SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Doc ID T1210.1.2




Configuring SQL Server Agent in a Safepeak Deployment
How to enable database clients on the SQL Server host
to connect through Safepeak

Introduction
This document will describe why and how the SQL Server Agent, the SQL Server Management Studio (SSMS) or
any other client installed locally on the SQL Server host need to be configured to access the database through
Safepeak.

Summary
Database clients must access the SQL Server database through Safepeak, even if they run locally on the database
server host.

The following are perquisites for windows authenticated connection from the SSMS or SQL Server Agent to the
local SQL Server Database to succeed:

       The database alias used in the client connection string must be specified using a numeric IP address and
        not using a hostname (e.g. use 10.254.11.22 and not dbserver.acme.com).
       The following Window registry key must be created and set to configure Windows to allow the local
        authenticated connection from network source.
        Path: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa
        Name: DisableLoopbackCheck
        Type: DWORD
        Value: 1

If the client and Windows are not configured correctly the client will fail to connect to the database when using
windows authentication1.

Background and Rational
Clients such as the SQL Server Agent service, the SQL Server Management Studio or SQLCMD that run locally on
the SQL server host can still benefit from reduced database server CPU utilization and disk I/O by using the
Safepeak cache for data access. This will also allow other clients to reuse the cached results sets from their
queries.

More importantly, Safepeak constantly analyses all data access traffic and identifies data modification language
(DML) queries and data definition language (DDL) queries that require stale data to be evicted from Safepeak’s
in-memory cache. This is why any data access to the SQL Server must be done through Safepeak. This is also
true for access made by clients running locally on the SQL server.

SafePeak Technologies Ltd 2012                 info@safepeak.com                                           Page 1
Doc ID T1210.1.2




The Windows Server operating system is by default configured not to allow local windows authenticated access
from an external network source - this is exactly the case of the SQL Server Agent or SSMS accessing the local
SQL Server database instance via Safepeak. Therefore the client connection and the Windows system need to be
configured specifically to allow this.1

If the client and Windows are not configured correctly the client will fail to connect to the database; SSMS for
instance will report that the connection is from an untrusted domain.




Step by Step Example
The following is a setup procedure example that will guide you through the configuration process. It assumes
the following:

       An SQL Server 2008R2 64-bit installation.
       The Safepeak server IP address is 10.254.11.22.
       The Safepeak port is 1433.


1. Set the database connection aliases.

The database alias can be set using the SQL Server Configuration Management utility.




1
 This limitation does not concern SQL Server authentication. Note that beginning with SQL Server 2005, SQL Server Agent
does not support SQL Server Authentication. This option is available only when you administer an earlier version of SQL
Server.

SafePeak Technologies Ltd 2012                   info@safepeak.com                                                Page 2
Doc ID T1210.1.2




   1.1. Set the 32-bit alias for SSMS




   1.2. Set the 64-bit alias for SQL Agent installations on 64-bit hosts




SafePeak Technologies Ltd 2012                 info@safepeak.com           Page 3
Doc ID T1210.1.2




2. Configure the registry.
   The registry can be configured using the windows registry editor (regedit.exe).
   2.1. Create a new DWORD value under the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa
        path named “DisableLoopbackCheck”




   2.2. Double-click the value name to set it to 1




SafePeak Technologies Ltd 2012                info@safepeak.com                             Page 4
Doc ID T1210.1.2




Alternatively the following Windows PowerShell command can be used:

New-ItemProperty HKLM:SystemCurrentControlSetControlLsa –Name “DisableLoopbackCheck"
 -value "1" -PropertyType dword

3. Connect SSMS using the 32-bit alias.




4. Set the connection alias for the SQL Server Agent.




SafePeak Technologies Ltd 2012               info@safepeak.com                        Page 5

Weitere ähnliche Inhalte

Was ist angesagt?

Weblogic 12c Graphical Mode installation steps in Windows
Weblogic 12c Graphical Mode installation steps in Windows Weblogic 12c Graphical Mode installation steps in Windows
Weblogic 12c Graphical Mode installation steps in Windows webservicesm
 
How to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata EnvironmentsHow to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata EnvironmentsSandesh Rao
 
Double the Performance of Oracle SOA Suite 11g? Absolutely!
Double the Performance of Oracle SOA Suite 11g? Absolutely!Double the Performance of Oracle SOA Suite 11g? Absolutely!
Double the Performance of Oracle SOA Suite 11g? Absolutely!Revelation Technologies
 
Oracle SOA, BPM, OSB, BAM, & B2B 12C
Oracle SOA, BPM, OSB, BAM, & B2B 12COracle SOA, BPM, OSB, BAM, & B2B 12C
Oracle SOA, BPM, OSB, BAM, & B2B 12CRakesh Gujjarlapudi
 
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...ginniapps
 
Oracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bit
Oracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bitOracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bit
Oracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bitMohammed Raouf
 
ATG - Installing WebLogic Server
ATG - Installing WebLogic ServerATG - Installing WebLogic Server
ATG - Installing WebLogic ServerKeyur Shah
 
Getting to Know MySQL Enterprise Monitor
Getting to Know MySQL Enterprise MonitorGetting to Know MySQL Enterprise Monitor
Getting to Know MySQL Enterprise MonitorMark Leith
 
SafePeak Installation guide
SafePeak Installation guideSafePeak Installation guide
SafePeak Installation guideVladi Vexler
 
Where did my day go?: OEM 12c Administration #em12c #C15LV @IOUG
Where did my day go?: OEM 12c Administration #em12c #C15LV @IOUGWhere did my day go?: OEM 12c Administration #em12c #C15LV @IOUG
Where did my day go?: OEM 12c Administration #em12c #C15LV @IOUGAlfredo Krieg
 
UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...
UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...
UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...Leighton Nelson
 
Instrumenting plugins for Performance Schema
Instrumenting plugins for Performance SchemaInstrumenting plugins for Performance Schema
Instrumenting plugins for Performance SchemaMark Leith
 
Colvin exadata and_oem12c
Colvin exadata and_oem12cColvin exadata and_oem12c
Colvin exadata and_oem12cEnkitec
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...Michael Noel
 

Was ist angesagt? (19)

Weblogic 12c Graphical Mode installation steps in Windows
Weblogic 12c Graphical Mode installation steps in Windows Weblogic 12c Graphical Mode installation steps in Windows
Weblogic 12c Graphical Mode installation steps in Windows
 
How to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata EnvironmentsHow to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata Environments
 
Double the Performance of Oracle SOA Suite 11g? Absolutely!
Double the Performance of Oracle SOA Suite 11g? Absolutely!Double the Performance of Oracle SOA Suite 11g? Absolutely!
Double the Performance of Oracle SOA Suite 11g? Absolutely!
 
Oracle SOA, BPM, OSB, BAM, & B2B 12C
Oracle SOA, BPM, OSB, BAM, & B2B 12COracle SOA, BPM, OSB, BAM, & B2B 12C
Oracle SOA, BPM, OSB, BAM, & B2B 12C
 
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
 
DAC
DACDAC
DAC
 
Oracle EMC 12 Installation
Oracle EMC 12 InstallationOracle EMC 12 Installation
Oracle EMC 12 Installation
 
Sql saturday oc 2019
Sql saturday oc 2019Sql saturday oc 2019
Sql saturday oc 2019
 
Oam install & config
Oam install & configOam install & config
Oam install & config
 
Oracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bit
Oracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bitOracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bit
Oracle R12.1 Full & Tips Installation on Windows Server 2008 64/32 bit
 
ATG - Installing WebLogic Server
ATG - Installing WebLogic ServerATG - Installing WebLogic Server
ATG - Installing WebLogic Server
 
Getting to Know MySQL Enterprise Monitor
Getting to Know MySQL Enterprise MonitorGetting to Know MySQL Enterprise Monitor
Getting to Know MySQL Enterprise Monitor
 
SafePeak Installation guide
SafePeak Installation guideSafePeak Installation guide
SafePeak Installation guide
 
Where did my day go?: OEM 12c Administration #em12c #C15LV @IOUG
Where did my day go?: OEM 12c Administration #em12c #C15LV @IOUGWhere did my day go?: OEM 12c Administration #em12c #C15LV @IOUG
Where did my day go?: OEM 12c Administration #em12c #C15LV @IOUG
 
UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...
UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...
UPGRADING FROM ORACLE ENTERPRISE MANAGER 10G TO CLOUD CONTROL 12C WITH ZERO D...
 
Instrumenting plugins for Performance Schema
Instrumenting plugins for Performance SchemaInstrumenting plugins for Performance Schema
Instrumenting plugins for Performance Schema
 
Colvin exadata and_oem12c
Colvin exadata and_oem12cColvin exadata and_oem12c
Colvin exadata and_oem12c
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
 
OID Install and Config
OID Install and ConfigOID Install and Config
OID Install and Config
 

Andere mochten auch

Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011Normunds Reips
 
wewalkthetalk - EFA Final
wewalkthetalk - EFA Finalwewalkthetalk - EFA Final
wewalkthetalk - EFA FinalAngad Singh
 
Cathedral of Saint Mary Magdalene
Cathedral of Saint Mary MagdaleneCathedral of Saint Mary Magdalene
Cathedral of Saint Mary MagdaleneTigu Rius
 
Privacy and security on twitter
Privacy and security on twitterPrivacy and security on twitter
Privacy and security on twitterEman Aldakheel
 
2) exam section a question 1
2) exam section a   question 12) exam section a   question 1
2) exam section a question 1adamporter
 
オリエンテーション
オリエンテーションオリエンテーション
オリエンテーションMasaru Kimura
 
Koppelen en doorschakelen definitief[1]
Koppelen en doorschakelen   definitief[1]Koppelen en doorschakelen   definitief[1]
Koppelen en doorschakelen definitief[1]Mieke Sanden, van der
 
Discussion continuum - The biotechnology revolution
Discussion continuum - The biotechnology revolutionDiscussion continuum - The biotechnology revolution
Discussion continuum - The biotechnology revolutionXplore Health
 
Managing your online reputation
Managing your online reputationManaging your online reputation
Managing your online reputationEdmar Lago
 
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...Harish Bramhaver
 
The Family Businesses Fund and March Gestión @ Tharawat magazine
The Family Businesses Fund and March Gestión @ Tharawat magazineThe Family Businesses Fund and March Gestión @ Tharawat magazine
The Family Businesses Fund and March Gestión @ Tharawat magazinelau_db
 
Donor Relationship Management
Donor Relationship Management Donor Relationship Management
Donor Relationship Management Yellow Umbrella
 
Throw out best practices, double email conversion (15 minute version)
Throw out best practices, double email conversion (15 minute version)Throw out best practices, double email conversion (15 minute version)
Throw out best practices, double email conversion (15 minute version)A. Litsa
 
Social Media in Practice
Social Media in PracticeSocial Media in Practice
Social Media in Practicemarinabooh
 
A Road map of Data Analysis for Visualization with D3.js
A Road map of Data Analysis for Visualization with D3.jsA Road map of Data Analysis for Visualization with D3.js
A Road map of Data Analysis for Visualization with D3.js博三 太田
 

Andere mochten auch (20)

Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011Begosais pardevejs ok 14.04.2011
Begosais pardevejs ok 14.04.2011
 
wewalkthetalk - EFA Final
wewalkthetalk - EFA Finalwewalkthetalk - EFA Final
wewalkthetalk - EFA Final
 
Cathedral of Saint Mary Magdalene
Cathedral of Saint Mary MagdaleneCathedral of Saint Mary Magdalene
Cathedral of Saint Mary Magdalene
 
Privacy and security on twitter
Privacy and security on twitterPrivacy and security on twitter
Privacy and security on twitter
 
2) exam section a question 1
2) exam section a   question 12) exam section a   question 1
2) exam section a question 1
 
オリエンテーション
オリエンテーションオリエンテーション
オリエンテーション
 
Koppelen en doorschakelen definitief[1]
Koppelen en doorschakelen   definitief[1]Koppelen en doorschakelen   definitief[1]
Koppelen en doorschakelen definitief[1]
 
Discussion continuum - The biotechnology revolution
Discussion continuum - The biotechnology revolutionDiscussion continuum - The biotechnology revolution
Discussion continuum - The biotechnology revolution
 
Managing your online reputation
Managing your online reputationManaging your online reputation
Managing your online reputation
 
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...
 
Kudavi 2.4.2016
Kudavi 2.4.2016Kudavi 2.4.2016
Kudavi 2.4.2016
 
The Family Businesses Fund and March Gestión @ Tharawat magazine
The Family Businesses Fund and March Gestión @ Tharawat magazineThe Family Businesses Fund and March Gestión @ Tharawat magazine
The Family Businesses Fund and March Gestión @ Tharawat magazine
 
Lagu-lagu SM
Lagu-lagu SMLagu-lagu SM
Lagu-lagu SM
 
Donor Relationship Management
Donor Relationship Management Donor Relationship Management
Donor Relationship Management
 
Pitch
PitchPitch
Pitch
 
Throw out best practices, double email conversion (15 minute version)
Throw out best practices, double email conversion (15 minute version)Throw out best practices, double email conversion (15 minute version)
Throw out best practices, double email conversion (15 minute version)
 
Social Media in Practice
Social Media in PracticeSocial Media in Practice
Social Media in Practice
 
A Road map of Data Analysis for Visualization with D3.js
A Road map of Data Analysis for Visualization with D3.jsA Road map of Data Analysis for Visualization with D3.js
A Road map of Data Analysis for Visualization with D3.js
 
Menciones
MencionesMenciones
Menciones
 
Bewonersbedrijf na tekening
Bewonersbedrijf na tekeningBewonersbedrijf na tekening
Bewonersbedrijf na tekening
 

Ähnlich wie SafePeak - How to configure SQL Server agent in a safepeak deployment

Administrators manual
Administrators manualAdministrators manual
Administrators manualScrumDesk
 
Administrators manual
Administrators manualAdministrators manual
Administrators manualScrumDesk
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications guest879f38
 
Dealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NETDealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NETFernando G. Guerrero
 
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory EnvironmentsTROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory EnvironmentsScott Sutherland
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overviewukdpe
 
SSMS-waitstats
SSMS-waitstatsSSMS-waitstats
SSMS-waitstatsE Blake
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101IDERA Software
 
Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor adminsKlaudiia Jacome
 
Database Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David IzahkDatabase Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David Izahksqlserver.co.il
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartITimothy Chen
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security TaskYaakub Idris
 
Download Presentation
Download PresentationDownload Presentation
Download Presentationwebhostingguy
 
2. Introduction-to-MSSQL-Server.pptx
2. Introduction-to-MSSQL-Server.pptx2. Introduction-to-MSSQL-Server.pptx
2. Introduction-to-MSSQL-Server.pptxAyobamiAdelekeMDM
 
SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012Michael Noel
 
Sql server lesson11
Sql server lesson11Sql server lesson11
Sql server lesson11Ala Qunaibi
 
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginnersSQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginnersTobias Koprowski
 
Backend Server Validation
Backend Server ValidationBackend Server Validation
Backend Server ValidationYu Tao Zhang
 
Brief introduction into SQL injection attack scenarios
Brief introduction into SQL injection attack scenariosBrief introduction into SQL injection attack scenarios
Brief introduction into SQL injection attack scenariosPayampardaz
 

Ähnlich wie SafePeak - How to configure SQL Server agent in a safepeak deployment (20)

Administrators manual
Administrators manualAdministrators manual
Administrators manual
 
Administrators manual
Administrators manualAdministrators manual
Administrators manual
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
 
Dealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NETDealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NET
 
Sql Sever Presentation.pptx
Sql Sever Presentation.pptxSql Sever Presentation.pptx
Sql Sever Presentation.pptx
 
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory EnvironmentsTROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
SSMS-waitstats
SSMS-waitstatsSSMS-waitstats
SSMS-waitstats
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
 
Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor admins
 
Database Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David IzahkDatabase Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David Izahk
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
Download Presentation
Download PresentationDownload Presentation
Download Presentation
 
2. Introduction-to-MSSQL-Server.pptx
2. Introduction-to-MSSQL-Server.pptx2. Introduction-to-MSSQL-Server.pptx
2. Introduction-to-MSSQL-Server.pptx
 
SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012
 
Sql server lesson11
Sql server lesson11Sql server lesson11
Sql server lesson11
 
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginnersSQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
 
Backend Server Validation
Backend Server ValidationBackend Server Validation
Backend Server Validation
 
Brief introduction into SQL injection attack scenarios
Brief introduction into SQL injection attack scenariosBrief introduction into SQL injection attack scenarios
Brief introduction into SQL injection attack scenarios
 

Mehr von Vladi Vexler

Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015 Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015 Vladi Vexler
 
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deckMySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deckVladi Vexler
 
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...Vladi Vexler
 
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24Vladi Vexler
 
SafePeak - IT particle accelerator (2012)
SafePeak - IT particle accelerator (2012)SafePeak - IT particle accelerator (2012)
SafePeak - IT particle accelerator (2012)Vladi Vexler
 
SafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic CachingSafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic CachingVladi Vexler
 
SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR Vladi Vexler
 
SafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsSafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsVladi Vexler
 
SafePeak Globes testimonial
SafePeak Globes testimonialSafePeak Globes testimonial
SafePeak Globes testimonialVladi Vexler
 
SafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmarkSafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmarkVladi Vexler
 

Mehr von Vladi Vexler (10)

Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015 Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
Data Modeling and Scale Out - ScaleBase + 451-Group webinar 30.4.2015
 
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deckMySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
 
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
Continuous Availability and Scale-out for MySQL with ScaleBase Lite & Enterpr...
 
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
Data Caching Evolution - the SafePeak deck from webcast 2014-04-24
 
SafePeak - IT particle accelerator (2012)
SafePeak - IT particle accelerator (2012)SafePeak - IT particle accelerator (2012)
SafePeak - IT particle accelerator (2012)
 
SafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic CachingSafePeak - In-Memory Dynamic Caching
SafePeak - In-Memory Dynamic Caching
 
SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR SafePeak cloud case study:EEDAR
SafePeak cloud case study:EEDAR
 
SafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsSafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud Apps
 
SafePeak Globes testimonial
SafePeak Globes testimonialSafePeak Globes testimonial
SafePeak Globes testimonial
 
SafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmarkSafePeak @ large telco - Sharepoint benchmark
SafePeak @ large telco - Sharepoint benchmark
 

SafePeak - How to configure SQL Server agent in a safepeak deployment

  • 1. Doc ID T1210.1.2 Configuring SQL Server Agent in a Safepeak Deployment How to enable database clients on the SQL Server host to connect through Safepeak Introduction This document will describe why and how the SQL Server Agent, the SQL Server Management Studio (SSMS) or any other client installed locally on the SQL Server host need to be configured to access the database through Safepeak. Summary Database clients must access the SQL Server database through Safepeak, even if they run locally on the database server host. The following are perquisites for windows authenticated connection from the SSMS or SQL Server Agent to the local SQL Server Database to succeed:  The database alias used in the client connection string must be specified using a numeric IP address and not using a hostname (e.g. use 10.254.11.22 and not dbserver.acme.com).  The following Window registry key must be created and set to configure Windows to allow the local authenticated connection from network source. Path: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa Name: DisableLoopbackCheck Type: DWORD Value: 1 If the client and Windows are not configured correctly the client will fail to connect to the database when using windows authentication1. Background and Rational Clients such as the SQL Server Agent service, the SQL Server Management Studio or SQLCMD that run locally on the SQL server host can still benefit from reduced database server CPU utilization and disk I/O by using the Safepeak cache for data access. This will also allow other clients to reuse the cached results sets from their queries. More importantly, Safepeak constantly analyses all data access traffic and identifies data modification language (DML) queries and data definition language (DDL) queries that require stale data to be evicted from Safepeak’s in-memory cache. This is why any data access to the SQL Server must be done through Safepeak. This is also true for access made by clients running locally on the SQL server. SafePeak Technologies Ltd 2012 info@safepeak.com Page 1
  • 2. Doc ID T1210.1.2 The Windows Server operating system is by default configured not to allow local windows authenticated access from an external network source - this is exactly the case of the SQL Server Agent or SSMS accessing the local SQL Server database instance via Safepeak. Therefore the client connection and the Windows system need to be configured specifically to allow this.1 If the client and Windows are not configured correctly the client will fail to connect to the database; SSMS for instance will report that the connection is from an untrusted domain. Step by Step Example The following is a setup procedure example that will guide you through the configuration process. It assumes the following:  An SQL Server 2008R2 64-bit installation.  The Safepeak server IP address is 10.254.11.22.  The Safepeak port is 1433. 1. Set the database connection aliases. The database alias can be set using the SQL Server Configuration Management utility. 1 This limitation does not concern SQL Server authentication. Note that beginning with SQL Server 2005, SQL Server Agent does not support SQL Server Authentication. This option is available only when you administer an earlier version of SQL Server. SafePeak Technologies Ltd 2012 info@safepeak.com Page 2
  • 3. Doc ID T1210.1.2 1.1. Set the 32-bit alias for SSMS 1.2. Set the 64-bit alias for SQL Agent installations on 64-bit hosts SafePeak Technologies Ltd 2012 info@safepeak.com Page 3
  • 4. Doc ID T1210.1.2 2. Configure the registry. The registry can be configured using the windows registry editor (regedit.exe). 2.1. Create a new DWORD value under the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa path named “DisableLoopbackCheck” 2.2. Double-click the value name to set it to 1 SafePeak Technologies Ltd 2012 info@safepeak.com Page 4
  • 5. Doc ID T1210.1.2 Alternatively the following Windows PowerShell command can be used: New-ItemProperty HKLM:SystemCurrentControlSetControlLsa –Name “DisableLoopbackCheck" -value "1" -PropertyType dword 3. Connect SSMS using the 32-bit alias. 4. Set the connection alias for the SQL Server Agent. SafePeak Technologies Ltd 2012 info@safepeak.com Page 5