|
| 1 | +--- |
| 2 | +title: Error 0x800719e4 (ERROR_LOG_FULL) When Windows Update Fails |
| 3 | +description: Discusses how to fix Windows Update failures related to error code `0x800719e4 (ERROR_LOG_FULL)`--typically on Azure-hosted Windows virtual machines. |
| 4 | +ms.date: 01/08/2026 |
| 5 | +manager: dcscontentpm |
| 6 | +audience: itpro |
| 7 | +ai.usage: ai-generated |
| 8 | +ms.topic: troubleshooting |
| 9 | +ms.reviewer: kaushika, dougking, v-appelgatet |
| 10 | +ms.custom: |
| 11 | +- sap:Windows Servicing, Updates and Features on Demand\Windows Update - Install errors starting with 0x8007 (ERROR) |
| 12 | +- pcy:WinComm Devices Deploy |
| 13 | +appliesto: |
| 14 | +- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Supported versions of Windows Server</a> |
| 15 | +- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Supported versions of Windows Client</a> |
| 16 | +- ✅ <a href=https://learn.microsoft.com/lifecycle/products/azure-virtual-machine target=_blank>Azure Virtual Machines</a> |
| 17 | +--- |
| 18 | +# Error 0x800719e4 (ERROR_LOG_FULL) when Windows Update fails |
| 19 | + |
| 20 | +## Summary |
| 21 | + |
| 22 | +This article explains how to fix Windows Update error `0x800719e4 (ERROR_LOG_FULL)` when updates fail on supported Windows Server, Windows client, and Azure virtual machines. It describes common causes such as full or corrupted transaction logs, ghosted network adapters or drivers, and misconfigured update orchestration and provides step-by-step guidance to restore successful Windows Update operations. |
| 23 | + |
| 24 | +## Symptoms |
| 25 | + |
| 26 | +When you try to install a Windows update, the installation fails and returns error code `0x800719e4 (ERROR_LOG_FULL)`. The update might appear to install. However, after the computer restarts at the end of installation, the installation rolls back. The Windows Update history might list repeated failed installations. |
| 27 | + |
| 28 | +When this issue occurs, the System log and Component-Based Servicing (CBS) log might include any of the following error messages: |
| 29 | + |
| 30 | +- `Failed uninstalling driver updates [HRESULT = 0x800719e4 - ERROR_LOG_FULL]` |
| 31 | +- `Startup: Failed while processing non-critical driver operations queue` |
| 32 | +- `patch not applicable` or `patch not reflecting after restart` |
| 33 | +- `0x80070002 (ERROR_FILE_NOT_FOUND)` |
| 34 | +- `0x800f0991 (PSFX_E_MISSING_PAYLOAD_FILE)` |
| 35 | +- `0x800f0982 (PSFX_E_MATCHING_COMPONENT_NOT_FOUND)` |
| 36 | +- `0x800F0920 (CBS_E_HANG_DETECTED)` |
| 37 | + |
| 38 | +## Cause |
| 39 | + |
| 40 | +Typically, this issue occurs during the installation or uninstallation of cumulative or driver-related updates. This issue has various possible causes: |
| 41 | + |
| 42 | +- **Transaction log exhaustion, corruption, or improper cleanup**. Windows transaction logs (.blf files and .regtrans-ms files in \Windows\System32\Config\TxR) become full or corrupted, and then block update processes. Improper cleaning of the transaction logs can cause further system corruption and startup failures. |
| 43 | +- **"Ghosted" network adapters or drivers**. VMs that are frequently deallocated and reallocated in Azure can accumulate "ghosted" or hidden device entries that remain in the system registry but are no longer physically present. This behavior is observed in Mellanox devices. When this behavior occurs, driver update queues increase in size, and logs eventually overflow. |
| 44 | +- **Misconfigured update orchestration**. Incorrect settings for update orchestration (such as not using the **Customer Managed** option) can contribute to update failures. |
| 45 | + |
| 46 | +## Resolution |
| 47 | + |
| 48 | +> [!IMPORTANT] |
| 49 | +> |
| 50 | +> - If the affected computer is a Windows VM that can't restart correctly or that you can't access by using SSH, make sure that you can use the Azure Serial Console to access the VM. |
| 51 | +> - Before you troubleshoot this issue, back up the operating system disk. For information about this process for VMs, see [About Azure Virtual Machine restore](/azure/backup/about-azure-vm-restore). |
| 52 | +> - Use administrative permissions to run all the commands and scripts that are provided in these steps. |
| 53 | +
|
| 54 | +### Step 1: Check the system health |
| 55 | + |
| 56 | +To check the system health and make any necessary repairs, open an administrative Command Prompt window, and then run the following commands: |
| 57 | + |
| 58 | +```console |
| 59 | +DISM /Online /Cleanup-Image /RestoreHealth |
| 60 | +SFC /SCANNOW |
| 61 | +``` |
| 62 | + |
| 63 | +Review the output for errors or corruption. If these commands make repairs, try again to install the update. |
| 64 | + |
| 65 | +### Step 2: Clean up the transaction logs |
| 66 | + |
| 67 | +> [!IMPORTANT] |
| 68 | +> Cleaning up transaction incorrectly logs can cause more issues to occur. |
| 69 | +
|
| 70 | +Follow these steps: |
| 71 | + |
| 72 | +1. If the affected computer is a VM that can't start, create a rescue VM. Then move the operating system disk from the affected VM to the rescue VM. |
| 73 | +1. On the rescue VM or the affected physical computer, open an administrative command prompt window, and then change the working directory to \<drive>:\Windows\System32\Config\TxR. |
| 74 | +1. To remove the system and hidden attributes from the transaction log files, run the following command: |
| 75 | + |
| 76 | + ```console |
| 77 | + attrib -h -s * |
| 78 | + ``` |
| 79 | + |
| 80 | +1. To delete the transaction log files, run the following commands: |
| 81 | + |
| 82 | + ```console |
| 83 | + del *.blf |
| 84 | + del *.regtrans-ms |
| 85 | + ``` |
| 86 | + |
| 87 | +1. If you're using a rescue VM, move the operating system disk back to the original VM. |
| 88 | + |
| 89 | +1. Start the VM (or restart the physical computer), and then try again to install the update. |
| 90 | + |
| 91 | +### Step 3: Check for ghosted network adapters or drivers |
| 92 | + |
| 93 | +For more information about this issue, see [Azure VM Ghosted Nic Validation and Cleanup Tools](../../azure/virtual-machines/windows/windows-vm-ghostednic-tool.md). |
| 94 | + |
| 95 | +> [!NOTE] |
| 96 | +> A computer that accumulates ghosted network adapters or drivers might continue to behave in this manner. Consider checking for this issue periodically as part of regular maintenance. |
| 97 | +
|
| 98 | +1. Download the following scripts: |
| 99 | + |
| 100 | +- [Windows_GhostedNIC_Detection.ps1](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_GhostedNIC_Detection.ps1) |
| 101 | +- [Windows_GhostedNIC_Removal.ps1](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_GhostedNIC_Removal.ps1) |
| 102 | + |
| 103 | +1. To detect any ghosted network adapters or drivers, open an administrative Windows PowerShell Command Prompt window, and then run the following commands: |
| 104 | + |
| 105 | + ```powershell |
| 106 | + Set-ExecutionPolicy Bypass -Force |
| 107 | + .\Windows_GhostedNIC_Detection.ps1 |
| 108 | + ``` |
| 109 | + |
| 110 | +1. If the script detects ghosted network adapters or drivers, run the following commands: |
| 111 | + |
| 112 | + ```powershell |
| 113 | + Set-ExecutionPolicy Bypass -Force |
| 114 | + .\Windows_GhostedNIC_Removal.ps1 |
| 115 | + ``` |
| 116 | + |
| 117 | +1. If the affected computer has a Mellanox adapter or driver, run the following commands: |
| 118 | + |
| 119 | + ```powershell |
| 120 | + Get-PnpDevice | Where-Object { $_.FriendlyName -like "*Mellanox*" } |
| 121 | + pnputil /remove-device <InstanceID> |
| 122 | + ``` |
| 123 | + |
| 124 | + > [!NOTE] |
| 125 | + > In this command, \<InstanceID> represents the instance ID number of the device. |
| 126 | +
|
| 127 | +1. Restart the computer, and then try again to install the update. |
| 128 | + |
| 129 | +## Data collection |
| 130 | + |
| 131 | +If issues persist, consider contacting Microsoft Support. Before you contact Microsoft Support for assistance, use the Trouble Shooting Script (TSS) diagnostic scripts to collect data, as described in [Collect data to analyze and troubleshoot Windows servicing, Updates, and Features on Demand scenarios](../../windows-client/windows-tss/collect-data-analyze-troubleshoot-windows-servicing-scenarios.md?context=%2Ftroubleshoot%2Fwindows-server%2Fcontext%2Fcontext#scenario-failures-to-install-windows-updates-or-features-on-demand). Attach this information to your support request. |
| 132 | + |
| 133 | +## References |
| 134 | + |
| 135 | +- [Ghosted NIC Detection & Removal Scripts](https://github.com/Azure/azure-support-scripts) |
| 136 | +- [Introduction to TroubleShootingScript toolset (TSS)](../../windows-client/windows-tss/introduction-to-troubleshootingscript-toolset-tss.md) |
0 commit comments