Bill thanks for the offline comments, we are going to try and move it
off a SQL cluster for this time, if that doesn't help stuff then well go
the SPN route, which I believe its going to have to happen anyways to
fix the clusters accordingly, Unless I temporarly make the accounts DA,
recycle the servers and see if the SPN creates ( I don't think it will
but its an idea to get around fiddingly with asdiedit or the setspn)

Z

Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505


-----Original Message-----
From: Mayo, Bill [mailto:bem...@pittcountync.gov] 
Sent: Friday, October 08, 2010 1:53 PM
To: NT System Admin Issues
Subject: RE: Setting SPN's on Clustered SQL (2005)

I have had this problem before.  I don't remember a lot firsthand, but I
do have my notes about it.  Copied/pasted below.

When multiple computers are traversed for integrated authentication
(e.g. computer connects to web server which connects to SQL server),
there are certain requirements for Kerberos to work properly. One of the
key things needed in this scenario is for the Service Principal Name
(SPN) to be properly set on the service account in Active Directory.
This normally happens transparently, but some extra configuration may be
required with clustered servers. If authentication fails in a scenario
like this, one of the first things to check is the SPN. Basic
troubleshooting steps follow. NOTE: The SetSPN utility is required and
must be installed on the local computer (not server). 

1.Confirm the port on which SQL Server is listening. When a single
instance is installed, this should be 1433. When multiple instances are
installed, such as with a cluster, you will need to check. 
1.1.On the SQL Server in question, open SQL Server Configuration
Manager. 
1.2.Expand SQL Server 2005 Network Configuration. 
1.3.There should be a "Protocols for..." entry for each named instance.
Select the appropriate named instance. 
1.4.In the right column, open TCP/IP. 
1.5.Choose the IP Addresses tab in the resulting window. 
1.6.Scroll down to the bottom, finding the section with the header
"IPAll". Record the value of "TCP Dynamic Ports". 
1.7.Close all windows. 
2.From the workstation with SetSPN installed, run the following command,
where serviceaccountname represents the service account running the SQL
Server service instance: 
setspn -L serviceaccountname
3.Look for an entry for the server/instance name in question and note
the port indicated (at the end of the line). If an entry exists and the
port matches, this is not the problem. NOTE: Technical documents from
Microsoft indicate that clustered instances should have an entry without
a port and one with. I have not been able to confirm that the record
without a port number is absolutely necessary, but add it when it
doesn't exist and there is a problem. 
4.If the entry doesn't exist, add it with the following command (where
serviceaccountname is the service name, clustername is the cluster name,
and 9999 is the port number recorded earlier): 
setspn -A MSSQLSvc/clustername.mydomain.local:9999 serviceaccountname 
5.Per Microsoft's recommendation, you can also add an entry without the
port number: 
setspn -A MSSQLSvc/clustername.mydomain.local serviceaccountname 
6.Do another list to confirm the entries were properly added. 
7.Synchronize the domain to replicate the changes and try again.  

-----Original Message-----
From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Friday, October 08, 2010 1:34 PM
To: NT System Admin Issues
Subject: Setting SPN's on Clustered SQL (2005)

Has anyone had to manually add a SPN to a multi-node cluster SQL 2005
box before?

I used the spn_query.vbs script from Microsoft to look at each of the
nodes of the cluster and the Cluster Name and the SQL Server name (
Still default instance) 

Used the best practices that doesn't have the SQL Service accounts for
SQLServer,Agent and Full Text Search as a normal user during the
installation which leads me to believe that the SPN's didn't get written
because when I look at the properties of the service account they don't
have permissions to read or write SPN. 

And I get this error when troubleshooting Shavlik 7.60 with Domain
Accounts from multiple consoles...
SPI handshake failed with error code 0x8009030c while establishing a
connection with integrated security; the connection has been closed.
[CLIENT: IP_Address_of_client. 

Has anyone had to do this before for their clusters?

Been looking at Microsoft KB 811889 which talks about the "Cannot
Generate SSPI Context" error message. 

http://support.microsoft.com/kb/811889

Any ideas on this one? 

Z


Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org
Cell:401-639-3505



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to