A domain controller would fetch GPO directly from itself, over loopback SMB, and loopback SMB doesn't use Kerberos – it uses NTLM, and more specifically it uses NTLM in the special "local call" mode.
NTLM has specific handling for loopback connections – instead of doing challenge/response and then querying the directory for user details, the server process directly peeks at the security token of the client process, therefore it always sees the groups that were effective when starting that process.
The process security token is a local Windows concept and generally not something that can be cleared or reacquired on the fly – you have to restart the process (and perhaps also the process that starts the process), which means either restarting the service, (or doing a clean logout/login for interactive sessions,) or a full reboot.
gpresultis a symptom of the problem. The problem, as stated, is that domain controllers are not recognizing their group membership changes even though a kerberos ticket is purged and regenerated. I think the answer provided addresses the question. For your own curiosity there are other ways to check the local group membership "view" of the client such asGet-WmiObject -Namespace "root\rsop\COMPUTER" -Class RSOP_Session -Property SecurityGroups– Appleoddity Mar 22 '24 at 14:32