- IMC: document 716 GB SQL backup cleanup, retention scheduled task, DB move C:->S:, sysadmin grant via single-user recovery, parked RDS removal after KB5075999 apply rolled back on ETW manifest error - Valleywide: document RDWeb brute-force incident on VWP-QBS, UDM port forward closure, 30-day audit showing no breach, lockout policy restoration - Dataforth: capture Swagger API review and Hoffman Zoom call prep
5.2 KiB
5.2 KiB
Session Log: 2026-04-12 — IMC1 Cleanup, SSH Setup, SQL Move
Summary
Originally engaged to help remove RDS from IMC1 as prep for a Server 2019 upgrade. Removal failed with 0x80073701 (component store corruption). Spent most of the session setting up SSH access, diagnosing the corruption, performing SQL backup cleanup and DB relocation, and ultimately parking the RDS removal as a deeper problem than scoped.
Work Completed
Remote access
- Installed OpenSSH Server on IMC1 via GitHub release (built-in
Add-WindowsCapabilityinstall was a ghost — binaries never landed due to component store corruption) - Registered
sshdandssh-agentservices, opened firewall port 22 - Added public key to
C:\ProgramData\ssh\administrators_authorized_keyswith correct ACLs (inheritance off, Administrators + SYSTEM full control) - Set PowerShell as default SSH shell via registry
- Diagnosed routing conflict: Tailscale's
pfsense-2was advertising192.168.0.0/24with lower metric than OpenVPN; disconnecting Tailscale restored IMC reachability
SQL backup cleanup
- Inventoried
E:\SQL\MSSQL14.SQLEXPRESS\MSSQL\Backup\: 66 AIMsi nightly fulls totaling 905 GB (Feb 1 → Apr 11, 2026) - Confirmed Cloudberry off-site exists before deletion
- Applied GFS retention manually: kept 14 dailies + 1st-of-month (16 files / 189 GB); deleted 50 files / 716 GB freed on E:
- Noted size drop from ~15 GB → ~11 GB around 2026-03-28 suggests someone purged/archived data that day
Automated retention
- Wrote
C:\Scripts\Clean-AimsiBackups.ps1implementing GFS policy - Safety: 3-newest override, filename-pattern guard, log to
C:\Scripts\Logs\aimsi-retention-YYYYMM.log - Registered scheduled task
IMC AIMsi Backup Retention: daily 23:30, SYSTEM, highest privileges, 1h execution limit - Test ran successfully
SQL database relocation (C: → S:)
- Elevated
IMC\guruto sysadmin onAIMSQLinstance via single-user recovery mode (net stop →net start MSSQL$AIMSQL /mSQLCMD→ALTER SERVER ROLE sysadmin ADD MEMBER→ normal restart) - Moved user databases via
ALTER DATABASE ... SET OFFLINE / MODIFY FILE / SET ONLINE:AIM(8.6 GB)IMC(9.8 GB)TestConv61223(8.8 GB) — still hanging on; candidate for drop
- Moved
tempdbviaALTER DATABASE tempdb MODIFY FILE+ service restart; cleaned up orphaned files on C: - Left system DBs (master, model, msdb) on C: — moving
masterrequires startup-parameter changes, marginal benefit - Result: C: 322→278 GB used, S: 27→53 GB used; AIM client launch tested working
Minor fix
- Recreated missing
C:\Users\guru\Downloadsfolder (registry pointed there, folder didn't exist)
RDS Removal / Component Store (parked)
Root error: 0x80073701 ERROR_SXS_ASSEMBLY_MISSING on RDS role removal.
Attempts made:
DISM /Online /Cleanup-Image /RestoreHealth— failed Error 14 (reallyE_OUTOFMEMORY 0x8007000efrom oversized 168 MB COMPONENTS hive)- With explicit
/ScratchDir— failedE_ACCESSDENIED(BITS + wuauserv were stopped; DISM couldn't fetch payloads) - Started BITS/wuauserv, retried — failed again; BITS idle-auto-stops on Server 2016 (known)
/Source:WIM:E:\W2016\sources\install.wim:2 /LimitAccess— failedCBS_E_SOURCE_MISSING(E:\W2016 is RTM 14393.0 media; damaged assembly is from a post-RTM CU)- Extracted KB5075999 (Feb 2026 CU) from local MSU at
C:\Users\guru\Documents\Downloads\→DISM /Add-Package→ staged successfully (S_OK) but on reboot, apply phase failed withHRESULT_FROM_WIN32(15010) ERROR_EVT_INVALID_EVENT_DATAatonecore\admin\wmi\events\config\manproc.cpp line 733— ETW event manifest for provider GUID{9c2a37f3-e5fd-5cae-bcd1-43dafeee1ff0}is malformed →CBS_E_INSTALLERS_FAILED→ full rollback
Decision: deeper than scoped. Server otherwise healthy. RDS removal is blocking a planned 2019 upgrade.
Next actions (for next session)
- Decide 2019 upgrade strategy:
- Path A: identify specific KB owning provider GUID
{9c2a37f3-e5fd-5cae-bcd1-43dafeee1ff0}, re-register its manifest viawevtutil im, retry CU apply - Path B: try in-place Server 2019 upgrade despite corruption — OS files get rewritten wholesale
- Path C: clean 2019 build + AD/SQL/file/RDS migration
- Path A: identify specific KB owning provider GUID
- Verify whether
IMCdatabase (9.8 GB) is actively used; drop if not - Verify
TestConv61223can be dropped safely (leftover migration test from 2023-06-12) - Disable SMB1 (security hygiene):
Set-SmbServerConfiguration -EnableSMB1Protocol $false - Add IMC entry to SOPS vault
Key Files and Paths
- SSH key authorized:
C:\ProgramData\ssh\administrators_authorized_keys(ed25519guru@DESKTOP-0O8A1RL) - Retention script:
C:\Scripts\Clean-AimsiBackups.ps1 - Retention logs:
C:\Scripts\Logs\aimsi-retention-YYYYMM.log - DISM scratch:
C:\DISMScratch - Expanded KB5075999 payload:
C:\DISMScratch\KB5075999\ - Local Server 2016 media:
E:\W2016\sources\install.wim(RTM 14393.0, index 2 = Standard Desktop Experience)
Credentials Referenced
IMC\guru— domain admin, AIMSQL sysadmin. Password handled verbally, not stored here.saonAIMSQL— exists, enabled, password unknown (tried one candidate, failed — no lockout policy was hit)