Solved

renaming and sql server (instance)

Posted on 2011-09-09
2
338 Views
Last Modified: 2012-05-12
I needed to create a test environment for my main business application (McKesson) on server 2008 R2 and SQL2008.
I used Symantec system recover 2010 and imaged to a new similar server.  This went well and both are basically identical.  I change the ip address of the new server but cannot bring it on the network until I do a name change.
My problem is the SQL, I do not think it is a good idea to have two servers with the same SQL server name (the original is the same as the server name).
Is there a way to rename the SQL server so it is never confused with the original on the network?
0
Comment
Question by:wlasner
2 Comments
 
LVL 17

Accepted Solution

by:
Chris Mangus earned 500 total points
ID: 36514043
Use:

EXEC sp_dropserver 'oldname'
GO
EXEC sp_addserver 'newname', 'local'
GO

Then, stop and restart SQL Server service.  check to see if the name was changed with SELECT @@servername
0
 

Author Closing Comment

by:wlasner
ID: 36523329
Executed against Master DB - worked perfect.

Thank you
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
t-sql splitting string column 5 42
Minus first query 1 36
Linking a DMV to a database id/sql text in SQL server 2008 8 46
Sql query 107 24
How to leverage one TLS certificate to encrypt Microsoft SQL traffic and Remote Desktop Services, versus creating multiple tickets for the same server.
In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now