- Joined
- Mar 14, 2023
- Messages
- 42,458
You should use the SHA256 hash to verify the integrity of your downloaded Windows Server 2022 ISO. This is the current standard for checksums, ensuring a more accurate verification process than the older SHA1 method.
Steps to Verify Using SHA256:
- Open Command Prompt or PowerShell:
- You can use either the command line or Powershell to compute the hash.
- Run the SHA256 Hash Command:
- Use the following command (make sure you replace
with the actual file path to your ISO):
Code:bash CertUtil -hashfile "" SHA256
- Compare the Output Hash:
- Once you see the computed SHA256 hash in your terminal, compare it against the hash listed on the download site to confirm it matches exactly.
- Use the following command (make sure you replace
Example Command Output
- The format will resemble:
Code:SHA256 hash of file :
- If Hashes Don’t Match:
- If the hash you computed does not match what’s listed on the download site, the ISO may be corrupt, and you should re-download it from a trustworthy source.
Confirm Integrity Before Proceeding
After confirming the hash:- If the hash is accurate and matches perfectly, proceed with the steps we discussed earlier (like mounting the ISO and using it in your DISM commands).
- If the hash doesn’t match, skip trying any repairs with that ISO until you have a correctly verified version.
- Thread Author
- #82
- Joined
- Mar 14, 2023
- Messages
- 42,458
That's great news! Since the SHA256 hash matches, it confirms that your ISO is intact and can be safely used for repairs. Now, let’s proceed with using the ISO to run the DISM command to fix any underlying issues.
Steps to Repair Using the Valid ISO
- Mount the ISO:
- If it’s not already mounted, right-click the ISO file and select Mount. Note the drive letter assigned (e.g.,
D:
).
- If it’s not already mounted, right-click the ISO file and select Mount. Note the drive letter assigned (e.g.,
- Run the DISM Command with Source Option:
- Use the following command to point to the
install.wim
file from your mounted ISO:
Code:bash dism /online /cleanup-image /restorehealth /source:wim:D:\sources\install.wim:1 /limitaccess
- Replace
D:
with the actual drive letter where your ISO is mounted.
- Use the following command to point to the
- Monitor the Output:
- Wait for the command to finish and watch for any errors or confirmation of success.
- If DISM completes successfully, it means the component store was repaired.
- Run System File Checker (SFC):
- After a successful DISM action, run:
Code:bash sfc /scannow
- This will further check integrity and repair system files.
- After a successful DISM action, run:
- Reboot the Server:
- Once both DISM and SFC have completed, restart the server to finalize any changes.
- Retry WSUS Configuration:
- After rebooting, attempt to run the
wsusutil postinstall
command again:
Code:bash wsusutil.exe postinstall SQL_INSTANCE_NAME="YourInstanceName" CONTENT_DIR="D:\WSUS\WSUSCONTENT"
- After rebooting, attempt to run the
If You Encounter Further Errors
- If issues persist during the
postinstall
execution:- Check the WSUSSetup.log and IIS logs for any updated errors.
- Focus on errors similar to previous communications, like those related to IIS configuration or path findability.
Final Notes
- If the DISM actions don’t resolve your issues, we might need to explore deeper into the
WSUSSetup.log
for additional clues. Please keep me posted on the results once you execute these commands!
- Thread Author
- #84
- Joined
- Mar 14, 2023
- Messages
- 42,458
Alright, the persistent 0x800f081f error indicates that DISM still cannot find the necessary source files to complete the operation, even with a valid ISO. Let's tackle this systematically given the ongoing issues:
Steps to Troubleshoot DISM Error 0x800f081f
Step 1: Use the Correct Source from the Mounted ISO
Ensure you're using the correct path and index from the mounted ISO. Since you confirmed the ISO is valid, double-check the following:- Verify Index Number:
- Run this command to confirm the index:
Code:bash dism /Get-WimInfo /WimFile:D:\sources\install.wim
- Note down the actual index number for your version of Windows Server 2022. If the first index returns a mismatch, try using that specific index in the following command.
- Run this command to confirm the index:
- Run DISM with Exact Source:
Run DISM again, ensuring the source parameter is absolutely correct:
Code:bash dism /online /cleanup-image /restorehealth /source:wim:D:\sources\install.wim: /limitaccess
with the correct number found from your
Get-WimInfo
command.
Step 2: Check for File Path Issues
- Since 0x800f081f can also be caused by file path errors or environmental issues:
- Make sure there are no special characters or spaces in your path.
- Temporarily move the ISO to a simpler directory such as
C:\ISO\
and remount it.
Step 3: Confirm Permissions
- The account you're running the commands under must have appropriate permissions:
- Right-click the Command Prompt or PowerShell > Run as Administrator.
- Ensure that the Windows account has full access to both the mounted ISO and its folders.
Step 4: Accessing Windows Updates Online
If you're continuously running into issues finding local source files, try allowing DISM to pull resources online temporarily.- Disable WSUS Temporarily:
Ensure your server can reach Microsoft Update by disabling the "Specify intranet Microsoft update service location" setting in Group Policy:- Open Group Policy Editor (gpedit.msc).
- Navigate to:
Code:Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update
- Disable the setting, then force a policy refresh:
Code:bash gpupdate /force
- Run The Following DISM Command:
Allow it to attempt to pull files from Microsoft directly:
Code:bash dism /online /cleanup-image /restorehealth
Step 5: Examine CBS.log and Use an Alternative Source
- After running DISM with the mounted ISO, check the CBS.log:
- This log may provide more granular error messages:
Code:C:\Windows\Logs\CBS\cbs.log
- This log may provide more granular error messages:
- Use Additional Repair Options:
If issues persist beyond DISM, consider executing a full installation repair:- Mount the ISO again.
- Navigate to the setup.exe file within the ISO and run it. Choose the Upgrade option to repair Windows while keeping settings in place.
Final Notes:
We’re still focused on ensuring the repair capabilities work in your environment. Each iteration tightens up our approach. Let me know how these steps progress and if there are specific errors from the logs that surface after attempting these methods!- Thread Author
- #86
2024-12-09 08:49:27, Info DISM DISM Package Manager: PID=14760 TID=8180 Error in operation: source for package or file not found, ResolveSource() unsuccessful. (CBS HRESULT=0x800f081f) - CCbsConUIHandler::Error
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed finalizing changes. - CDISMPackageManager::Internal_Finalize(hr:0x800f081f)
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 The source files could not be found; their location must be specified using the /source option to restore the feature. - GetCbsErrorMsg
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed processing package changes with session option CbsSessionOptionRepairStoreCorruption - CDISMPackageManager::RestoreHealth(hr:0x800f081f)
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 The source files could not be found; their location must be specified using the /source option to restore the feature. - GetCbsErrorMsg
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed to restore the image health. - CPackageManagerCLIHandler:rocessCmdLine_CleanupImage(hr:0x800f081f)
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed while processing command cleanup-image. - CPackageManagerCLIHandler::ExecuteCmdLine(hr:0x800f081f)
2024-12-09 08:49:27, Info DISM DISM Package Manager: PID=14760 TID=21716 Further logs for online package and feature related operations can be found at %WINDIR%\logs\CBS\cbs.log - CPackageManagerCLIHandler::ExecuteCmdLine
2024-12-09 08:49:27, Info DISM DISM Package Manager: PID=14760 TID=21716 Finalizing CBS core. - CDISMPackageManager::Finalize
2024-12-09 08:49:27, Info DISM DISM Manager: PID=1624 TID=17852 Closing session event handle 0x240 - CDISMManager::CleanupImageSessionEntry
2024-12-09 08:49:27, Info DISM DISM.EXE: Image session has been closed. Reboot required=no.
2024-12-09 08:49:27, Info DISM DISM.EXE:
2024-12-09 08:49:27, Info DISM DISM.EXE: <----- Ending Dism.exe session ----->
2024-12-09 08:49:27, Info DISM DISM.EXE:
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed finalizing changes. - CDISMPackageManager::Internal_Finalize(hr:0x800f081f)
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 The source files could not be found; their location must be specified using the /source option to restore the feature. - GetCbsErrorMsg
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed processing package changes with session option CbsSessionOptionRepairStoreCorruption - CDISMPackageManager::RestoreHealth(hr:0x800f081f)
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 The source files could not be found; their location must be specified using the /source option to restore the feature. - GetCbsErrorMsg
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed to restore the image health. - CPackageManagerCLIHandler:rocessCmdLine_CleanupImage(hr:0x800f081f)
2024-12-09 08:49:27, Error DISM DISM Package Manager: PID=14760 TID=21716 Failed while processing command cleanup-image. - CPackageManagerCLIHandler::ExecuteCmdLine(hr:0x800f081f)
2024-12-09 08:49:27, Info DISM DISM Package Manager: PID=14760 TID=21716 Further logs for online package and feature related operations can be found at %WINDIR%\logs\CBS\cbs.log - CPackageManagerCLIHandler::ExecuteCmdLine
2024-12-09 08:49:27, Info DISM DISM Package Manager: PID=14760 TID=21716 Finalizing CBS core. - CDISMPackageManager::Finalize
2024-12-09 08:49:27, Info DISM DISM Manager: PID=1624 TID=17852 Closing session event handle 0x240 - CDISMManager::CleanupImageSessionEntry
2024-12-09 08:49:27, Info DISM DISM.EXE: Image session has been closed. Reboot required=no.
2024-12-09 08:49:27, Info DISM DISM.EXE:
2024-12-09 08:49:27, Info DISM DISM.EXE: <----- Ending Dism.exe session ----->
2024-12-09 08:49:27, Info DISM DISM.EXE:
- Joined
- Mar 14, 2023
- Messages
- 42,458
Thanks for providing this detailed DISM log output. The recurring 0x800f081f error clearly signifies that DISM is unable to locate the necessary source files during its attempt to repair the Windows image. This type of issue can often stem from a few common causes related to source file access.
Let's break down the resolution into actionable steps:
Step 1: Verify Mounting and Location of the ISO
- Ensure the ISO is Mounted Correctly:
- Verify the drive letter where the ISO is mounted.
- Ensure all necessary files are accessible, especially
install.wim
orinstall.esd
.
- Recheck the Source Path:
Run the following command to explicitly check the availability ofinstall.wim
orinstall.esd
:
Code:bash dism /Get-WimInfo /WimFile:D:\sources\install.wim
- Confirm you get a valid response with the expected Windows Server 2022 images listed.
Step 2: Run DISM with Explicit Source Path
Make sure you are correctly including the source path in your DISM command.- If using
install.wim
:
Code:bash dism /online /cleanup-image /restorehealth /source:wim:D:\sources\install.wim:1 /limitaccess
- If using
install.esd
(change the command for ESD) if needed:
Code:bash dism /online /cleanup-image /restorehealth /source:ESD:D:\sources\install.esd:1 /limitaccess
Step 3: Ensure Network Access
- If the server is configured to connect through WSUS, temporarily disable that setting:
- Navigate to Group Policy Editor (gpedit.msc).
- Under:
Code:Computer Configuration > Administrative Templates > Windows Components > Windows Update
- Disable the "Specify intranet Microsoft update service location".
- Run:
Code:bash gpupdate /force
- Retry the DISM command for the online repair.
Step 4: Analyze the CBS.log for Further Clues
If errors persist:- Look into the CBS logs for additional hints on missing files:
Code:C:\Windows\Logs\CBS\cbs.log
- Key pieces of information can include names of files DISM cannot locate or other errors indicating the nature of the failure.
Step 5: Additional Manual Repair Options
If these steps still yield errors, consider the following alternatives:- In-Place Upgrade Repair:
- Using the same ISO, run
setup.exe
. This option allows Windows to perform a repair and may clear existing corruption:
Code:bash D:\setup.exe
- Using the same ISO, run
- Create a Bootable USB:
- If the ISO mounted method continues to fail, consider creating bootable media using tools like Rufus. Boot from this USB and run repairs.
Summary:
- Mount your valid Windows Server 2022 ISO correctly and ensure all files are intact.
- Try explicitly specifying the source in the DISM command.
- Check CBS log for any missing file references.
- Consider performing an in-place repair if ongoing repair attempts fail.
- Thread Author
- #88
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-iis-legacysnapin_31bf3856ad364e35_10.0.20348.143_none_69b5e8a33c16ae8a\IIS6 Manager.lnk
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-iis-managementconsole_31bf3856ad364e35_10.0.20348.1787_none_302474c6ed69f247\IIS Manager.lnk
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-t..enseserver-tlsbrand_31bf3856ad364e35_10.0.20348.1970_none_f6ceeebeb5fb9c23\tls_branding_config.xml
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-t..enseserver-lrwizdll_31bf3856ad364e35_10.0.20348.2582_none_acb12089639c01ab\LServer_PKConfig.xml
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-iis-legacysnapin_31bf3856ad364e35_10.0.20348.2849_none_2962aeafe4645b4d\IIS6 Manager.lnk
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS
2024-12-09 08:49:26, Info CBS Summary:
2024-12-09 08:49:26, Info CBS Operation: Detect and Repair
2024-12-09 08:49:26, Info CBS Operation result: 0x800f081f
2024-12-09 08:49:26, Info CBS Last Successful Step: Remove staged packages completes.
2024-12-09 08:49:26, Info CBS Total Detected Corruption: 5
2024-12-09 08:49:26, Info CBS CBS Manifest Corruption: 0
2024-12-09 08:49:26, Info CBS CBS Metadata Corruption: 0
2024-12-09 08:49:26, Info CBS CSI Manifest Corruption: 0
2024-12-09 08:49:26, Info CBS CSI Metadata Corruption: 0
2024-12-09 08:49:26, Info CBS CSI Payload Corruption: 5
2024-12-09 08:49:26, Info CBS Total Repaired Corruption: 0
2024-12-09 08:49:26, Info CBS CBS Manifest Repaired: 0
2024-12-09 08:49:26, Info CBS CSI Manifest Repaired: 0
2024-12-09 08:49:26, Info CBS CSI Payload Repaired: 0
2024-12-09 08:49:26, Info CBS CSI Store Metadata refreshed: True
2024-12-09 08:49:26, Info CBS Staged Packages:
2024-12-09 08:49:26, Info CBS CBS Staged packages: 0
2024-12-09 08:49:26, Info CBS CBS Staged packages removed: 0
2024-12-09 08:49:26, Info CBS
2024-12-09 08:49:26, Info CBS Total Operation Time: 143 seconds.
2024-12-09 08:49:26, Info CBS Ensure CBS corruption flag is clear
2024-12-09 08:49:26, Info CBS Not all CSI corruption was fixed, create CorruptionDetectedDuringAcr flag for slow mode reset
2024-12-09 08:49:26, Info CBS CheckSur: hrStatus: 0x800f081f [CBS_E_SOURCE_MISSING], download results: <none>
2024-12-09 08:49:26, Info CBS Count of times corruption detected: 1
2024-12-09 08:49:26, Info CBS Seconds between initial corruption detections: -1
2024-12-09 08:49:26, Info CBS Seconds between corruption and repair: -1
2024-12-09 08:49:26, Info CBS Failed to run Detect and repair. [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Info CBS Reboot mark cleared
2024-12-09 08:49:27, Info CBS Winlogon: Simplifying Winlogon CreateSession notifications
2024-12-09 08:49:27, Info CBS Winlogon: Deregistering for CreateSession notifications
2024-12-09 08:49:27, Info CBS Exec: Processing complete, session(Corruption Repairing): 31148608_3560096482 [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Error CBS Session: 31148608_3560096482 failed to perform store corruption detect and repair operation. [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Info CBS Session: 31148608_3560096482 finalized. Reboot required: no [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Info CBS Failed to FinalizeEx using worker session [HRESULT = 0x800f081f]
2024-12-09 08:49:27, Info CBS Deleting directory: \\?\C:\WINDOWS\CbsTemp\31148608_3560096482\
2024-12-09 08:49:27, Info CBS Moving directory from \\?\C:\WINDOWS\CbsTemp\31148608_3560096482\ to \\?\C:\WINDOWS\CbsTemp\{EDBC6C3E-95AA-4B6D-9B5E-F7EEC8CD9E07}
2024-12-09 08:49:27, Info CBS Deletion of: \\?\C:\WINDOWS\CbsTemp\{EDBC6C3E-95AA-4B6D-9B5E-F7EEC8CD9E07} successful
2024-12-09 08:51:27, Info CBS Trusted Installer is shutting down because: SHUTDOWN_REASON_AUTOSTOP
2024-12-09 08:51:27, Info CBS TiWorker signaled for shutdown, going to exit.
2024-12-09 08:51:27, Info CBS Deleting the contents of directory: \\?\C:\WINDOWS\CbsTemp
2024-12-09 08:51:27, Info CBS Deletion of: \\?\C:\WINDOWS\CbsTemp successful
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: ExecutionEngineFinalize
2024-12-09 08:51:27, Info CBS Execution Engine Finalize
2024-12-09 08:51:27, Info CBS Execution Engine Finalize
2024-12-09 08:51:27, Info CBS Lock: Lock removed: TiWorkerClassFactory, level: 30, total lock:3
2024-12-09 08:51:27, Info CBS Lock: Lock removed: CCbsWorker, level: 5, total lock:2
2024-12-09 08:51:27, Info CBS Ending the TiWorker main loop.
2024-12-09 08:51:27, Info CBS Starting TiWorker finalization.
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: ExecutionEngineFinalize
2024-12-09 08:51:27, Info CBS CBS Engine already deactivated
2024-12-09 08:51:27, Info CBS CBS Engine already deactivated
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: ComponentAnalyzerFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: PackageTrackerFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CoreResourcesUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: SessionManagerFinalize
2024-12-09 08:51:27, Info CBS Lock: Lock removed: CSIInventoryCriticalSection, level: 64, total lock:10
2024-12-09 08:51:27, Info CBS Lock: Lock removed: CCbsSessionManager, level: 11, total lock:9
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CapabilityManagerFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: PublicObjectMonitorFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: Enter vCoreInitializeLock
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: WcpUnload
2024-12-09 08:51:27, Info CSI 00000016 Direct SIL provider: Number of files opened: 66739.
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: DrupUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CfgMgr32Unload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: DpxUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: TurboStackUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsEsdUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsOneSettingsFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsTraceInfoUninitialize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsEventUnregister
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: AppContainerUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: WdsUnload, logging from cbscore will end.
2024-12-09 08:51:27, Info CBS Ending TiWorker finalization.
2024-12-09 08:51:27, Info CBS Ending the TrustedInstaller main loop.
2024-12-09 08:51:27, Info CBS Starting TrustedInstaller finalization.
2024-12-09 08:51:27, Info CBS Winlogon: Stopping notify server
2024-12-09 08:51:27, Info CBS Winlogon: Unloading SysNotify DLL
2024-12-09 08:51:27, Info CBS Lock: Lock removed: WinlogonNotifyLock, level: 8, total lock:6
2024-12-09 08:51:27, Info CBS Ending TrustedInstaller finalization.
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-iis-managementconsole_31bf3856ad364e35_10.0.20348.1787_none_302474c6ed69f247\IIS Manager.lnk
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-t..enseserver-tlsbrand_31bf3856ad364e35_10.0.20348.1970_none_f6ceeebeb5fb9c23\tls_branding_config.xml
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-t..enseserver-lrwizdll_31bf3856ad364e35_10.0.20348.2582_none_acb12089639c01ab\LServer_PKConfig.xml
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS (p) CSI Payload Corrupt (n) amd64_microsoft-windows-iis-legacysnapin_31bf3856ad364e35_10.0.20348.2849_none_2962aeafe4645b4d\IIS6 Manager.lnk
2024-12-09 08:49:26, Info CBS Repair failed: Missing replacement payload.
2024-12-09 08:49:26, Info CBS
2024-12-09 08:49:26, Info CBS Summary:
2024-12-09 08:49:26, Info CBS Operation: Detect and Repair
2024-12-09 08:49:26, Info CBS Operation result: 0x800f081f
2024-12-09 08:49:26, Info CBS Last Successful Step: Remove staged packages completes.
2024-12-09 08:49:26, Info CBS Total Detected Corruption: 5
2024-12-09 08:49:26, Info CBS CBS Manifest Corruption: 0
2024-12-09 08:49:26, Info CBS CBS Metadata Corruption: 0
2024-12-09 08:49:26, Info CBS CSI Manifest Corruption: 0
2024-12-09 08:49:26, Info CBS CSI Metadata Corruption: 0
2024-12-09 08:49:26, Info CBS CSI Payload Corruption: 5
2024-12-09 08:49:26, Info CBS Total Repaired Corruption: 0
2024-12-09 08:49:26, Info CBS CBS Manifest Repaired: 0
2024-12-09 08:49:26, Info CBS CSI Manifest Repaired: 0
2024-12-09 08:49:26, Info CBS CSI Payload Repaired: 0
2024-12-09 08:49:26, Info CBS CSI Store Metadata refreshed: True
2024-12-09 08:49:26, Info CBS Staged Packages:
2024-12-09 08:49:26, Info CBS CBS Staged packages: 0
2024-12-09 08:49:26, Info CBS CBS Staged packages removed: 0
2024-12-09 08:49:26, Info CBS
2024-12-09 08:49:26, Info CBS Total Operation Time: 143 seconds.
2024-12-09 08:49:26, Info CBS Ensure CBS corruption flag is clear
2024-12-09 08:49:26, Info CBS Not all CSI corruption was fixed, create CorruptionDetectedDuringAcr flag for slow mode reset
2024-12-09 08:49:26, Info CBS CheckSur: hrStatus: 0x800f081f [CBS_E_SOURCE_MISSING], download results: <none>
2024-12-09 08:49:26, Info CBS Count of times corruption detected: 1
2024-12-09 08:49:26, Info CBS Seconds between initial corruption detections: -1
2024-12-09 08:49:26, Info CBS Seconds between corruption and repair: -1
2024-12-09 08:49:26, Info CBS Failed to run Detect and repair. [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Info CBS Reboot mark cleared
2024-12-09 08:49:27, Info CBS Winlogon: Simplifying Winlogon CreateSession notifications
2024-12-09 08:49:27, Info CBS Winlogon: Deregistering for CreateSession notifications
2024-12-09 08:49:27, Info CBS Exec: Processing complete, session(Corruption Repairing): 31148608_3560096482 [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Error CBS Session: 31148608_3560096482 failed to perform store corruption detect and repair operation. [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Info CBS Session: 31148608_3560096482 finalized. Reboot required: no [HRESULT = 0x800f081f - CBS_E_SOURCE_MISSING]
2024-12-09 08:49:27, Info CBS Failed to FinalizeEx using worker session [HRESULT = 0x800f081f]
2024-12-09 08:49:27, Info CBS Deleting directory: \\?\C:\WINDOWS\CbsTemp\31148608_3560096482\
2024-12-09 08:49:27, Info CBS Moving directory from \\?\C:\WINDOWS\CbsTemp\31148608_3560096482\ to \\?\C:\WINDOWS\CbsTemp\{EDBC6C3E-95AA-4B6D-9B5E-F7EEC8CD9E07}
2024-12-09 08:49:27, Info CBS Deletion of: \\?\C:\WINDOWS\CbsTemp\{EDBC6C3E-95AA-4B6D-9B5E-F7EEC8CD9E07} successful
2024-12-09 08:51:27, Info CBS Trusted Installer is shutting down because: SHUTDOWN_REASON_AUTOSTOP
2024-12-09 08:51:27, Info CBS TiWorker signaled for shutdown, going to exit.
2024-12-09 08:51:27, Info CBS Deleting the contents of directory: \\?\C:\WINDOWS\CbsTemp
2024-12-09 08:51:27, Info CBS Deletion of: \\?\C:\WINDOWS\CbsTemp successful
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: ExecutionEngineFinalize
2024-12-09 08:51:27, Info CBS Execution Engine Finalize
2024-12-09 08:51:27, Info CBS Execution Engine Finalize
2024-12-09 08:51:27, Info CBS Lock: Lock removed: TiWorkerClassFactory, level: 30, total lock:3
2024-12-09 08:51:27, Info CBS Lock: Lock removed: CCbsWorker, level: 5, total lock:2
2024-12-09 08:51:27, Info CBS Ending the TiWorker main loop.
2024-12-09 08:51:27, Info CBS Starting TiWorker finalization.
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: ExecutionEngineFinalize
2024-12-09 08:51:27, Info CBS CBS Engine already deactivated
2024-12-09 08:51:27, Info CBS CBS Engine already deactivated
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: ComponentAnalyzerFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: PackageTrackerFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CoreResourcesUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: SessionManagerFinalize
2024-12-09 08:51:27, Info CBS Lock: Lock removed: CSIInventoryCriticalSection, level: 64, total lock:10
2024-12-09 08:51:27, Info CBS Lock: Lock removed: CCbsSessionManager, level: 11, total lock:9
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CapabilityManagerFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: PublicObjectMonitorFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: Enter vCoreInitializeLock
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: WcpUnload
2024-12-09 08:51:27, Info CSI 00000016 Direct SIL provider: Number of files opened: 66739.
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: DrupUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CfgMgr32Unload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: DpxUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: TurboStackUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsEsdUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsOneSettingsFinalize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsTraceInfoUninitialize
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: CbsEventUnregister
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: AppContainerUnload
2024-12-09 08:51:27, Info CBS CbsCoreFinalize: WdsUnload, logging from cbscore will end.
2024-12-09 08:51:27, Info CBS Ending TiWorker finalization.
2024-12-09 08:51:27, Info CBS Ending the TrustedInstaller main loop.
2024-12-09 08:51:27, Info CBS Starting TrustedInstaller finalization.
2024-12-09 08:51:27, Info CBS Winlogon: Stopping notify server
2024-12-09 08:51:27, Info CBS Winlogon: Unloading SysNotify DLL
2024-12-09 08:51:27, Info CBS Lock: Lock removed: WinlogonNotifyLock, level: 8, total lock:6
2024-12-09 08:51:27, Info CBS Ending TrustedInstaller finalization.
- Joined
- Mar 14, 2023
- Messages
- 42,458
Thank you for sharing the detailed output from the CBS.log. The key points here highlight that DISM is still struggling to find certain files necessary for the repair, specifically related to "Missing replacement payload" and hash mismatches.
Here’s a comprehensive approach to tackle the 0x800f081f error:
Here’s a comprehensive approach to tackle the 0x800f081f error:
Addressing the 0x800f081f Error
Step 1: Ensure Proper Source Access
The error most often occurs due to missing files that DISM cannot locate. Since you verified that the WIM extraction is correct, let's ensure proper setup by addressing paths and exploring other alternatives.- Mount the Correct Windows Server 2022 ISO Again:
- Make sure you've a good copy and it's mounted properly.
- Ensure you're referencing the correct path when retrieving the
install.wim
.
- Run DISM Targeting the ASCII-Based Image File:
Execute the following command:
Code:bash dism /online /cleanup-image /restorehealth /source:wim:D:\sources\install.wim:1 /limitaccess
- Change
D:
with the actual mounted ISO path if needed.
- Change
Step 2: Try Accessing the Source from Windows Update
If you prefer trying from the Windows servers directly after disabling WSUS:- Disable WSUS Configuration:
You already noted earlier—ensure your Group Policies to not specify WSUS:- Go to Group Policy Editor (gpedit.msc):
Code:Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update
- Disable "Specify intranet Microsoft update service location".
- Go to Group Policy Editor (gpedit.msc):
- Run DISM:
Attempt to run:
Code:bash dism /online /cleanup-image /restorehealth
Step 3: Complete Manual Installation of Components
In case of continuous failures and absence of repairs, you might want to:- Use the ISO for a manual repair by launching setup.exe:
- Navigate to the mounted ISO.
- Run:
Code:bash D:\setup.exe
- Choose Upgrade and keep your files.
Step 4: Last Resort - Repair Windows
If the above doesn't work:- Access MSI (Microsoft Installer) logs.
- Reinstall any IIS components or core Windows features around the WSUS needs:
Code:bash Install-WindowsFeature -Name Web-Server, Web-Common-Http, Web-Dyn-Compression, Web-Basic-Auth, Web-Windows-Auth, Web-Mgmt-Console
Final Steps if All Else Fails
If the result remains unchanged:- Back up your current environment meticulously.
- As a last effort, consider rebuilding the server (which would be time-consuming but would guarantee a clean and functional state).
Next Steps
- Run the commands above for either direct mount of ISO OR attempt from Windows Update without the WSUS setting.
- If there’s still a failure, let’s analyze CBS again for specifics on what’s failing to locate and work from there.
- Thread Author
- #90
- Joined
- Mar 14, 2023
- Messages
- 42,458
That’s a solid move! An in-place upgrade will effectively reset critical system files while keeping your applications, settings, and configurations intact. This should clear up any underlying corruption that might be affecting WSUS, IIS, or other components.
Keep me posted on how the in-place upgrade goes! I’m here to assist you through whatever comes next.
Steps During the In-Place Upgrade:
- Follow the On-Screen Prompts:
- The setup will guide you through various options. Ensure you select Upgrade and choose to keep your files and applications.
- Monitor the Install Process:
- Keep an eye on the progress. Any errors or prompts should be addressed during installation.
- Post-Upgrade Actions:
- Once the upgrade completes, ensure to:
- Restart the server if prompted.
- Run Windows Updates manually to bring everything up to the latest version.
- Recheck WSUS configuration to see if it now initializes correctly.
- Once the upgrade completes, ensure to:
Testing WSUS After the Upgrade:
- Re-run the WSUS Post-Install Command:
After confirming that the upgrade completes successfully:
Code:bash wsusutil.exe postinstall SQL_INSTANCE_NAME="YourInstanceName" CONTENT_DIR="D:\WSUS\WSUSCONTENT"
- Validate the Current WSUS Functionality:
- Open the WSUS administration console and check for any errors.
- Test your WSUS updates against your clients.
Next Steps After Upgrade
If the in-place upgrade resolves the issues, excellent! If any errors persist:- Gather logs from the WSUS installation:
- Look specifically at the WSUSSetup.log and any IIS-related logs from your previous settings.
Keep me posted on how the in-place upgrade goes! I’m here to assist you through whatever comes next.
- Thread Author
- #92
Setup encountered a problem and was unable to determine whether Hyper-V features can be upgraded. For more information about Hyper-V upgrade requirements, see What's new in Windows Server 2022
- Joined
- Mar 14, 2023
- Messages
- 42,458
The error message indicating that the setup encountered a problem with Hyper-V features during the in-place upgrade suggests there may be an issue regarding your system configuration, particularly related to enabled Hyper-V features.
Hyper-V Upgrades Issue: This happens when certain features are installed and might be conflicting or incompatible with the upgrade process to Windows Server 2022. Let's walk through the resolution step by step.
Hyper-V Upgrades Issue: This happens when certain features are installed and might be conflicting or incompatible with the upgrade process to Windows Server 2022. Let's walk through the resolution step by step.
Step 1: Check Installed Hyper-V Features
- Open PowerShell with Administrator Privileges and check if Hyper-V features are currently enabled:
Code:powershell Get-WindowsFeature -Name Hyper-V
- Look for the Installed Features:
- If Hyper-V is listed and installed, you'll need to decide whether to remove it (if it's not needed) or prepare to manage the upgrade correctly.
Step 2: Options Depending on Hyper-V Usage
Option 1: If You Need Hyper-V and Want to Keep it:
- Before upgrading, make sure that all Hyper-V virtual machines (VMs) are turned off and that you’re following best practices for Hyper-V:
- Ensure your virtual network adapters (if any) are configured correctly.
- Consider handling your Hyper-V setups according to Microsoft guidelines. You might need to check compatibility for any VMs or features you plan to keep.
- Try Upgrading Using:
- PowerShell or Windows Settings to ensure Hyper-V settings aren't conflicting.
Option 2: If Hyper-V is Unnecessary:
- If you find that you don’t need Hyper-V features, consider disabling/removing Hyper-V before attempting the upgrade:
Code:powershell Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All
- Reboot the server, then reattempt the in-place upgrade with the Windows Server 2022 ISO.
Step 3: Retry the Upgrade
After you’ve either resolved issues with Hyper-V or removed it:- Attempt the in-place upgrade again by running:
Code:bash D:\setup.exe
Step 4: Monitor Installation / Errors
After resolving Hyper-V compatibility:- Be attentive to any new prompts or errors that arise during the upgrade, especially if they pertain to existing configurations.
If Installation Continues to Fail
If obstacles persist, consider providing the following:- Any specific errors that pop up during the Hyper-V check or installation process.
- Key outputs from logs relating to Hyper-V or setup (often found in C:\$WINDOWS.~BT\Sources\Panther during setup).
Final Note
You’re navigating critical steps concerning Hyper-V and the in-place upgrade functionality; don’t hesitate to ask for assistance as needed. Once you get through this phase, you’ll be in a much more reliable place with your WSUS and system health overall! Keep me updated!- Thread Author
- #94
- Joined
- Mar 14, 2023
- Messages
- 42,458
If your server is set up with Hyper-V but it’s not visibly checked under Remove Roles, there could be a couple of issues at play. Here’s how to proceed to clarify and resolve this situation:
This will list all Hyper-V features and their states, indicating any subfeatures present.
Understanding the Situation
- Hyper-V Not Checked in Roles:
- This could mean that the Hyper-V role is not installed as part of the standard roles list or that it exists as an update feature rather than a root role.
- Install State - Available:
- If the Hyper-V role is marked as available, it indicates that it is indeed present but may not be actively configured.
- This can happen if Hyper-V was installed via PowerShell or other means without the full role being added formally in the GUI.
Step 1: Verify All Installed Features
To check if Hyper-V components are installed, run PowerShell (Admin) with the following command:
Code:
Get-WindowsFeature | Where-Object { $_.Name -like '*Hyper-V*' }
Step 2: Check Hyper-V Manager
- Open Hyper-V Manager (you can search for it in the Start Menu).
- Verify the virtual machines (VMs) and network switches:
- Ensure you have correctly configured network switches or external access.
Step 3: Check Installed Roles via PowerShell
Run:
Code:
Get-WindowsFeature Hyper-V
- Look for:
- Role Services: Ensure that essential components (like Hyper-V Virtual Machine Management) are listed.
Step 4: Remove/Repair Hyper-V if Necessary
If you determine that Hyper-V is unnecessary or incorrectly installed and wish to remove it:- Run the following command in PowerShell:
Code:Uninstall-WindowsFeature –Name Hyper-V –IncludeManagementTools
- You may also check and remove any specific Hyper-V roles that you don’t intend to keep.
Step 5: Proceed with In-Place Upgrade Post-Configuration
After removing or confirming the Hyper-V status and ensuring it's not installed incorrectly:- Retry the in-place upgrade with the Windows Server 2022 ISO:
Code:bash D:\setup.exe
- Follow the prompts for an upgrade, ensuring you've kept your files and settings.
Final Note
If after these steps you continue encountering issues with Hyper-V integrations during your upgrade:- Consider directly reaching out to Microsoft support for Hyper-V related configuration complexities, especially if you aim for a successful in-place upgrade without needing a complete server installation to mitigate potential risks from existing setups.
- Thread Author
- #96
- Joined
- Mar 14, 2023
- Messages
- 42,458
Thank you for clarifying that the Hyper-V references are just the management tools and PowerShell modules, and that the main Hyper-V role isn’t actually installed on the server. This distinction is important as it simplifies the situation regarding the upgrade and WSUS setup, especially since it means Hyper-V might not be the main issue causing the errors in your ongoing WSUS installation.
Here’s How to Proceed:
1. Leave Hyper-V Management Features as-is:
Since the Hyper-V Management Tools are just that—tools without the full Hyper-V role—they can remain installed without affecting your WSUS setup. You shouldn't need to remove them unless you specifically don't want any Hyper-V capabilities on this server.2. Focus on Addressing WSUS Configuration Issues:
Since the Hyper-V tools weren't causing the original WSUS issues, let's ensure WSUS can install successfully this time around.Step-by-Step: Troubleshooting WSUS Postinstall
- Check WSUS Dependencies:
Ensure all features required by WSUS are installed. Use PowerShell to check:
Code:powershell Get-WindowsFeature | Where-Object { $_.Name -like '*Web*' }
Web-Server
and all sub-features) are included as before. - Reconfirm the Content Directory:
- Make sure:
Code:bash D:\WSUS\WSUSCONTENT
- Exists and has proper permissions.
- Make sure:
- Revisit the WSUS Postinstall Command:
Since previous attempts failed due to path issues:- Make sure the command is correctly configured:
Code:bash wsusutil.exe postinstall SQL_INSTANCE_NAME="YourInstanceName" CONTENT_DIR="D:\WSUS\WSUSCONTENT"
- Make sure the command is correctly configured:
- Run With Skipped IIS Config:
If errors persist, try skipping IIS configuration to see if it allows completion:
Code:bash wsusutil.exe postinstall -skipIISConfig SQL_INSTANCE_NAME="YourInstanceName" CONTENT_DIR="D:\WSUS\WSUSCONTENT"
- Review Logs for Insight:
- If the
postinstall
command fails again, check the WSUSSetup.log and IIS logs immediately after for any errors related to paths or configurations.
- If the
If Postinstall Still Fails with IIS-Related Errors
Should the process yield further IIS-related errors, we may iterate through more adjustments or potentially perform further reinstalls only on the WSUS Administration without disrupting SCCM:- Additional Verification Needed:
- Look for mismatches in WSUS virtual directories if they’ve been altered or are missing.
- Each directory (like
Content
,SelfUpdate
, etc.) must point to valid existing locations.
- Final Attempt for a Clean Retry:
If everything else fails, be ready to run:
Code:bash wsusutil.exe deletecontent wsusutil.exe reset
- This will clean up and allow WSUS to attempt its configuration afresh.
Summary
- Keep Hyper-V Management Tools as they’re not causing issues.
- Focus on refining the path settings and confirming directory permissions.
- Retry the postinstall command, considering both standard and
-skipIISConfig
executions. - Review logs thoroughly for any persistent issues after each step.
- Thread Author
- #98
- Joined
- Mar 14, 2023
- Messages
- 42,458
Since Hyper-V is only installed as management tools and shouldn’t impact the core Windows Server functionality, you can go ahead and proceed with the in-place upgrade. Here’s how to approach it carefully while confirming that Hyper-V won’t lead to issues:
Let me know how the upgrade goes and if you face any particular issues afterward. We’re working our way through to a fully functional WSUS!
Proceeding with the In-Place Upgrade
- Confirm the Hyper-V Notice:
- When prompted regarding Hyper-V during the upgrade process, you should be able to confirm and proceed. The installation will assess the existence of the Hyper-V management tools along with any existing configurations.
- Since Hyper-V is only a management layer in this case, it should not block the upgrade.
- Ensure Backup:
- Make sure that you have a current backup of your system, including crucial data, before proceeding. This will protect you from unforeseen issues during the upgrade.
- Run the Setup:
- Mount the Windows Server 2022 ISO if it's not already mounted.
- Launch the upgrade by running:
Code:bash D:\setup.exe
- Follow the installation prompts carefully, ensuring you select Keep Files and Apps during the installation options.
- Monitor the Upgrade Process:
- Keep an eye on the installation. While it's processing, it may take some time depending on your server's resources and configurations.
- Post-Upgrade Tasks:
- Once the upgrade completes:
- Ensure that WSUS and all server roles operate correctly.
- Run Windows Updates after the upgrade to ensure all components are updated.
- Re-run any WSUS configuration commands as necessary.
- Once the upgrade completes:
Post-upgrade Steps to Validate WSUS and IIS
- Verify WSUS Installation:
- Check the functionality of the WSUS console.
- Confirm that the
postinstall
command works without any issues:
Code:bash wsusutil.exe postinstall SQL_INSTANCE_NAME="YourInstanceName" CONTENT_DIR="D:\WSUS\WSUSCONTENT"
- Test Clients:
- Send a manual update request from a client to ensure they can connect to WSUS and download updates.
Final Note
Going forward with the in-place upgrade is a stable way to reset underlying issues, especially if prior repair methods have exhausted options. If in the process errors do arise, document them, as this will help diagnose residual issues after the upgrade.Let me know how the upgrade goes and if you face any particular issues afterward. We’re working our way through to a fully functional WSUS!
- Thread Author
- #100
Same error after in place upgrade
C:\Program Files\Update Services\Tools>wsusutil.exe postinstall SQL_INSTANCE_NAME="ARIMGMT" CONTENT_DIR="D:\WSUS\WSUSCONTENT"
Log file is located at C:\Users\DAdmin\AppData\Local\Temp\2\\WSUS_PostInstall_20241209T151930.log
Post install is starting
Fatal Error: The system cannot find the path s
C:\Program Files\Update Services\Tools>wsusutil.exe postinstall SQL_INSTANCE_NAME="ARIMGMT" CONTENT_DIR="D:\WSUS\WSUSCONTENT"
Log file is located at C:\Users\DAdmin\AppData\Local\Temp\2\\WSUS_PostInstall_20241209T151930.log
Post install is starting
Fatal Error: The system cannot find the path s
Similar threads
- Replies
- 0
- Views
- 3K
- Solved
Windows 7
Complex Problem with Windows 7 (again)
- Replies
- 30
- Views
- 5K