Solved

Impact on Win2008 R2 cluster & its services if adid password is changed

Posted on 2013-12-01
3
307 Views
Last Modified: 2013-12-07
We used one adid (added to the servers' local Administrator
group) to create/maintain several pairs of Win2008 R2 MSCS
clusters.  The clusters host MS SQL 2008 Ent services

Supposed we changed this adid, what's the impact?
If there's impact, what are the updates/changes that need
to be done?
0
Comment
Question by:sunhux
  • 2
3 Comments
 
LVL 35

Assisted Solution

by:Mahesh
Mahesh earned 334 total points
ID: 39688093
1st off all cluster service is not dependent on this ID
Any AD which is part of local administrators group of servers in cluster, it can manage cluster and its nodes.
in other words there should not be any impact by changing this ID.

You just need to ensure that in case of If your any SQL services are running with this ID, you should make this ID as service account (account never expires and password never expires)
and if you change its password, same need to be replicated to SQL services as well.

Mahesh
0
 
LVL 9

Assisted Solution

by:VirastaR
VirastaR earned 166 total points
ID: 39688167
0
 
LVL 35

Accepted Solution

by:
Mahesh earned 334 total points
ID: 39688485
The account must have administrative permissions on the servers that will become cluster nodes. The simplest way to provide this is to create a domain user account, and then add that account to the local Administrators group on each of the servers that will become cluster nodes

Taken from above link

Same thing I mentioned in my 1st comment.

Since you already have cluster in place with "cluster network object (CNO)" there no question of adding \ removing any permissions on any container.
hence wheather you change existing account password or you add another account in local admin group of cluster servers for management and remove earlier from local admin group, you should not face any issues

Mahesh
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now