Category: <span>Uncategorized</span>
From TN 1228354. This is the last option
- Ensure that the corrupt replica is not in use by any user or server.
On the Domino server hosting the corrupted database, enter the following command: “dbcache flush” (command may require entering two or three time to release the database). - Using operating system commands, delete the corrupt replica file.
- Using the Lotus Notes client, open the “good” replica located on the other clustered server.
- Create a new replica on the server where the “bad” replica was deleted.
Select File -> Replication -> New Replica. - Complete the replication.
- Stop the Cluster Directory task on the server where the new replica was created by running the console command “tell CLDBDIR quit”
- Restart Cluster Directory task by running the command “load CLDBDIR”
- Verify database replica is on clustered server: Open Cluster Directory database and select the view, Databases by Replica ID
- Verify that each replica copy of the same NSF file has the same Replica ID value.
Today i an agent stop to working . The cause was the wrong signature but in this case was not access rights
The TN 1099178 explain the problem:
In order for “After new mail has arrived” triggered agents to run on Notes/Domino Servers, the following must be true:
1. The signer of the agent (the last person to save or enable the agent) must have their mail file located on the same server as where the agent will run. The server determines this by taking the name of the last person to save the agent, performing a person lookup into the Domino Directory and retrieving the Mail Server from that user’s Person document. If the Mail Server in the Person document is different than the current server, the agent will not run. If the person is not found in the directory, the agent will not run. This person lookup is performed every time the agent loads to run. Remember, if the User ID is hierarchical, the user name in the Person document must also be hierarchical. This is stored in the field “FullName” in the Person document.
2. Historical Detail: In Notes R4, if the agent is a Formula agent (as opposed to a Simple Action or Script agent), then there is an additional requirement that the agent be saved as a R4 type agent, rather than an R3/R4 Compatible agent (which is the default). An agent will save as a R4 agent when a feature that is exclusive to R4 is used within the agent.
Note: This limitation no longer applies to formula agents created or saved in R5. R5 does not save agents in the R3/R4 compatible format. Existing agents that are still in the R3/R4 compatible agent format will still not run under R5 until they are resaved using an R5 client.
Workarounds for the Mail Server Lookup caveat in Requirement #1 above
In Notes 4.5x and later:
You can add a parameter to the NOTES.INI file that disables this mail lookup check. The NOTES.INI parameter must be set on the server where the agent is to be run. The parameter is:
AMgr_DisableMailLookup=1
Historical Detail: In 4.5x releases prior to 4.5.3 and in release 4.6, if the above INI parameter is set to 0, then it still acts as if it is set to 1. So, in those Notes releases if you want to re-enable the mail lookup, the INI parameter must be removed entirely.
Note: This parameter does not prevent the following warning when saving the agent; however, the agent still runs:
“Unable to determine the execution access privileges for this agent on
Thetechnote 1447614 outlines the steps to install Multi-user 8.5.1 or later releases, on Citrix XenApp with a customized data directory for new and existing Notes Installs. These instructions do not include steps to store the data directory on a remote file share, because this configuration is not supported.
I search for information about upgrading ODS to a new version to support a Domino migration and justify the upgrade of the ODS.
The summary is bellow.
On-Disk Structure (ODS)
Every major release of Notes/Domino (e.g., versions 2, 3, 4, 5, 6/7 ,8 and 8.5 ) has included significant architectural changes to the database structure, also known as the On-Disk Structure (ODS). These architectural changes enables the Notes and Domino development team to improve performance and scalability in each release. Upgrading the databases provides a lot of benefits, with very low risk, so this has always been an important early step in any Notes and Domino upgrade plan.
The ODS version for each major release of Notes and Domino is as follows:
- v2 — ODS 16/16.3
- v3 — ODS 17/17.3
- v4 — ODS 20
- v5 — ODS 41
- v6/v7 — ODS 43
- v8 — ODS 48
- v8.5 — ODS 51
The impersonation feature lets you access another user’s system as though you are that user. This is a new feature of WebSphere Portal 7.
The impersonation feature lets you view new pages, portlets, and other portal components. Users such as support specialists can use the impersonation feature to find issues and errors.
But pay attention on this two things:
Client side aggregation does not support user impersonation. For this reason, ensure you do not activate client side aggregation on any portal pages where the impersonation portlet is deployed.
User impersonation and people awareness: When a user who is enabled for impersonation impersonates other users, the people awareness feature is disabled for the entire session for which that user is authenticated.
From TN 1507380
Domino server 8.5.2.3 (Fix Pack 3) changed one of the API calls that the Lotus Traveler server uses. Running Domino 8.5.2.3 and Lotus Traveler 8.5.2.3 (or lower Fix Pack level) can cause a server crash scenario.
Traveler 8.5.2.4 (includes APAR LO62635) is available from Traveler Recommended Maintenancepage.
The InstallShield Tuner for Lotus Notes configuration file (LotusNotes853.itw) was inadvertently excluded from the 8.5.3 Notes Standard client, All Client (Notes, Admin, Designer) webkits and ISO images. The absence of this file will affect Administrators using the InstallShield Tuner for Lotus Notes to generate a transform file for customized installations on Windows.
The missing file can be downloaded directly from Fix Central (Fix ID = Notes_853_ITWFile).
New offering designed to help ISVs (Independent Software Vendors) and business partners deliver social business applications for web and mobile devices.
Leverages IBM’s XPages technology to provide rich social business applications with a Web 2.0 applications for partners/ISVs that need to provide :
- a tailored solution that rapidly delivers on customers’ business objectives
- applications available on web and mobile devices for productivity anywhere
- good looking applications with a rich user experience
- solutions based on a proven technology
- solutions with built-in enterprise grade security
- solutions at a low cost
- integration of multiple enterprise information sources into a single view for better decision making
- applications that connect to social communities for broader knowledge sharing
Compressing and decompressing files on linux
gzip {filename} | Gzip compress the size of the given files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz. | gzip mydata.doc gzip *.jpg |
bzip2 {filename} | bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by bzip command (LZ77/LZ78-based compressors). Whenever possible, each file is replaced by one with the extension .bz2. | bzip2 mydata.doc bzip2 *.jpg |
zip {.zip-filename} {filename-to-compress} | zip is a compression and file packaging utility for Unix/Linux. Each file is stored in single .zip {.zip-filename} file with the extension .zip. | zip mydata.zip mydata.doc zip data.zip *.doc |
tar -zcvf {.tgz-file} {files} tar -jcvf {.tbz2-file} {files} | The GNU tar is archiving utility but it can be use to compressing large file(s). GNU tar supports both archive compressing through gzip and bzip2. If you have more than 2 files then it is recommended to use tar instead of gzip or bzip2. -z: use gzip compress -j: use bzip2 compress | tar -zcvf data.tgz *.doc tar -zcvf pics.tar.gz *.jpg *.png tar -jcvf data.tbz2 *.doc |
Decompressing | ||
gzip -d {.gz file} gunzip {.gz file} | Decompressed a file that is created using gzip command. File is restored to their original form using this command. | gzip -d mydata.doc.gz gunzip mydata.doc.gz |
bzip2 -d {.bz2-file} bunzip2 {.bz2-file} | Decompressed a file that is created using bzip2 command. File is restored to their original form using this command. | bzip2 -d mydata.doc.bz2 gunzip mydata.doc.bz2 |
unzip {.zip file} | Extract compressed files in a ZIP archive. | unzip file.zip unzip data.zip resume.doc |
tar -zxvf {.tgz-file} tar -jxvf {.tbz2-file} | Untar or decompressed a file(s) that is created using tar compressing through gzip and bzip2 filter | tar -zxvf data.tgz tar -zxvf pics.tar.gz *.jpg tar -jxvf data.tbz2 |
The table above is from this link