Solved

SCCM - Secondary Site Installation Fails

Posted on 2011-03-14
7
1,386 Views
Last Modified: 2013-11-21
Hello All -

I've been trying to create a secondary site for SCCM for the past couple of hours, but it fails each time.  

Here's what I've tried:

1. The method that I use is to push an installation from my primary SCCM server.  
2.  I have the primary sccm server's hostname as a local admin on the secondary server.
3. Start the push from the prmary
4. Set it to install to c:\sccm (tried creating and not creating folder first)
5. Watch bootstrap file copy over to secondary root, then extract to temp folder.
6. The installation fails after I review log files which are below.

Please help!
ConfigMgrPrereq.log
 ConfigMgrSetup.log
 SMS-BOOTSTRAP.log
0
Comment
Question by:BzowK
  • 4
  • 3
7 Comments
 
LVL 10

Expert Comment

by:Kezzi
ID: 35133690
can yo post a copy of the bootstrap.ini?
0
 

Author Comment

by:BzowK
ID: 35138664
Here you go... SMS-BOOTSTRAP.INI
0
 
LVL 10

Expert Comment

by:Kezzi
ID: 35146211
That Bootstrap.ini is for the deinstall of the site.  I take it that was the last action performed on that server?
0
Promote certifications in your email signature

Has your company recently won an award or achieved a certification? They'll no doubt want to show it off. Email signature images used to promote certifications & awards can instantly establish credibility with a recipient and provide you with numerous benefits.

 

Author Comment

by:BzowK
ID: 35147990
Yea, I guess so.  It was the only thing on the root.
0
 
LVL 10

Accepted Solution

by:
Kezzi earned 500 total points
ID: 35148181
Have you tried a manual install?
0
 

Author Comment

by:BzowK
ID: 35157229
Yes - Many times
0
 
LVL 10

Expert Comment

by:Kezzi
ID: 35158325
Do you have the Setup log file from the manual install?  Are you able to repeat this process and produce as much logging for the manual install to help us help you?
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Some time ago I faced the need to use a uniform folder structure that spanned across numerous sites of an enterprise to be used as a common repository for the Software packages of the Configuration Manager 2007 infrastructure. Because the procedu…
Introduction: Sometimes when I receive a call from my users to solve their problems it is very difficult for me to found their computer IP address. Even finding their computer Host to provide remote support can be a problem.  So I resorted to Goo…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now