Solved

File Lock Threshold Exceeded

Posted on 1998-04-24
2
660 Views
Last Modified: 2008-02-01
Greetings,

Pls advise on how to set the NetWare 4.11 server parameters in the server install console to eliminate the below error msg. The server SBT application prompted "waiting for log" whenever this msg appears.

TIA

 4-23-98  11:49:04 am:    SERVER-4.11-677
   Severity = 0  Locus = 11  Class = 19
   Station 25 file lock threshold exceeded.  Total violations 10.

 4-23-98   1:47:20 pm:    SERVER-4.11-677
   Severity = 0  Locus = 11  Class = 19
   Station 25 file lock threshold exceeded.  Total violations 14.

 4-23-98   1:48:56 pm:    SERVER-4.11-677
   Severity = 0  Locus = 11  Class = 19
   Station 25 file lock threshold exceeded.  Total violations 16.

 4-23-98   4:44:28 pm:    SERVER-4.11-677
   Severity = 0  Locus = 11  Class = 19
   Station 25 file lock threshold exceeded.  Total violations 25.
0
Comment
Question by:danfoo
2 Comments
 
LVL 4

Accepted Solution

by:
saar2 earned 50 total points
ID: 1592249
The easiest way to change servers parameters in 4.11 is using the Monitor NLM.

Load the monitor, and go to Server Parameters (last option).
There you will be able to see all the categories - go to locks and change connection maximum lock.

Another way to change parameters is using the Set consoele command:

Set <Paramet> = Value


HTH
Saar Carmi.

0
 

Author Comment

by:danfoo
ID: 1592250
Tks for the info.

I did a remote dialin to my administrator PC and run remote console from nwadmin. It prompted:

Cannot find the file 'RCONSOLE.EXE". Make sure that the file exists on your system and that the path and filename are correct.

As checked with the windows explorer, there is already a Y search drive to the public directory which contains rconsole.exe.

Pls advise on the above resolution.

TIA

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 recommendations for managing major incidents (https:…
An analysis of the phishing scam that has been affecting Google users, along with steps to take for protection, as well as what to do if you receive one of the emails.
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now