Leaked source code of windows server 2003
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
@echo off
REM HEALTH_CHK.CMD - Retrieves some state info from the specified DC.
SETLOCAL ENABLEEXTENSIONS
set toollist=regdmp repadmin ntfrsutl eventdmp
if NOT "%1" == "" goto :CHECK_TOOLS :USAGE echo Usage: health_chk result_dir [target_computername] echo Retrieve state info from the specified DC. echo result_dir is created if it does not exist. No trailing backslash. echo Target_ComputerName is optional. Default is current computer. echo It can be a netbios name with no leading slashes or a full dns name, xxx.yyy.zzz.com echo This script uses NTFRSUTL.EXE to gather data from FRS on the echo Target computer. This tool must be in your path and can be found echo in the resource kit. The NTFRS service must be running on the echo target computer. health_chk uses the following tools to gather information. echo %toollist% echo ---- goto :QUIT
:CHECK_TOOLS
REM see if we have ntfrsutl.exe ntfrsutl > nul: 2> nul: if ERRORLEVEL 1 ( echo ****** NTFRSUTL.EXE is not in your path. This tool can be found in the resource kit. echo ****** This tool is needed to gather all the data. goto :USAGE )
REM see if we have repadmin.exe repadmin > nul: 2> nul: if ERRORLEVEL 1 ( echo ****** REPADMIN.EXE is not in your path. echo ****** This tool is needed to gather all the data. goto :USAGE )
REM see if we have regdmp.exe regdmp HKEY_LOCAL_MACHINE\system\currentcontrolset\services\NtFrsxxx > nul: 2> nul: if ERRORLEVEL 2 ( echo ****** REGDMP.EXE is not in your path. echo ****** This tool is needed to gather all the data. goto :USAGE )
REM see if we have eventdmp.exe eventdmp /? > nul: 2> nul: if ERRORLEVEL 1 ( echo ****** EVENTDMP.EXE is not in your path. echo ****** This tool is needed to gather all the data. goto :USAGE )
if "%2" == "" ( set CHKCOMP=%COMPUTERNAME% ) else ( set CHKCOMP=%2 )
set QA=%1\%CHKCOMP% if NOT EXIST %QA% ( echo ****** Creating output directory: %QA% md %QA% ) if NOT EXIST %QA% ( echo ****** Failed to create output dir: %QA% echo ****** No data retrieved. goto :DONE )
@echo Please WAIT....
for %%x in (ds errscan inlog outlog machine reg sets version config sysvol) do ( del %QA%\ntfrs_%%x.txt 1>nul: 2>nul: )
for %%x in (showreps showconn) do ( del %QA%\ds_%%x.txt 1>nul: 2>nul: )
del %QA%\evl_*.txt 1>nul: 2>nul:
echo DateTime : %DATE%, %TIME% > %QA%\ntfrs_machine.txt echo TargetComputer : %2 >> %QA%\ntfrs_machine.txt echo LocalComputername: %COMPUTERNAME% >> %QA%\ntfrs_machine.txt echo LogonServer : %LOGONSERVER% >> %QA%\ntfrs_machine.txt echo UserDomain : %USERDOMAIN% >> %QA%\ntfrs_machine.txt echo UserName : %USERNAME% >> %QA%\ntfrs_machine.txt
if ("%CHKCOMP%"=="%COMPUTERNAME%") ( echo Architecture : %PROCESSOR_ARCHITECTURE% >> %QA%\ntfrs_machine.txt echo NumberProcessors : %NUMBER_OF_PROCESSORS% >> %QA%\ntfrs_machine.txt echo SystemRoot : %SystemRoot% >> %QA%\ntfrs_machine.txt )
echo NTFRSUTL checks are running ... ntfrsutl version %CHKCOMP% > %QA%\ntfrs_version.txt findstr /c:"ERROR" %QA%\ntfrs_version.txt if NOT ERRORLEVEL 1 ( echo ****** NTFRSUTL cannot access target computer "%CHKCOMP%". echo ****** You must be an admin or run HEALTH_CHK on the target computer to gather all the data. goto :GETREG )
ntfrsutl ds %CHKCOMP% > %QA%\ntfrs_ds.txt ntfrsutl sets %CHKCOMP% > %QA%\ntfrs_sets.txt ntfrsutl configtable %CHKCOMP% > %QA%\ntfrs_config.txt
echo Dumping FRS inbound and outbound logs ... ntfrsutl inlog %CHKCOMP% > %QA%\ntfrs_inlog.txt ntfrsutl outlog %CHKCOMP% > %QA%\ntfrs_outlog.txt
:GETREG echo Dumping FRS registry parameters ... regdmp -m \\%CHKCOMP% HKEY_LOCAL_MACHINE\system\currentcontrolset\services\NtFrs > %QA%\ntfrs_reg.txt
echo SYSVOL check is running dir \\%CHKCOMP%\sysvol /s > %QA%\ntfrs_sysvol.txt
REM REM For DS replication REM echo repadmin /showreps %CHKCOMP% is running repadmin /showreps %CHKCOMP% > %QA%\ds_showreps.txt
echo repadmin /showconn %CHKCOMP% is running repadmin /showconn %CHKCOMP% > %QA%\ds_showconn.txt
REM REM Do a simple dump of the 400 most recent records in the event logs. REM echo Scanning eventlogs ... eventdmp /n:400 /l:ntfrs /r:%CHKCOMP% > %QA%\evl_ntfrs.txt eventdmp /n:400 /l:application /r:%CHKCOMP% > %QA%\evl_application.txt eventdmp /n:400 /l:system /r:%CHKCOMP% > %QA%\evl_system.txt eventdmp /n:400 /l:ds /r:%CHKCOMP% > %QA%\evl_ds.txt eventdmp /n:400 /l:DNS /r:%CHKCOMP% > %QA%\evl_dns.txt
echo Scanning FRS debug logs for error/warning info ...
set XCOMP=%windir%\debug
if /i "%CHKCOMP%" EQU "%COMPUTERNAME%" goto :FOUND
set XCOMP=\\%CHKCOMP%\debug dir %XCOMP%\ntfrs_*.log 1>nul: 2>nul: if NOT ERRORLEVEL 1 goto :FOUND
set XCOMP=\\%CHKCOMP%\admin$\debug dir %XCOMP%\ntfrs_*.log 1>nul: 2>nul: if NOT ERRORLEVEL 1 goto :FOUND
set XCOMP=\\%CHKCOMP%\C$\winnt\debug
:FOUND
dir %XCOMP%\ntfrs_*.log > %QA%\ntfrs_errscan.txt if ERRORLEVEL 1 ( echo ****** HEALTH_CHK cannot access the FRS log files on "%XCOMP%". echo ****** You must be an admin or run HEALTH_CHK on the target computer to gather all the data. del %QA%\ntfrs_errscan.txt goto :DONE )
findstr /i ":SO: :H: error invalid fail abort warn" %XCOMP%\ntfrs_*.log | findstr /v "IO_PEND ERROR_SUCCESS PrintThreadIds FrsErrorSuccess" >> %QA%\ntfrs_errscan.txt
:DONE echo Done ...
:QUIT
|