VMware Cloud Builder Audit Task for Microsoft SQL Server Failing
search cancel

VMware Cloud Builder Audit Task for Microsoft SQL Server Failing

book

Article ID: 319746

calendar_today

Updated On:

Products

VMware Cloud on AWS

Issue/Introduction

This article provides steps to resolve this failure.

Symptoms:
  • The audit task ‘Microsoft SQL Server (vra01mssql01)’ fails with the following error message visible in the VMware Cloud Builder UI:
Database 'VRADB01' not found on vra01mssql01.rainpole.local
  • Running the AuditSqlServer PlatformAudit module from the command line fails with the following error message:
Database 'VRADB01' not found on vra01mssql01.rainpole.local
  • Reviewing the Application Log from Event Viewer on the Microsoft SQL Server shows the following error messages:
Login failed. The login is from an untrusted domain and cannot be used with Integrated authentication. [CLIENT: 172.28.211.60]

SSPI handshake failed with error code 0x80090302, state 14 while establishing a connection with integrated security; the connection has been closed. Reason: AcceptSecurityContext failed. The operating system error code indicates the cause of failure. The function requested is not supported   [CLIENT: 172.28.211.60


Environment

VMware Validated Design for Software-Defined Data Center (SDDC) 5.1.x
VMware Cloud Builder 2.x
VMware Validated Design for Software-Defined Data Center (SDDC) 5.0.x
VMware Validated Design for Software-Defined Data Center (SDDC)
VMware Cloud Builder 1.x

Cause

This issue occurs because the AuditSqlServer module does not support NTLMv2 negotiation when attempting to connect to the SQL Server.

Resolution

To resolve this issue you must disable Require NTLMv2 session security for the Minimum session security for NTLM SSP based (including secure RPC) servers local policy. 
  1. Click Start, click Run, type secpool.msc, and then click OK.
  2. In the navigator pane, expand the Local Policies.
  3. In the navigator pane, click Security Options.
  4. In the Policy list, locate and double-click Minimum session security for NTLM SSP based (including secure RPC) servers
  5. Deselect the Require NTLMv2 session security check box and click OK.
  6. Rerun the audit process


Additional Information

Impact/Risks:
  •