无法创建SharePoint Search Service应用程序SP 2013
09/21/2017 17:28:46.71 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
记录关联数据 xmnv
Medium Name = Timer Job job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dkb3
高 SearchServiceInstance:输入Provision().
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 acrol
高 将SearchRuntimeServiceInstance设置为SearchServiceInstance.Provision()的一部分
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 8xqz
Medium 更新SPPersistedObject SearchRuntimeServiceInstance.版本:8245571确保:False,哈希码:2399563,ID:e63df7a9-4c33-4dde-b33d-67591be610ad,堆栈: 位于Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()
位于Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()上. 在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid
targetInstanceId) 在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,布尔值isTimerService,Int32& result)处 在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData&
数据,Int32&结果) 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.92 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 aka3i
Medium 查找防火墙规则'SharePoint Search'
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 aka3j
Medium 名为"SharePoint Search"的防火墙规则已存在,将被覆盖.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 aka3k
Medium 为端口'16500,16501,16502,16503,16504,16505,16506,16507,16508,16509创建防火墙规则'SharePoint Search' ,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 aka3l
高 为端口'16500,16501,16502,16503,16504,16505,16506,16507,16508,16509创建防火墙规则'SharePoint Search' ,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 8xqz
Medium 更新SPPersistedObject SearchRuntimeServiceInstance.版本:8245590确保:False,哈希码:2399563,ID:e63df7a9-4c33-4dde-b33d-67591be610ad,堆栈: at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔
开始) 位于Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()上. 位于Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()上. 在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid
targetInstanceId) 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid
targetInstanceId,布尔值isTimerService,Int32&结果) 在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data,Int32& result)处
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 96ft
Medium 将dev \ mossfarm添加到本地组WSS_WPG.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 9sis
Medium 尝试向SE_ASSIGNPRIMARYTOKEN_NAME授予应用程序池用户dev \ mossfarm
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 9sit
Medium 尝试向SE_INCREASE_QUOTA_NAME授予应用程序池用户dev \ mossfarm
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 7041
信息 用于Windows服务"SPSearchHostController"的凭据;已由dev \ mossfarm更新.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 af51u
Medium 将服务帐户dev \ mossfarm添加到PerformanceMonitoringUsers
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.44 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 8xqz
Medium 更新SPPersistedObject SearchRuntimeServiceInstance.版本:8245592确保:False,哈希码:2399563,ID:e63df7a9-4c33-4dde-b33d-67591be610ad,堆栈: at Microsoft.SharePoint.Administration.SPServiceInstance.Provision()
在Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔值开始)处 位于Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()上. 在Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()
在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处
在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,布尔值isTimerService,Int32& result)处 在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData&
数据,Int32&结果) 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dkb5
高 使用Windows服务帐户'dev \ mossservice'配置Microsoft Search Server.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm6n
高 确保搜索服务可以访问其注册表配置单元
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm6o
高 确保COM应用程序注册表ACE允许从服务到Windows COM的访问列表自动传播访问/激活/启动权限
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm6p
高 当前COM的'AccessPermission'权限为'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD :( A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW ;; ; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S -1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm6r
高 将新的COM'AccessPermission'权限配置为'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD: (A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW; ;; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm6p
高 当前COM的'LaunchPermission'权限为'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD :( A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW ;; ; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S -1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm6r
高 配置新的COM对'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:的"LaunchPermission"权限: (A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW; ;; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm5v
高 修改ACL,以允许'dev \ mossservice'R/W访问'C:\ Windows \ Tasks'并删除WSS_WPG
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm5i
高 修改ACL以允许'dev \ mossservice'R/E访问BIN文件夹'C:\ Program Files \ Microsoft Office Servers \ 15.0 \ Bin'
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dkb7
高 允许服务帐户FC使用默认索引位置
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dkb8
高 允许服务帐户FC覆盖'C:\ Program Files \ Microsoft Office Servers \ 15.0 \ Data \ Office Server \ Applications. ="white-space:pre">
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.55 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Server搜索
管理 dm5v
高 修改ACL以允许'dev \ mossservice'R/W访问'C:\ Program Files \ Microsoft Office Servers \ 15.0 \ Data \ Office Server \ Applications",并删除对WSS_WPG 的访问权限
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.60 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 96ft
Medium 将dev \ mossservice添加到本地组WSS_WPG.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.63 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 7041
信息 用于Windows服务"OSearch15"的凭据已由dev \ mossfarm更新.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 88b2
高 验证农场帐户:dev \ mossservice
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 88b5
Medium 尝试使用服务器场帐户登录LogonUser以验证密码dev \ mossservice.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 88b6
Medium LogonUser成功使用dev \ mossservice.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 88b8
高 dev \ mossservice是有效的服务器场帐户.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 7034
关键 在服务器AppDev01上启动/停止服务SharePoint Server Search实例的尝试未成功. 通过用户界面或命令行在指定服务器上重新运行该操作.附加信息
在下面. 无法在计算机."上启动服务OSearch15.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
计时器 3899
严重 执行服务实例(取消)配置作业时出错. 服务实例:"SharePoint Server搜索"; (id" 6f08979a-3d29-4af4-a820-ee122baac9e9)"无法在以下位置启动服务OSearch15
计算机."." 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 c4rg
Exception System.InvalidOperationException:无法在计算机."上启动服务OSearch15. ---> System.ComponentModel.Win32Exception:访问被拒绝 ---内部异常堆栈跟踪的结尾---
在System.ServiceProcess.ServiceController.Start(String [] args)处 位于Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName)处. 位于Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start()上.
在Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔值开始)处 位于Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()上. 在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid
targetInstanceId)StackTrace:在onetnative.dll上:(sig = da316f9f-9b24-40fd-97d9-40edd414a99d | 2 | onetnative.pdb,offset = 28EE2)在onetnative.dll:(offset = 15735) OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
统一日志服务 c91s
Monitorable Watson存储桶参数:Microsoft SharePoint Foundation 4,ULSException14、269cd32d"sharepoint foundation",0f0011d9"15.0.4569.0&",0af81b67"; system.serviceprocess",0400766f
"4.0.30319.0&",58dc6408"thu mar 30 02:48:56 2017",00000072"00000072",00000109"00000109",54e7243f"invalidoperationexception",63347267"c4rg" OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
拓扑 8xqz
Medium 更新SPPersistedObject SearchServiceInstance.版本:8245583确保:False,哈希码:31510010,ID:6f08979a-3d29-4af4-a820-ee122baac9e9,堆栈: at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid
targetInstanceId) 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid
targetInstanceId,布尔值isTimerService,Int32&结果) 在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data,Int32& result)处
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
计时器 6398
Critical 作业定义Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition(ID 24c5d410-9bcc-4a90-a3f4-bfa6da71d356)的Execute方法引发了异常.下面包含更多信息. 不能
在计算机'.'上启动服务OSearch15. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
计时器 72ae
意外 异常堆栈跟踪: 位于System.ServiceProcess.ServiceController.Start(String [] args) 位于Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName)处.
位于Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start()上. 在Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔值开始)处 在Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()
在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处
在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,Boolean isTimerService,Int32& result)中
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.87 OWSTIMER.EXE(0x5238)
0x44D8 SharePoint Foundation
监视 b4ly
Medium 离开受监视范围(计时器作业job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9).执行时间= 7154.7435
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Logging Correlation Data xmnv
Medium Name=Timer Job job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dkb3
High SearchServiceInstance: Entering Provision().
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration acrol
High Provisioning SearchRuntimeServiceInstance as part of SearchServiceInstance.Provision()
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 8xqz
Medium Updating SPPersistedObject SearchRuntimeServiceInstance. Version: 8245571 Ensure: False, HashCode: 2399563, Id: e63df7a9-4c33-4dde-b33d-67591be610ad, Stack: at Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()
at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision() at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId) at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid
targetInstanceId) at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result) at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData&
data, Int32& result) 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.92 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration aka3i
Medium Looking up firewall rule 'SharePoint Search'
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration aka3j
Medium Firewall rule named 'SharePoint Search' already exists and will be overwritten.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration aka3k
Medium Creating firewall rule 'SharePoint Search' for ports '16500,16501,16502,16503,16504,16505,16506,16507,16508,16509,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration aka3l
High Created firewall rule 'SharePoint Search' for ports '16500,16501,16502,16503,16504,16505,16506,16507,16508,16509,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 8xqz
Medium Updating SPPersistedObject SearchRuntimeServiceInstance. Version: 8245590 Ensure: False, HashCode: 2399563, Id: e63df7a9-4c33-4dde-b33d-67591be610ad, Stack: at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean
start) at Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision() at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision() at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid
targetInstanceId) at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId) at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid
targetInstanceId, Boolean isTimerService, Int32& result) at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data, Int32& result)
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 96ft
Medium Adding dev\mossfarm to local group WSS_WPG.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 9sis
Medium Attempting to give SE_ASSIGNPRIMARYTOKEN_NAME privilege to application pool user dev\mossfarm
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 9sit
Medium Attempting to give SE_INCREASE_QUOTA_NAME privilege to application pool user dev\mossfarm
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 7041
Information The credentials used for the windows service "SPSearchHostController" were updated by dev\mossfarm.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology af51u
Medium Adding service account dev\mossfarm to PerformanceMonitoringUsers
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.44 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 8xqz
Medium Updating SPPersistedObject SearchRuntimeServiceInstance. Version: 8245592 Ensure: False, HashCode: 2399563, Id: e63df7a9-4c33-4dde-b33d-67591be610ad, Stack: at Microsoft.SharePoint.Administration.SPServiceInstance.Provision()
at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean start) at Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision() at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()
at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId) at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)
at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result) at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData&
data, Int32& result) 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dkb5
High Provisioning Microsoft Search Server with Windows service account 'dev\mossservice'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm6n
High Ensuring that the Search service has access to its registry hive
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm6o
High Ensuring COM application registry ACEs to allow auto propagation of access lists from the service to the Windows COM access/activate/launch permissions
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm6p
High Current COM 'AccessPermission' permissions are 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm6r
High Configure new COM 'AccessPermission' permissions to 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm6p
High Current COM 'LaunchPermission' permissions are 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm6r
High Configure new COM 'LaunchPermission' permissions to 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm5v
High Modifying ACL to allow 'dev\mossservice' R/W access to 'C:\Windows\Tasks' and to remove access for WSS_WPG
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm5i
High Modifying ACL to allow 'dev\mossservice' R/E access to the BIN folder 'C:\Program Files\Microsoft Office Servers\15.0\Bin'
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dkb7
High Allow the service account FC over the default index location
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dkb8
High Allow the service account FC over 'C:\Program Files\Microsoft Office Servers\15.0\Data\Office Server\Applications.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.55 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Server Search
Administration dm5v
High Modifying ACL to allow 'dev\mossservice' R/W access to 'C:\Program Files\Microsoft Office Servers\15.0\Data\Office Server\Applications' and to remove access for WSS_WPG
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.60 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 96ft
Medium Adding dev\mossservice to local group WSS_WPG.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.63 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 7041
Information The credentials used for the windows service "OSearch15" were updated by dev\mossfarm.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 88b2
High Validating Farm Account: dev\mossservice
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 88b5
Medium Attempting to LogonUser using the Farm Account to verify the password, dev\mossservice.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 88b6
Medium LogonUser succeeded for dev\mossservice.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 88b8
High dev\mossservice is a valid Farm Account.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 7034
Critical An attempt to start/stop instance of service SharePoint Server Search on server AppDev01 did not succeed. Re-run the action via UI or command line on the specified server. Additional information
is below. Cannot start service OSearch15 on computer '.'.
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Timer 3899
Critical Error executing service instance (un)provisioning job. Service instance: "SharePoint Server Search" (id "6f08979a-3d29-4af4-a820-ee122baac9e9) "Cannot start service OSearch15 on
computer '.'."" 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology c4rg
Exception System.InvalidOperationException: Cannot start service OSearch15 on computer '.'. ---> System.ComponentModel.Win32Exception: Access is denied --- End of inner exception stack trace ---
at System.ServiceProcess.ServiceController.Start(String[] args) at Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName) at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start()
at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean start) at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision() at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid
targetInstanceId) StackTrace: at onetnative.dll: (sig=da316f9f-9b24-40fd-97d9-40edd414a99d|2|onetnative.pdb, offset=28EE2) at onetnative.dll: (offset=15735)
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Unified Logging Service c91s
Monitorable Watson bucket parameters: Microsoft SharePoint Foundation 4, ULSException14, 269cd32d "sharepoint foundation", 0f0011d9 "15.0.4569.0", 0af81b67 "system.serviceprocess", 0400766f
"4.0.30319.0", 58dc6408 "thu mar 30 02:48:56 2017", 00000072 "00000072", 00000109 "00000109", 54e7243f "invalidoperationexception", 63347267 "c4rg"
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Topology 8xqz
Medium Updating SPPersistedObject SearchServiceInstance. Version: 8245583 Ensure: False, HashCode: 31510010, Id: 6f08979a-3d29-4af4-a820-ee122baac9e9, Stack: at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid
targetInstanceId) at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId) at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid
targetInstanceId, Boolean isTimerService, Int32& result) at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data, Int32& result)
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Timer 6398
Critical The Execute method of job definition Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition (ID 24c5d410-9bcc-4a90-a3f4-bfa6da71d356) threw an exception. More information is included below. Cannot
start service OSearch15 on computer '.'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Timer 72ae
Unexpected Exception stack trace: at System.ServiceProcess.ServiceController.Start(String[] args) at Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName)
at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start() at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean start) at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()
at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId) at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)
at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result)
20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.87 OWSTIMER.EXE (0x5238)
0x44D8 SharePoint Foundation
Monitoring b4ly
Medium Leaving Monitored Scope (Timer Job job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9). Execution Time=7154.7435
20771b9e-6d0f-302b-8552-935e9731b924
基于ULS,您可以从应用程序中获得更多信息和/或系统事件在服务器上登录.还要确认运行OSearch15的用户帐户不受作为服务登录"的限制.
Based on the ULS, you may get more information from the Application and/or System Event Log on the server. Also verify that the user account running OSearch15 isn't restricted from Logon as a Service.