Solved

How to install new sybase instance in Linux

Posted on 2014-04-18
4
674 Views
Last Modified: 2014-05-13
I have installed the machine with Sybase 15.7 and now we need to install another instance in the same server, how do I do this ? I heard about svrbuilders, have tried that with no luck to create new instance
0
Comment
Question by:motioneye
  • 2
  • 2
4 Comments
 
LVL 24

Expert Comment

by:Joe Woodhouse
ID: 40008987
srvbuildres installs ASE from a resource file which is human readable and editable. It's written up in the "ASE Utility Guide" for you version - all manuals available for free and without registration from www.sybase.com/support/manuals.

There is a sample resource file for ASE in $SYBASE/$SYBASE_ASE/init/sample_resource_files.

Broadly speaking you need to supply the same details you did in building your first ASE (names, paths for devices for master and sysprocs, database sizes, network address, etc), and it will create all the things you need to have an ASE you can boot (devices, interfaces file entry, RUN_SERVER file, config file, etc).
0
 

Author Comment

by:motioneye
ID: 40009096
Hi,
I'm thinking to run sybase setup from the setup file, more easier for less experience ppl like me who need to work in sybase.
0
 
LVL 24

Accepted Solution

by:
Joe Woodhouse earned 500 total points
ID: 40009126
Yep that will work too, you have the option to create a new ASE without reinstalling the software.

Resource files are great for a repeatable or unattended process.
0
 

Author Closing Comment

by:motioneye
ID: 40063780
Thanks Joe for the advise.
0

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

Suggested Solutions

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now