You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/azure/virtual-machines/windows/windows-azure-guest-agent.md
+19-18Lines changed: 19 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,8 +134,8 @@ These error entries indicate that the VM can't reach the WireServer IP address,
134
134
### Solution: Enable DHCP, and make sure that the server isn't blocked by firewalls, proxies, or other sources
135
135
136
136
1. Connect to the VM by using Remote Desktop, and then test connectivity to 168.63.129.16. See the [Troubleshoot connectivity](/azure/virtual-network/what-is-ip-address-168-63-129-16?tabs=windows#troubleshoot-azure-ip-connectivity) section of [Azure IP address 168.63.129.16 overview](/azure/virtual-network/what-is-ip-address-168-63-129-16).
137
-
1. If you have only one private IP on your VM's network adapter, we highly recommend that you have DHCP enabled on the guest VM. If you need a static private IP address, you should configure it through the Azure portal or PowerShell, and make sure the DHCP option inside the VM is enabled. [Learn more](/azure/virtual-network/ip-services/virtual-networks-static-private-ip-arm-ps) about how to set up a static IP address by using PowerShell to make sure that the IP configuration always matches what's configured on the VM in Azure.
138
-
1. If you have multiple private IPs assigned to your VM's network adapter, make sure that you carefully follow the steps to [assign the IP configurations correctly](/azure/virtual-network/ip-services/virtual-network-multiple-ip-addresses-portal#os-config). After this, if Guest Agent can't communicate with 168.63.129.16, check that the primary IP in Windows [matches the primary IP in your VM's network adapter in Azure](/troubleshoot/azure/virtual-machines/windows/no-internet-access-multi-ip).
137
+
1. If you have only one private IP on your VM's network adapter, we highly recommend that you have DHCP enabled on the guest VM. If you need a static private IP address, you should configure it through the Azure portal or PowerShell, and make sure the DHCP option inside the VM is enabled. To make sure that the IP configuration always matches what's configured on the VM in Azure, [Learn more](/azure/virtual-network/ip-services/virtual-networks-static-private-ip-arm-ps) about how to set up a static IP address by using PowerShell.
138
+
1. If you have multiple private IPs assigned to your VM's network adapter, make sure that you carefully follow the steps to [assign the IP configurations correctly](/azure/virtual-network/ip-services/virtual-network-multiple-ip-addresses-portal#os-config). After you finish the steps, if Guest Agent can't communicate with 168.63.129.16, check that the primary IP in Windows [matches the primary IP in your VM's network adapter in Azure](/troubleshoot/azure/virtual-machines/windows/no-internet-access-multi-ip).
139
139
1. Check for any issues that a firewall, a proxy, or another source might cause that could block access to IP address `168.63.129.16`.
140
140
1. Check whether Windows Firewall or a third-party firewall is blocking access to ports `80` and `32526`. For more information about why this address shouldn't be blocked, see [What is IP address 168.63.129.16?](/azure/virtual-network/what-is-ip-address-168-63-129-16)
These error entries are probably caused by Remote Procedure Call (RPC) issues. For example, the RPC endpoint might not be listening, or the RPC process might be missing on the opposite end.
212
+
These errors probably occur because of Remote Procedure Call (RPC) issues. For example, the RPC endpoint might not be listening, or the RPC process might be missing on the opposite end.
213
213
214
214
### Solution: Start the CNG Key Isolation service
215
215
@@ -237,7 +237,7 @@ PInvoke PFXImportCertStore failed and null handle is returned. Error Code: 86
237
237
[00000003] [10/21/2020 02:37:45.98] [ERROR] Installing certificates in the LocalMachine store failed with exception: Microsoft.WindowsAzure.GuestAgent.CertificateManager.CryptographyNative+PInvokeException: PInvoke PFXImportCertStore failed and null handle is returned. Error Code: 86.
238
238
```
239
239
240
-
These errors are probably caused by a lack of permissions on the *Crypto* folders for the SYSTEM account. If you collect a [Process Monitor](/sysinternals/downloads/procmon) (ProcMon) trace while you restart the Guest Agent services (RdAgent or WindowsAzureGuestAgent), you should be able to see some "Access Denied" errors.
240
+
These errors probably occur because of a lack of permissions on the *Crypto* folders for the SYSTEM account. If you collect a [Process Monitor](/sysinternals/downloads/procmon) (ProcMon) trace while you restart the Guest Agent services (RdAgent or WindowsAzureGuestAgent), you should be able to see some "Access Denied" errors.
241
241
242
242
### Solution: Add full control of Crypto folders to the SYSTEM account
243
243
@@ -362,9 +362,9 @@ If trying to install Guest Agent fails, make sure that all [prerequisites for Gu
362
362
363
363
**Note:** If Guest Agent was installed manually through the .msi installer, the agent appears in Add/Remove Programs. If Guest Agent was installed during image provisioning, the agent doesn't appear in Add/Remove Programs.
364
364
1. If Guest Agent exists in Add/Remove programs, uninstall it from there. Then, you can install it through the .msi file by using the command line arguments in this step.
365
-
1. If the agent is installed but doesn't appear in Add/Remove programs, use the command line process to remove and install by directly running the .msi file.
365
+
1. If the agent is installed but doesn't appear in Add/Remove programs, follow these steps:
366
366
1. Open an elevated Command Prompt window.
367
-
1. Stop the Guest Agent Services. If the services won't stop, you must set the services to manual startup, and then restart the VM:
367
+
1. Stop the Guest Agent Services. If the services don't stop, you must set the services to manual startup, and then restart the VM:
368
368
369
369
```
370
370
net stop rdagent
@@ -379,8 +379,8 @@ If trying to install Guest Agent fails, make sure that all [prerequisites for Gu
379
379
1. Under C:\WindowsAzure, create a folder that's named OLD.
380
380
1. Move any folders that are named Packages or GuestAgent into the OLD folder.
381
381
1. Create a new folder for the .msi install location (C:\VMAgentMSI).
382
-
1. Download the latest [MSI](https://github.com/Azure/WindowsVMAgent/releases) from the Github Releases for Windows Guest Agent.
383
-
1. Install Guest Agent by using the MSI command line + arguments:
382
+
1. Download the latest [.msi file](https://github.com/Azure/WindowsVMAgent/releases) from the GitHub Releases for Windows Guest Agent.
383
+
1. Install Guest Agent by using the .msiexec command line + arguments:
<Eventtime="2019-12-12T12:49:05.258Z"category="ERROR"source="GuestAgent"><UnhandledError><Message>Installing the RdAgent service failed.</Message><Number>-2147467259</Number><Description>This name may not contain the ' ' character:
431
431
```
432
432
433
-
The VM agent MSI uses WMI StdRegProv to access the registry. If WMI is not working correctly, the MSI cannot set the RdAgent service path from the registry. Therefore, the MSI installation fails.
433
+
The VM agent .msi file uses WMI StdRegProv to access the registry. If WMI isn't working correctly, the .msi file can't set the RdAgent service path from the registry. Therefore, the .msi file installation fails.
434
434
435
435
### Solution
436
436
437
437
1. Open an elevated Command Prompt window.
438
438
2. To test whether WMI StdRegProv is working, run the following WMIC command, and copy the output to a text file:
439
+
439
440
```
440
441
wmic /namespace:\\root\default Class StdRegProv Call GetDWORDValue hDefKey="&H80000002" sSubKeyName="SYSTEM\CurrentControlSet\Services\Winmgmt" sValueName=Start
441
442
```
442
-
If you're using Windows Server 2025 or later, and you haven't manually installed WMIC, instead open an elevated PowerShell prompt to test StdRegProv:
443
+
If you're using Windows Server 2025 or later, and you didn't manually install WMIC, open an elevated PowerShell window to test StdRegProv:
6. Try the VM agent MSI installation again. If it finishes successfully, wait for a minute or two, and then check whether the **RdAgent** service is running.
467
+
6. Try the VM agent .msi installation again. If it finishes successfully, wait for a minute or two, and then check whether the **RdAgent** service is running.
467
468
468
469
```
469
470
wmic service rdagent list brief
470
471
```
471
472
472
-
7. If the **WMIC** command shows **RdAgent** is running, the issue should be resolved. If the **WMIC** command fails or shows that **RdAgent** is not running, go to the next step.
473
+
7. If the **WMIC** command shows **RdAgent** is running, the issue should be resolved. If the **WMIC** command fails or shows that **RdAgent** isn't running, go to the next step.
473
474
474
475
8. Run the following commands to reset the WMI repository:
475
476
@@ -479,7 +480,7 @@ winmgmt /resetrepository
479
480
net start winmgmt
480
481
```
481
482
482
-
9. Try the VM agent MSI installation again. If it finishes successfully, wait for a minute or two, and then check whether the **RdAgent** service is running:
483
+
9. Try the VM agent .msi installation again. If it finishes successfully, wait for a minute or two, and then check whether the **RdAgent** service is running:
483
484
484
485
```
485
486
wmic service rdagent list brief
@@ -504,7 +505,7 @@ System event errors 7031 or 7034 is logged, and the C:\WindowsAzure\logs\Transpa
504
505
505
506
### Solution
506
507
507
-
This issue might occur if Windows Communication Framework (WCF) profiling is enabled. WCF profiling should be enabled only while you debug a WCF issue. It should not be left enabled while you run a production workload.
508
+
This issue might occur if Windows Communication Framework (WCF) profiling is enabled. WCF profiling should be enabled only while you debug a WCF issue. It shouldn't be left enabled while you run a production workload.
508
509
509
510
To disable WCF profiling:
510
511
@@ -516,13 +517,13 @@ cd C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config
516
517
copy machine.config machine.config.bak
517
518
```
518
519
519
-
- To edit the file in Notepad, Run `notepad machine.config`. Remove the following text (but be careful not to also remove any additional text that might be on the same line):
520
+
- To edit the file in Notepad, Run `notepad machine.config`. Remove the following text (but be careful not to also remove any other text that might be on the same line):
0 commit comments