in the c:\program files\bladelogic\pxe\bin folder, there should be a log file for the pxe service. I can't remember right now if its pxesvc.log or pxe.log... anyway, does that indicate anything clearer than what you've included below?
the log file is pxesvc.log and it's empty as the service fails to start immediatly. So the log info I gave came from a manual start of the binary with the debug option.
I just tested this using the latest 6.3 build (build 174) on a Windows 2003 server and confirmed your problem. I'm going to create a support case and log a defect for this. If I get feedback from engineering I'll let you know...
Did this get fixed before the release of 6.3?
no, but it only affects the pxesvc.exe. executing blpxe from c:\program files\bladelogic\pxe\br is a workaround to manually start the pxe server.
Do we have a permanent solution, though? A work-around is fine, but can we get new copies of pxesvc.exe out to the field or whatever we need to make this work?
the permanent solution is being introduced into 6.3.1. we also have a .jar file that we might be able to distribute to customers who can't live without this working as a service. this will be determined on a case by case basis.
I encountered the same problem also trying to start the PXE server using blpxe.
The error is:
Unexpected signal: EXCEPTION_ACCESS_VIOLATION...
Library: C:\Program Files\BladeLogic\PXE\jre\bin\client\jvm.dll
Could you please send me the .jar that solves this annoying problem ?
I've just done a fresh install of 6.3 and I also get this problem. Starting the PXE service returns no error in the event log but doing so through a command prompt displays this:
*JVM location - D:\Program Files\BladeLogic\PXE\jre\bin\client\j
Loading Class Name:com/bladelogic/pxe/PxeMain
Exception in thread "main" java.lang.NoSuchMethodError: *
Is this fix available for download yet? - If so, how does one gain access to the fix.
I've created support ticket 7930 to address this. I'll follow up after I determine if we have a build that I can provide to you.