks on the system and as such the lease renewal cannot be completed. This is again a best effort estimate based on the inputs from the cluster logs.


The Failover Detection utility can be used to analyze SQL Server 2012, 2014, 2016 and 2017 Availability groups, provided the servers are on the latest service packs and cumulative updates.

Update 11/21

A few users have reported the following error while using the utility. We are looking into this and will post an update shortly.

“An unhandled exception of type ‘System.BadImageFormatException’ occurred in FailoverDetector.exe
Could not load file or assembly ‘Microsoft.SqlServer.XEvent.Linq, Version=14.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91’ or one of its dependencies. An attempt was made to load a program with an incorrect format.”

Update 11/27

New updated binaries for the Failover Detector Utility have been uploaded to GitHub. Before running the utility, please install the "Microsoft Visual C++ Redistributable for Visual Studio 2017" from here . On the download page, scroll down to the "Other Tools and Frameworks" section to download the redistributable (x64 version).

You may encounter the "Strong name validation failed" error while using the utility. To resolve the error use sn.exe (available in the zip file) to disable strong name validation. To disable strong name use the following command

sn.exe -Vr <<path to the DLLs>>



Sourabh Agarwal
Senior PM, SQL Server Tiger Team
Twitter | LinkedIn
Follow us on Twitter: @mssqltiger | Team Blog: Aka.ms/sqlserverteam
2 Comments
Regular Visitor

I've copied the cluster log from each node into the respective sub-directory under data, but when I run the tool I get the message repeated for each node:

 

Cluster Log is missingRoot Cause analysis may not be complete in some cases, please refer log for more information.

Is there a more verbose option to find out why it is not detecting the Cluster log being available?

 

 

 

 

 

Regular Visitor

Hi, I am also having the same issue with the cluster logs and get the same message - Cluster Log is missingRoot Cause analysis may not be complete in some cases, please refer log for more information. 

 

The files are named - PrimaryNodeServerName_Cluster.log and SecondaryNodeServerName_Cluster.log

 

Hopefully someone can advise what to check here. Thanks