Solved

Replica sans attachments

Posted on 2004-09-29
8
230 Views
Last Modified: 2013-12-18
I want to replicate some databases that are huge in size, primarily because of attachments. THere are replicas of the databases on user workstations. There is no utility of attachments on the workstation however they might want to work with the local database for read only purpose. Changes are not to be updated back to server. The no of workstations would be a couple and the required update frequency a couple of hours.

What is my solution?

Thanks for sharing your expertise.
0
Comment
Question by:RanjeetRain
  • 4
  • 4
8 Comments
 
LVL 9

Accepted Solution

by:
HappyFunBall earned 250 total points
ID: 12185236
When you setup the replica, would the option to replicate only the first 40KB of rich text help you?  I imagine you want something more customizable, but that is a very simple way to remove attachments in a replica.
0
 
LVL 19

Author Comment

by:RanjeetRain
ID: 12185283
Nope. Those workarounds aren't as neat as I want. 40K method ain't good anyway. These documents might be under 4K wihtout attachments. Why spend 40K?

Programmatic solution, is the first thing that comes to mind but also the last thing I am looking at.
0
 
LVL 9

Expert Comment

by:HappyFunBall
ID: 12186200
Actually, I just noticed in R6 there's an option to choose what size limit you want for attachments.  Try to create a new replica and click the More Options button before hitting OK.  Change the receive documents from server option to Partial Documents, then change the "Limit attachment size to" field to 0kbs.

It worked for me - documents were replicated but not the attachments.
0
 
LVL 19

Author Comment

by:RanjeetRain
ID: 12188058
Seems, it was necessary to give the version. R 5.0.3 - 5.0.8

HFB, that would just be what I am looking for. Could you please see if there is something of the same kind in R5?
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 9

Expert Comment

by:HappyFunBall
ID: 12193691
I've been looking around but can't find anything better than the < 40KB idea to use in R5.  I've been thinking about how to do this programmatically and that seems like a nightmare.

I'm reaching, I know, but if you have even one R6 server in the environment and people replicate with only that server then the attachment size limit idea could work.

I'll keep thinking...
0
 
LVL 19

Author Comment

by:RanjeetRain
ID: 12218686
Lets hope you come out with some smart workaround.
0
 
LVL 9

Expert Comment

by:HappyFunBall
ID: 12308439
I've been thinking about this now and then and nothing has come to mind.  I guess for a programmatic solution, you can create a database copy which users will replicate from.  This copy will be maintained by agents that update it from the original database.  Basically, you can just write an agent to do a loop through all docs of the original db.  During the loop, do a subloop that scans all the items in the original doc.  Copy all items to the database copy that are not of type RICHTEXT.  

Actually as I think about it, that isn't too bad of a workaround.  It shouldn't take too long to write that.  Let me know if you need help writing the agent.
0
 
LVL 19

Author Comment

by:RanjeetRain
ID: 12643498
Okay, time to close this one. Thanks for all the help HFB. I wish there was an easy way to do this without writing code. Thanks anyways.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now