Solved

MAS200 Pervasive setup

Posted on 2009-05-03
1
533 Views
Last Modified: 2013-12-25
My server went down when the C: drive ran out of disk space.  Although I was able to save the data on the D partition the C partition was history.  Because I replaced the hardware I am not able to use a system state restore.  It would appear that we stopped doing them anyway since the tape was not big enough to hold all our data and the system state.  So I slipstreamed a server 2000 disk with SP4 and recreated the C partition.  I need to get MAS200 running again but I don't know how to get Pervasive installed and configured.  The only thing I know for sure is that it was using port 10000.  The data is intact since it was on the D partition.  We also use the latest Peachtree which also uses the pervasive server.  I thought I could install the server portion first and the make the changes for MAS200.  That would get pervasive onto the server.
0
Comment
Question by:MikeKAtLCS
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
MikeKAtLCS earned 0 total points
ID: 24292350
There are threads that talk about moving MAS90 to another server.  The suggestions work.  The only problem I ran into was BackupExec and MAS200 both use port 10000.  It took a while to figure out that the conflict was causing communication errors.  Finally after a reboot and looking at the event logs I found an entry from BackuExec referring to one of its services not running due to a port 10000 conflict.  You can move the port to 9000 in the services file under windows\system32\drivers\etc on the server.  The port is used by the remote windows agent.  Instructions are on Symantecs web site.  I am using Backup Exec 10d.
0

Featured Post

Webinar: MariaDB® Server 10.2: The Complete Guide

Join Percona’s Chief Evangelist, Colin Charles as he presents MariaDB Server 10.2: The Complete Guide on Tuesday, June 27, 2017 at 7:00 am PDT / 10:00 am EDT (UTC-7).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to protecting Oracle Database servers and systems, there are a ton of myths out there. Here are the most common.
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question