WSUS downstream Server synchroziation failed
Hi All,
I have upgraded my downstream server to Windows Server 2012 R2. After upgrade my WSUS server is not synchronization with my upstream WSUS server. I am getting the below error while running the synchronization.
IOException: Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host. ---> System.Net.Sockets.SocketException: An existing connection was forcibly closed by the remote host
at System.Net.ConnectStream.Read(Byte[] buffer, Int32 offset, Int32 size)
at Microsoft.UpdateServices.ServerSync.ServerSyncCompressionProxy.GetWebResponse(WebRequest webRequest)
at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetRevisionIdList(Cookie cookie, ServerSyncFilter filter)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.WebserviceGetRevisionIdList(ServerSyncFilter filter, Boolean isConfigData)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
Nirmal Singh IT Administrator
How did you do the upgrade, was it in-place, or a new machine? And did you migrate the WSUS role or just deploy a new instance?
Are there any firewalls in place?
Do you have other downstream servers connecting to the upstream, if so are those connecting ok?
Do you have any clients connecting to the upstream?
What are the build numbers on both servers?
Are there any errors in the IIS log?
Similar Messages
-
WSUS Downstream server not synchronizing - SQL Timeout
I'm running into problems synching a downstream WSUS server with the parent server. The first few times that the server synch'd it ran fine, then it just stopped working. The Windows Firewall is disabled and there is no proxy. I've checked all the permissions
for IIS and all required services are running. I've also tried an IISRESET, uninstall WSUS, re-installed, ran wsusutil.exe reset and checkhealth, rebooted many times. Ran the DB Cleanup Wizard on both servers. Any help woul be appreciated.
WSUS Parent Server: Windows Server 2003 R2 SP2
WSUS Downstream Server: Windows Server 2003 R2 SP2
WSUS Failed Error Message:
SqlException: Timeout expired. The timeout period elapsed prior to completion of the operation or the server is not responding.
at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection)
at System.Data.SqlClient.SqlInternalConnection.OnError(SqlException exception, Boolean breakConnection)
at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj)
at System.Data.SqlClient.TdsParser.Run(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj)
at System.Data.SqlClient.SqlDataReader.ReadInternal(Boolean setTimeout)
at System.Data.SqlClient.SqlDataReader.Read()
at Microsoft.UpdateServices.DatabaseAccess.DBConnection.ReadOneRow()
at Microsoft.UpdateServices.Internal.DataAccess.HideUpdatesForReplicaSync(String xmlUpdateIds)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ProcessHiddenUpdates(Guid[] hiddenUpdates)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ReplicaSync()
at Microsoft.UpdateServic
Thank YouSure, here are the log files. Thank you!
UPSTREAM SERVER:
Running... GetConfiguration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
Version:3
InstallLanguage:ENU
ProxyPassword:
SmtpUserPassword:
VersionString:3.2.7600.226
ConfigurationSource:0
ServicePackLevel:2
TargetDir:C:\Program Files\Update Services\
InstallType:1
EnableRemoting:1
WsusAdministratorsSid:S-1-5-21-163115894-1154025269-1635805901-1010
WSUSReportersSid:S-1-5-21-163115894-1154025269-1635805901-1009
SqlServerName:WSUSDAL\MICROSOFT##SSEE
SqlAuthenticationMode:WindowsAuthentication
SqlDatabaseName:SUSDB
SqlUserName:
SqlEncryptedPassword:
SqlInstanceIsRemote:0
wYukonInstalled:1
ContentDir:E:\WSUS
PortNumber:8530
IISTargetWebSiteIndex:625045861
IISTargetWebSiteCreated:True
IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
IISPreviousInstallRevision:
IISInstallRevision:3.2.7600.226
IIsDynamicCompression:0
EncryptionParam:System.Byte[]
EncryptionKey:System.Byte[]
<NewDataSet>
<Table>
<ConfigurationID>1</ConfigurationID>
<LastConfigChange>2010-05-30T21:19:36.8700000-05:00</LastConfigChange>
<DssAnonymousTargeting>false</DssAnonymousTargeting>
<IsRegistrationRequired>true</IsRegistrationRequired>
<MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
<ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
<ServerID>c48b3181-a77e-4a88-8986-3dd6bf07c291</ServerID>
<AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
<SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
<MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
<DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
<EncryptionKey>dE3WZ7GGMBOpG/ftJuzo7lDLHBFVT7VR</EncryptionKey>
<ServerTargeting>false</ServerTargeting>
<SyncToMU>true</SyncToMU>
<UpstreamServerName>SUSDal</UpstreamServerName>
<ServerPortNumber>8530</ServerPortNumber>
<UpstreamServerUseSSL>false</UpstreamServerUseSSL>
<UseProxy>false</UseProxy>
<ProxyName />
<ProxyServerPort>80</ProxyServerPort>
<AnonymousProxyAccess>true</AnonymousProxyAccess>
<ProxyUserName />
<HostOnMu>false</HostOnMu>
<LocalContentCacheLocation>e:\WSUS\WsusContent\</LocalContentCacheLocation>
<ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
<LogLevel>0</LogLevel>
<LogPath />
<SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
<SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
<DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
<StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
<StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
<MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
<MUUrl>https://www.update.microsoft.com/v6</MUUrl>
<EventLogFloodProtectTime>10</EventLogFloodProtectTime>
<HandshakeAnchor>13270510,2010-06-02 21:12:31.056</HandshakeAnchor>
<StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
<QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
<QueueFlushCount>100</QueueFlushCount>
<QueueRejectCount>500</QueueRejectCount>
<SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
<LogDestinations>0</LogDestinations>
<AutoRefreshDeployments>true</AutoRefreshDeployments>
<RedirectorChangeNumber>0</RedirectorChangeNumber>
<ImportLocalPath />
<UseCookieValidation>true</UseCookieValidation>
<AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
<AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
<AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
<DoReportingDataValidation>true</DoReportingDataValidation>
<DoReportingSummarization>true</DoReportingSummarization>
<MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
<MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
<MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
<DownloadRegulationUrl />
<AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
<LazySync>true</LazySync>
<DownloadExpressPackages>false</DownloadExpressPackages>
<DoServerSyncCompression>true</DoServerSyncCompression>
<ProxyUserDomain />
<BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
<BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
<MaxXmlPerRequest>5242880</MaxXmlPerRequest>
<MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
<MaxTargetComputers>30000</MaxTargetComputers>
<MaxEventInstances>2000000</MaxEventInstances>
<LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
<WUSInstallType>0</WUSInstallType>
<ReplicaMode>false</ReplicaMode>
<AutoDeployMandatory>true</AutoDeployMandatory>
<DeploymentChangeDeferral>30</DeploymentChangeDeferral>
<RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
<RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
<CollectClientInventory>false</CollectClientInventory>
<DoDetailedRollup>true</DoDetailedRollup>
<RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
<UssSupportsAllLanguages>false</UssSupportsAllLanguages>
<GetContentFromMU>false</GetContentFromMU>
<HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
<HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
<HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
<HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
<HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
<HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
<HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
<HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
<HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
<HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
<HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
<HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
<HmClientsSilentDays>30</HmClientsSilentDays>
<DssRollupChunkSize>5000</DssRollupChunkSize>
<MURollupOptin>False</MURollupOptin>
<AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
<ServerString>Default</ServerString>
<HmCoreFlags>-1</HmCoreFlags>
<HmClientsFlags>-1</HmClientsFlags>
<HmDatabaseFlags>-1</HmDatabaseFlags>
<HmWebServicesFlags>-1</HmWebServicesFlags>
<ClientReportingLevel>2</ClientReportingLevel>
<LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
<DownloadRegulationWebServiceUrl />
<LoadOdfLocally>false</LoadOdfLocally>
<OdfFilePath />
<HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
<HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
<ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
<ConfigurationChangeNumber>137118</ConfigurationChangeNumber>
<UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
<SslProxyName />
<SslProxyServerPort>443</SslProxyServerPort>
<ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
</Table>
</NewDataSet>
DOWNSTREAM SERVER:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
Version:3
InstallLanguage:ENU
ProxyPassword:
SmtpUserPassword:
VersionString:3.2.7600.226
ConfigurationSource:0
ServicePackLevel:2
TargetDir:C:\Program Files\Update Services\
InstallType:1
EnableRemoting:1
WsusAdministratorsSid:S-1-5-21-2105027866-1443240842-1445603992-20366
WSUSReportersSid:S-1-5-21-2105027866-1443240842-1445603992-19384
SqlServerName:SUSFTW\MICROSOFT##SSEE
SqlAuthenticationMode:WindowsAuthentication
SqlDatabaseName:SUSDB
SqlUserName:
SqlEncryptedPassword:
SqlInstanceIsRemote:0
wYukonInstalled:1
ContentDir:D:\WSUS
PortNumber:8530
IISTargetWebSiteIndex:602037408
IISTargetWebSiteCreated:True
IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
IISPreviousInstallRevision:
IISInstallRevision:3.2.7600.226
IIsDynamicCompression:-1
EncryptionParam:System.Byte[]
EncryptionKey:System.Byte[]
<NewDataSet>
<Table>
<ConfigurationID>1</ConfigurationID>
<LastConfigChange>2010-06-02T00:00:35.0200000-05:00</LastConfigChange>
<DssAnonymousTargeting>false</DssAnonymousTargeting>
<IsRegistrationRequired>true</IsRegistrationRequired>
<MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
<ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
<ServerID>dac8845b-855c-4899-ab19-8bf7a750514f</ServerID>
<AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
<SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
<MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
<DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
<EncryptionKey>VoxRFFCoICrJYoTjr5WL1aOzfX1CSL9m</EncryptionKey>
<ServerTargeting>true</ServerTargeting>
<SyncToMU>false</SyncToMU>
<UpstreamServerName>WSUSDAL</UpstreamServerName>
<ServerPortNumber>8530</ServerPortNumber>
<UpstreamServerUseSSL>false</UpstreamServerUseSSL>
<UseProxy>false</UseProxy>
<ProxyName />
<ProxyServerPort>80</ProxyServerPort>
<AnonymousProxyAccess>true</AnonymousProxyAccess>
<ProxyUserName />
<HostOnMu>false</HostOnMu>
<LocalContentCacheLocation>d:\WSUS\WsusContent\</LocalContentCacheLocation>
<ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
<LogLevel>0</LogLevel>
<LogPath />
<SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
<SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
<DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
<StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
<StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
<MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
<MUUrl>https://www.update.microsoft.com/v6</MUUrl>
<EventLogFloodProtectTime>10</EventLogFloodProtectTime>
<HandshakeAnchor>136861,2010-06-02 00:00:34.112</HandshakeAnchor>
<StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
<QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
<QueueFlushCount>100</QueueFlushCount>
<QueueRejectCount>500</QueueRejectCount>
<SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
<LogDestinations>0</LogDestinations>
<AutoRefreshDeployments>true</AutoRefreshDeployments>
<RedirectorChangeNumber>0</RedirectorChangeNumber>
<ImportLocalPath />
<UseCookieValidation>true</UseCookieValidation>
<AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
<AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
<AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
<DoReportingDataValidation>true</DoReportingDataValidation>
<DoReportingSummarization>true</DoReportingSummarization>
<MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
<MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
<MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
<DownloadRegulationUrl />
<AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
<LazySync>true</LazySync>
<DownloadExpressPackages>false</DownloadExpressPackages>
<DoServerSyncCompression>true</DoServerSyncCompression>
<ProxyUserDomain />
<BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
<BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
<MaxXmlPerRequest>5242880</MaxXmlPerRequest>
<MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
<MaxTargetComputers>30000</MaxTargetComputers>
<MaxEventInstances>2000000</MaxEventInstances>
<LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
<WUSInstallType>0</WUSInstallType>
<ReplicaMode>true</ReplicaMode>
<AutoDeployMandatory>true</AutoDeployMandatory>
<DeploymentChangeDeferral>30</DeploymentChangeDeferral>
<RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
<RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
<CollectClientInventory>false</CollectClientInventory>
<DoDetailedRollup>true</DoDetailedRollup>
<RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
<UssSupportsAllLanguages>false</UssSupportsAllLanguages>
<GetContentFromMU>false</GetContentFromMU>
<HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
<HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
<HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
<HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
<HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
<HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
<HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
<HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
<HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
<HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
<HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
<HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
<HmClientsSilentDays>30</HmClientsSilentDays>
<DssRollupChunkSize>5000</DssRollupChunkSize>
<MURollupOptin>False</MURollupOptin>
<AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
<ServerString>Default</ServerString>
<HmCoreFlags>-1</HmCoreFlags>
<HmClientsFlags>-1</HmClientsFlags>
<HmDatabaseFlags>-1</HmDatabaseFlags>
<HmWebServicesFlags>-1</HmWebServicesFlags>
<ClientReportingLevel>2</ClientReportingLevel>
<LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
<DownloadRegulationWebServiceUrl />
<LoadOdfLocally>false</LoadOdfLocally>
<OdfFilePath />
<HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
<HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
<ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
<ConfigurationChangeNumber>76409</ConfigurationChangeNumber>
<UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
<SslProxyName />
<SslProxyServerPort>443</SslProxyServerPort>
<ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
</Table>
</NewDataSet> -
Wsus downstream server not showing up
OS: Windows 2003
WSUS: 3.0 SP1
Architecture: 3-tier WSUS, Level 1 approve/decline updates and sync with microsoft update websites; Level 2 is replica of Level 1; Level 3 is downstream servers of Level2 and configed into autonomous mode.
We have a 3-tier WSUS infrastructure in test mode. The WSUS.Level1 server gets updates directly from Microsoft Updates. WSUS.Level2 server is a replica server of Level 1 server, i.e., upstream server is WSUS.Level1. There are more than 20 other Level 3 WSUS servers use WSUS.Level2 as the upstream servers. Level 3 servers are setup as autonomous mode at this moment.
The Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
Microsoft Updates Server -> WSUS.Level1 -> WSUS.Level2 -> 20 other WSUS Level 3 servers
Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3 server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2, always! Any idea why this happensThe Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3 server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2, always! Any idea why this happens
<sigh>....
SYSPREP is not an appropriate tool to be used for imaging machines with *APPLICATIONS* installed, particularly if those applications use GUIDs to uniquely identify the machines, as WSUS downstream servers do.
So, ironically, only two threads earlier I answered this very identical scenario . . .
In theory, you should be able to do this to 'reset' these GUIDs...
1. Synchronize the downstream server so that it shows up in the console of the upstream server.
2. Set the downstream server synchronization schedule to MANUAL.
3. Modify the Options | Update Source and Proxy Server | Update Source page to make this an upstream server.
4. Delete the server from the Downstream Servers node of the upstream server's console.
5. Modify the Options | Update Source and Proxy Server | Update Source page to make this a downstream server again.
6. Initiate a synchronization.
You won't see any difference after performing these steps on the first server.
When you'll know this is working is if the second server shows up in the console after Step #6.
Repeat Steps #1 through #6 for the other three servers.
Lawrence Garvin, M.S., MCITP:EA, MCDBA, MCSA
Principal/CTO, Onsite Technology Solutions, Houston, Texas
Microsoft MVP - Software Distribution (2005-2010)
My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin
My Blog: http://onsitechsolutions.spaces.live.com -
We have recently upgraded our WSUS server to Windows 2012 R2. Now none of the PCs reporting their status to the WSUS server and not getting updates at all. The PCs are contacting the Server but not reporting their status. Stopped the Firewall on Client and
Server. BITS and windows updates services are running.
Record the system time of the Windows 7 client.
Reboot the Windows 7 client.
Run this command from a command prompt: wuauclt /resetauthorization /detectnow.
Wait =30= minutes.
Performed the above steps. Please see the updates logs from a client.
2015-03-16 12:48:44:617
1040 15a4
Shutdwn user declined update at shutdown
2015-03-16 12:48:44:617
1040 15a4
AU Successfully wrote event for AU health state:0
2015-03-16 12:48:44:618
1040 15a4
AU AU initiates service shutdown
2015-03-16 12:48:44:649
1040 15a4
AU ########### AU: Uninitializing Automatic Updates ###########
2015-03-16 12:48:46:506
1040 15a4
Report CWERReporter finishing event handling. (00000000)
2015-03-16 12:48:46:584
1040 15a4
Service *********
2015-03-16 12:48:46:584
1040 15a4
Service ** END ** Service: Service exit [Exit code = 0x240001]
2015-03-16 12:48:46:584
1040 15a4
Service *************
2015-03-16 12:54:23:139
1024 1060
Misc =========== Logging initialized (build: 7.6.7600.320, tz: -0400) ===========
2015-03-16 12:54:23:214
1024 1060
Misc = Process: C:\Windows\system32\svchost.exe
2015-03-16 12:54:23:264
1024 1060
Misc = Module: c:\windows\system32\wuaueng.dll
2015-03-16 12:54:23:139
1024 1060
Service *************
2015-03-16 12:54:23:264
1024 1060
Service ** START ** Service: Service startup
2015-03-16 12:54:23:265
1024 1060
Service *********
2015-03-16 12:54:24:262
1024 1060
Agent * WU client version 7.6.7600.320
2015-03-16 12:54:24:263
1024 1060
Agent * Base directory: C:\Windows\SoftwareDistribution
2015-03-16 12:54:24:272
1024 1060
Agent * Access type: No proxy
2015-03-16 12:54:24:532
1024 1060
Agent * Network state: Connected
2015-03-16 12:55:17:235
1024 1060
Report CWERReporter::Init succeeded
2015-03-16 12:55:17:235
1024 1060
Agent *********** Agent: Initializing Windows Update Agent ***********
2015-03-16 12:55:17:235
1024 1060
Agent * Prerequisite roots succeeded.
2015-03-16 12:55:17:235
1024 1060
Agent *********** Agent: Initializing global settings cache ***********
2015-03-16 12:55:17:235
1024 1060
Agent * WSUS server: http://ewd-srv-01.resultstel.net:8530
2015-03-16 12:55:17:235
1024 1060
Agent * WSUS status server: http://ewd-srv-01.resultstel.net:8530
2015-03-16 12:55:17:235
1024 1060
Agent * Target group: Eastwood
2015-03-16 12:55:17:235
1024 1060
Agent * Windows Update access disabled: No
2015-03-16 12:55:17:247
1024 1060
DnldMgr Download manager restoring 0 downloads
2015-03-16 12:55:17:248
1024 1060
AU ########### AU: Initializing Automatic Updates ###########
2015-03-16 12:55:17:249
1024 1060
AU # WSUS server: http://ewd-srv-01.resultstel.net:8530
2015-03-16 12:55:17:249
1024 1060
AU # Detection frequency: 22
2015-03-16 12:55:17:249
1024 1060
AU # Target group: Eastwood
2015-03-16 12:55:17:249
1024 1060
AU # Approval type: Scheduled (Policy)
2015-03-16 12:55:17:249
1024 1060
AU # Scheduled install day/time: Every day at 3:00
2015-03-16 12:55:17:249
1024 1060
AU # Auto-install minor updates: Yes (Policy)
2015-03-16 12:55:17:249
1024 1060
AU # Will interact with non-admins (Non-admins are elevated (User preference))
2015-03-16 12:55:17:249
1024 1060
AU # Will display featured software notifications (User preference)
2015-03-16 12:55:17:259
1024 1060
Agent Switching to hardware-verified ClientId.
2015-03-16 12:55:17:260
1024 1060
AU Setting AU scheduled install time to 2015-03-17 07:00:00
2015-03-16 12:55:17:402
1024 1060
Report *********** Report: Initializing static reporting data ***********
2015-03-16 12:55:17:402
1024 1060
Report * OS Version = 6.1.7601.1.0.65792
2015-03-16 12:55:17:402
1024 1060
Report * OS Product Type = 0x00000030
2015-03-16 12:55:17:600
1024 1060
Report WARNING: Failed to load reporting information from WMI with hr = 80041002.
2015-03-16 12:55:17:601
1024 1060
Report * Locale ID = 1033
2015-03-16 12:55:17:654
1024 1060
AU Successfully wrote event for AU health state:0
2015-03-16 12:55:17:655
1024 1060
AU Initializing featured updates
2015-03-16 12:55:17:655
1024 1060
AU Found 0 cached featured updates
2015-03-16 12:55:17:655
1024 1060
AU Successfully wrote event for AU health state:0
2015-03-16 12:55:17:656
1024 1060
AU Successfully wrote event for AU health state:0
2015-03-16 12:55:17:656
1024 1060
AU AU finished delayed initialization
2015-03-16 12:55:23:261
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 12:55:41:121
1024 1074
AU Triggering AU detection through DetectNow API
2015-03-16 12:55:41:122
1024 1074
AU Triggering Online detection (non-interactive)
2015-03-16 12:55:41:193
1024 1060
AU #############
2015-03-16 12:55:41:193
1024 1060
AU ## START ## AU: Search for updates
2015-03-16 12:55:41:193
1024 1060
AU #########
2015-03-16 12:55:41:218
1024 1060
AU <<## SUBMITTED ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
2015-03-16 12:55:41:218
1024 1194
Agent *************
2015-03-16 12:55:41:218
1024 1194
Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2015-03-16 12:55:41:218
1024 1194
Agent *********
2015-03-16 12:55:41:218
1024 1194
Agent * Online = Yes; Ignore download priority = No
2015-03-16 12:55:41:218
1024 1194
Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
and DeploymentAction='Uninstallation' and RebootRequired=1"
2015-03-16 12:55:41:218
1024 1194
Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2015-03-16 12:55:41:218
1024 1194
Agent * Search Scope = {Machine}
2015-03-16 12:55:41:218
1024 1194
Setup Checking for agent SelfUpdate
2015-03-16 12:55:41:219
1024 1194
Setup Client version: Core: 7.6.7600.320 Aux: 7.6.7600.320
2015-03-16 12:55:45:440
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2015-03-16 12:55:45:893
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:45:897
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPD98D.tmp with dwProvFlags 0x00000080:
2015-03-16 12:55:45:979
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:46:014
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2015-03-16 12:55:46:019
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:46:050
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2015-03-16 12:55:46:055
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:46:093
1024 1194
Setup Determining whether a new setup handler needs to be downloaded
2015-03-16 12:55:46:093
1024 1194
Setup SelfUpdate handler is not found. It will be downloaded
2015-03-16 12:55:46:093
1024 1194
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320"
2015-03-16 12:55:52:237
1024 1194
Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
2015-03-16 12:55:52:237
1024 1194
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
2015-03-16 12:55:53:377
1024 1194
Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
2015-03-16 12:55:53:502
1024 1194
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
2015-03-16 12:55:56:705
1024 1194
Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
2015-03-16 12:55:56:896
1024 1194
Setup SelfUpdate check completed. SelfUpdate is NOT required.
2015-03-16 12:56:01:618
1024 1060
AU AU received policy change subscription event
2015-03-16 13:00:00:824
1024 1194
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2015-03-16 13:00:00:824
1024 1194
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
2015-03-16 13:00:01:001
1024 1194
PT WARNING: PTError: 0x80041002
2015-03-16 13:00:01:001
1024 1194
PT Initializing simple targeting cookie, clientId = f86ac648-7394-46eb-8f40-eb605f77d86b, target group = Eastwood, DNS name = ewd-wc-420-235.resultstel.net
2015-03-16 13:00:01:001
1024 1194
PT Server URL = http://ewd-srv-01.resultstel.net:8530/SimpleAuthWebService/SimpleAuth.asmx
2015-03-16 13:00:01:833
1024 1194
Agent WARNING: Failed to evaluate Installed rule, updateId = {F92A18E7-8784-4828-89C9-F80085A422A7}.202, hr = 80041002
2015-03-16 13:00:02:004
1024 1194
Agent WARNING: Failed to evaluate Installed rule, updateId = {C735DBB1-06B4-49F2-815F-97976B4B86A4}.102, hr = 80041002
2015-03-16 13:00:08:676
1024 1194
Agent WARNING: Failed to evaluate Installed rule, updateId = {6A8FE277-1048-48B1-803B-4580C15BBDF1}.100, hr = 80041002
2015-03-16 13:07:37:795
1024 1194
PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2015-03-16 13:07:37:795
1024 1194
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
2015-03-16 13:07:37:988
1024 1194
PT WARNING: PTError: 0x80041002
2015-03-16 13:07:41:893
1024 1194
PT WARNING: GetExtendedUpdateInfo failure, error = 0x8024400E, soap client error = 7, soap error code = 400, HTTP status code = 200
2015-03-16 13:07:41:893
1024 1194
PT WARNING: SOAP Fault: 0x000190
2015-03-16 13:07:41:893
1024 1194
PT WARNING: faultstring:Fault occurred
2015-03-16 13:07:41:893
1024 1194
PT WARNING: ErrorCode:InternalServerError(5)
2015-03-16 13:07:41:893
1024 1194
PT WARNING: Message:(null)
2015-03-16 13:07:41:893
1024 1194
PT WARNING: Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetExtendedUpdateInfo"
2015-03-16 13:07:41:893
1024 1194
PT WARNING: ID:4cd69d60-d69b-4591-88ad-5687cdda3265
2015-03-16 13:07:41:893
1024 1194
PT WARNING: PTError: 0x8024400e
2015-03-16 13:07:41:893
1024 1194
PT WARNING: GetExtendedUpdateInfo_WithRecovery: 0x8024400e
2015-03-16 13:07:41:893
1024 1194
PT WARNING: Sync of Extended Info: 0x8024400e
2015-03-16 13:07:41:893
1024 1194
PT WARNING: SyncServerUpdatesInternal failed : 0x8024400e
2015-03-16 13:07:41:914
1024 1194
Agent * WARNING: Exit code = 0x8024400E
2015-03-16 13:07:41:914
1024 1194
Agent *********
2015-03-16 13:07:41:914
1024 1194
Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2015-03-16 13:07:41:914
1024 1194
Agent *************
2015-03-16 13:07:41:914
1024 1194
Agent WARNING: WU client failed Searching for update with error 0x8024400e
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:930
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:930
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:42:021
1024 14f4
AU >>## RESUMED ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
2015-03-16 13:07:42:021
1024 14f4
AU # WARNING: Search callback failed, result = 0x8024400E
2015-03-16 13:07:42:021
1024 14f4
AU # WARNING: Failed to find updates with error code 8024400E
2015-03-16 13:07:42:021
1024 14f4
AU #########
2015-03-16 13:07:42:021
1024 14f4
AU ## END ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
2015-03-16 13:07:42:021
1024 14f4
AU #############
2015-03-16 13:07:42:021
1024 14f4
AU Successfully wrote event for AU health state:0
2015-03-16 13:07:42:021
1024 14f4
AU AU setting next detection timeout to 2015-03-16 22:07:42
2015-03-16 13:07:42:022
1024 14f4
AU Setting AU scheduled install time to 2015-03-17 07:00:00
2015-03-16 13:07:42:022
1024 14f4
AU Successfully wrote event for AU health state:0
2015-03-16 13:07:42:022
1024 14f4
AU Successfully wrote event for AU health state:0
2015-03-16 13:07:46:919
1024 1194
Report REPORT EVENT: {CB48FD20-D762-4E5E-8CCA-5C27F3CFA04A}
2015-03-16 13:07:41:913-0400 1
148 101
{00000000-0000-0000-0000-000000000000}
0 8024400e
AutomaticUpdates Failure
Software Synchronization Windows Update Client failed to detect with error 0x8024400e.
2015-03-16 13:07:47:022
1024 1194
Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2015-03-16 13:07:47:022
1024 1194
Report WER Report sent: 7.6.7600.320 0x8024400e 00000000-0000-0000-0000-000000000000 Scan 101 Managed
2015-03-16 13:07:47:022
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:14:23:923
1024 1194
PT WARNING: PTError: 0x80041002
2015-03-16 13:14:23:923
1024 1194
Report Uploading 1 events using cached cookie, reporting URL = http://ewd-srv-01.resultstel.net:8530/ReportingWebService/ReportingWebService.asmxDon thank you for the reply.
But I do have the same issue on the other PCs as well on which WMI is good. And also i pointed the above PC to my primary WSUS server which is running windows 2003 and it reported successfully and downloaded the approved updates.
please see the below logs from the same PC after pointing to our wsus running on win2003.
2015-03-17 14:41:08:507
1020 f1c
Inv # Talking to WSUS server = http://atl-wsus-1:8530
2015-03-17 14:41:08:508
1020 f1c
Inv # Downloading Rule file from = http://atl-wsus-1:8530/Inventory/InventoryRules.cab
2015-03-17 14:41:08:508
1020 53c
AU #########
2015-03-17 14:41:08:508
1020 53c
AU ## END ## AU: Search for updates [CallId = {54490DE2-CF7B-4017-A553-6C8C1532E621}]
2015-03-17 14:41:08:508
1020 53c
AU #############
2015-03-17 14:41:08:510
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:510
1020 53c
AU Featured notifications is disabled.
2015-03-17 14:41:08:510
1020 53c
AU AU setting next detection timeout to 2015-03-18 16:13:54
2015-03-17 14:41:08:510
1020 53c
AU Setting AU scheduled install time to 2015-03-18 07:00:00
2015-03-17 14:41:08:510
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approved 5 update(s) for download (NOT for Ux)
2015-03-17 14:41:08:510
1020 53c
AU #############
2015-03-17 14:41:08:511
1020 53c
AU ## START ## AU: Download updates
2015-03-17 14:41:08:511
1020 53c
AU #########
2015-03-17 14:41:08:511
1020 53c
AU # Approved updates = 5
2015-03-17 14:41:08:512
1020 53c
AU AU initiated download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, callId = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
2015-03-17 14:41:08:513
1020 53c
AU AU initiated download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, callId = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
2015-03-17 14:41:08:514
1020 53c
AU AU initiated download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, callId = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
2015-03-17 14:41:08:515
1020 53c
AU AU initiated download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, callId = {B6B35AC2-9BC1-4CFA-8421-D666C79464AD}
2015-03-17 14:41:08:516
1020 53c
AU AU initiated download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, callId = {F0D00A6F-36BC-4680-9BE4-4005742A2C93}
2015-03-17 14:41:08:516
1020 53c
AU Setting AU scheduled install time to 2015-03-18 07:00:00
2015-03-17 14:41:08:516
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:516
1020 53c
AU AU setting pending client directive to 'Download Progress'
2015-03-17 14:41:08:518
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:518
1020 53c
AU # Pending download calls = 5
2015-03-17 14:41:08:518
1020 53c
AU <<## SUBMITTED ## AU: Download updates
2015-03-17 14:41:08:520
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:964
1020 f1c
Misc Validating signature for C:\Windows\SoftwareDistribution\Inventory\InventoryRule\InventoryRules.cab with dwProvFlags 0x00000080:
2015-03-17 14:41:08:976
1020 f1c
Misc Microsoft signed: NA
2015-03-17 14:41:08:993
1020 f1c
Inv # Inventory Rule id = 8226C3A1-70D4-4848-B441-1555AC820A23, version = 1.0
2015-03-17 14:41:09:022
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:086
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:118
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:150
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:182
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:214
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:246
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:278
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:310
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:342
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:374
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:406
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:438
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:471
1020 f1c
PT WARNING: PTError: 0x80041002
2015-03-17 14:41:10:590
1020 f1c
Inv #########
2015-03-17 14:41:10:590
1020 f1c
Inv ## END ## Inv: Inventory Collection
2015-03-17 14:41:10:590
1020 f1c
Inv #############
2015-03-17 14:41:10:592
1020 f1c
DnldMgr *************
2015-03-17 14:41:10:592
1020 f1c
DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:10:592
1020 f1c
DnldMgr *********
2015-03-17 14:41:10:592
1020 f1c
DnldMgr * Call ID = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
2015-03-17 14:41:10:592
1020 f1c
DnldMgr * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2015-03-17 14:41:10:592
1020 f1c
DnldMgr * Updates to download = 1
2015-03-17 14:41:10:592
1020 f1c
Agent * Title = Security Update for Windows 7 (KB3029944)
2015-03-17 14:41:10:592
1020 f1c
Agent * UpdateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202
2015-03-17 14:41:10:592
1020 f1c
Agent * Bundles 1 updates:
2015-03-17 14:41:10:592
1020 f1c
Agent * {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
2015-03-17 14:41:10:598
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202] ***********
2015-03-17 14:41:10:599
1020 f1c
DnldMgr * Queueing update for download handler request generation.
2015-03-17 14:41:10:599
1020 f1c
DnldMgr Generating download request for update {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
2015-03-17 14:41:13:863
1020 f1c
Handler Generating request for CBS update CF9A0A9F-EA32-4B84-8B11-647F8DE3432C in sandbox C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b
2015-03-17 14:41:13:863
1020 f1c
Handler Selected payload type is ptExpress
2015-03-17 14:41:13:863
1020 f1c
Handler Detected download state is dsStart
2015-03-17 14:41:13:863
1020 f1c
Handler Adding windows6.1-kb3029944-x86-express.cab (entire file) to request list.
2015-03-17 14:41:13:864
1020 f1c
Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2015-03-17 14:41:13:864
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202] ***********
2015-03-17 14:41:16:436
1020 f1c
DnldMgr * BITS job initialized, JobId = {675985CD-3133-4157-9D02-06CC33C29C49}
2015-03-17 14:41:16:473
1020 f1c
DnldMgr * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3029944-x86-express_0c21886fd0931285b2d3a29773d3673c947f60b3.cab to C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b\windows6.1-kb3029944-x86-express.cab
(full file).
2015-03-17 14:41:16:644
1020 f1c
Agent *********
2015-03-17 14:41:16:644
1020 f1c
Agent ** END ** Agent: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:644
1020 f1c
Agent *************
2015-03-17 14:41:16:645
1020 f1c
DnldMgr *************
2015-03-17 14:41:16:645
1020 f1c
DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:645
1020 f1c
DnldMgr *********
2015-03-17 14:41:16:645
1020 f1c
DnldMgr * Call ID = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
2015-03-17 14:41:16:645
1020 f1c
DnldMgr * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2015-03-17 14:41:16:645
1020 f1c
DnldMgr * Updates to download = 1
2015-03-17 14:41:16:645
1020 f1c
Agent * Title = Security Update for Windows 7 (KB3004361)
2015-03-17 14:41:16:645
1020 f1c
Agent * UpdateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203
2015-03-17 14:41:16:645
1020 f1c
Agent * Bundles 1 updates:
2015-03-17 14:41:16:645
1020 f1c
Agent * {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
2015-03-17 14:41:16:648
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203] ***********
2015-03-17 14:41:16:649
1020 f1c
DnldMgr * Queueing update for download handler request generation.
2015-03-17 14:41:16:649
1020 f1c
DnldMgr Generating download request for update {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
2015-03-17 14:41:16:678
1020 f1c
Handler Generating request for CBS update 151B27A0-4EA8-428F-BE06-C90A3CF0C2CA in sandbox C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25
2015-03-17 14:41:16:678
1020 f1c
Handler Selected payload type is ptExpress
2015-03-17 14:41:16:678
1020 f1c
Handler Detected download state is dsStart
2015-03-17 14:41:16:678
1020 f1c
Handler Adding windows6.1-kb3004361-x86-express.cab (entire file) to request list.
2015-03-17 14:41:16:687
1020 f1c
Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2015-03-17 14:41:16:687
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203] ***********
2015-03-17 14:41:16:732
1020 f1c
DnldMgr * BITS job initialized, JobId = {27F85F04-0E56-4BFA-93E3-4D6BCB3ECB4F}
2015-03-17 14:41:16:758
1020 f1c
DnldMgr * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2014/12/windows6.1-kb3004361-x86-express_47f37958063afd2521ca42de8904b55d1aa85b89.cab to C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25\windows6.1-kb3004361-x86-express.cab
(full file).
2015-03-17 14:41:16:809
1020 f1c
Agent *********
2015-03-17 14:41:16:809
1020 f1c
Agent ** END ** Agent: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:809
1020 f1c
Agent *************
2015-03-17 14:41:16:811
1020 f1c
DnldMgr *************
2015-03-17 14:41:16:811
1020 f1c
DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:811
1020 f1c
DnldMgr *********
2015-03-17 14:41:16:811
1020 f1c
DnldMgr * Call ID = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
2015-03-17 14:41:16:811
1020 f1c
DnldMgr * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2015-03-17 14:41:16:811
1020 f1c
DnldMgr * Updates to download = 1
2015-03-17 14:41:16:811
1020 f1c
Agent * Title = Security Update for Windows 7 (KB3031432)
2015-03-17 14:41:16:811
1020 f1c
Agent * UpdateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203
2015-03-17 14:41:16:811
1020 f1c
Agent * Bundles 1 updates:
2015-03-17 14:41:16:811
1020 f1c
Agent * {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
2015-03-17 14:41:16:814
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203] ***********
2015-03-17 14:41:16:815
1020 f1c
DnldMgr * Queueing update for download handler request generation.
2015-03-17 14:41:16:815
1020 f1c
DnldMgr Generating download request for update {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
2015-03-17 14:41:16:843
1020 f1c
Handler Generating request for CBS update EE556F37-7EAC-42B3-BD29-653F98E6E364 in sandbox C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba
2015-03-17 14:41:16:843
1020 f1c
Handler Selected payload type is ptExpress
2015-03-17 14:41:16:843
1020 f1c
Handler Detected download state is dsStart
2015-03-17 14:41:16:843
1020 f1c
Handler Adding windows6.1-kb3031432-x86-express.cab (entire file) to request list.
2015-03-17 14:41:16:844
1020 f1c
Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2015-03-17 14:41:16:845
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203] ***********
2015-03-17 14:41:16:881
1020 f1c
DnldMgr * BITS job initialized, JobId = {6C5B3B60-DB8B-4B6F-9E40-D99CA43B366D}
2015-03-17 14:41:16:906
1020 f1c
DnldMgr * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3031432-x86-express_fb5326e90facfe6de39cf44fc4ed5ec630968ba5.cab to C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba\windows6.1-kb3031432-x86-express.cab
(full file). -
WSUS on server 2012 fails to open
I successfully installed WSUS role on server 2012 R2 and pointed its database to SQL 2012 during installation. I was prompted to specify the instance name, but since the sql is installed on the same server I entered the server name as was able to verify
the connection. Database was successfully created in SQL, but when I try to open WSUS console, it opens up but does not connect to its service.
Came across someone else's post with a similar problem, but using wsusutil.exe postinstall SQL_INSTANCE_NAME=<database server name> fails.
http://blogs.technet.com/b/reshard_sharps_blog/archive/2013/08/18/wsus-post-deployment-configuration-fails.aspx
I didn't specify CONTENT_DIR=C:\Wsus as I don't want to store updates locally until additional storage becomes available.
PS C:\Program Files\Update Services\tools> .\WsusUtil.exe postinstall SQL_INSTANCE_NAME=W2012\mssqlserver
Log file is located at C:\Users\Administrator\AppData\Local\Temp\2\tmpC758.tmp
Post install is starting Fatal Error: A network-related or instance-specific error occurred while establishing a connection to SQL Server. The server was not found or was not accessible. Verify that the instance name is correct and that SQL Server is configured
to allow remote connections. (provider: SQL Network Interfaces, error: 25 - Connection string is not valid)2014-03-31 16:40:46 Importing SQLServer.xml...
2014-03-31 16:40:46 Importing WindowsXP64BitEditionVersion2003.xml...
2014-03-31 16:40:46 Importing DefinitionUpdateSusXml.xml...
2014-03-31 16:40:46 Importing ClientServicingApiDetectoid.xml...
2014-03-31 16:40:46 Importing default detectoids succeeded.
2014-03-31 16:40:48 Synchronization in progress. Please cancel synchronization and rerun postinstall again. Exception: System.Net.WebException: The request failed with HTTP status 503: Service Unavailable.
at System.Web.Services.Protocols.SoapHttpClientProtocol.ReadResponse(SoapClientMessage message, WebResponse response, Stream responseStream, Boolean asyncCall)
at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
at Microsoft.UpdateServices.Internal.ApiRemoting.GetServerVersion()
at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.GetServerVersion()
at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer.CreateUpdateServer(String serverName, Boolean useSecureConnection, Int32 portNumber)
at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer..ctor(Boolean bypassApiRemoting)
at Microsoft.UpdateServices.Setup.StartServer.StartServer.FixSubscriptionCategories()
2014-03-31 16:40:48 StartServer encountered errors. Exception=Synchronization in progress. Please cancel synchronization and run postinstall again.
2014-03-31 16:40:48 Microsoft.UpdateServices.Administration.CommandException: Failed to start and configure the WSUS service
at Microsoft.UpdateServices.Administration.PostInstall.Run()
at Microsoft.UpdateServices.Administration.PostInstall.Execute(String[] arguments) -
WSUS Downstream server not downloading updates
I have a windows 2012R2 wsus server setup running wsus and getting updates fine from Microsoft Updates. We will call this server A in this example.
I have a downstream server that is windows 2012r2 and has wsus installed. We can call this server B. It is configured to use "Update Source" and point to A to get its updates. SSL is not being used.
Server B says it syncs fine with no errors. However, when i look in the content folder I see the folders (0A, 2A, 2F etc..) but they do not contain any files. When i run wsusutil checkhealth the following error comes up in event viewer.
The WSUS content directory is not accessible. System.Net.WebException: The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType
type, HealthEventLogger logger)
Any SuggesitonsWhen i run wsusutil checkhealth the following error comes up in event viewer.
The WSUS content directory is not accessible. System.Net.WebException:
The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType type, HealthEventLogger logger)
Any Suggesitons
Looks like the content store, specifically the /Content v-dir in IIS, is not configured correctly.
If so, it's also possible that the upstream server is not downloading content correctly from Microsoft. And if the downstream server cannot get to /Content, neither can any of the clients of the upstream server.
Start by inspecting the ApplicationEventLog on the upstream server for any evidence of download failures. If they don't exist, then this could simply be an issue with IIS. Verify that the /Content v-dir is configured to point to the correct location of the
~\WSUSContent folder.
Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
SolarWinds Head Geek
Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
http://www.solarwinds.com/gotmicrosoft
The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds. -
WSUS Replica server version limitations.
Hello, I am trying to find which WSUS upstream server versions can stream to which WSUS downstream server versions. Can WSUS 6.3 stream to WSUS 2.0? Etc.
Hi Lucas,
2.0 is no longer supported, but 3.0 SP2, 6.2 (2012) & 6.3 (2012R2) can inter-operate providing kb2734608 is installed first on the WSUS 3.0 SP2 servers.
https://social.technet.microsoft.com/Forums/en-US/35ed689a-8b78-424e-802d-9e335e07fcfe/wsus-6-upstream-server-will-support-wsus-3-sp2-downstream-server-or-not?forum=winserverwsus
If you find the answer of assistance please "Vote as Helpful"and/or "Mark as Answer" where applicable. This helps others to find solutions for there issues, and recognises contributions made to the community :) -
Computers not appearing in WSUS downstream replica server
Hello guys,
I need your advice on the setup of the replica servers. I currently installed a WSUS replica downstream server on one of our locations for the clients/servers in the same place to get the updates locally.
Now we are on Server 2012, on this box has WDS service working and I have decided to setup a WSUS replica here. So added WSUS role & SSL is enabled, so ports 8531 & 8530 are allowing traffic on the replica server. Now synching works fine with the
upstream server as far as updates & computer GROUPS were synch fine. Now the issue, is the computers are not showing up in the computer groups for the replica server in contrast with the upstream which has the computers. What could be the reason?
I have configured already the GPO for the clients intended to get updates for the replica, client side targeting & "Specify a MS intranet location..." is configured with the REPLICA servername:port. Am I missing anything? Please help..
Thank you, MonHi Mon Laq,
Please check your upstream and downstream server have any event occur, the client which not reporting must have error log.
Check if name resolution is working for parent server from this replica server, GPO were not applied correctly, please to confirm the sync between the upstream
and downstream server is working properly,
The following similar thread solution you can refer first.
Clients not installing updates from Downstream WSUS Server
http://social.technet.microsoft.com/Forums/windowsserver/en-US/3399a578-ddb0-4a66-9594-f3caa490e48d/clients-not-installing-updates-from-downstream-wsus-server
I’m glad to be of help to you!
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. -
WSUS 4 Server as downstream server in a WSUS 3 Infrastructur
Hi,
we will migrate the Infrasctructur on a remote location to Windows Server 2012. The Master WSUS Server is a WSUS3 installed on Windows Server 2008.
It is possible to connect a WSUS4 downstream Server to a WSUS3 upstream Server? The clients in the remote lokation will connect the WSUS4 downstream Server....
Regards, MichaelHello Michael,
I think this answer from Lawrence could helps you : http://social.technet.microsoft.com/Forums/windowsserver/en-US/8aad057d-fd9b-4e22-8808-33118deefc01/wsus-server-2008-downstream-to-a-2012-server
Indeed if a fix exists to have downstream in 2008R2 connect to 2012, it should be working on the other side.
So first of all, try to patch both server and give us some feedback.
Regards,
TiGrOu. -
WSUS 6 upstream server will support WSUS 3 SP2 downstream server or not
In our company WSUS upstream server operating system is windows 2012 r2. I would like to know can we install downstream server in windows 2008 r2 (WSUS 3.0 sp2) it will download approved patches from upstream server.
WSUS 6 upstream server will support WSUS 3.0 SP2 downstream or not?No post-installation instruction in the KB article.
Then you should READ the article again. Let me help:
How to apply this update
We recommend that you synchronize all WSUS servers after you apply this update. If you have a hierarchy of WSUS servers, apply this update, and then synchronize your servers from the top of the hierarchy on down. To synchronize your servers in this manner,
follow these steps:
Note Before computers that are running Windows 8 or Windows Server 2012 can be updated by WSUS 3.2 servers, you must complete these steps.
Start the process with WSUS 3.0 SP2 that synchronizes with Microsoft Update.
Apply this update.
Start a synchronization.
Wait for the synchronization to succeed.
Repeat steps 2 through 4 for each WSUS 3.0 SP2 server that synchronizes to the server that you just updated.
Known issues with this update
If you have Windows 8 or Windows Server 2012 clients that synchronized with WSUS 3SP2 before you applied this update, wait for the update to be applied to the WSUS servers, and then follow these steps:
On the affected client, open cmd.exe in elevated mode
Type the following commands. Make sure that you press Enter after you type each command:
Net stop wuauserv
rd /s %windir%\softwaredistribution\
Net start wuauserv
Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
SolarWinds Head Geek
Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
http://www.solarwinds.com/gotmicrosoft
The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds. -
Can a WSUS 3.0 sp2 server be a downstream server of WSUS 2012 R2?
Can a WSUS 3.0 sp2 server be a downstream server of WSUS 2012 R2?
Am 17.04.2014 schrieb silverandblackaholic2:
Can a WSUS 3.0 sp2 server be a downstream server of WSUS 2012 R2?
Yes, you ca. But if you install WSUS on a W2008R2 have a look at the
Version from your WSUS 3.0 SP2.
WSUS 3.0 (SP2): Build 3.2.7600.226
WSUS 3.0 (SP2) + KB2720211: Build 3.2.7600.251
WSUS 3.0 (SP2) + KB2734608: Build 3.2.7600.256
WSUS 3.0 (SP2) + KB2828185: Build 3.2.7600.262
The Version you will find on the Startpage from WSUS:
http://www.wsus.de/images/wsus-version.png
Servus
Winfried
Gruppenrichtlinien
WSUS Package Publisher
HowTos zum WSUS Package Publisher
NNTP-Bridge für MS-Foren -
I need some help please. I have read every forum I can think of and google for months and can not find a solution.
I have 1 Primary WSUS Server and 3 Replica servers. Often times systems are placed into the unassigned group on the replica servers and then after a syncronization they will show up on the primary server in the unassigned group.
The problem is that when I log into a replica server and move these computers to another group, they never get moved on the primary server. They will constantly remain on the primary server in the unassigned group. I know this is probably something simple that I have overlooked in the documentation, but believe me I have tried everything that I can come up with. Please help! :)> So when you move them into the appropriate group... this is not remembered on the server.
It is... but only until the *client* (which believe that it is authoritative for its group memberships -- as a result of the policy configuation) tells the server otherwise. Then the server has the group membership as reported by the client machine.
> I thought that when the client went to contact the server again and said I'm in this group (which happens to not exist on the server)
If the *group* does not exist on the server, the client will be seen only in "All Computers". The group name reported by the client is still stored in the database as an attribute of the client, but because the console is not configured to display that group, the client computer does not appear in any group except "All Computers".
> the server would then say, yes you are; however the admin has told me that you really belong to this other group.
No, the server never assumes it is authoritative for anything coming from the client. The WUAgent is the authoritative source for everything in the WSUS environment (except Update Approvals <g>). If the WUAgent is not configured to use "policy-based groups", then the WUAgent will query the WSUS Server to determine which group(s) the client belongs to, and if the server is configured in Options | Computers to "Use the console... to assign groups", then it will answer with the currently stored group name(s). However, if the WUAgent is given that information via policy, then it doesn't ask for anything, it *tells* the server what the facts are, and those facts are used to update the WSUS database.
> On the downstream server they remain in the appropriate groups after I move them.
> Its only on the upstream server that I have this problem.
There are several configuration parameters that could be contributing to this. We should start by verifying the correct settings for all of them.
1. Options | Computers on the replica server is set to "Use group policy".
2. Options | Computers on the upstream server is set to "Use group policy".
3. The policy configured group exists on the upstream server.
4. The policy configured group has replicated to the replica server.
5. The policy has been properly applied to the client system.
6. The client appears in the correct group(s) on the replica server, according to the group(s) configured in the policy.
7. The replica server has synchronized successfully with the upstream server since the client system last *reported* to the replica.
8. The upstream server has "Reporting Rollup" enabled.
9. Sufficient time has passed to allow the upstream server to complete the asynchronous updating of the reporting data from the replica server.
If all of the above is correct, and the client system still appears in "Unassigned Computers" on the upstream server, then we'll have something that needs further investigation. Most likely, though, is that one of those items enumerated is not copasetic and is interfering with the correct recording of the client system's correct group membership. Once corrected, the upstream server will properly reflect the actual group memberhips as configured in policy.
Lawrence Garvin, M.S., MCITP:EA, MCDBA
Principal/CTO, Onsite Technology Solutions, Houston, Texas
Microsoft MVP - Software Distribution (2005-2009) -
WSUS Event 10032 The server is failing to download some updates
Hi,
we receive this error message every 6 hours on our WSUS-server:
Log Name: Application
Source: Windows Server Update Services
Date: 2014-02-26 09:56:26
Event ID: 10032
Task Category: 7
Level: Error
Keywords: Classic
User: N/A
Computer: %Computer%
Description:
The server is failing to download some updates.
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Windows Server Update Services" />
<EventID Qualifiers="0">10032</EventID>
<Level>2</Level>
<Task>7</Task>
<Keywords>0x80000000000000</Keywords>
<TimeCreated SystemTime="2014-02-26T08:56:26.000000000Z" />
<EventRecordID>567460</EventRecordID>
<Channel>Application</Channel>
<Computer>%Computer%</Computer>
<Security />
</System>
<EventData>
<Data>The server is failing to download some updates.</Data>
</EventData>
</Event>
The SoftwareDistribution.log shows a couple of these messages for different items:
2014-02-24 04:43:22.509 UTC Info WsusService.15 ContentSyncAgent.WakeUpWorkerThreadProc Processing Item: be885bda-e4e2-4b3b-92f0-d4b4e31428e7, State: 6
2014-02-24 04:43:22.525 UTC Error WsusService.15 ContentSyncAgent.VerifyCRC Could not find file 'D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab'.
at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyCRC(String fileLocalPath)
at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyFile(String fileLocalPath)
at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.WakeUpWorkerThreadProc()
at System.Threading.ExecutionContext.runTryCode(Object userData)
at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
at System.Threading.ThreadHelper.ThreadStart()
2014-02-24 04:43:22.525 UTC Error WsusService.15 ContentSyncAgent.WakeUpWorkerThreadProc Importing file 904517558197FEC77082AEFD6885106590744CFB caught exception at VerifyFile: System.IO.FileNotFoundException: Could not find file 'D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab'.
File name: 'D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab'
at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyCRC(String fileLocalPath)
at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyFile(String fileLocalPath)
at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.WakeUpWorkerThreadProc()
at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.WakeUpWorkerThreadProc()
at System.Threading.ExecutionContext.runTryCode(Object userData)
at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
at System.Threading.ThreadHelper.ThreadStart()
2014-02-24 04:43:22.525 UTC Warning WsusService.15 ContentSyncAgent.WakeUpWorkerThreadProc Invalid file deleted: D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab
2014-02-24 04:43:22.525 UTC Info WsusService.15 ContentSyncAgent.ContentSyncSPFireStateMachineEvent ContentSyncAgent firing Event: FileVerificationFailed for Item: be885bda-e4e2-4b3b-92f0-d4b4e31428e7
I already checked updates on the WSUS console and all approved updates have File status "Ready for install". The .cab-files mentioned in the SoftwareDistribution.log does not exist but i cannot see which updates failed to download.
We also use Secunia CSI to update applications like Adobe Flash through WSUS.
Windows Server 2008 R2
WSUS 3.0 Version 3.2.7600.226
Thanks
MaikHi
Manjunath,
i
know this thread and has verified all settings and they are ok.
Regards,
Maik -
Here is my issue.
We have WSUS (version 3.2.7600.226) setup on Windows server 2003 x86 and planned to migrate to the new WSUS on windows server 2012 R2 box and once done then retired the 2003 server.
The way it was done was to create separate wsus on server 2012 and then make it a downstream server. Now the groups are replicated to the downstream server, however it is not pulling the computers. Event log showed the following errors Event ID 13051 no
client computers have ever contacted the server. Not sure what the issue is. synchronization also fail with error message An HTTP error occurred.
WebException: Unable to connect to the remote server ---> System.Net.Sockets.SocketException: No connection could be made because the target machine actively refused it 192.168.x.x:8530
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
at System.Net.HttpWebRequest.GetRequestStream()
at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetAuthConfig()
at Microsoft.UpdateServices.ServerSync.ServerSyncLib.InternetGetServerAuthConfig(ServerSyncProxy proxy, WebServiceCommunicationHelper webServiceHelper)
at Microsoft.UpdateServices.ServerSync.ServerSyncLib.Authenticate(AuthorizationManager authorizationManager, Boolean checkExpiration, ServerSyncProxy proxy, Cookie cookie, WebServiceCommunicationHelper webServiceHelper)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.SyncConfigUpdatesFromUSS()
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
I've asked security team to check firewall.
Also once this is resolved can we make it standalone server and remove the upstream server ?
If not What will be the easiest and best way to migrate WSUS from server 2003 to server 2012 ?It was a firewall issue. I was able to communicate with the upstream server.
Now the next part. So I reconfigure my downstream server (server2) as an upstream server and synchronize with microsoft. I configured the clients to communicate with the new wsus server. After applying gpo and everything the clients are still not showing
up. I checked the Windowsupdate.log on client computer and I'm getting the following errors
2014-11-04 09:52:03:065
1836 45e0
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-11-04 09:52:03:065
1836 45e0
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://server2.domain.org/ClientWebService/client.asmx
2014-11-04 09:52:03:065
1836 45e0
EP Got WSUS SimpleTargeting URL: "http://server2.domain.org"
2014-11-04 09:52:03:065
1836 45e0
IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 85; does use network; is at background priority
2014-11-04 09:52:03:065
1836 45e0
PT Initializing simple targeting cookie, clientId = 8d9331e5-3fbf-4a44-bd40-26e3cc2dea3a, target group = Testing, DNS name = machine1.domain.org
2014-11-04 09:52:03:065
1836 45e0
PT Server URL = http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Nws Failure: errorCode=0x803d000d
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: There was an error communicating with the endpoint at 'http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: The server returned HTTP status code '404 (0x194)' with text 'Not Found'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: The requested resource was not found.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: MapToSusHResult mapped Nws error 0x803d000d to 0x80244019
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Web service call failed with hr = 80244019.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Current service auth scheme='None'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
2014-11-04 09:52:04:037
1836 45e0
WS FATAL: OnCallFailure failed with hr=0X80244019
2014-11-04 09:52:04:037
1836 45e0
WS FATAL: NwsCallWithRetries<Functor>( Functor(_clientId, _targetGroupName, _dnsName, &_result)) failed with hr=0x80244019
2014-11-04 09:52:04:037
1836 45e0
IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 85) stopped; does use network; is at background priority
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: PopulateAuthCookies failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: RefreshCookie failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: RefreshPTState failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT + SyncUpdates round trips: 0
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: Sync of Updates: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: SyncServerUpdatesInternal failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
Agent * WARNING: Failed to synchronize, error = 0x80244019
2014-11-04 09:52:04:038
1836 45e0
Agent * WARNING: Exit code = 0x80244019
2014-11-04 09:52:04:038
1836 45e0
Agent *********
2014-11-04 09:52:04:038
1836 45e0
Agent ** END ** Agent: Finding updates [CallerId = Windows Update Command Line Id = 1]
2014-11-04 09:52:04:038
1836 45e0
Agent *************
2014-11-04 09:52:04:038
1836 45e0
Agent WARNING: WU client failed Searching for update with error 0x80244019
I'm not sure why is it not able to communicate. Any help will be appreciated. -
New WSUS on Server 2012 - problem with win8 clients
Hi,
Two weeks ago we created a new Server 2012 and installed the WSUS role from scratch on it. Its version number is: 6.2.9200.16384. It replaced a Server 2008 WSUS server. After some time all the win7 clients updated and reported as
they did on the old and replaced server.
However all our win8 clients refuse to update against this server. They show correctly up in WSUS server console each with 107 needed updates day after day. We have rebooted them and done numerous wuauclt /resetauthorization /detectnow and wuauclt
/detectnow /reportnow, but to no avail.
I paste in some lines from a win8 client winupdate log at the end of this message if someone can figure out what I have to do to get these clients update as they did against the old wsus server. Thanks for help on this issue.
regards Tor
2014-02-03 08:33:38:008 920 153c Agent *************
2014-02-03 08:33:38:008 920 153c Agent ** START ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:38:008 920 153c Agent *********
2014-02-03 08:33:38:008 920 153c Agent * Online = Yes; Ignore download priority = No
2014-02-03 08:33:38:008 920 153c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-02-03 08:33:38:008 920 153c Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-02-03 08:33:38:008 920 153c Agent * Search Scope = {Machine & All Users}
2014-02-03 08:33:38:008 920 153c Agent * Caller SID for Applicability: S-1-5-18
2014-02-03 08:33:38:008 920 153c Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\wuredir.cab:
2014-02-03 08:33:38:008 920 1990 AU >>## RESUMED ## AU: Search for updates [CallId = {ABC7E77F-635F-4192-9B92-CBF9B1CB8AB0} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-02-03 08:33:38:008 920 1990 AU # 0 updates detected
2014-02-03 08:33:38:008 920 1990 AU #########
2014-02-03 08:33:38:008 920 1990 AU ## END ## AU: Search for updates [CallId = {ABC7E77F-635F-4192-9B92-CBF9B1CB8AB0} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-02-03 08:33:38:008 920 1990 AU #############
2014-02-03 08:33:38:023 920 153c Misc Microsoft signed: Yes
2014-02-03 08:33:38:023 920 153c Misc Infrastructure signed: Yes
2014-02-03 08:33:38:023 920 153c EP Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "http://fe1.ws.microsoft.com/w8/2/redir/storeauth.cab"
2014-02-03 08:33:38:023 920 153c Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\117CAB2D-82B1-4B5A-A08C-4D62DBEE7782\wuredir.cab:
2014-02-03 08:33:38:039 920 153c Misc Microsoft signed: Yes
2014-02-03 08:33:38:039 920 153c Misc Infrastructure signed: Yes
2014-02-03 08:33:38:039 920 153c EP Got 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 redir Client/Server URL: "https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx"
2014-02-03 08:33:38:055 920 153c PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-02-03 08:33:38:055 920 153c PT + ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}, Server URL = https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx
2014-02-03 08:33:38:055 920 153c Agent Reading cached app categories using lifetime 604800 seconds
2014-02-03 08:33:38:055 920 153c Agent Read 0 cached app categories
2014-02-03 08:33:39:211 920 153c Agent * Added update {E7FF661C-6A03-4387-A1EE-1D723B52EF60}.3 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {A9A0E183-0667-46D6-84E4-17CEBCEE5A22}.1 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
2014-02-03 08:33:39:211 920 153c Agent * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
2014-02-03 08:33:39:211 920 153c Agent * Found 13 updates and 31 categories in search; evaluated appl. rules of 69 out of 94 deployed entities
2014-02-03 08:33:39:211 920 153c Agent *********
2014-02-03 08:33:39:211 920 153c Agent ** END ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:211 920 153c Agent *************
2014-02-03 08:33:39:211 920 1a64 Report REPORT EVENT: {0786C161-F6DC-4842-85D6-9506124654AD} 2014-02-03 08:33:38:008+0100 1
147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 Windows Update Command Line Success Software Synchronization
Windows Update Client successfully detected 0 updates.
2014-02-03 08:33:39:211 920 1a64 Report REPORT EVENT: {1E5D9728-220F-44A3-8BCC-ADE69687531D} 2014-02-03 08:33:38:008+0100 1
156 [AGENT_STATUS_30] 101 {00000000-0000-0000-0000-000000000000} 0 0 Windows Update Command Line Success Pre-Deployment Check
Reporting client status.
2014-02-03 08:33:39:211 920 1a64 Report REPORT EVENT: {57BAB7D0-685B-4D73-BDF7-82AFCE8675B0} 2014-02-03 08:33:39:211+0100 1
147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 Windows Update Command Line Success Software Synchronization
Windows Update Client successfully detected 13 updates.
2014-02-03 08:33:39:211 920 1a64 Report CWERReporter finishing event handling. (00000000)
2014-02-03 08:33:39:227 920 153c Agent *************
2014-02-03 08:33:39:227 920 153c Agent ** START ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:227 920 153c Agent *********
2014-02-03 08:33:39:227 920 153c Agent * Online = No; Ignore download priority = No
2014-02-03 08:33:39:227 920 153c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-02-03 08:33:39:227 920 153c Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-02-03 08:33:39:227 920 153c Agent * Search Scope = {Current User}
2014-02-03 08:33:39:227 920 153c Agent * Caller SID for Applicability: S-1-5-21-4260610346-2664610402-3334891387-1155
2014-02-03 08:33:39:258 920 153c Agent * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {A9A0E183-0667-46D6-84E4-17CEBCEE5A22}.1 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
2014-02-03 08:33:39:258 920 153c Agent * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
2014-02-03 08:33:39:258 920 153c Agent * Found 11 updates and 29 categories in search; evaluated appl. rules of 58 out of 94 deployed entities
2014-02-03 08:33:39:258 920 153c Agent *********
2014-02-03 08:33:39:258 920 153c Agent ** END ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:258 920 153c Agent *************
2014-02-03 08:33:39:258 920 153c Agent *************
2014-02-03 08:33:39:258 920 153c Agent ** START ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:258 920 153c Agent *********
2014-02-03 08:33:39:258 920 153c Agent * Online = No; Ignore download priority = No
2014-02-03 08:33:39:258 920 153c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-02-03 08:33:39:258 920 153c Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-02-03 08:33:39:258 920 153c Agent * Search Scope = {Current User}
2014-02-03 08:33:39:258 920 153c Agent * Caller SID for Applicability: S-1-5-21-2212025170-3189117132-1219651784-500
2014-02-03 08:33:39:305 920 153c Agent * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
2014-02-03 08:33:39:305 920 153c Agent * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
2014-02-03 08:33:39:305 920 153c Agent * Found 11 updates and 30 categories in search; evaluated appl. rules of 60 out of 94 deployed entities
2014-02-03 08:33:39:305 920 153c Agent *********
2014-02-03 08:33:39:305 920 153c Agent ** END ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:305 920 153c Agent *************
2014-02-03 08:33:39:305 920 153c Agent *************
2014-02-03 08:33:39:305 920 153c Agent ** START ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:305 920 153c Agent *********
2014-02-03 08:33:39:305 920 153c Agent * Online = No; Ignore download priority = No
2014-02-03 08:33:39:305 920 153c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-02-03 08:33:39:305 920 153c Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-02-03 08:33:39:305 920 153c Agent * Search Scope = {Current User}
2014-02-03 08:33:39:305 920 153c Agent * Caller SID for Applicability: S-1-5-21-4260610346-2664610402-3334891387-1323
2014-02-03 08:33:39:352 920 153c Agent * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
2014-02-03 08:33:39:352 920 153c Agent * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
2014-02-03 08:33:39:352 920 153c Agent * Found 11 updates and 30 categories in search; evaluated appl. rules of 60 out of 94 deployed entities
2014-02-03 08:33:39:352 920 153c Agent *********
2014-02-03 08:33:39:352 920 153c Agent ** END ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:352 920 153c Agent *************
2014-02-03 08:33:39:352 920 153c Agent *************
2014-02-03 08:33:39:352 920 153c Agent ** START ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:352 920 153c Agent *********
2014-02-03 08:33:39:352 920 153c Agent * Online = No; Ignore download priority = No
2014-02-03 08:33:39:352 920 153c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-02-03 08:33:39:352 920 153c Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-02-03 08:33:39:352 920 153c Agent * Search Scope = {Current User}
2014-02-03 08:33:39:352 920 153c Agent * Caller SID for Applicability: S-1-5-21-4260610346-2664610402-3334891387-1282
2014-02-03 08:33:39:383 920 153c Agent * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
2014-02-03 08:33:39:383 920 153c Agent * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
2014-02-03 08:33:39:383 920 153c Agent * Found 11 updates and 30 categories in search; evaluated appl. rules of 60 out of 94 deployed entities
2014-02-03 08:33:39:383 920 153c Agent *********
2014-02-03 08:33:39:383 920 153c Agent ** END ** Agent: Finding updates [CallerId = Windows Update Command Line]
2014-02-03 08:33:39:383 920 153c Agent *************
2014-02-03 08:33:39:383 920 1990 AU >>## RESUMED ## AU: Search for updates [CallId = {66AF0139-896D-4607-8660-B66D2B58EA26} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-02-03 08:33:39:383 920 1990 AU # 12 updates detected
2014-02-03 08:33:39:383 920 1990 AU #########
2014-02-03 08:33:39:383 920 1990 AU ## END ## AU: Search for updates [CallId = {66AF0139-896D-4607-8660-B66D2B58EA26} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-02-03 08:33:39:383 920 1990 AU #############
2014-02-03 08:33:39:383 920 1990 AU All AU searches complete.
2014-02-03 08:33:39:383 920 1990 AU AU setting next detection timeout to 2014-02-03 10:18:51
2014-02-03 08:33:44:211 920 1a64 Report CWERReporter finishing event handling. (00000000)
2014-02-03 08:41:39:472 920 1a64 EP Got WSUS Client/Server URL: "http://elias:8530/ClientWebService/client.asmx"
2014-02-03 08:41:39:472 920 1a64 PT WARNING: Cached cookie has expired or new PID is available
2014-02-03 08:41:39:472 920 1a64 EP Got WSUS SimpleTargeting URL: "http://elias:8530"
2014-02-03 08:41:39:472 920 1a64 PT Initializing simple targeting cookie, clientId = c5e26849-287b-4b96-ba5d-1489d6fad2f2, target group = , DNS name = dt-ikt-tor.framnes.lan
2014-02-03 08:41:39:472 920 1a64 PT Server URL = http://elias:8530/SimpleAuthWebService/SimpleAuth.asmx
2014-02-03 08:41:39:519 920 1a64 EP Got WSUS Reporting URL: "http://elias:8530/ReportingWebService/ReportingWebService.asmx"
2014-02-03 08:41:39:519 920 1a64 Report Uploading 2 events using cached cookie, reporting URL = http://elias:8530/ReportingWebService/ReportingWebService.asmx
2014-02-03 08:41:39:566 920 1a64 Report Reporter successfully uploaded 2 events.
2014-02-03 08:42:13:212 920 178c Report WARNING: CSerializationHelper:: InitSerialize failed : 0x80070002
2014-02-03 08:43:40:450 920 178c AU ########### AU: Uninitializing Automatic Updates ###########
2014-02-03 08:43:40:450 920 178c WuTask Uninit WU Task Manager
2014-02-03 08:43:40:513 920 178c Service *********
2014-02-03 08:43:40:513 920 178c Service ** END ** Service: Service exit [Exit code = 0x240001]
2014-02-03 08:43:40:513 920 178c Service *************Today I opened Control Panel / Windows Updates and first did a check for new updates (from the WSUS server). Nothing was found and it reported Windows is Updated. Then I clicked the link Check for updates from Microsoft via internet, and
it found around 24 updates.
This is confirmation of the point that I made in the previous post. The updates are *NEEDED* by this system, but the updates were not *AVAILABLE* from the assigned WSUS Server. You were able to get them from Windows Update, but that does not fix your continuing
issue with the WSUS Server.
but it still reported the original 108 Needed updates.
Exactly. As previously noted, the client is functioning perfectly. The problem is NOT with the client; the problem is with the WSUS Server. The updates that this client needed were not AVAILABLE to be downloaded from the WSUS server.
Why this is the case requires further investigation on your part, but is either because the updates are not properly approved, or the update FILES are not yet downloaded from Microsoft to the WSUS server.
It appears that the wsus server doesn't get any information back from the client despite that it displays new Last contact and Last Status report timestamps.
This conclusion is incorrect. The WSUS Server got every bit of information available from the client -- you've confirmed this by the number of updates reported as "Needed" by the Windows Update Agent to the WSUS Server.
I assumed that the log would display if the updates were downloaded or not.
It will log when the updates are actually downloaded. If there's no log entries for updates being downloaded, then they're not being downloaded. If the logfile says "Found 0 updates", then that means exactly what it says: It couldn't find any approved/available
updates to download.
In your case it "Found 11 updates", but now it will be impossible to diagnose that fault, because you went and got them from Windows Update.
All Win8 versions are checked in the WSUS server's Product list so the updates should at least have been downloaded to the server.
This is why understanding the infrastructure is so critical. Your conclusion is invalid based on the premise given, and you may be using improper terminology which only confuses the rest of us as well.
First, selecting updates for synchronization only gets the update metadata (i.e. the detection logic) downloaded to the WSUS database.
The Second Step in this process is to Approve those updates for one or more WSUS Target Groups that contain the appropriate client systems. Following the approval of an update, the WSUS Server downloads the INSTALLATION FILE for that update.
Once the WUAgent sees an approved update and the installation file is available, then the WUAgent will download the file and schedule the update for installation.
Most of the post I read about my problem is about upgrading a 2008 WSUS server to support Win8 / Server 12 clients. When I try to run this update on my Server 12 WSUS it refuses to run (probably because it is for Server 2008).
Yeah.. totally different issue in those posts than what you're describing here.
What should I do to try to track down the problem?
Well.... now that it's 11 days since the logfile was posted, and you've already updated that system, we'll first need to find another system exhibiting the same issue.
Then I'll need to ask a number of questions to properly understand the environment, as well as what you have or have not done.
Then, from there, we can attempt to figure out why your Windows 8 client apparently sees some updates as approved/available but is still not downloading them. We do not yet have sufficient information to even speculate on a possible cause -- there are several.
Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
SolarWinds Head Geek
Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
http://www.solarwinds.com/gotmicrosoft
The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.
Maybe you are looking for
-
Hi I had my iTunes library on an external hard drive which has crashed. The data is unrecoverable. I've now bought a new laptop and I want to rebuild my iTunes library. I found a set of backup discs I created back in 2010 and although they don't repr
-
How to flow the xml in a document?
pls,anyone guide me,how to flow the xml in a document? thanks, screen410099
-
I have transferred my own DVDs to mp4 format to play on my ipad2. I put them on a memory stick to save the moment in the iPad. I bought a camera connection kit/USB kit but I can't get the movies to register - is this possible to do or do I have to pu
-
Hi all, I have a question about allocation. For example there is a property FLAG in product dimension and I have the members in this dimension. Some of them have a "X" and rest have a "Y" in property FLAG. In input schedule i want to enter data in pr
-
HT1689 can't connect to the iTunes
when I try to download a game I can't connect to the iTunes Store at all