cloudbase / windows-imaging-tools

Tools to automate the creation of a Windows image for OpenStack, supporting KVM, Hyper-V, ESXi and more.
Apache License 2.0
680 stars 227 forks source link

Your PC ran into a problem, Stop code: inacessible boot device #347

Closed erickeller closed 4 years ago

erickeller commented 4 years ago

Hi there,

I was using the following config.ini with a windows 2016 iso and try to deploy the resulting image to maas.

[DEFAULT]
# The location of the WIM file from the mounted Windows ISO.
wim_file_path=F:\Sources\install.wim
# This is the complete name of the Windows version that will be generated.
# In order to find the possible options, use the Get-WimFileImagesInfo command
# and look for the Name property.
image_name=Windows Server 2016 SERVERSTANDARD
# The destination of the generated image.
image_path=C:\Users\foobar\win2016-image.img.gz
# Select between VHD, VHDX, QCOW2, VMDK or RAW formats.
virtual_disk_format=RAW
# This parameter allows to choose between MAAS, KVM, VMware and Hyper-V specific images.
# For HYPER-V, cloudbase-init will be installed and the generated image should be in vhd or vhdx format.
# For MAAS, in addition to cloudbase-init, the curtin tools are installed
# and the generated image should be in raw.tgz format.
# For KVM, in addition to cloudbase-init, the VirtIO drivers are installed
# and the generated image should be in qcow2 format.
image_type=MAAS
# This parameter can be set to either BIOS or UEFI.
disk_layout=BIOS
# The product key for the selected OS. If the value is default_kms_key and the Windows image is
# ServerStandard or ServerDatacenter (Core), the appropiate KMS key will be used.
product_key=foo-bar-baz
# A comma separated array of extra features that will be enabled on the resulting image.
# These features need to be present in the ISO file.
extra_features=""
# A comma separated array of extra capabilities that will be enabled on the resulting image.
# These capabilities need to be present in the ISO file.
extra_capabilities=""
# It will force the image generation when RunSysprep is False or the selected SwitchName
# is not an external one. Use this parameter with caution because it can easily generate
# unstable images.
force=False
# If set to true, MAAS Windows curtin hooks will be copied to the image root directory.
install_maas_hooks=True
# Select between tar, gz, zip formats or any combination between these.
compression_format=gz
# If this parameter is set, after the image is generated,
# a password protected zip archive with the image will be created.
# compression_format must contain zip in order for this parameter to be used
zip_password=""
# It will stop the image generation after the updates are installed and cleaned.
gold_image=False
# This is the full path of the already generated golden image.
# It should be a valid VHDX path.
gold_image_path=""
# This is a full path to the VMware-tools.exe version that you want to install.
vmware_tools_path=""
# This is the full path of a folder with custom resources which will be used by
# the custom scripts.
# The resources found at this path will be copied recursively to the image
# UnattendResources\CustomResources folder.
custom_resources_path=""
# This is the full path of the folder which can contain a set of PS scripts,
# that will be copied and executed during the online generation part on the VM.
# The PowerShell scripts, if existent, will be started by Logon.ps1 script,
# at different moments during image generation.
# The purpose of these scripts is to offer to the user a fully
# customizable way of defining additional logic for tweaking the final image.
# The scripts files can have the following names: RunBeforeWindowsUpdates.ps1,
# RunAfterWindowsUpdates.ps1, RunBeforeCloudbaseInitInstall.ps1, RunAfterCloudbaseInitInstall.ps1,
# RunBeforeSysprep.ps1, RunAfterSysprep.ps1.
# The script names contain the information on when the script will be executed.
# One can define only some of the hook scripts and it is not mandatory to define all of them.
# If a script does not exist, it will not be executed.
custom_scripts_path=""
# If set to true the Administrator account will be enabled on the client
# versions of Windows, which have the Administrator account disabled by default
enable_administrator_account=False
# Whether to shrink the image partition and disk after the image generation is complete.
shrink_image_to_minimum_size=True
# If set to true, a custom wallpaper will be set according to the values of configuration options
# wallpaper_path and wallpaper_solid_color
enable_custom_wallpaper=True
# If set, it will replace the Cloudbase Solutions wallpaper to the one specified.
# The wallpaper needs to be a valid .jpg/.jpeg image.
wallpaper_path=""
# If set, it will replace the Cloudbase Solutions wallpaper to a solid color.
# Currently, the only allowed solid color is '0 0 0' (black).
# If both wallpaper_path and wallpaper_solid_color are set,
# the script will throw an error.
wallpaper_solid_color=""
# If set, the animation displayed during the first login on Windows Client versions will be disabled.
disable_first_logon_animation=False
# If set to true and the target image format is QCOW2, the image conversion will
# use qemu-img built-in compression. The compressed qcow2 image will be smaller, but the conversion
# will take longer time.
compress_qcow2=False
# If set to true, during final cleanup, https://github.com/felfert/ntfszapfree will be used to zero unused space.
# This helps qemu-img to minimize image size. In order to benefit from this, an additional invocation
# of qemu-img convert must be performed after the initial run of the image has shutdown.
zero_unused_volume_sectors=False
# A comma separated list of extra packages (referenced by filepath)
# to slipstream into the underlying image.
# This allows additional local packages, like security updates, to be added to the image.
extra_packages=""
# Ignore failures from DISM when installing extra_packages, such as when
# updates are skipped which are not applicable to the image.
extra_packages_ignore_errors=False
# Enables shutdown of the Windows instance from the logon console.
enable_shutdown_without_logon=False
# If set to true, firewall rules will be added to enable ping requests (ipv4 and ipv6).
enable_ping_requests=False
# If set to true, use EUI-64 derived IDs and disable privacy extensions for IPv6.
# If set to false, the IPv6 protocol might not work on OpenStack or CloudStack.
# See https://github.com/cloudbase/windows-openstack-imaging-tools/issues/192
enable_ipv6_eui64=False
# If set to true, it will set the High Performance mode and some power mode
# and registry tweaks to prevent the machine from sleeping / hibernating.
enable_active_mode=False
[vm]
# This will be the Administrator user's, so that AutoLogin can be performed on the instance,
# in order to install the required products,
# updates and perform the generation tasks like sysprep.
administrator_password=Pa$$w0rd
# Used to specify the virtual switch the VM will be using.
# If it is specified but it is not external or if the switch does not exist,
# you will get an error message.
external_switch=ExSwitch
# The number of CPU cores assigned to the VM used to generate the image.
cpu_count=2
# RAM (in bytes) assigned to the VM used to generate the image.
ram_size=4294967296
# Disk space (in bytes) assigned to the boot disk for the VM used to generate the image.
disk_size=32212254720
# If set to true and the disk layout is UEFI, the secure boot firmware option will be disabled.
disable_secure_boot=False
[drivers]
# The path to the ISO file containing the VirtIO drivers.
virtio_iso_path=""
# The location where the VirtIO drivers are found.
# For example, the location of a mounted VirtIO ISO. VirtIO versions supported >=0.1.6.x
virtio_base_path=G:\
# The location where additional drivers that are needed for the image are located.
drivers_path=""
[updates]
# If set to true, the latest updates will be downloaded and installed.
install_updates=False
# If set to true, will run DISM with /resetbase option. This will reduce the size of
# WinSXS folder, but after that Windows updates cannot be uninstalled.
purge_updates=False
# Clean up the updates / components by running a DISM Cleanup-Image command.
# This is useful when updates or capabilities are installed offline.
clean_updates_offline=False
# Clean up the updates / components by running a DISM Cleanup-Image command.
# This is useful when updates or other packages are installed when the instance is running.
clean_updates_online=True
[sysprep]
# Used to clean the OS on the VM, and to prepare it for a first-time use.
run_sysprep=True
# The path to the Unattend XML template file used for sysprep.
unattend_xml_path=UnattendTemplate.xml
# DisableSwap option will disable the swap when the image is generated and will add a setting
# in the Unattend.xml file which will enable swap at boot time during specialize step.
# This is required, as by default, the amount of swap space on Windows machine is directly
# proportional to the RAM size and if the image has in the initial stage low disk space,
# the first boot will fail due to not enough disk space. The swap is set to the default
# automatic setting right after the resize of the partitions is performed by cloudbase-init.
disable_swap=False
# In case the hardware on which the image is generated will also be the hardware on
# which the image will be deployed this can be set to true, otherwise the spawned
# instance is prone to BSOD.
persist_drivers_install=False
[cloudbase_init]
# This is a switch that allows the selection of Cloudbase-Init branches. If set to true, the
# beta branch will be used:
# https://cloudbase.it/downloads/CloudbaseInitSetup_<arch>.msi, where arch can be x86 or x64
# otherwise the stable branch will be used:
# https://cloudbase.it/downloads/CloudbaseInitSetup_Stable_<arch>.msi, where arch can be x86 or x64
beta_release=False
# Serial log port for Cloudbase-Init.
# If set to null, the first serial port (if any) from the generation VM will be used
serial_logging_port=COM1
# If set, the Cloudbase-Init msi at this path will be used.
# The path needs to be a locally accessible file path.
msi_path=""
# If set, the cloudbase-init.conf is replaced with the file at the path.
cloudbase_init_config_path=""
# If set, the cloudbase-init-unattend.conf is replaced with the file at the path.
cloudbase_init_unattended_config_path=""
# If set, the Cloudbase-Init service will be run under Local System account.
# By default, a user named cloudbase-init with admin rights is created and used.
cloudbase_init_use_local_system=False
# If set, the Cloudbase-Init service startup type will be set to delayed-auto
cloudbase_init_delayed_start=False
[custom]
# Set a custom timezone for the Windows image.
time_zone=""
# Set custom ntp servers(space separated) for the Windows image
ntp_servers=""

Unfortunatelly the following blue screen crashed my party.

2020-07-23-181407_692x316_scrot

the command used to compile the image was:

New-WindowsOnlineImage -ConfigFilePath config.ini
PS C:\Users\foobar\windows-openstack-imaging-tools> New-WindowsOnlineImage -ConfigFilePath $ConfigFilePath
7/23/2020 2:43:22 PM - Windows online image generation started.
7/23/2020 2:43:26 PM - Cloud image generation started.
WARNING: The installed version of DISM is older than the Windows image
7/23/2020 2:43:28 PM - Creating Virtual Disk Image: C:\Users\foobar\win2016-image.vhdx...
7/23/2020 2:43:34 PM - Successfuly created disk: C:\Users\foobar\win2016-image.vhdx
7/23/2020 2:43:34 PM - Generate Unattend Xml :H:\Unattend.xml...
7/23/2020 2:43:34 PM - Xml was generated.
7/23/2020 2:43:34 PM - Copy Unattend Resources: Server...
7/23/2020 2:43:34 PM - Copying: C:\Users\foobar\windows-openstack-imaging-tools\UnattendResources H:\UnattendResources
7/23/2020 2:43:35 PM - Resources have been copied.
7/23/2020 2:43:35 PM - Copy Custom Resources: ...
7/23/2020 2:43:35 PM - Custom Resources at: H:\UnattendResources.
7/23/2020 2:43:35 PM - Setting wallpaper...
7/23/2020 2:43:35 PM - Wallpaper copied to the image.
7/23/2020 2:43:35 PM - Wallpaper GPO copied to the image.
7/23/2020 2:43:35 PM - Wallpaper was set.
7/23/2020 2:43:35 PM - Downloading Cloudbase-Init...
7/23/2020 2:43:38 PM - Applying Windows image "F:\Sources\install.wim" in "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Applying image

[                           1.0%                           ] 

[=                          2.0%                           ] 

[=                          3.0%                           ] 

[==                         4.0%                           ] 

[==                         5.0%                           ] 

[===                        6.0%                           ] 

[====                       7.0%                           ] 

[====                       8.0%                           ] 

[=====                      9.0%                           ] 

[=====                      10.0%                          ] 

[======                     11.0%                          ] 

[======                     12.0%                          ] 

[=======                    13.0%                          ] 

[========                   14.0%                          ] 

[========                   15.0%                          ] 

[=========                  16.0%                          ] 

[=========                  17.0%                          ] 

[==========                 18.0%                          ] 

[===========                19.0%                          ] 

[===========                20.0%                          ] 

[============               21.0%                          ] 

[============               22.0%                          ] 

[=============              23.0%                          ] 

[=============              24.0%                          ] 

[==============             25.0%                          ] 

[===============            26.0%                          ] 

[===============            27.0%                          ] 

[================           28.0%                          ] 

[================           29.0%                          ] 

[=================          30.0%                          ] 

[=================          31.0%                          ] 

[==================         32.0%                          ] 

[===================        33.0%                          ] 

[===================        34.0%                          ] 

[====================       35.0%                          ] 

[====================       36.0%                          ] 

[=====================      37.0%                          ] 

[======================     38.0%                          ] 

[======================     39.0%                          ] 

[=======================    40.0%                          ] 

[=======================    41.0%                          ] 

[========================   42.0%                          ] 

[========================   43.0%                          ] 

[=========================  44.0%                          ] 

[========================== 45.0%                          ] 

[========================== 46.0%                          ] 

[===========================47.0%                          ] 

[===========================48.0%                          ] 

[===========================49.0%                          ] 

[===========================50.0%                          ] 

[===========================51.0%                          ] 

[===========================52.0%                          ] 

[===========================53.0%                          ] 

[===========================54.0%                          ] 

[===========================55.0%                          ] 

[===========================56.0%                          ] 

[===========================57.0%=                         ] 

[===========================58.0%=                         ] 

[===========================59.0%==                        ] 

[===========================60.0%==                        ] 

[===========================61.0%===                       ] 

[===========================62.0%===                       ] 

[===========================63.0%====                      ] 

[===========================64.0%=====                     ] 

[===========================65.0%=====                     ] 

[===========================66.0%======                    ] 

[===========================67.0%======                    ] 

[===========================68.0%=======                   ] 

[===========================69.0%========                  ] 

[===========================70.0%========                  ] 

[===========================71.0%=========                 ] 

[===========================72.0%=========                 ] 

[===========================73.0%==========                ] 

[===========================74.0%==========                ] 

[===========================75.0%===========               ] 

[===========================76.0%============              ] 

[===========================77.0%============              ] 

[===========================78.0%=============             ] 

[===========================79.0%=============             ] 

[===========================80.0%==============            ] 

[===========================81.0%==============            ] 

[===========================82.0%===============           ] 

[===========================83.0%================          ] 

[===========================84.0%================          ] 

[===========================85.0%=================         ] 

[===========================86.0%=================         ] 

[===========================87.0%==================        ] 

[===========================88.0%===================       ] 

[===========================89.0%===================       ] 

[===========================90.0%====================      ] 

[===========================91.0%====================      ] 

[===========================92.0%=====================     ] 

[===========================93.0%=====================     ] 

[===========================94.0%======================    ] 

[===========================95.0%=======================   ] 

[===========================96.0%=======================   ] 

[==========================100.0%==========================] 
The operation completed successfully.
7/23/2020 2:53:32 PM - Create BCDBoot Config for Windows Server 2016 SERVERSTANDARD
7/23/2020 2:53:33 PM - Resetting BCD boot border
The operation completed successfully.
The operation completed successfully.
The operation completed successfully.
7/23/2020 2:53:34 PM - BCDBoot config has been created.
7/23/2020 2:53:34 PM - Adding Virtual IO Drivers: G:\...
7/23/2020 2:53:34 PM - Getting Virtual IO Drivers: G:\...
7/23/2020 2:53:34 PM - Adding drivers from "G:\\balloon\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\balloon\2k16\AMD64\balloon.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:53:48 PM - Adding drivers from "G:\\netkvm\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\netkvm\2k16\AMD64\netkvm.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:53:53 PM - Adding drivers from "G:\\pvpanic\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\pvpanic\2k16\AMD64\pvpanic.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:53:58 PM - Adding drivers from "G:\\qemupciserial\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\qemupciserial\2k16\AMD64\qemupciserial.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:54:03 PM - Adding drivers from "G:\\qxldod\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\qxldod\2k16\AMD64\qxldod.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:54:09 PM - Adding drivers from "G:\\vioinput\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\vioinput\2k16\AMD64\vioinput.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:54:14 PM - Adding drivers from "G:\\viorng\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\viorng\2k16\AMD64\viorng.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:54:20 PM - Adding drivers from "G:\\vioscsi\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\vioscsi\2k16\AMD64\vioscsi.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:54:25 PM - Adding drivers from "G:\\vioserial\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\vioserial\2k16\AMD64\vioser.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:54:30 PM - Adding drivers from "G:\\viostor\2k16\AMD64" to image "H:\"

Deployment Image Servicing and Management tool
Version: 10.0.14393.3750

Image Version: 10.0.14393.0

Searching for driver packages to install...
Found 1 driver package(s) to install.
Installing 1 of 1 - G:\viostor\2k16\AMD64\viostor.inf: The driver package was successfully installed.
The operation completed successfully.
7/23/2020 2:54:35 PM - Virtual IO Drivers was added.
7/23/2020 2:54:42 PM - Cloud image generation finished. Image path: C:\Users\foobar\win2016-image.vhdx
7/23/2020 2:54:42 PM - Creating VM WindowsOnlineImage-Sysprep1110874354 attached to ExSwitch
7/23/2020 2:54:44 PM - Starting WindowsOnlineImage-Sysprep1110874354
7/23/2020 2:54:49 PM - Waiting for WindowsOnlineImage-Sysprep1110874354 to finish sysprep.
7/23/2020 2:57:28 PM - - - StatusInitial: Automated instance configuration started...
7/23/2020 2:57:28 PM - - - WindowsInfo: Windows version 10.0.14393.0. PS version 5.1.14393.1884.
7/23/2020 2:57:32 PM - - - License: Windows was licensed successfully
7/23/2020 2:57:34 PM - - - Cleanup: Updates were cleaned up successfully
7/23/2020 2:58:33 PM - - - Cloudbase-InitSetupComplete: Cloudbase-Init service set to start using SetupComplete
7/23/2020 2:58:33 PM - - - Cloudbase-Init: Service installed successfully under user cloudbase-init
7/23/2020 2:58:36 PM - - - StatusFinal: Waiting for sysprep to stop machine...
7/23/2020 2:58:36 PM - - - Sysprep: Sysprep initiated successfully
7/23/2020 2:58:36 PM - - - Defragment: Image was defragemented successfully
7/23/2020 2:58:36 PM - - - Drivers: PersistDrivers was set to False in the unattend.xml
7/23/2020 2:58:36 PM - - - Ipconfig: IPs were released successfully
7/23/2020 2:58:36 PM - - - Cleanup(1): Image was cleaned up successfully
7/23/2020 2:59:36 PM - Shrinking VHD to minimum size
7/23/2020 2:59:36 PM - Initial VHD size is: 30 GB
7/23/2020 2:59:43 PM - Current partition size: 29.998046875 GB
7/23/2020 2:59:43 PM - New partition size: 12 GB
7/23/2020 2:59:43 PM - Size increased: 12884901888
7/23/2020 2:59:46 PM - Final disk size: 12.001953125 GB
7/23/2020 3:00:24 PM - Converting VHD to RAW
7/23/2020 3:00:24 PM - Convert Virtual Disk: C:\Users\foobar\win2016-image.vhdx...
7/23/2020 3:00:24 PM - Converting virtual disk image from C:\Users\foobar\win2016-image.vhdx to C:\Users\foobar\win2016-
image.raw...
False
7/23/2020 3:05:36 PM - Finish to convert virtual disk.
7/23/2020 3:05:40 PM - Compressing image C:\Users\foobar\win2016-image.raw...
7/23/2020 3:05:41 PM - Compressing win2016-image.raw to gzip win2016-image.raw.gz
7/23/2020 3:10:39 PM - Windows online image generation finished. Image path: C:\Users\foobar\win2016-image.img.gz

the command to import the image into maas:

maas adminprofile boot-resources create name=custom/win-server-2016 architecture=amd64/generic filetype=ddgz content@=win2016-image.img.gz

our target hardware is some ProLiant DL380 Gen10 server

I am wondering what is going wrong, and feel a bit blind where to find some more logs as the system automatically start a reboot loop and ends up with this window: 2020-07-23-183012_1027x766_scrot

ader1990 commented 4 years ago

Hello,

What is important in this case, is the target server: ProLiant DL380 Gen10 server.

The error you get is likely to happen because you did not install the required drivers for the baremetal server. You need to go on the driver download page for the exact server you have, download the drivers (unzip if needed) and put them in a directory of your choice where you generate the image.

Then set the drivers_path="" and recreate the image. If you do not know from where to get the drivers, please contact the OEM from where you got the servers for help on the matter.

Thank you, Adrian Vladu

erickeller commented 4 years ago

thanks will try this out today. In the meantime I was able to boot on the same hardware a windows 2019 server. So it definitively goes in the direction of driver support.

ader1990 commented 4 years ago

the direction of driver support.

Yes, that should be the case. Probably 2019 has builtin compatible drivers for the storage.

erickeller commented 4 years ago

so I checked on the HP ProLiant page and found out that the drivers are all in exe format.

https://support.hpe.com/hpesc/public/km/product/1010026819/hpe-proliant-dl380-gen10-server-models?ismnp=0&l5oid=1010026818#t=DriversandSoftware&sort=relevancy&numberOfResults=25&f:@kmswsoftwaretypekey=[swt8000113]&f:@kmswtargetproductenvironmentlatest=[1010026819_Microsoft%20Windows%20Server%202016]&hpe=1

Will this still work or shall I install them and extract the files as a zip to be passed on on the drivers_path= variable?

ader1990 commented 4 years ago

You have two options here:

  1. Download the exe, extract the files and put them in the chosen path. Simpler way, but not so automated. It works well, as the exe has an option to just extract the driver files.

or

  1. Leverage the custom resource path and custom scripts to install the executable unattended (if it is possible). https://github.com/cloudbase/windows-openstack-imaging-tools/blob/master/Config.psm1#L70 https://github.com/cloudbase/windows-openstack-imaging-tools/blob/master/Config.psm1#L75 You can create a small hook script in powershell, that downloads the executable and installs it unattended. Name the executable according to the stage that you want to be run (let s say before any updates - RunBeforeWindowsUpdates.ps1 ), put it in a folder and set custom_scripts_path to point to that folder.
erickeller commented 4 years ago

ok the 1. worked pretty well I was able to run a windows server 2016 on the bare metal... extracting all the driver into one flat directory and configuring this into the config.ini did the trick thanks for the support.

win2016-drivers 2020-07-24-191153_1590x839_scrot

ader1990 commented 4 years ago

ok the 1. worked pretty well I was able to run a windows server 2016 on the bare metal... extracting all the driver into one flat directory and configuring this into the config.ini did the trick thanks for the support.

win2016-drivers 2020-07-24-191153_1590x839_scrot

Great to hear that!