How to Generate a Certificate from Windows Server CA

The process of submitting and generating a new certificate is a two steps process listed below:

  1. Request – This is the process where we create a certificate request and save it as a.CER file, In many cases your application or you will create it from IIS or the certificates MMC.
  2. Issuing \ Generating certificate – this process follows step one, Submitting the requested file to our Certificate Authority and copying the new certificate

Continue reading

MSSQL Server Error 67 and 17

SQL-Server-does-not-exist-or-access-deniedWe are running Windows SQL Server 2016 Enterprise on Windows Server 2016. The server has an instance with databases in Always On High Availability group. People connect to the instance mostly from MS Access and MS Excel applications and from time to time they experience the following error:

—————————
Microsoft SQL Server Login
—————————
Connection failed:
SQLState: ‘01000’
SQL Server Error: 67
[Microsoft][ODBC SQL Server Driver][DBNETLIB]ConnectionOpen (Connect()).
Connection failed:
SQLState: ‘08001’
SQL Server Error: 17
[Microsoft][ODBC SQL Server Driver][DBNETLIB]SQL Server does not exist or access denied.
Continue reading

10 Practical Sar Usage Examples

There are two ways to invoke sar.

  1. sar followed by an option (without specifying a saXX data file). This will look for the current day’s saXX data file and report the performance data that was recorded until that point for the current day.
  2. sar followed by an option, and additionally specifying a saXX data file using -f option. This will report the performance data for that particular day. i.e XX is the day of the month.

In all the examples below, we are going to explain how to view certain performance data for the current day. To look for a specific day, add “-f /var/log/sa/saXX” at the end of the sar command. Continue reading

Generate CPU, Memory and I/O report using SAR command

SAR stands for System Activity Report, as its name suggest sar command is used to collect,report & save CPU, Memory, I/O usage in Unix like operating system. SAR command produce the reports on the fly and can also save the reports in the log files as well.

In this article we will discuss different examples of SAR Command in CentOS  7 & RHEL 7, in case sar is not installed on your system then use the below command to install it. Continue reading

How to find AD Disabled Accounts with Skype for Business Enabled

skype-for-businessAs you definitely know disabling user in Active Directory won’t disable it in Skype for Business. That’s because Skype for Business uses it’s own AD attributes. So such users will still be visible in Skype for Business Control Panel and in licenses count. Continue reading

How to Set the DSCP Flag in Windows and Linux

QoSmappingDSCPDSCP (Differentiated Services Code Point) is a series of bits in the IP header for classification purposes. These bits specify the precedence value of the packet, the drop probability, and the network service used.

Before setting the DSCP flag with a desired value, you need to take some things into consideration. You cannot force the DSCP flag from the Data Distribution Service (DDS) middleware, but you can suggest the system use a specific value. The reason is that all network elements such as switches and routers must have the capability and be enabled to actually use the TOS bits to treat higher-priority packets differently (TOS is an older mechanism to prioritize packets). In addition, many network transports are not capable of managing packet priority. All this makes it impossible for DDS to control the prioritization of data at the network level. Continue reading

Polycom Cannot download certificate because domain is not accessible

Polycom-cannot-download-certificateOn first sign in Polycom phone cannot download certificate because domain is not accessible and displays the following messages: Continue reading

MSSQL Error – Access to the remote server is denied because the current security context is not trusted

mssql-error-access-to-the-remote-server-is-denied-because-the-current-security-context-is-not-trustedWhen trying to load data from  database that is in AlwaysOn High Availability Group from Microsoft Excel the following error occurs:

Access to the remote server is denied because the current security context is not trusted Continue reading

SQL Error – The database owner SID recorded in the master database differs from the database owner SID

When trying to execute Stored Procedures on a particular Database we got the following error:

The server principal “domain\user” is not able to access the database “dbXYZ” under the current security context.

The database owner SID recorded in the master database differs from the database owner SID recorded in database ‘dbXYZ’. You should correct this situation by resetting the owner of database ‘dbXYZ’ using the ALTER AUTHORIZATION statement. Continue reading

odbc_log: Unable to retrieve database handle. CDR failed.

Asterisk PBXI correctly configured ODBC connection on Asterisk server to MSSQL database in Always On cluster.

The working configuration was as follows: Continue reading

Load more