Skip to content

Commit e207456

Browse files
authored
Update file-sync-troubleshoot-installation.md
1 parent 9f8110e commit e207456

File tree

1 file changed

+26
-6
lines changed

1 file changed

+26
-6
lines changed

articles/storage/file-sync/file-sync-troubleshoot-installation.md

Lines changed: 26 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,22 +15,42 @@ After deploying the Storage Sync Service, the next steps in deploying Azure File
1515

1616
## Agent installation
1717
<a id="agent-installation-failures"></a>**Troubleshoot agent installation failures**
18-
If the Azure File Sync agent installation fails, at an elevated command prompt, run the following command to turn on logging during agent installation:
18+
If the Azure File Sync agent installation fails, locate the installation log file which is located in the agent installation directory. If the Azure File Sync agent is installed on the C: volume, the installation log file is located under C:\Program Files\Azure\StorageSyncAgent\InstallerLog.
1919

20+
> [!Note]
21+
> If the Azure File Sync agent is installed from the command line and the /l\*v switch is used, the log file will be located in the path where the agent installation was executed.
22+
23+
The log file name for agent installations using the MSI package is AfsAgentInstall. The log file name for agent installations using the MSP package (update package) is AfsUpdater.
24+
25+
Once you have located the agent installation log file, open the file and search for the failure code at the end of the log. If you search for **error code 1603** or **sandbox**, you should be able to locate the error code.
26+
27+
Here is a snippet from an agent installation that failed:
2028
```
21-
StorageSyncAgent.msi /l*v AFSInstaller.log
29+
CAQuietExec64: + CategoryInfo : SecurityError: (:) , PSSecurityException
30+
CAQuietExec64: + FullyQualifiedErrorId : UnauthorizedAccess
31+
CAQuietExec64: Error 0x80070001: Command line returned an error.
32+
CAQuietExec64: Error 0x80070001: QuietExec64 Failed
33+
CAQuietExec64: Error 0x80070001: Failed in ExecCommon64 method
34+
CustomAction SetRegPIIAclSettings returned actual error code 1603 (note this may not be 100% accurate if translation happened inside sandbox)
35+
Action ended 12:23:40: InstallExecute. Return value 3.
36+
MSI (s) (0C:C8) [12:23:40:994]: Note: 1: 2265 2: 3: -2147287035
2237
```
2338

24-
Review installer.log to determine the cause of the installation failure.
39+
For this example, the agent installation failed with error code -2147287035 (ERROR_ACCESS_DENIED).
2540

2641
<a id="agent-installation-gpo"></a>**Agent installation fails with error: Storage Sync Agent Setup Wizard ended prematurely because of an error**
2742

2843
In the agent installation log, the following error is logged:
2944

3045
```
31-
CAQuietExec64: + CategoryInfo : SecurityError: (:) , PSSecurityException
32-
CAQuietExec64: + FullyQualifiedErrorId : UnauthorizedAccess
33-
CAQuietExec64: Error 0x80070001: Command line returned an error.
46+
CAQuietExec64: + CategoryInfo : SecurityError: (:) , PSSecurityException
47+
CAQuietExec64: + FullyQualifiedErrorId : UnauthorizedAccess
48+
CAQuietExec64: Error 0x80070001: Command line returned an error.
49+
CAQuietExec64: Error 0x80070001: QuietExec64 Failed
50+
CAQuietExec64: Error 0x80070001: Failed in ExecCommon64 method
51+
CustomAction SetRegPIIAclSettings returned actual error code 1603 (note this may not be 100% accurate if translation happened inside sandbox)
52+
Action ended 12:23:40: InstallExecute. Return value 3.
53+
MSI (s) (0C:C8) [12:23:40:994]: Note: 1: 2265 2: 3: -2147287035
3454
```
3555

3656
This issue occurs if the [PowerShell execution policy](/powershell/module/microsoft.powershell.core/about/about_execution_policies#use-group-policy-to-manage-execution-policy) is configured using group policy and the policy setting is "Allow only signed scripts." All scripts included with the Azure File Sync agent are signed. The Azure File Sync agent installation fails because the installer is performing the script execution using the Bypass execution policy setting.

0 commit comments

Comments
 (0)