Solved

Invalid or nonexistent document

Posted on 2008-06-26
3
1,263 Views
Last Modified: 2013-12-18
I recently upgraded two of my servers from 6.5.1 to 7.0 and all of the clients are still at 6.5.1.  After the upgrade, a number of users started getting "Invalid or nonexistent document" when accessing certain documents.  Now I now that most often the cause of this is that the user had deleted the document and they have a corrupt view.  However, this is not the case.  The users did not delete the documents, it is correspondence that they refer back to on a regular basis.  When maintenence is run against the mail database, the documents are deleted.  Unfortunately, I can't get them back because they all seem to be from a time period that I was not getting good backups.  How can I stop this from happening and is it a result of the upgrade or just coincidence?
0
Comment
Question by:RiverStoneLLC
3 Comments
 
LVL 17

Accepted Solution

by:
fgrushevsky earned 250 total points
ID: 21875436
the upgrade causes design updates on the system databases and "refresh" on the other databases - i.e. indexes are rebuild and so on. basically, if the environment is not 100% properly maintained and pristine, it might have dormant problems (minor corruptions, view indexes corruptions here and there etci) , then upgrade bring them up
0
 
LVL 63

Assisted Solution

by:SysExpert
SysExpert earned 250 total points
ID: 21892976
Part of the upgrade process usually calls for doing a complete set of refreshing the views/ indexes.
This should be done Before and after the upgrade to make sure the DBs are all in a consistent state.

I hate to say this, but I would not upgrade, unless I knew my backups were solid...

I hope this helps !
0
 

Author Closing Comment

by:RiverStoneLLC
ID: 31470965
They confirmed what I already knew and there was no real solution presented.  
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

  In today’s Arena we can’t imagine our lives without Internet as we are highly used to of it. If we consider our life style just for only 2 min we found that face to face communication is swapped by e-communication.  Every Where from Works place to…
This article covers general Notes 8.5 troubleshooting information including recreating the Notes\Data folder.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now