Solved

Shared Memory Provider, error: 0 - No process is on the other end of the pipe.

Posted on 2011-03-17
4
1,241 Views
Last Modified: 2012-05-11
I've got a new Win2008R2 server setup which is a vm, to host a web site.

I've installed sql 2008 r2 express edition.

I can run queries fine from ssms but when the website connects through .NET sql client on the same machine I get this:

Shared Memory Provider, error: 0 - No process is on the other end of the pipe.

Full message:

A connection was successfully established with the server, but then an error occurred during the login process. (provider: Shared Memory Provider, error: 0 - No process is on the other end of the pipe.)    


The connection strings I've tried are

server=computername\sqlexpress;database=WebSite;user id=website;password=xxxx

and

server=.\sqlexpress;database=WebSite;user id=username;password=xxxx


Remote connections are enabled and as far as I can tell named pipes is enabled and I just moved it to the top in the "order" of protocols.

thanks
0
Comment
Question by:plq
  • 3
4 Comments
 
LVL 8

Author Comment

by:plq
ID: 35159742
Disabling "shared memory provider" seems to have fixed it. Will confirm and if so will accept own answer.. thanks
0
 
LVL 8

Accepted Solution

by:
plq earned 0 total points
ID: 35163831
Yes, good to go now. I am deeply concerned that a vanilla implementation of an MS product like this plainly does not work out of the box.

Se la vie with Microsoft.

So the solution is to disable shared memory provide in sql configuration manager.
0
 
LVL 8

Author Closing Comment

by:plq
ID: 35163833
Answered own question above
0
 
LVL 13

Expert Comment

by:Felix Leven
ID: 37820058
Common connectivity errors in SQL 2005 and still very Common in Neuwerk Version:
http://blogs.msdn.com/b/sql_protocols/archive/2005/09/28/474698.aspx
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Nowadays, some of developer are too much worried about data. Who is using data, who is updating it etc. etc. Because, data is more costlier in term of money and information. So security of data is focusing concern in days. Lets' understand the Au…
When you hear the word proxy, you may become apprehensive. This article will help you to understand Proxy and when it is useful. Let's talk Proxy for SQL Server. (Not in terms of Internet access.) Typically, you'll run into this type of problem w…
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.
Viewers will learn how to use the UPDATE and DELETE statements to change or remove existing data from their tables. Make a table: Update a specific column given a specific row using the UPDATE statement: Remove a set of values using the DELETE s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now