BatchPatch Forums Home › Forums › BatchPatch Support Forum › Updates not requested
- This topic has 4 replies, 2 voices, and was last updated 5 years, 9 months ago by Anonymous.
-
AuthorPosts
-
February 15, 2019 at 6:26 am #8722AnonymousInactive
Why does batchpatch download unrequested updates, even though the settings states that classifications apply to DOWNLOADS and INSTALLATION
Had the correct updates installed, but more than we needed downloaded.
Please see below
What server downloaded
1> Update for Windows Server 2012 R2 (KB4339284) (660 KB) (2018-07-24) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4339284
2> Update for Windows Server 2012 R2 (KB4462901) (652 KB) (2018-10-18) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4462901
3> Update for Windows Server 2012 R2 (KB4468323) (651 KB) (2018-11-27) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4468323
4> Update for Microsoft Silverlight (KB4481252) (12 MB) (2019-01-15) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-FALSE)
http://support.microsoft.com/kb/4481252
5> Windows Malicious Software Removal Tool x64 – February 2019 (KB890830) (42 MB) (2019-02-12) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/890830
6> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) (5 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487123
7> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) (76 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487080
8> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) (54 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4486474
9> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) (24 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487028
10> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) (367 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487000
What server installed
6> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) (5 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487123
7> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) (76 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487080
8> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) (54 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4486474
9> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) (24 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487028
10> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) (367 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
February 15, 2019 at 10:53 am #9884dougModeratorAre you sure that BatchPatch is what downloaded the updates in question? The log snippets you provided show that the updates were downloaded on the server, but they don’t show that BatchPatch was responsible for downloading them. For that matter your log snippet doesn’t even show that BatchPatch installed them. Can you provide the complete log that backs up your assertion? I’d like to see the log that shows the entire filter + download + install operation. Also what version of BP are you using? Version number is displayed under ‘Help > About’
February 18, 2019 at 3:29 am #9885AnonymousInactiveApologies for all the long windedness.. Trying to be as specific as possible
These are the steps we have followed and the settings we have used, and our understanding of how the Batchpatch app works in Offline + Cached mode. There is a caveat to this explanation that might confuse things: There are actually 12 downloaded updates, even though the Client01 in the following scenario only finds 10 updates. I assume this is something to do with the second question we have for you, which can be found at the bottom of this wall of text.
We have a single client machine “Client01” and a single Batchpatch server “Server01”
The Batchpatch server is configured in Cached + Offline mode. Also in the windows update settings tab we have the following tick boxes ticked to the exclusion of all else
– Search for *Only* important updates
– Include “Critical Updates”
– Include “Security Updates”
– Auto Accept EULAs during installation. If required
– Enable ‘Cached Mode’
– Enable ‘Offline Mode’
– Local update cache directory “C:Temp”
We initiate a Windows update check on Client01 from the Batchpatch grid on Server01. Server01 downloads the wsusscn2.cab then copies it over to Client01.
C:Program FilesBatchPatchwsusscn2.cab
Client01 checks against the .cab for applicable updates, and locally creates the following files:
C:Program FilesBatchPatchBatchPatch.log
C:Program FilesBatchPatchBatchPatchTempAvailableUpdates.log
We then initiate a download. Batchpatch downloads the updates from the previously created list file on Client01 (10 in total) to the local cache of Server01 “c:temp” as dictated in the Batchpatch settings under the Windows update tab.
We then initiate an “install downloaded updates + reboot if required”. Again we do this from the Batchpatch grid, right clicking on Client01 and selecting “Windows Update > Install downloaded updates + reboot if required”
After this is completed the server reboots, and upon checking windows update log on Client01 (using the “View Update History” link in the Control Panel > Windows Update screen) we see that only 5 of the 10 updates that were downloaded have actually installed.
Now, what was installed is actually what we wanted to be installed which means the update classifications are working. The problem we are seeing is that under Tools > Settings > Windows update Tab, above the classifications tick boxes there is a little note that reads “Update Classification filtering (applies only to download / Installation)”. So the classification is applying to installation, but not download, so we end up with a bunch of downloaded updates that we don’t need.
A second question: When using offline mode, the client computers create their own download lists for use by the Batchpatch server, for the purpose of downloading updates:
C:Program FilesBatchPatchBatchPatch.log
C:Program FilesBatchPatchBatchPatchTempAvailableUpdates.log
My question is, do these lists get amalgamated on the Batchpatch server somewhere? Or does Batchpatch reach out to each client to check the contents of these lists prior to downloading require updates
As requested please see logs below
Client01
Ping Reply
Reply from 10.0.0.2 time=0ms
Reboot Messages
Reboot (force) initiated successfully – 11:19:16
Windows Update Messages
Reboot Required. Overall Installation Result: Succeeded – 11:19:15
Local Agent Log
::Begin download – 2019-02-18 10:46:21
Microsoft Offline Scan File
1> wsusscn2.cab :: Skipped: File already exists in cache
::End download – 2019-02-18 10:46:22
Files downloaded: 0
Files located in cache: 1
Files excluded by filter: 0
Files initiated by another row: 0
Failures: 0
::Begin file copy operation – 2019-02-18 10:46:22
1> WsusScn2.cab :: File already exists in destination
::End file copy operation – 2019-02-18 10:46:22
::Begin download – 2019-02-18 10:48:39
Update for Windows Server 2012 R2 (KB4339284)
1> windows8.1-kb4339284-x64_6c6de13ba3b4f098d6601db41c4d3e346fb75171.cab :: Success
Update for Windows Server 2012 R2 (KB4462901)
2> windows8.1-kb4462901-x64_e4c74c7408fed9b2a35ae78b9ca7e565fcb44a83.cab :: Success
Update for Windows Server 2012 R2 (KB4468323)
3> windows8.1-kb4468323-x64_3a350e3c225374123008438223f05fddd19c8955.cab :: Success
Update for Microsoft Silverlight (KB4481252)
4> silverlight_x64_16cfdfe075ee9249845eccff913acc4386a0a1e6.exe :: Success
Windows Malicious Software Removal Tool x64 – February 2019 (KB890830)
5> windows-kb890830-x64-v5.69_65c649c5777c8109ad9ef62da7d1191676b524c6.exe :: Success
2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)
6> windows8.1-kb4483484-x64_e46aaf18c5b6382dc93a62b6db803f1a693477a0.cab :: Success
7> windows8.1-kb4483469-x64_c5ac17fdca18f3813de5747a7bbae268cce70577.cab :: Success
2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)
8> windows8.1-kb4483459-x64_e986e7f8d6708190a0f0f35f2a65eb5fb6051ee7.cab :: Success
9> windows8.1-kb4483450-x64_ef404e2976341ec4e3783e8ff9bc7e9c7a9f70fa.cab :: Success
2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)
10> windows8.1-kb4486474-x64_5c9b4826d37000f5d0906afd6dee50f9fb17ba9a.cab :: Success
2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)
11> windows8.1-kb4487028-x64_df7ee5a6e41607e66103a8331356ee8f28263785.cab :: Success
2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)
12> windows8.1-kb4487000-x64_32763bce1645d2d535b32aafd06615e228e14ff7.cab :: Success
::End download – 2019-02-18 10:51:16
Files downloaded: 12
Files located in cache: 0
Files excluded by filter: 0
Files initiated by another row: 0
Failures: 0
::Begin file copy operation – 2019-02-18 10:51:16
Update for Windows Server 2012 R2 (KB4339284)
1> windows8.1-kb4339284-x64_6c6de13ba3b4f098d6601db41c4d3e346fb75171.cab :: Skipped: File already cached on target host
Update for Windows Server 2012 R2 (KB4462901)
2> windows8.1-kb4462901-x64_e4c74c7408fed9b2a35ae78b9ca7e565fcb44a83.cab :: Skipped: File already cached on target host
Update for Windows Server 2012 R2 (KB4468323)
3> windows8.1-kb4468323-x64_3a350e3c225374123008438223f05fddd19c8955.cab :: Skipped: File already cached on target host
Update for Microsoft Silverlight (KB4481252)
4> silverlight_x64_16cfdfe075ee9249845eccff913acc4386a0a1e6.exe :: Skipped: File already cached on target host
Windows Malicious Software Removal Tool x64 – February 2019 (KB890830)
5> windows-kb890830-x64-v5.69_65c649c5777c8109ad9ef62da7d1191676b524c6.exe :: Skipped: File already cached on target host
2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)
6> windows8.1-kb4483484-x64_e46aaf18c5b6382dc93a62b6db803f1a693477a0.cab :: Skipped: File already cached on target host
7> windows8.1-kb4483469-x64_c5ac17fdca18f3813de5747a7bbae268cce70577.cab :: Skipped: File already cached on target host
2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)
8> windows8.1-kb4483459-x64_e986e7f8d6708190a0f0f35f2a65eb5fb6051ee7.cab :: Skipped: File already cached on target host
9> windows8.1-kb4483450-x64_ef404e2976341ec4e3783e8ff9bc7e9c7a9f70fa.cab :: Skipped: File already cached on target host
2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)
10> windows8.1-kb4486474-x64_5c9b4826d37000f5d0906afd6dee50f9fb17ba9a.cab :: Skipped: File already cached on target host
2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)
11> windows8.1-kb4487028-x64_df7ee5a6e41607e66103a8331356ee8f28263785.cab :: Skipped: File already cached on target host
2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)
12> windows8.1-kb4487000-x64_32763bce1645d2d535b32aafd06615e228e14ff7.cab :: Skipped: File already cached on target host
::End file copy operation – 2019-02-18 10:51:17
Files copied: 0
Files skipped: 12
Failures: 0
Remote Agent Log
Client01 02/18/2019 11:03:59
::Begin ‘offline sync service’ search
The search query “ImportantOnly” returned 10 update(s):
1> Update for Windows Server 2012 R2 (KB4339284) (660 KB) (2018-07-24) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4339284
2> Update for Windows Server 2012 R2 (KB4462901) (652 KB) (2018-10-18) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4462901
3> Update for Windows Server 2012 R2 (KB4468323) (651 KB) (2018-11-27) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4468323
4> Update for Microsoft Silverlight (KB4481252) (12 MB) (2019-01-15) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-FALSE)
http://support.microsoft.com/kb/4481252
5> Windows Malicious Software Removal Tool x64 – February 2019 (KB890830) (42 MB) (2019-02-12) – Update Rollups
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/890830
6> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) (5 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487123
7> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) (76 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487080
8> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) (54 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4486474
9> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) (24 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487028
10> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) (367 MB) (2019-02-12) – Security Updates
(Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)
http://support.microsoft.com/kb/4487000
::End search
::Begin filtering collection
skipped> Update for Windows Server 2012 R2 (KB4339284) – Reason: UpdateClassification-UpdateRollups
skipped> Update for Windows Server 2012 R2 (KB4462901) – Reason: UpdateClassification-UpdateRollups
skipped> Update for Windows Server 2012 R2 (KB4468323) – Reason: UpdateClassification-UpdateRollups
skipped> Update for Microsoft Silverlight (KB4481252) – Reason: UpdateClassification-UpdateRollups
skipped> Windows Malicious Software Removal Tool x64 – February 2019 (KB890830) – Reason: UpdateClassification-UpdateRollups
adding> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)
adding> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)
adding> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)
adding> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)
adding> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)
::End filtering collection
::Begin adding downloaded items to installer collection
adding> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)
adding> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)
adding> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)
adding> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)
adding> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)
::End adding downloaded items to installer collection
::Begin installation
1> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) – Installation Result: Succeeded. Reboot Required: TRUE
2> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) – Installation Result: Succeeded. Reboot Required: TRUE
3> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) – Installation Result: Succeeded. Reboot Required: TRUE
4> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) – Installation Result: Succeeded. Reboot Required: TRUE
5> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) – Installation Result: Succeeded. Reboot Required: TRUE
::End installation
Overall Installation Result: Succeeded
Reboot Required: TRUE
Client01 02/18/2019 11:19:11
Job Queue
* * Post Update Check * *
. . . . . . . . . .
Start pinging
Get last boot time
Get C: disk space
Get stopped automatic services
Get pending reboot status
Get last boot time
Check for available updates
Wait 10 minutes
Stop pinging
Send email notification
Schd Task – Action
Job queue (Post Update Check):: Start pinging
Get last boot time
Get C: disk space
Get stopped automatic services
Get pending reboot status
Get last boot time
Check for available updates
Wait 10 minutes
Stop pinging
Send email notification
Schd Task – Next Run Time
Thursday – 04/18/19 – 11:07
Schd Task – Recurrence
None
Schd Task – Multiple Tasks Schedule
Monday – 02/18/19 – 11:03
Install downloaded updates + reboot if required
Thursday – 04/18/19 – 11:07
Job queue (Post Update Check):: Start pinging
Get last boot time
Get C: disk space
Get stopped automatic services
Get pending reboot status
Get last boot time
Check for available updates
Wait 10 minutes
Stop pinging
Send email notification
All Messages
Mon-11:23:18> Client01 ONLINE
Mon-11:23:05> Client01 OFFLINE
Mon-11:19:16> Reboot/Shutdown: Reboot (force) initiated successfully
Mon-11:19:15> Reboot/Shutdown: Attempting to initiate reboot (force)…
Mon-11:19:15> Reboot/Shutdown: Failed to initiate reboot. User is logged on.
Mon-11:19:15> Reboot/Shutdown: Attempting to initiate reboot…
Mon-11:19:15> Windows Update: Reboot Required. Overall Installation Result: Succeeded
Mon-11:03:58> Windows Update: Executing BatchPatchRemoteAgent.exe…
Mon-11:03:58> Windows Update: Attempting to initiate Windows Update (Action: Install downloaded updates: ‘ImportantOnly’) …
Mon-11:03:57> Windows Update: Establishing connection…
Mon-11:03:57> Windows Update: Initializing…
Mon-11:03:57> Windows Update: Queued…
Mon-11:03:57> Scheduled Task: Initiating ‘Install downloaded updates + reboot if required’ – Monday – 02/18/19 – 11:03.
Mon-10:53:24> Windows Update: END (Offline mode: Download available updates)
Mon-10:53:24> Windows Update: 10 update(s) found
Mon-10:51:17> Windows Update: Executing BatchPatchRemoteAgent.exe…
Mon-10:51:17> Windows Update: Attempting to initiate Windows Update (Action: Copy files to Windows Update cache: ‘ImportantOnly’ | Server selection: Offline sync service) …
Mon-10:51:17> Windows Update: Establishing connection…
Mon-10:51:17> Windows Update: Initializing…
Mon-10:51:17> Windows Update: File copy complete (Files copied: 0. Failures: 0)
Mon-10:51:17> Windows Update: Copying file(s) from local cache to target working directory…
Mon-10:51:16> Windows Update: Attempting to copy file(s) from local cache to target working directory…
Mon-10:51:16> Windows Update: Local download complete (Files downloaded: 12. Files located in cache: 0. Files excluded by filter: 0. Files initiated by another row: 0. Failures: 0)
Mon-10:48:39> Windows Update: Executing local downloader…
Mon-10:48:39> Windows Update: Queued local downloader…
Mon-10:48:39> Windows Update: 10 update(s) found
Mon-10:46:22> Windows Update: Executing BatchPatchRemoteAgent.exe…
Mon-10:46:22> Windows Update: Attempting to initiate Windows Update (Action: Search for updates and retrieve url list: ‘ImportantOnly’ | Server selection: Offline sync service) …
Mon-10:46:22> Windows Update: Establishing connection…
Mon-10:46:22> Windows Update: Initializing…
Mon-10:46:22> Windows Update: WsusScn2.cab file copy complete
Mon-10:46:22> Windows Update: Copying WsusScn2.cab file from local cache to target working directory…
Mon-10:46:22> Windows Update: Queued WsusScn2.cab file copy from local cache to target working directory…
Mon-10:46:22> Windows Update: Initializing copy of WsusScn2.cab file from local cache to target working directory…
Mon-10:46:22> Windows Update: Local download complete (Files downloaded: 0. Files located in cache: 1. Files excluded by filter: 0. Files initiated by another row: 0. Failures: 0)
Mon-10:46:21> Windows Update: Executing WsusScn2.cab downloader…
Mon-10:46:21> Windows Update: Queued WsusScn2.cab downloader…
Mon-10:46:21> Windows Update: BEGIN (Offline mode: Download available updates)
Mon-10:46:21> Windows Update: Queued…
Mon-10:40:11> Windows Update: END (Offline mode: Check for available updates)
Mon-10:40:11> Windows Update: 10 update(s) found
Mon-10:37:48> Windows Update: Executing BatchPatchRemoteAgent.exe…
Mon-10:37:48> Windows Update: Attempting to initiate Windows Update (Action: Search for updates and retrieve url list: ‘ImportantOnly’ | Server selection: Offline sync service) …
Mon-10:37:48> Windows Update: Establishing connection…
Mon-10:37:47> Windows Update: Initializing…
Mon-10:37:47> Windows Update: WsusScn2.cab file copy complete
Mon-10:37:41> Windows Update: Copying WsusScn2.cab file from local cache to target working directory…
Mon-10:37:41> Windows Update: Queued WsusScn2.cab file copy from local cache to target working directory…
Mon-10:37:41> Windows Update: Initializing copy of WsusScn2.cab file from local cache to target working directory…
Mon-10:37:41> Windows Update: Local download complete (Files downloaded: 1. Files located in cache: 0. Files excluded by filter: 0. Files initiated by another row: 0. Failures: 0)
Mon-10:37:41> Windows Update: WsusScn2.cab signature validation successful
Mon-10:37:35> Windows Update: Validating digital signature on WsusScn2.cab…
Mon-10:35:17> Windows Update: Executing WsusScn2.cab downloader…
Mon-10:35:17> Windows Update: Queued WsusScn2.cab downloader…
Mon-10:35:17> Windows Update: BEGIN (Offline mode: Check for available updates)
Mon-10:35:17> Windows Update: Queued…
February 18, 2019 at 5:31 am #9881AnonymousInactiveSorry for forgot to mention, we are running version 2018.10.4.13.0
February 18, 2019 at 8:53 pm #9882dougModeratorThe update classification filters are applied by the batchpatchremoteagent process that runs on the target computer. In normal (non-cached) mode, the target computer is responsible for downloading/installing updates, and since the update classification filters process runs on the target computer, update classifications that are UNchecked do not get downloaded or installed. However, in cached mode the BatchPatch computer is responsible for downloading the updates. It downloads all of the updates found in the search, even if they are UNchecked in the update classification filters. The BatchPatch computer then copies these files to the target computer’s BatchPatch remote working directory cache folder. Then the target computer processes everything according to the filtering that has been applied, and so it sees that the files are filtered by the update classification filters being UNchecked, and so the target computer does not copy the files from the BatchPatch remote working directory cache folder to the Windows Update cache folder. So, to the Windows Update agent, the files never get a status of ‘Downloaded-TRUE’. They are effectively never “downloaded” by the target computer. So to reiterate how the process works, the BatchPatch computer puts the files on the target computer into the BatchPatch remote working cache directory, and then the target computer performs a scan and only runs the copy to cache (this method copies files from the BatchPatch remote working directory cache folder to the Windows Update cache folder) for updates that are included (or NOT excluded) by the filter. We are aware of this behavior. We need to modify it to either not copy files to the target that will never be cached on the target, or to delete files on the target (in the remote working dir cache folder. default is C:Program FilesBatchPatchcache) that were copied there but were not cached into the Windows Update cache location (in C:WindowsSoftwareDistribution) due to being excluded by the filter.
In the log that you shared we can see a status of ‘Downloaded-TRUE’ for *all* of the updates, even the ones that should be excluded by your update classification filters set. This means that either you downloaded *all* of the updates on that machine prior to the session that you created to obtain the log file by using BatchPatch *without* UNchecking the update classifications filters, or you had a different process perform the download of updates, and so the BatchPatch filters were not observed by that other process. The log that you pasted does not show BatchPatch running copy to cache for the files that would be excluded by having the update classification filters UNchecked. Rather it shows the files *already* have a status of ‘Downloaded-TRUE’ before the log you included was created.
All that said, everything appears to be working properly, based on what you have shown me, and based on my testing here to confirm that the behavior is what I described. I realize that it’s not completely what one would expect to have happen, considering the language about “applies only to download / installation” but in reality the “applies only to download / installation” is from the perspective of the target computer remote agent, not from the BatchPatch computer. When running in cached mode things are a bit different, and so you’ll see the BatchPatch computer download updates that are UNchecked in the update classification filters, but when they go for processing on the target computer, the target computer excludes them properly and never caches them (never copies them from the BatchPatch cache folder to the Windows Update cache folder) and hence they never obtain a status of ‘Downloaded-TRUE’ as a result of a BatchPatch action, unless the BatchPatch action is executed with filters applied that do enable the updates to be copied to the Windows Update cache. In your case I can’t tell you how the updates got to a point where status would show ‘Downloaded-TRUE’. I can only tell you that it was not due to BatchPatch unless at an earlier time you ran BatchPatch with the update classification boxes *checked* for the updates in question, and then you subsequently unchecked the boxes at a later time to run the action that produced the logs that you shared.
You asked “A second question: When using offline mode, the client computers create their own download lists for use by the Batchpatch server, for the purpose of downloading updates:
C:Program FilesBatchPatchBatchPatch.log
C:Program FilesBatchPatchBatchPatchTempAvailableUpdates.log
My question is, do these lists get amalgamated on the Batchpatch server somewhere? Or does Batchpatch reach out to each client to check the contents of these lists prior to downloading require updates”
The two files that you mentioned are not “download lists for use by the Batchpatch server, for the purpose of downloading updates.” BatchPatch instructs the target computer batchpatchremoteagent process to create these files, and then BatchPatch consumes these files for a variety of purposes.
For any further questions on this matter, please contact us directly for support.
-
AuthorPosts
- You must be logged in to reply to this topic.