Solved

corrupt .mdb BE when using Citrix

Posted on 2004-04-21
10
241 Views
Last Modified: 2008-01-16
I have a database with an XP FE and a 97 BE. The backend is on a shared server and the front end is either installed on the user's C:\... folder (typically Windows XP computer) or if they are off-campus and need to improve the response time, they use a Citrix server (Windows 2000 computer) and download a copy of the FE to their personal U:\ drive they can access when in Citrix.

Once we began using the Citrix terminal server with this database, we noticed the back end was corrupting every couple weeks which then turned into every couple of days. We took the away the access to use the Citrix server and it hasn't corrupted since.

Has anyone seen and resolved this type of issue? Let me know if there are any questions I can answer.

Thanks in advance for your help!
emijohns
0
Comment
Question by:emijohns
  • 5
  • 4
10 Comments
 
LVL 54

Expert Comment

by:nico5038
ID: 10879041
0
 

Author Comment

by:emijohns
ID: 10879980
Thank you for the response nico. I am looking into that solution.

To my knowledge, no one has ever mentioned that they were kicked out of the database or Citrix while using the database.  Although that doesn't mean it didn't happen. ;)  The only calls I've received were from user's not able to open the database because the back end was corrupt.

I should also mention that the database is opened using Access XP runtime.

Thanks!
0
 
LVL 54

Expert Comment

by:nico5038
ID: 10880787
I guess you've activated a regular compact on the back end, or doesn't the size approach the max 2Gb?

Nic;o)
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:emijohns
ID: 10881122
Yes, we compact every night. The size of the BE is about 14 MB. Not too big.
0
 
LVL 54

Expert Comment

by:nico5038
ID: 10881245
Hmm, hard to detect when you can't trace the actual session that's corrupting the .mdb.
Perhaps worthwhile to add a database decompile after the compact to make sure it's in "fresh" condition.

Nic;o)
0
 

Author Comment

by:emijohns
ID: 10892913
The solution we took was to move the db to another Citrix server running Windows 2003. We think the problem may have had something to do with OpsLock problems which would take some patches and other investigation. Since 2003 doesn't have the OpsLock problems (to our knowledge) the move was the easier/faster solution.

How do I handle points in this situation?

Thanks!
emijohns
0
 
LVL 54

Expert Comment

by:nico5038
ID: 10893285
Just post a request for a PAQ/refund at CS: http://www.experts-exchange.com/Community_Support/

It's worth to save the info for future reference by other Citrix users !

Nic;o)
0
 

Accepted Solution

by:
modulo earned 0 total points
ID: 10899198
Closed, 500 points refunded.

Thanks nico5038

modulo
Community Support Moderator
Experts Exchange
0
 

Author Comment

by:emijohns
ID: 10899233
Thank you nico! I really appreciate your help and discussion!

emijohns
0
 
LVL 54

Expert Comment

by:nico5038
ID: 10899407
Discussions are my favorite "topic" :-)

Success with the application !

Nic;o)
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Describes a method of obtaining an object variable to an already running instance of Microsoft Access so that it can be controlled via automation.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now