Title : Technical Support Workbook Subject : Symantec Ghost 11.0 Author : Ghost Development Date : 8 March 2016 d:\533577408.doc Technical Support Workbook - Symantec Ghost 11.0 Contents 1. INTRODUCTION 4 2. GENERAL INFORMATION 5 2.1. 2.2. 2.3. 2.4. 3. Customer Information Problem Description Ghost Software Platform Information GHOST/GHOST32 3.1. Ghosterr.txt 3.2. Ghost hangs 3.3. Cloning linux 3.3.1. Lilo fails to boot after clone 3.3.2. Grub fails to boot after clone 3.4. CD/DVD 3.5. Peer to peer 3.5.1. LPT 3.5.2. USB 3.6. Tape 3.7. File preservation 4. CONSOLE 4.1. Console database 4.2. Ngserver crashes 4.3. Domain joining 4.3.1. Client unable to join domain 4.4. Sysprep errors 4.5. Errors when configurations are applied to clients 4.6. GhostCasting problems 4.7. File transfer 4.7.1. Ghostcasting problems 4.8. Client Connectivity 4.9. Deployment AI Packages 4.10. User Migration 4.11. Backup regimes 4.11.1. General infomation 4.11.2. Problems with backup 4.11.3. Problems with restore 4.12. Client inventory 4.13. Booting a Console client into the Dos boot partition 4.13.1. Failure to boot into the Virtual partition 4.13.2. Failures once booted into Dos 4.14. Remote Client Installation and Uninstallation 5 5 5 5 6 6 6 6 6 6 6 7 7 7 7 7 8 8 8 8 8 8 9 9 9 9 9 9 10 10 10 10 10 10 11 11 11 12 5. GHOST EXPLORER 13 6. GHOSTCASTING 14 6.1. 7. Multicast logs from both the client and the server. USER MIGRATION WIZARD 14 15 Page 2 of 22 Technical Support Workbook - Symantec Ghost 11.0 8. OMNIFS 16 9. GDISK 17 10. GHOST BOOT WIZARD 18 11. GHOST WALKER/32 19 12. INSTALLATION 20 13. AI SNAPSHOT AND AI PACKAGES 21 13.1. 13.2. 14. 14.1. 14.2. Ai Configuration file AITrace log PACKET TRACES General WireShark (formerly known as Ethereal) 21 21 22 22 22 Page 3 of 22 Technical Support Workbook - Symantec Ghost 11.0 1. Introduction The purpose of this document is to provide basic information to the Ghost development team when a customer encounters a problem. The General Information section on page 5 must be completed in all instances, special attention should be given to the Problem Description section on page 5. Generally at least one other section should also be completed depending on which component is not working. Page 4 of 22 Technical Support Workbook - Symantec Ghost 11.0 2. General Information 2.1. Customer Information Company Name Company Address Customer Phone # Customer Email CRM ID# Other Staff to keep in the loop (i.e. Symantec Sales, Customer Management) 2.2. Problem Description Must provide a detailed problem description stating: Steps performed to produce the problem and whether it is reproducible. The EXACT text of messages generated. Distinguishing characteristics; is there anything unusual that should be pointed out like “the hard drive is connected via USB” or the system is controlled from PcAnywhere. If you remove these special cases circumstances, or vary any of the components does the problem still occur? 2.3. Ghost Software What version of Ghost is being used? This can be found in the About Box on Windows components or by using the –version or /version options on the command line of DOS components. Product Version 2.4. Platform Information Detailed information on equipment used. Manufacturer Model Hard Drives -make / model /interface type / capacity NIC Make and model OS type and version Primary network login (Netware/Microsoft/Other). Network Configuration: Domain/Workgroup/Other, if other specify. Is there settings enabled for screen saver, power management, or hibernate, if yes please specify. Page 5 of 22 Technical Support Workbook - Symantec Ghost 11.0 3. Ghost/Ghost32 The Ghosterr.txt section must always be completed. Depending on the nature of the problem it may be necessary to complete one or more of the other ghost sections. 3.1. Ghosterr.txt Problems occurring during the running of Ghost almost always produce a ghosterr.txt. It is mandatory that this file accompanies any request for support. If ghost is not crashing then is should still be possible to press Ctrl-C in Ghost, a ghosterr.txt will be produced which is still useful in that it contains Ghost’s view of the hardware. Ghosterr.txt 3.2. Ghost hangs If Ghost is not responding and therefore can not produce a ghosterr.txt file Ghost is either locking up, or going into an endless loop, so the customer should be asked to do the following. Run ghost with the -*6 switch, and report which procedure is being displayed in the top left corner of the ghost screen. If ghost is in a loop it may not be possible to see the procedure, press the “pause” key, note the procedure and then press the “enter key”. Do this several times. Procedures displayed An alternative is to run ghost with both the -*3 and -*5 switches and sending the resulting ghostlog.txt. 3.3. Cloning linux Which distribution of Linux Which file systems are being used Is /boot in the root partition or its own partition 3.3.1. Lilo fails to boot after clone Provide /etc/lilo.conf Describe at which point and with what error message LILO fails. 3.3.2. Grub fails to boot after clone Confirm that there is a /boot/grub directory containing files named stage1 and stage2 (i.e., it is a standard configuration) 3.4. CD/DVD What is the make, model & firmware revision of the writer? What type of media was used (DVD+RW / DVD+R / DVD-RW / DVD-R / CD-RW / CD-R) and if rewritable, was it previously used? If Ghost does not detect a CD/DVD writer then start Ghost with the -*1 switch. Once Ghost has loaded, ghosterr.txt cdfile.txt start a disk to image operation, select any disk, and pull down the list of drives in the file requester to establish that no CD/DVD writer is detected. Page 6 of 22 Technical Support Workbook - Symantec Ghost 11.0 Repeat the above operation running Ghost with the –cdfile=cdfile.txt. Generate an error file (using Ctrl+C) 3.5. Peer to peer 3.5.1. LPT What is the make & model of LPT cable used? Please include the text displayed by the LPT driver during boot up. 3.5.2. USB What is the make & model of USB cable used? What is the nature of the USB hardware (add-in card make & model, or motherboard make & model)? Also, include the text displayed by the USB driver during boot up. 3.6. Tape Make and Model of tape drive 3.7. File preservation Any information about the original file systems, e.g. type, cluster size, used space, free space etc. Recovery file, this will be called fpmfile1.dat (or fpmfile2.dat) Page 7 of 22 Technical Support Workbook - Symantec Ghost 11.0 4. Console The Console database section must always be completed. Depending on the nature of the problem it may be necessary to complete one or more other of the Console sections. 4.1. Console database For most problems when running the Console the customers Console database must be provided. The database is normally found in the following location C:\Program Files\Symantec\Ghost\db. Please zip this directory including subdirectories. In addition, please provide the database user name and password. You can retrieve this information from the Console by following ToolsDatabase Password. Content of DB directory (Zip the files) Database credentials Must provide. Username: Password: Console runs under what OS? 4.2. Ngserver crashes If ngserver has crashed (for example an exception has occurred of type cx0000005) Ghost 11.0 generates a dump file called ngserver.dmp in the ghost directory. This must be provided. All ngserver*.log files located under e.g. C:\Program Files\Symantec\Ghost should be provided. ngserver.dmp ngserver*.log Must provide. Must provide. 4.3. Domain joining OS of domain controller If not NT4, Domain mode (mixed or native) Is there more than one domain controller Configuration of DNS environment, e.g is DNS server on the PDC, is it Active directory integrated or zonefile. 4.3.1. Client unable to join domain From the client machine provide the following file. %systemroot%\debug\netsetup.log 4.4. Sysprep errors For problems when using Sysprep, we require the following information: Windows 2000 Windows XP Windows Vista Answer files C:\WINNT\setupact.log C:\WINNT\setuperr.log C:\Windows\setupact.log C:\Windows \setuperr.log C:\windows\panther\setupact.log C:\windows\panther\setuperr.log C:\windows\panther\unattendGC\setupact.log C:\windows\panther\unattendGC\setuperr.log C:\windows\system32\sysprep\panther\setupact.log C:\windows\system32\sysprep\panther\setuperr.log Sysprep.inf or Unattend.xml Page 8 of 22 Technical Support Workbook - Symantec Ghost 11.0 4.5. Errors when configurations are applied to clients Please provide the ghconfer.txt error file from the task log. Ghconfer.txt Must provide 4.6. GhostCasting problems Please attempt the operation without using the Console, i.e. use a boot diskette and the GhostCast server. If the problem occurs then complete the GhostCasting section on page 14. If problem only occurs when running from the console, you still need to complete the GhostCasting section on page 14, but run the task using the “Advanced Execute…” option to obtain the logs. In some cases, especially when the client is running in a Virtual Partition, it may not be possible to collect a client side log. 4.7. File transfer Console file transfer uses Ghostcasting technology. In most cases it will be easy to determine whether the problem is with the Ghostcasting of the files or a general problem. For general problems you should only need to complete the Console database section. 4.7.1. Ghostcasting problems Complete the GhostCasting section on page 14. To obtain the logs you’ll need to create the following two registry keys. HKEY_LOCAL _MACHINE\SOFTWARE\Symantec\Symantec Ghost\GhostcastConsoleLogFile HKEY_LOCAL _MACHINE\SOFTWARE\Symantec\Symantec Ghost\ GhostcastConsoleLogLevel The "GhostcastConsoleLogFile" key is a is a full path to a file, e.g. c:\log.txt The "GhostcastConsoleLogLevel" key is a string value between 0 and 100 where 0 is "Log All" and 100 is "Log None" It is not possible to collect client side logs when doing file transfer tasks. 4.8. Client Connectivity You should refer to the console discovery section of the following Symantec knowledge base article http://service1.symantec.com/SUPPORT/ghost.nsf/docid/2002101612025325 Provide all ngctw32*.log files which will be created at e.g. C:\Program Files\Symantec\Ghost\ Which discovery method are you expecting to work (multicast or WINS) Provide a packet trace, see section Packet Traces on page 22. Ngctw32*.log files provided? Must provide. 4.9. Deployment AI Packages Complete the AI Snapshot and AI packages section on page 21. Page 9 of 22 Technical Support Workbook - Symantec Ghost 11.0 4.10. User Migration Please provide user migration logs for any failed tasks. During Console task specification, ensure that full logging is selected. If not using the Console, or for more details on the logs, please see the section “User Migration Wizard” on page 15. Are the account(s) being moved domain or local machine accounts? Is the target machine part of a domain? What is the source and target operating system? File systems? Is there anything special about the files being gathered or placed? Security, in-use, encryption? Was package stored locally on the client or on the server? Logs provided? Must provide. 4.11. Backup regimes 4.11.1.General infomation What is the source and target operating system? File system? Are there any warnings reported in the task log or event log? Please specify. 4.11.2.Problems with backup If the problem occurs in Ghost while completing a baseline backup, please also complete the Ghost/Ghost32 section on page 6. Are you getting a baseline or incremental? What is the source operating system? File system? Is there anything specific about the files you’re gathering? Encrypted, in-use, locked, etc? Were applications, OS update installed/uninstalled or system changes made to the system since last incremental or baseline? If the problem is with an incremental complete the AITrace log section on page 21 . If problem is with an incremental, then using the incremental package, complete the Ai Configuration file section on page 21 4.11.3.Problems with restore If the problem occurs in Ghost while completing a baseline restore, please also complete the Ghost/Ghost32 section on page 6. Are you restoring a baseline or incremental? How many? What is the target operating system? File system? Is there anything specific about the files you’re restoring? Have you tried performing “safe mode- files only” restore? Did this work? If the problem is with an incremental complete the AITrace log section on page 21 . If problem is with an incremental, then using the incremental package, complete the Ai Configuration file section on page 21 4.12. Client inventory Complete the Problem Description section on page 5. Page 10 of 22 Technical Support Workbook - Symantec Ghost 11.0 4.13. Booting a Console client into the Dos boot partition Does the client have a Ghost boot partition or a Virtual partition. You can determine this by looking at the client properties on the console. Does the client use MS Dos or PC Dos 4.13.1.Failure to boot into the Virtual partition There are some classes of software that are known to interfere with the creation of the virtual partition. It is often worth disabling such software before attempting Ghost operations. Please list the software installed on the machine: Virus Scanning Software CD Burning Software, especially Package Writing software Other low-level disk software Other software that starts when the computer is turned on and stays active in the background In the case of errors that are not readily explainable, it is possible to turn on additional logging during the creation of the VP. This shows the path of execution in the VP library in great detail, information that is generally only useful for developers. Logging is controlled by a registry key on the client machine “HKEY_LOCAL_MACHINE\Software\Symantec\Symantec Ghost\TraceMode”. Set this value to 1 to enable tracing. You must first reboot the computer for the change to take effect. This will generate a log file called "trace.txt" in the temporary directory ("C:\WINDOWS\TEMP" for Win9x, or "C:\Document and Settings\YOUR_USER_NAME\Local Settings\TEMP" for Win2k/XP). Please provide the contents of this file. 4.13.2.Failures once booted into Dos There are normally two types of problems when booting into Dos. 4.13.2.1.No network connectivity Complete the Ghost Boot Wizard section on page 18 for the template selected for the client. 4.13.2.2.Failures to boot. Complete at least the first three items in the Platform Information section on page 5. Describe what happens What are the exact error messages which are displayed Boot from a floppy disk or bootable CD at the time you expect to boot into the Virtual partition and provide output from gdisk. gdisk 1 /raw > gdisk.log Does running ghreboot result in the computer booting back to Windows. Does the same problem occur if MS Dos is used for the Virtual Parititon gdisk.log Page 11 of 22 Technical Support Workbook - Symantec Ghost 11.0 4.14. Remote Client Installation and Uninstallation For trouble shooting help you should refer to the Remote client install documents in the Symantec knowledge base. On the client there are two log files created. There is a log file created for the performance of the Client Install Service (rcilog.txt) and for the msi-based portion of the installation (log.txt or logun.txt for uninstallation). These log files are created in <Common AppData>\Symantec. rcilog.txt. log(un).txt Page 12 of 22 Technical Support Workbook - Symantec Ghost 11.0 5. Ghost Explorer What partitions are in the image file, e.g. FAT, Ext2, NTFS. Are any of these “Image All”, i.e. don't show individual files? If possible provide a screen shot of the properties of the image (in explorer open the image and then from the file menu select properties) What version of Ghost created the image? Has the image file been edited in Ghost Explorer previously, e.g. files added or deleted. Are these the files which cause the problem? Is the image file split into multiple segments? Are they on removable media? Are these segments all in one directory with autoname, or are they scattered across several directories or disks? Is the image file password protected? Was the image file written by Ghost directly to CD/DVD? Can Ghost verify the image file? If not, what does Ghost report? Can the customer let us have a copy of this image file if we need it? Was the image compiled by Ghost explorer? Is the problem reproducible? Check to see if Ghost Explorer has written an error log (GhostExplorerError.txt) to the Application Data folders (e.g. C:\Documents and Settings\All Users\Application Data\Symantec\Ghost\Explorer) Try running Ghost Explorer with the diagnostic switch ignoreindex. Does this result in any different behavior? What happens? Page 13 of 22 Technical Support Workbook - Symantec Ghost 11.0 6. GhostCasting This section includes explicitly GhostCast Server problems, problems starting multicasting in Ghost, problems of connectivity between GhostCast Server and Ghost, but not other Ghost problems that just happen to occur when multicasting. Ghosterr.txt 6.1. Multicast logs from both the client and the server. Set this at the server at “FileOptionsLog Level”. At the client end (Ghost) use the -jl:x=filename switch. Generating these files is covered in the manual under Diagnostics. If the error occurs prior to any significant progress being made through the image, set the logging level to All, otherwise Informational. In general this should produce logs small enough to fit on a floppy, which is often necessary at the client end. Multicast Log from Server Multicast log from Client What the network configuration is, in particular presence of routers and switches between the client and the server? Type of network (Ethernet/Token Ring)? What network adapter they have on the machine running Ghost? Are they using a packet driver or an NDIS driver? What OS is the MC Server running on (including version and service pack)? Page 14 of 22 Technical Support Workbook - Symantec Ghost 11.0 7. User Migration Wizard Logs must be provided for all failed operations. Please provide enhanced logs. Enhanced logging can be set by changing the values of the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec User Migration\Log Change the value “level” to “0000ffff” [Advanced and minimal logging can be toggled by pressing F2 button while the User Migration Wizard.exe is running. The dots in the right-bottom corner of the Wizard become green when full logging is on.] The logs can be extracted from the package by opening it in the Package Explorer, going to logs tab and pressing “Export Logs’ button. The logs are created by default at: C:\Documents and Settings\All Users\Application Data\Symantec\Client Migration\4.0\logs\" Are the account(s) being moved domain or local machine accounts? Is the target machine part of a domain? What is the source and target operating system? File systems? Is there anything special about the files being gathered or placed? Security, in-use, encryption? Was package encrypted with password? Enhanced logs provided? Must provide. Page 15 of 22 Technical Support Workbook - Symantec Ghost 11.0 8. OmniFS omnifser.txt omnifs info and omnifs diskinfo output Page 16 of 22 Technical Support Workbook - Symantec Ghost 11.0 9. Gdisk GDISK screen output Does Ghost work? If not the complete the Ghost/Ghost32 section If ghost does work for a ghosterr.txt by pressing Ctrl-C and provide this Use gdisk [commands] > file.txt Page 17 of 22 Technical Support Workbook - Symantec Ghost 11.0 10. Ghost Boot Wizard Normally the problem won’t be with the Ghost boot wizard but with the package which it has created. If the problem is with Ghost boot wizard, complete the Problem Description section on page 5. If the problem is with a boot package created then complete the following things: Copy and paste of the contents of the “Symantec Ghost Boot Wizard – review” page when creating the package. NIC type of booting machine? What kind of machine were you booting from? Include BIOS version. Exact Error messages (there is normally two) that happen during the boot when the driver loads? Page 18 of 22 Technical Support Workbook - Symantec Ghost 11.0 11. Ghost Walker/32 If one is generated, GWALKERR.TXT If ghstwalk is aborting then run ghstwalk with the "/logging" switch and send the gwalklog.txt file. If it is crashing or hanging run ghstwalk with the “/save_logging” switch GWALKLOG.TXT What is the OS they are trying to change? (9X, NT, 2000 or XP) What type of file system is the OS installed on? (Fat or NTFS) If the OS is NT, 2000 or XP, is it a member of a domain? Page 19 of 22 Technical Support Workbook - Symantec Ghost 11.0 12. Installation If any problems are encountered during installation/upgrading they should run the installation again from the command line as: On Win NT/2000/XP: msiexec /i "<path to msi>\<msi package>" /l*v logfile.txt On Win 9x: <windowsFolder>\system\msiexec /i "<path to msi>\<msi package>" /l*v logfile.txt where <msi package> is “Symantec Ghost.msi” for Console, Standard Tools and AI Snapshot installations “Client.msi” for Console Client and Configuration Client installations “SUMWizard.msi” for Symantec User Migration installations The logfile should give us details on what failed during installation/upgrade. logfile.txt Must provide. On LiveUpdate, we create ghupdlog.txt in ghost directory. If any problems have been encountered we should be able to tell what went wrong. Note that ghupdlog.txt always gets created on LiveUpdate (even if the update was successful). ghupdlog.txt Please provide. Page 20 of 22 Technical Support Workbook - Symantec Ghost 11.0 13. AI Snapshot and AI packages What application is being replicated? Maker/Title/Version? Was there more than one application or change made to the system during the replication process? What other software or service are running on the machine the package was built on? Were AIsnapshot options changed during replication? Please specify. What drives were being specified in the AIsnapshot options for scanning? What was the AIsnapshot working directory used for replicating? What was the Builder build directory used for replicating? Was there a reboot in the original application install? Did you allow the reboot? Did you click modify or build at the end of the replication process? Did you add any commands into the package before building? Please specify. 13.1. Ai Configuration file Open the AI package using builder then copy and paste all information to a text file and send the file. 13.2. AITrace log Create a standard text file in the windows folder named aitrace.log. Perform the same AI package deployment again to the machine and send the file. The file should contain trace information that specifies exactly what is happening during the installation with the install engine and the agent. Aitrace.log Page 21 of 22 Technical Support Workbook - Symantec Ghost 11.0 14. Packet Traces For some issues a trace of network packets is the best way to provide the necessary diagnostic information to the Ghost developers. If a trace is required, this will be noted in one or more of the sections above. Below is information on how to get the software. Packet traces tend to be quite large so ensure that the file is zipped before send and only capture for a time necessary to see the problem occur. 14.1. General When a Packet Trace is requested please try to limit the number of machines involved to the lowest number that still reproduces the problem. Ideally just two machines (plus one running the packet sniffer software). Be aware that running a packet trace when connected to a network switch you will probably not receive all the packets you are wanting to see. This is because switches only send traffic to the port with the client the traffic is addressed to. So, either you can reconfigure your switch specifically to support packet sniffing, or put the all the machines on a hub. If you can’t put them all on a hub, put the sniffer machine on a hub with first the server machine and then with the client and collect two traces. 14.2. WireShark (formerly known as Ethereal) WireShark is generally preferable to NetMon primarily because it is much easier to install (Netmon only comes with Windows NT/2000 Server editions), and performs promiscuous-mode capture so it can be installed on any device connected to the network under inspection. To use, you need to download the WireShark program. WireShark can be downloaded from http://www.wireshark.org/download.html Page 22 of 22