Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

the g:/users index file is missing or corrupt!

Posted on 2011-03-23
7
1,276 Views
Last Modified: 2013-11-15
the g:/users index file is missing or corrupt!
Goldmine will not function properly until this table is rebuilt!

When I click rebuild the file and provide my sql login information it takes me to the repair wizard but that shuts off after 5 seconds.

How can I fix this?

Thanks.
0
Comment
Question by:benj707
  • 4
  • 3
7 Comments
 
LVL 12

Accepted Solution

by:
GMGenius earned 500 total points
ID: 35197593
when you attemp to login to GoldMine, Hold down the CTRL key and perform maintenance, select individual files and select the USERS table
0
 
LVL 1

Author Comment

by:benj707
ID: 35197680
It takes me too the maintenance wizard if I do/don't hold down CRTL but that shuts off after 2 seconds.

"the g:/users index file is missing or corrupt!
Goldmine will not function properly until this table is rebuilt!

Would you like to rebuild this file now? (yes or no) "

after clicking yes ive got to provide my sql login it then runs the repair wizard but that just shuts off after a second.

Are there files that can be replaced, would replacing files overwrite any data? (ive got a backup) Where would the USERS files be located?

This problem started after someone ran the Maintain Databases.

Thank you.
0
 
LVL 12

Assisted Solution

by:GMGenius
GMGenius earned 500 total points
ID: 35197721
6.7 has the Users table in the root of the goldmine folder

USERS.DBF
USERS.DBT
USERS.MDX

Thes can be replaced from a backup. the SQL login should only be needed for the contact set and after you have logged in.

Try replacing these files from a backup
0
How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

 
LVL 12

Expert Comment

by:GMGenius
ID: 35197730
I should also add.

Make sure the G:\ drive is accessible.
0
 
LVL 1

Author Comment

by:benj707
ID: 35197745
There are a whole bunch of  user files;

e.g. user_def.tbi        users.dbf      users.dbt    users.mdx

or does 'g:/users index file' mean something else? is it safe to just replace these with my backup?
0
 
LVL 12

Assisted Solution

by:GMGenius
GMGenius earned 500 total points
ID: 35197767
USERS.MDX is the index, the maintenance should re-create this

When replaceing dBase files you should always replace all that relate.

eg

USERS.*

USERS.DBF
USERS.DBT
USERS.MDX

These are where the login information and passwords are recorded
0
 
LVL 1

Author Closing Comment

by:benj707
ID: 35197855
Thanks! ( replacing the files worked, didn't see your initial replies)
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Note: You must have administrative privileges in order to configure lead or case queues. Salesforce.com (http://www.Salesforce.com) is a cloud-based customer relationship management (CRM) system. It is widely used around the world by sales and ma…
For cloud, the “train has left the station” and in the Microsoft ERP & CRM world, that means the next generation of enterprise software from Microsoft is here: Dynamics 365 is Microsoft’s new integrated business solution that unifies CRM and ERP fun…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question