473,324 Members | 2,501 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,324 software developers and data experts.

Need to know FENCED ID details for an existing instance.

NG
Hi All,

I am trying to create a new db2instance using db2icrt command. It has
a parameter -u FENCED USER ID.

I want to use same FENCED USER ID as that of our existing
DB2INSTANCES.

I checked db2 dbm cfg. But i couldn't find existing FENCED ID details.

Please let me know, is there any way to find out the FENCED ID of the
existing DB2 INSTANCE.

Thanks.
Nov 12 '05 #1
1 1586
NG wrote:
Hi All,

I am trying to create a new db2instance using db2icrt command. It has
a parameter -u FENCED USER ID.

I want to use same FENCED USER ID as that of our existing
DB2INSTANCES.

I checked db2 dbm cfg. But i couldn't find existing FENCED ID details.

Please let me know, is there any way to find out the FENCED ID of the
existing DB2 INSTANCE.


Have a look at the onwer and group of the file sqllib/adm/.fenced of the
other instance. That file is consulted by DB2 when the fenced mode
processes are started.

--
Knut Stolze
Information Integration
IBM Germany / University of Jena
Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

12
by: jason | last post by:
Access 2000: I have a customer-inventory table I need to loop through and compile a list of all the inventory items the customer is tracking. The problem I am finding is that a simple loop...
4
by: Fan Ruo Xin | last post by:
I can truncate a version8 table by using "import from /dev/null ... replace into ..." when I use version8 client. But I failed to truncate the same table by using the same way if I connect from a...
1
by: NG | last post by:
Hi All, I am trying to create a new db2instance using db2icrt command. It has a parameter -u FENCED USER ID. I want to use same FENCED USER ID as that of our existing DB2INSTANCES. I...
5
by: Jeff | last post by:
I have question about differences in fenced sql procedures and fenced stored procedures. Do fenced sql procedures take up an extra memory segment when executed? Reason I ask is we have several...
2
by: NU2_UDB | last post by:
I have been assigned a few UDB instances to maintain. I would like to find out the name of the fenced user used when the instance was created. Is it possible to get that information by using...
4
by: techme | last post by:
I am surprised at how little info there is on this topic. We converted to DB2 v8.1.1.72 painlessly a few months ago. For specific reasons, we stayed on 32-bit. Our OS is AIX 5.2 and our hardward...
4
by: _link98 | last post by:
Which of the UDB 8.2.2 ESE unix executables really need to gain root privilege while they are running? In my installation, the db2sysc file is owned by the instance-owner (and relevant admin...
2
by: datapro01 | last post by:
Running DB2 8.2 on AIX 5.2. If you have more than one instance on a box is there a way that can be used to determine which is the name for the fenced user for a particular instance? Thanks in...
48
by: Chad Z. Hower aka Kudzu | last post by:
A few of you may recognize me from the recent posts I have made about Indy <http://www.indyproject.org/indy.html> Those of you coming to .net from the Delphi world know truly how unique and...
2
by: Terry Olsen | last post by:
Can anyone give me some guidance on installing a local printer with VB 2005? I'm guessing I would probably do this with WMI, but i'm not finding anything obvious. I see how to add a networked...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...
1
by: Shællîpôpï 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.