Solved

db2 create/load via IXF generates error SQL0104N & SQLSTATE=42601

Posted on 2004-08-04
9
1,957 Views
Last Modified: 2009-07-23
The following example:

db2 -v load from tab14.ixf of ixf modified by noheader create into STATHIST_TABLES


Generates the following message:

load from tab14.ixf of ixf modified by noheader create into STATHIST_TABLES
SQL0104N  An unexpected token "END-OF-STATEMENT" was found following
"<identifier>".  Expected tokens may include:  "REMOTE".  SQLSTATE=42601

can anyone tell me why?
I do know the files were generated on a UNIX box and I am now loading into w2k machine.
need answer ASAP thus the 500 points
0
Comment
Question by:strongs120
9 Comments
 
LVL 13

Accepted Solution

by:
ghp7000 earned 250 total points
Comment Utility
create into wont work, you can use insert or replace
0
 
LVL 4

Assisted Solution

by:bondtrader
bondtrader earned 250 total points
Comment Utility
hmmm, why won't create into work, ghp7000?  I think I do this all of the time!

strongs120:  put your load statement into a file, put a semi-colon at the end of the statement and invoke it from a db2 command window like this:  db2 -tvf yourfilename...you'll need to be connected to the database before you run it though...

Hope this helps

0
 
LVL 13

Expert Comment

by:ghp7000
Comment Utility
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 4

Expert Comment

by:bondtrader
Comment Utility
ahhh, I didn't see any reference to using 7.2 >> v8...I must not be awake today  ;-)
0
 
LVL 1

Author Comment

by:strongs120
Comment Utility
There wasn't any reference to any version... sorry about that.
It is version 8.1.6 UDB / windows.
I will try bondtrader's suggestion and follow-up.
0
 

Expert Comment

by:ratna1251
Comment Utility
what file i want to send them
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now