无法创建SharePoint Search Service应用程序SP 2013

问题描述:

09/21/2017 17:28:46.71 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 记录关联数据 xmnv Medium Name = Timer Job job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dkb3 SearchServiceInstance:输入Provision(). 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 acrol 将SearchRuntimeServiceInstance设置为SearchServiceInstance.Provision()的一部分 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 8xqz Medium 更新SPPersistedObject SearchRuntimeServiceInstance.版本:8245571确保:False,哈希码:2399563,ID:e63df7a9-4c33-4dde-b33d-67591be610ad,堆栈:   位于Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()    位于Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()上.  在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)   在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,布尔值isTimerService,Int32& result)处 在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& 数据,Int32&结果)  20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.92 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 aka3i Medium 查找防火墙规则'SharePoint Search' 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 aka3j Medium 名为"SharePoint Search"的防火墙规则已存在,将被覆盖. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 aka3k Medium 为端口'16500,16501,16502,16503,16504,16505,16506,16507,16508,16509创建防火墙规则'SharePoint Search' ,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 aka3l 为端口'16500,16501,16502,16503,16504,16505,16506,16507,16508,16509创建防火墙规则'SharePoint Search' ,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 8xqz Medium 更新SPPersistedObject SearchRuntimeServiceInstance.版本:8245590确保:False,哈希码:2399563,ID:e63df7a9-4c33-4dde-b33d-67591be610ad,堆栈:    at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔 开始)  位于Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()上.  位于Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()上.  在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)   在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,布尔值isTimerService,Int32&结果)  在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data,Int32& result)处 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 96ft Medium 将dev \ mossfarm添加到本地组WSS_WPG. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 9sis Medium 尝试向SE_ASSIGNPRIMARYTOKEN_NAME授予应用程序池用户dev \ mossfarm 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 9sit Medium 尝试向SE_INCREASE_QUOTA_NAME授予应用程序池用户dev \ mossfarm 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 7041 信息 用于Windows服务"SPSearchHostController"的凭据;已由dev \ mossfarm更新. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 af51u Medium 将服务帐户dev \ mossfarm添加到PerformanceMonitoringUsers 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.44 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 8xqz Medium 更新SPPersistedObject SearchRuntimeServiceInstance.版本:8245592确保:False,哈希码:2399563,ID:e63df7a9-4c33-4dde-b33d-67591be610ad,堆栈:    at Microsoft.SharePoint.Administration.SPServiceInstance.Provision()    在Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔值开始)处 位于Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()上.  在Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()    在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处  在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,布尔值isTimerService,Int32& result)处 在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& 数据,Int32&结果)  20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dkb5 使用Windows服务帐户'dev \ mossservice'配置Microsoft Search Server. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm6n 确保搜索服务可以访问其注册表配置单元 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm6o 确保COM应用程序注册表ACE允许从服务到Windows COM的访问列表自动传播访问/激活/启动权限 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm6p 当前COM的'AccessPermission'权限为'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD :( A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW ;; ; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S -1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm6r 将新的COM'AccessPermission'权限配置为'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD: (A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW; ;; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm6p 当前COM的'LaunchPermission'权限为'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD :( A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW ;; ; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S -1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm6r 配置新的COM对'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:的"LaunchPermission"权限: (A ;; CCDCSW ;;; SY)(A ;; CCDCSW ;;; BA)(A ;; CCDCSW ;;; S-1-5-21-2435362700-775136817-441280577-1206)(A ;; CCDCSW; ;; S-1-5-21-2435362700-775136817-441280577-1207)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1001)(A ;; CCDCSW ;;; S-1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm5v 修改ACL,以允许'dev \ mossservice'R/W访问'C:\ Windows \ Tasks'并删除WSS_WPG 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm5i 修改ACL以允许'dev \ mossservice'R/E访问BIN文件夹'C:\ Program Files \ Microsoft Office Servers \ 15.0 \ Bin' 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dkb7 允许服务帐户FC使用默认索引位置 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dkb8 允许服务帐户FC覆盖'C:\ Program Files \ Microsoft Office Servers \ 15.0 \ Data \ Office Server \ Applications. ="white-space:pre"> 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.55 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Server搜索 管理 dm5v 修改ACL以允许'dev \ mossservice'R/W访问'C:\ Program Files \ Microsoft Office Servers \ 15.0 \ Data \ Office Server \ Applications",并删除对WSS_WPG 的访问权限 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.60 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 96ft Medium 将dev \ mossservice添加到本地组WSS_WPG. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.63 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 7041 信息 用于Windows服务"OSearch15"的凭据已由dev \ mossfarm更新. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 88b2 验证农场帐户:dev \ mossservice 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 88b5 Medium 尝试使用服务器场帐户登录LogonUser以验证密码dev \ mossservice. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 88b6 Medium LogonUser成功使用dev \ mossservice. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 88b8 dev \ mossservice是有效的服务器场帐户. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 7034 关键 在服务器AppDev01上启动/停止服务SharePoint Server Search实例的尝试未成功.  通过用户界面或命令行在指定服务器上重新运行该操作.附加信息 在下面.  无法在计算机."上启动服务OSearch15. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 计时器 3899 严重 执行服务实例(取消)配置作业时出错.  服务实例:"SharePoint Server搜索"; (id" 6f08979a-3d29-4af4-a820-ee122baac9e9)"无法在以下位置启动服务OSearch15 计算机."." 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 c4rg Exception System.InvalidOperationException:无法在计算机."上启动服务OSearch15. ---> System.ComponentModel.Win32Exception:访问被拒绝    ---内部异常堆栈跟踪的结尾---   在System.ServiceProcess.ServiceController.Start(String [] args)处   位于Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName)处.  位于Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start()上.   在Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔值开始)处 位于Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()上.  在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)StackTrace:在onetnative.dll上:(sig = da316f9f-9b24-40fd-97d9-40edd414a99d | 2 | onetnative.pdb,offset = 28EE2)在onetnative.dll:(offset = 15735) OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 统一日志服务 c91s Monitorable Watson存储桶参数:Microsoft SharePoint Foundation 4,ULSException14、269cd32d"sharepoint foundation",0f0011d9"15.0.4569.0&",0af81b67"; system.serviceprocess",0400766f "4.0.30319.0&",58dc6408"thu mar 30 02:48:56 2017",00000072"00000072",00000109"00000109",54e7243f"invalidoperationexception",63347267"c4rg" OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 拓扑 8xqz Medium 更新SPPersistedObject SearchServiceInstance.版本:8245583确保:False,哈希码:31510010,ID:6f08979a-3d29-4af4-a820-ee122baac9e9,堆栈:    at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)   在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,布尔值isTimerService,Int32&结果)  在Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data,Int32& result)处 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 计时器 6398 Critical 作业定义Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition(ID 24c5d410-9bcc-4a90-a3f4-bfa6da71d356)的Execute方法引发了异常.下面包含更多信息.  不能 在计算机'.'上启动服务OSearch15. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 计时器 72ae 意外 异常堆栈跟踪:   位于System.ServiceProcess.ServiceController.Start(String [] args)   位于Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName)处.   位于Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start()上.  在Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(布尔值开始)处 在Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()    在Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)处 在Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)处  在Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd,Guid targetInstanceId,Boolean isTimerService,Int32& result)中 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.87 OWSTIMER.EXE(0x5238) 0x44D8 SharePoint Foundation 监视 b4ly Medium 离开受监视范围(计时器作业job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9).执行时间= 7154.7435 20771b9e-6d0f-302b-8552-935e9731b924

09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Logging Correlation Data xmnv Medium Name=Timer Job job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dkb3 High SearchServiceInstance: Entering Provision(). 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration acrol High Provisioning SearchRuntimeServiceInstance as part of SearchServiceInstance.Provision() 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:46.71 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 8xqz Medium Updating SPPersistedObject SearchRuntimeServiceInstance. Version: 8245571 Ensure: False, HashCode: 2399563, Id: e63df7a9-4c33-4dde-b33d-67591be610ad, Stack:    at Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()     at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()     at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result)     at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data, Int32& result)   20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.92 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration aka3i Medium Looking up firewall rule 'SharePoint Search' 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration aka3j Medium Firewall rule named 'SharePoint Search' already exists and will be overwritten. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration aka3k Medium Creating firewall rule 'SharePoint Search' for ports '16500,16501,16502,16503,16504,16505,16506,16507,16508,16509,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration aka3l High Created firewall rule 'SharePoint Search' for ports '16500,16501,16502,16503,16504,16505,16506,16507,16508,16509,16510,16511,16512,16513,16514,16515,16516,16517,16518,16519'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.93 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 8xqz Medium Updating SPPersistedObject SearchRuntimeServiceInstance. Version: 8245590 Ensure: False, HashCode: 2399563, Id: e63df7a9-4c33-4dde-b33d-67591be610ad, Stack:    at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean start)     at Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()     at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()     at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result)     at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data, Int32& result)   20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 96ft Medium Adding dev\mossfarm to local group WSS_WPG. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 9sis Medium Attempting to give SE_ASSIGNPRIMARYTOKEN_NAME privilege to application pool user dev\mossfarm 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:49.97 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 9sit Medium Attempting to give SE_INCREASE_QUOTA_NAME privilege to application pool user dev\mossfarm 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 7041 Information The credentials used for the windows service "SPSearchHostController" were updated by dev\mossfarm. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:50.00 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology af51u Medium Adding service account dev\mossfarm to PerformanceMonitoringUsers 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.44 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 8xqz Medium Updating SPPersistedObject SearchRuntimeServiceInstance. Version: 8245592 Ensure: False, HashCode: 2399563, Id: e63df7a9-4c33-4dde-b33d-67591be610ad, Stack:    at Microsoft.SharePoint.Administration.SPServiceInstance.Provision()     at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean start)     at Microsoft.Office.Server.Search.Administration.SearchRuntimeServiceInstance.Provision()     at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()     at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result)     at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data, Int32& result)   20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dkb5 High Provisioning Microsoft Search Server with Windows service account 'dev\mossservice'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.46 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm6n High Ensuring that the Search service has access to its registry hive 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm6o High Ensuring COM application registry ACEs to allow auto propagation of access lists from the service to the Windows COM access/activate/launch permissions 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.48 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm6p High Current COM 'AccessPermission' permissions are 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm6r High Configure new COM 'AccessPermission' permissions to 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm6p High Current COM 'LaunchPermission' permissions are 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm6r High Configure new COM 'LaunchPermission' permissions to 'O:S-1-5-21-2435362700-775136817-441280577-1207G:DUD:(A;;CCDCSW;;;SY)(A;;CCDCSW;;;BA)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1206)(A;;CCDCSW;;;S-1-5-21-2435362700-775136817-441280577-1207)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1001)(A;;CCDCSW;;;S-1-5-21-3087556231-4034532944-3593591460-1003)'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm5v High Modifying ACL to allow 'dev\mossservice' R/W access to 'C:\Windows\Tasks' and to remove access for WSS_WPG 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.49 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm5i High Modifying ACL to allow 'dev\mossservice' R/E access to the BIN folder 'C:\Program Files\Microsoft Office Servers\15.0\Bin' 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dkb7 High Allow the service account FC over the default index location 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.51 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dkb8 High Allow the service account FC over 'C:\Program Files\Microsoft Office Servers\15.0\Data\Office Server\Applications. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.55 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Server Search Administration dm5v High Modifying ACL to allow 'dev\mossservice' R/W access to 'C:\Program Files\Microsoft Office Servers\15.0\Data\Office Server\Applications' and to remove access for WSS_WPG 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.60 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 96ft Medium Adding dev\mossservice to local group WSS_WPG. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.63 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 7041 Information The credentials used for the windows service "OSearch15" were updated by dev\mossfarm. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 88b2 High Validating Farm Account: dev\mossservice 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.79 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 88b5 Medium Attempting to LogonUser using the Farm Account to verify the password, dev\mossservice. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 88b6 Medium LogonUser succeeded for dev\mossservice. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 88b8 High dev\mossservice is a valid Farm Account. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 7034 Critical An attempt to start/stop instance  of service SharePoint Server Search on server AppDev01 did not succeed.  Re-run the action via UI or command line on the specified server. Additional information is below.  Cannot start service OSearch15 on computer '.'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.82 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Timer 3899 Critical Error executing service instance (un)provisioning job.  Service instance: "SharePoint Server Search" (id "6f08979a-3d29-4af4-a820-ee122baac9e9) "Cannot start service OSearch15 on computer '.'."" 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology c4rg Exception System.InvalidOperationException: Cannot start service OSearch15 on computer '.'. ---> System.ComponentModel.Win32Exception: Access is denied     --- End of inner exception stack trace ---     at System.ServiceProcess.ServiceController.Start(String[] args)     at Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName)     at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start()     at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean start)     at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()     at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId) StackTrace:  at onetnative.dll: (sig=da316f9f-9b24-40fd-97d9-40edd414a99d|2|onetnative.pdb, offset=28EE2) at onetnative.dll: (offset=15735) 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Unified Logging Service c91s Monitorable Watson bucket parameters: Microsoft SharePoint Foundation 4, ULSException14, 269cd32d "sharepoint foundation", 0f0011d9 "15.0.4569.0", 0af81b67 "system.serviceprocess", 0400766f "4.0.30319.0", 58dc6408 "thu mar 30 02:48:56 2017", 00000072 "00000072", 00000109 "00000109", 54e7243f "invalidoperationexception", 63347267 "c4rg" 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.83 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Topology 8xqz Medium Updating SPPersistedObject SearchServiceInstance. Version: 8245583 Ensure: False, HashCode: 31510010, Id: 6f08979a-3d29-4af4-a820-ee122baac9e9, Stack:    at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result)     at Microsoft.SharePoint.Administration.SPTimerJobInvoke.Invoke(TimerJobExecuteData& data, Int32& result)   20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Timer 6398 Critical The Execute method of job definition Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition (ID 24c5d410-9bcc-4a90-a3f4-bfa6da71d356) threw an exception. More information is included below.  Cannot start service OSearch15 on computer '.'. 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.85 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Timer 72ae Unexpected Exception stack trace:    at System.ServiceProcess.ServiceController.Start(String[] args)     at Microsoft.SharePoint.Win32.SPAdvApi32.StartService(String strServiceName)     at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Start()     at Microsoft.SharePoint.Administration.SPWindowsServiceInstance.Provision(Boolean start)     at Microsoft.Office.Server.Search.Administration.SearchServiceInstance.Provision()     at Microsoft.SharePoint.Administration.SPServiceInstanceJobDefinition.Execute(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPAdministrationServiceJobDefinition.ExecuteAdminJob(Guid targetInstanceId)     at Microsoft.SharePoint.Administration.SPTimerJobInvokeInternal.Invoke(SPJobDefinition jd, Guid targetInstanceId, Boolean isTimerService, Int32& result) 20771b9e-6d0f-302b-8552-935e9731b924
09/21/2017 17:28:53.87 OWSTIMER.EXE (0x5238) 0x44D8 SharePoint Foundation Monitoring b4ly Medium Leaving Monitored Scope (Timer Job job-service-instance-6f08979a-3d29-4af4-a820-ee122baac9e9). Execution Time=7154.7435 20771b9e-6d0f-302b-8552-935e9731b924

基于ULS,您可以从应用程序中获得更多信息和/或系统事件在服务器上登录.还要确认运行OSearch15的用户帐户不受作为服务登录"的限制.
Based on the ULS, you may get more information from the Application and/or System Event Log on the server. Also verify that the user account running OSearch15 isn't restricted from Logon as a Service.