Solved

how to rename Sybase ASE on Windows ?

Posted on 2009-04-15
3
1,009 Views
Last Modified: 2012-05-06
I need to rename an existing instance, it is running on a Windows Server 2003 box. We are using this version: "Adaptive Server Enterprise/12.5.0.3/EBF 11449 ESD#4/P/NT (IX86)/OS 4.0/rel12503/1939/32-bit/OPT/Sat Sep 20 22:28:57 2003"

I know the usual Sybase steps involved in this task (change Run file, change sql.ini, do drop/add server) but I am unfamiliar with the widows specific parts of the task. For example are registry changes needed & how to change/create a new windows service ?

Andy
0
Comment
Question by:IDCSSupport
3 Comments
 
LVL 14

Assisted Solution

by:Jan_Franek
Jan_Franek earned 50 total points
ID: 24148326
I haven't seen Windows ASE for a while but as far as I remeber, the name of Windows service and name of run file is not important. So I would just change server name in run file, sql.ini and drop and add 'local' remote server in ASE.
0
 
LVL 24

Accepted Solution

by:
Joe Woodhouse earned 200 total points
ID: 24166243
Sybase ASE on Windows runs mostly out of the registry. If you're starting/stopping ASE as a service, the RUN_SERVER file is ignored. However I think the Windows version actually lets you rename a server...? I don't have one installed right now on my laptop so I can't check.

You're correct about what you'd normally have to do under UNIX, but the Windows registry complicates things.

That said, if you do all those things, you can still start ASE through the RUN_SERVER file. You won't be able to stop it as a service, and you have to keep open the command prompt window you launched the RUN_SERVER in else ASE dies! :)

Also that is an old and unreliable version to be running. If you have to be on ASE 12.5.x then 12.5.4 with the latest patch/EBF is the place to be. Of course, all 12.5.x support ends this year on December 31.
0
 

Author Closing Comment

by:IDCSSupport
ID: 31570427
Thanks
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Get to know the ins and outs of building a web-based ERP system for your enterprise. Development timeline, technology, and costs outlined.
A Short Story about the Best File Recovery Software – Acronis True Image 2017
This video discusses moving either the default database or any database to a new volume.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now