473,406 Members | 2,698 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,406 software developers and data experts.

Fenced User

I have been assigned a few UDB instances to maintain.

I would like to find out the name of the fenced user used when the
instance was created.

Is it possible to get that information by using DB2 commands/utilities
or config files?

Also , I get the following error when starting an instance

"USERID/GROUPID is greater than the Shelby Supported size/length"

The group in sysadm_group is valid and has 8 characters.

Appreciate your help.

Regards
prabski

Nov 12 '05 #1
2 5419
You can find the fenced id by looking at the owner of the
sqllib/adm/.fenced file.

NU2_UDB wrote:
I have been assigned a few UDB instances to maintain.

I would like to find out the name of the fenced user used when the
instance was created.

Is it possible to get that information by using DB2 commands/utilities
or config files?

Also , I get the following error when starting an instance

"USERID/GROUPID is greater than the Shelby Supported size/length"

The group in sysadm_group is valid and has 8 characters.

Appreciate your help.

Regards
prabski

Nov 12 '05 #2
Thanks . I did that and the owner was incorrect . So I moved the file
and touched it.
Instance started fine after that.

Regards
prabski

Nov 12 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

60
by: Fotios | last post by:
Hi guys, I have put together a flexible client-side user agent detector (written in js). I thought that some of you may find it useful. Code is here: http://fotios.cc/software/ua_detect.htm ...
4
by: Fan Ruo Xin | last post by:
I can truncate a version8 table by using "import from /dev/null ... replace into ..." when I use version8 client. But I failed to truncate the same table by using the same way if I connect from a...
1
by: NG | last post by:
Hi All, I am trying to create a new db2instance using db2icrt command. It has a parameter -u FENCED USER ID. I want to use same FENCED USER ID as that of our existing DB2INSTANCES. I...
5
by: Jeff | last post by:
I have question about differences in fenced sql procedures and fenced stored procedures. Do fenced sql procedures take up an extra memory segment when executed? Reason I ask is we have several...
2
by: datapro01 | last post by:
Running DB2 8.2 on AIX 5.2. If you have more than one instance on a box is there a way that can be used to determine which is the name for the fenced user for a particular instance? Thanks in...
3
by: zlst | last post by:
Many technological innovations rely upon User Interface Design to elevate their technical complexity to a usable product. Technology alone may not win user acceptance and subsequent marketability....
6
by: martin | last post by:
Hi, I am a web page and a web user control. My web user control is placed in my web page using the following directive <%@ Register TagPrefix="uc1" TagName="Header"...
0
by: th_maran | last post by:
Hi What is the difference between Fenced and Unfenced in DB2 UDB Thanks in a dv thirumaran
0
by: pcdb22009 | last post by:
Hi there, I would like to know if we can use the same fenced owner user id which is used with existing db2 instance of db2 version V9.1 for a new instance of db2 version V9.5, (both copies exist...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.