Search Results

Search found 12019 results on 481 pages for 'stop execution'.

Page 176/481 | < Previous Page | 172 173 174 175 176 177 178 179 180 181 182 183  | Next Page >

  • Generating/managing config files for hosted application

    - by mfinni
    I asked a question about config management, and haven't seen a reply. It's possible my question was too vague, so let's get down to brass tacks. Here's the process we follow when onboarding a new customer instance into our hosted application : how would you manage this? I'm leaning towards a Perl script to populate templates to generate shell scripts, config files, XML config files, etc. Looking briefly at CFengine and Chef, it seems like they're not going to reduce the amount of work, because I'd still have to manually specify all of the changes/edits within the tool. Doesn't seem to be much of a gain over touching the config files directly. We add a stanza to the main config file for the core (3rd-party) application. This stanza has values that defines the instance (customer) name the TCP listener port for this instance (not one currently used) the DB2 database name (serial numeric identifier, already exists, they get prestaged for us by the DBAs) three sub-config files, by name - they need to be created from 3 templates and be named after the instance The sub-config files define: The filepath for the DB2 volumes The filepath for the storage of objects The filepath for just one of the DB2 volumes (yes, redundant to the first item. We run some application commands, start the instance We do some LDAP thingies (make an OU for the instance, etc.) We add a stanza to the config file for our security listener that acts as a passthrough to LDAP instance name LDAP OU TCP port for instance DB2 database name We restart the security listener (off-hours), change the main config file from item 1, stop and restart the instance. It is now authenticating via LDAP. We add the stop and start commands for this instance to the HA failover scripts. We import an XML config file into the instance that defines things for the actual application for the customer - user names, groups, permissions, and business rules. The XML is supplied by the implementation team. Now, we configure the dataloading application We add a stanza to the existing top-level config file that points to a new customer-level config file. The new customer-level config file includes: the instance (customer) name the DB2 database name arbitrary number of sub-config files, by name Each of the sub-config files defines: filepaths to the directories for ingestion, feedback, backup, and failure those filepaths have a common path to a customer-specific folder, and then one folder for each sub-config file Each of those filepaths needs to be created We need to add this customer instance to our monitoring scripts that confirm the proper processes are running and can be logged into. Of course, those monitoring config files include the instance name, the TCP port, the DB2 database name, etc. There's also a reporting application that needs to be configured for the new instance. You get the idea. There's also XML that is loaded into WAS by the middleware team. We give them the values for them to plug into the XML - they could very easily hand us the template and we could give them back completed XML.

    Read the article

  • BSOD when using Visual Studio 2008

    - by I'm raaaaageeed
    Man, I am so fucking mad right now that my hand is broken from punching my piece of shit laptop. Fucking I'm in Visual Studio trying to get work done, and the piece of shit keeps telling me "LOL VSHost.exe crashed!" So I'm like fuck you you little piece of shit and keep ignoring it Then now everytime I start VS2008 and start working on a project I get the following blue screen: STOP: 0x0000007E (0xC000001D, 0x80573002*, 0xF78E6840, 0xF78E653C) = *can barely read my own handwriting on that one sorry lool Btw VSHost.exe was crashing in the mscorwks.dll FUCKING HELP ME I HAVE SO MUCH WORK TO DO

    Read the article

  • Why is my Mac contacting Romania?

    - by Jack
    I just used Onyx to clean out my caches and log files after which I did a reboot. Browsing the "All Messages" panel of the Console app I noticed this line: 10/27/13 3:38:03.000 PM kernel: 5.106.198.19 Since I did not recognize that IP I did a whois and to my surprise found out that it points to Eurolan Solutions in Romania. So my question is why is my Mac 10.7.5 contacting Romania and how can I stop this from happening? Many thanks

    Read the article

  • Remember Snow Leopard Firewall settings

    - by revelator
    I've got the firewall enabled on my Snow Leopard installation, and it works just fine, except for with EyeTV. Every time I run this app, a popup appears asking if I want to allow it access to the network, even though I've got it added in the application list for allowed apps. Any ideas how I can stop this from asking and just let it be given access?

    Read the article

  • User Account Control warning showed everytime I run an installed program

    - by Bronzato
    I just installed Windows 8 on my computer. Next I installed a program for prototyping (Pencil). Everytime I run this program I have the following Warning: User Account Control Do you want to allow the following program from an unknown publisher to make changes to this computer? I prefer not disable the User Account Control. Is there a way to stop User Account to warn me for this program? Thanks.

    Read the article

  • How to find out which app locks a given USB storage device?

    - by Dimitri C.
    I'd like to unplug my USB mass storage device, but I get the following error message from Windows: Windows can't stop your 'XYZ' device because it is in use. Close any programs or windows that might be using the device, and then try again later. How can I find out which application locks the device, so I can safely unplug it without having to close all running applications first? Note: I'm working on a Windows Vista system.

    Read the article

  • Remote Desktop and Num Lock

    - by PressAnyKey
    Whenever I log into my Windows 7 desktop from my Windows 7 laptop using RDC, the Num Lock is enabled on the host computer and it is not disabled after disconnecting. What can I do to stop the Num Lock from being enabled or automatically disable it at the end of the session? (I do not know if this happens only on Windows 7 and have no way of checking, so I went with the generic windows tag)

    Read the article

  • What are the optimum settings for uTorrent [windows]

    - by Shenal Silva
    I am recently getting slow speeds for downloading torrents on uTorrent. However when the speed is (1-3kBps) I stop the torrent and Start it again then the speed level climbs to the usual high level (100-200kBps) and gradually drops to (1-3kBps) speeds again . What should be the optimum settings for Number of connections per torrent maximum number of connected peers Maximum number of upload slots per torrent and what ever settings that i need to change to improve the speed

    Read the article

  • What could cause a program to stay in "Add/Remove Programs" even after removing from registry

    - by Ryan
    Trying to manually remove an entry from Control Panel Add/Remove Programs. (custom software, not MS KB patch or windows component and not doing anyting 'funky' like trying to stop itself form being uninstalled) Followed http://support.microsoft.com/kb/314481 removing all applicable registry keys for program from HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ and even tried rebooting but still it persists. Double checked followed KB314481 and search for program name doesn't return any other matches in that part of the registry. Any ideas what would cause this or how to solve?

    Read the article

  • What happens if I pierce a TFT monitor?

    - by sharptooth
    What happens if I pierce a TFT monitor screen with something sharp (say a nail)? Will only the pierced region malfunction or the whole monitor screen? There's an opinion that in this case the entire screen will "flow out" (more specifically - "liquid crystals will flow out") and stop working completely. Is that truth or an urban legend?

    Read the article

  • What happens when the server that the Remote Desktop Connection Broker goes down?

    - by Frank Owen
    I would like to setup the Remote Desktop Connection Broker to allow better load balancing of the two terminal servers we have as well as allowing the user to re-establish to the correct server if they get disconnected. My worry is, if I set this up and the server this service is running goes down, does the terminal server stop accepting connections or will they just lose the benefit of having RDCB turned on? I don't want to add another point of failure in this equation unless I have to.

    Read the article

  • After adding a SSD to my MacBook, the HD never spins down.

    - by Chris Woods
    I added a SSD to my MacBook Pro 17 as the primary drive attached to the SATA controller. I moved the HD to the optical bay using the OptiBay from MCE Technologies which I use for my home directory. The problem I have encountered is the HD seems to never stop spinning. I have modified the sleep settings, hoping one of the various options would solve my problem without success. Any suggestions for me?

    Read the article

  • Question about VMWare thin provisioning

    - by Datapimp23
    I'm playing around with virtual disks and thin provisioning and have a question about it. I've created several disks and allocated space to with thin provisioning. Is it possible to allocate more disk space than the maximum amount of the datastore space. So that for example, my VM's will stop functioning when the disks slowly start filling up?

    Read the article

  • Excel 2007: "Format as Table" Increments Column Names

    - by Mark
    I love using the formatting styles for tables in Excel 2007, but in my data I'm using the same column name for multiple columns. When I format my table using the pre-defined styles, it automatically adds an incremental number to each subsequent column name which I don't want. Is there any way to stop this from happening? If I attempt to manually rename the column back to the original name, it automatically appends the incremented number.

    Read the article

  • Deny login from certain hosts if logging in with specific sql credentials

    - by Dave
    I want to stop some of our developers from connecting to the production sql server using a specific sql account. They have rights to connect through windows authentication with lower rights. They claim that changing the password will affect too many other processes running on our processing machine. So I want to deny access if they're connecting from there dev machines for now. Another way this would work is if I could just allow connections from one specific host.

    Read the article

  • BSOD in fastfat.sys, any help?

    - by rajivpradeep
    A problem has been deteceted and windows has been shut down to prevent damage to ypur computer. The problem seems to be caused by the following file : Fastfat.SYS PAGE_FAULT_IN_NONPAGED_AREA technical information : STOP 0x10000050(0xffffffc8, 0x00000000, 0xb6aa68ef , 0x00000000) FAstfat.SYS - address 0xb6aa68ef base at 0xb6a9e000 datestamp 0x41107b7

    Read the article

< Previous Page | 172 173 174 175 176 177 178 179 180 181 182 183  | Next Page >