Category Archives: UNBLOG Tutorials (EN)

THINK UNBLOG Knowledge Network for Tutorials, Howto’s, Workaround, DevOps Code for Professionals. The posts are made on demand contributed by professionals

Microsoft SQL Server 2014 SSRS Instances

SQL Server, which is used for ERP and Business Intelligence applications, where the OLAP services of the SQL Server come into operation, so Microsoft Dynamics AX Application Object Server (AOS) or the Business Intelligence Frontend of Cubeware uses these interfaces. This requires deploying instances of SQL Server Reporting Services and SQL Server Analysis Services for analysis, planning, and reporting processes generated during database queries.

This post describes how to deploy SQL Server Reporting Services (SSRS) and SQL Server Analysis Services (SSAS) to an already installed SQL Server instance. The installation takes place on a Windows Server 2012 R2 running as a virtual machine in a VMware ESXi host. The installation media is a Microsoft SQL Server 2014 that is mounted as an ISO image in the VM as drive G:.

SQL Server 2014 Setup

It is important here that the setup is run from the installation media, here on drive G:, and not the “SQL Server Installation Center” from the program menu or Modern UI.

After accepting the license terms continue with the option New SQL Server stand-alone installation or add features to an existing installation.

Perform a new installation of SQL Server 2014

Enter the license code or select Evalutaion.

SQL Server Feature Installation.

Select the Analysis Services and Reporting Services features.

Definition of the new SQL Server instance, here BISRV as database instance for business intelligence.

As an account name, it is recommended to use a service account created in Active-Directory, here our account s_ssrsrv which was created in AD under the OU, Service Accounts, this should be a member of the local administrators group at the SQL Server, so that the necessary permissions are available later in the creation of the BI cubes and reports.

User account of Multidimensional and Data Mining Mode is the administrator and our SQL Service Account s_ssrsrv.

With Install only it goes on.

Here the selection of the components and configuration to be installed can be checked again, confirm with install or go back step by step with Back to make any changes.

After Complete shows the status of the installation process, the installation is complete with status 0 error.

After installing the SSRS and SSAS Services, the new instance must be configured with SQL Server 2014 Reporting Services Configuration Manager.

SQL Server 2014 Reporting Services Configuration Manager

Selecting the new Report Server instance, SQL Server 2014 Reporting Services and Analysis Services can now be configured for our BI.

How to use PuTTY SSH Key Generator

Generate SSH Key using PuTTY Key Generator

OpenSSH keys are used to log in to a Linux host without a password query prompt, or to run in batch processes, for example to enable authentication from scripts.

Generate OpenSSH Key

The PuTTY Key Generator generates a key par, after which the public key is copied to the remote host.

In the key comment field, your own email address can be entered, the generated private key is stored as privkey.ppk, the public key is stored as pubkey.ppk. The public key is stored on the remote host under the user’s home path in the .ssh directory in the authorized_keys file, and nothing can be changed in the copy & paste of the content.

[user@smarthost .ssh]$ ll
Total 16
drwx------ 2 user user 4096 21 Oct 2013 .
drwx------ 10 user user 4096 10 Apr 15:13 ..
-rw------- 1 user user 1124 21 Oct 2013 authorized_keys

The directory .ssh should have the right 700 and the owner must be user. This user user should serve as an example here.

PuTTY with OpenSSH Key

The host should be logged in to this one, with the IP or host name in the Session and Host Name (or IP address) section.

Illustration: PuTTY session

The path to the private key generated with PuTTY Key Generator is entered under Connection – SSH – Auth.

Illustration: SSH authentication

Auto-login username defines the user who should authenticate.

Illustration: Auto-login username
It’s done

With SSH daemon, key authentication is enabled in the configuration file /etc/ssh/sshd_config

# Authentication for user id's
AllowUsers user
# Allow key authentication
RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys

Tip! PuTTY can be run in command-line, so scripts can be performed.

# use putty load session name
"C:\Program Files\PuTTY\putty.exe" -load smarthost.mydomain.com
# Use putty session command-line
"C:\Program Files\PuTTY\putty.exe" -i C:\Users\user\ssh-privkey.ppk user@smarthost.mydomain.com

plink give the possibility to use PuTTY via CLI.

plink -i C:\Users\user\ssh\privkey.ppk userd@smarthost.mydomain.com

Remarks

PuTTY is free software for establishing connections via Secure Shell (SSH), Telnet, remote login or serial interfaces. PuTTY serves as a client and establishes the connection to a server. When the connection is established, the user’s identity is verified using one of the provided authentication methods. PuTTY is available for Windows and Linux.