The SQL Server Reporting Services … service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion.
Sound familiar? It was a problem I was having with a couple of SQL Server 2008 R2 machines built on VMWare 5.1 hosts. The SQL Server Reporting Services don’t start automatically on reboot and won’t start when manually instigated.
Fortunately it can be easily remedied by increasing the default service time-out:
- Open Regedit
- Navigate to: KEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
- Create a new DWORD value called ServicesPipeTimeout
- Modify it and ensure it is set to Decimal and enter the value 60000
- Close Regedit and reboot the server
Note: Incorrect modification of the registry can lead to serious problems, please be careful. For protection it’s worth taking a backup of the registry before hand.
If this does not work then you may have a more serious issue, if this is the first time you have tried to start the service then double check you have met the prerequisites for installation and have it configured correctly.
Running Microsoft Server 2008 R2 as your home lab but also use it as your desktop? Trying to install Google Drive and getting the following error?
The installer encountered error 1603: Fatal error during installation.
The application has failed to start because its side-by-side configuration is incorrect
It’s because it as a dependency it doesn’t tell you about, you need Microsoft Visual C++ 2008 SP1 Redistributable Package (x64) to install it and then Microsoft Visual C++ 2008 SP1 Redistributable Package (x86) to actually run it! As soon as you’ve installed it you can run the usual googledrivesync.exe installaer and that’s it!
Get the downloads (around 4Mb) from Microsoft below:
“User ‘DOMAIN\user’ does not have required permissions. Verify that sufficient permissions have been granted and Windows User Account Control (UAC) restrictions have been addressed.”
In my case this was on a Server 2008 R2 server with SQL 2008 installed and patched up to date. I knew the permissions were correct so it had to be UAC, so I turned it off and everything worked, not the solution I wanted but it proved my theory.
Now, as standard Reporting Services should allow anyone who is a local admin on the machine hosting it to access the web page. However, if you have UAC turned on you may not be able to open it without the above error. If this is the case, simply open IE on the server as an admin to bypass UAC. It’s worth noting that you may need to add the site (plus the localhost version) to trusted sites but I found this was not necessary on the default setup I have.
Now on to enabling access for users and groups without turning off UAC.
Once successfully on the Reporting Services page, click on the “Site Settings” button in the top right corner, select the “Security” tab and select “New Role Assignment”. At this point you can add the required users or groups in the “DOMAIN\username” format.
You will need to give people at least basic access to the root “Home” folder for them to gain access to the web portal at all, even if you have made them a site admin in the above step. To do this, return to the “Home” page and click “Folder Settings” from the nav bar, from here you can again click “New Role Assignment” and then assign the desired roles for the folder. These assignments will be inherited by any sub folder underneath, you can adjust the permissions on those in a similar way.
That’s it, headache over!
The other day I had to add new A records for just over 250 hosts, not something I wanted to do manually! Hunting around I found some good pointers but nothing concrete, so I thought I’d put my process on here.
First, it’s worth making sure you understand and test (if needed) the dnscmd.exe tool. For example, if you want to add a standard A record to you DNS you would use the following:
dnscmd DNSServerName /RecordAdd DNSZoneName HostName RecordType IPAddress
For clarity, this could be:
dnscmd DNSServer1 /RecordAdd domain.com host1 A 192.168.0.10
Once you’ve got that down, we can then manipulate the command to pull in a list of the updates you want to do:
I put the list of IP’s and Hostnames seperated by a space into a .txt file like so:
I then used some basic batch style scripting to pull those into a command:
for /f "tokens=1-2" %i in (C:\dnsimport.txt) do dnscmd DNSServer1 /RecordAdd domain.com %i A %j
You can import pretty much most types of record this way.
Whenever you make a fundamental change to a DNS zone it’s a good idea to back it up, but how do you do that when your DNS is Active Directory Integrated without taking a system state backup? We’ll take a look at both AD integrated and standalone methods to get a better understanding.
Non-AD integrated (Standalone) DNS:
If you’re running standalone DNS and simply have a Primary/Secondary setup then performing this style of backup is really very simple. As standard DNS zone file information is stored in the
%systemroot%\system32\dns folder (typically
C:\Windows\System32\dns). When the DNS service starts it simply loads the dones from these files, likewise when a change is made it creates a backup and places it in the backup folder on the aforementioned path. It’s worth noting that only one backup is maintained so if you make another change the previous backup is overwritten, therefore if you make a sideways copy of these backups you can keep a version as long as you require.
AD Integrated Zones:
As AD integrated zones are stored within the Active Directory they do not have any files associated with them and therefore are not backed up to the backup directory. So how do we get it out? Using DnsCmd.exe is how!
The Microsoft example of a zone export is as follows:
dnscmd  /zoneexport
This looks great but here it is in a more useful looking format:
DnsCmd DNSserver1 /ZoneExport example.com example.com.bak
Note that the backup file you have created will land in
How to restore AD Integrated Zones:
Warning: You should only attempt to restore this file as a last resort as it could impact your users especially then allowing for replication to the DNS holding DC’s.
- Hop onto the DNS Management Console and delete the zone
- Rename your zone backup to have a .dns extension, in the example above this would go from
- Create a new zone with the FQDN of the zone you deleted, if using the New Zone Wizard be sure to uncheck the Store in Active Directory option.
- When prompted to create a new zone file or use an existing file, choose an existing file, the wizard should automatically fill in the zone FQDN with the .dns extension, this should look the same as your renamed zone file (
- Complete the wizard
- Check the zone information is as per the zone before the changes
- If all is well, simply change the zone type to Active Directory Integrated.
So, you get on site and no one knows where their NTP server is, there’s a quick and easy way to find out.
The old schoolers will tell you to use the net time commmand, but this has been deprecated and is no longer recommended for use by Microsoft.
If you still want to use it or you’re on a Windows Server 2000 box
- Open up a command prompt
- Type: net time /query \\serveryouwanttoquery
If you’re on anything newer:
- Open up a command prompt
- Type: w32tm /query /computer:computeryouwanttoquery /source
- If you’re having trouble w32tm.exe can be found in “C:\Windows\System32”.
W32tm.exe is a powerful little tool that not only allows you to check the basic status but also completely configure the NTP server/service to whatever your heart desires. For more, check out this technet article over at the Microsoft site.
I can’t claim the credit here, it’s all Microsoft!
Follow this excellent KB article, it works like a charm!
That’s it on the Server 2003 to Server 2008 R2 migrations for now, let me know if you’d like more!