Posted on November 23, 2013 at 6:39 am by Chris Kawalek | Comments Off
Happy Friday, everyone. We hope you've had a great week!
The results from the Windows IT Pro 2013 Community Choice Awards are in and we’re proud to say that Oracle VM VirtualBox was named one of the best virtualization products!
This community-voted award is great validation of our work to enhance the product. Learn more about the latest release, Oracle VM VirtualBox 4.3.
We want to thank the Oracle VM VirtualBox community for their continued support as we work to make it easier and better than ever for users to run virtual machines on their desktop and laptop computers.
Posted on November 23, 2013 at 5:49 am by Brandye Barrington | Comments Off
This is a reminder that the Oracle Exadata 11g Essentials Exam (1Z0-535) retires December 21, 2013. This exam and the resulting certification have been replaced with a newer version. Obtain the new Exadata Database Machine Models X3-2 and X3-8 Certified Implementation Specialist certification by taking "Exadata Database Machine Models X3-2 and X3-8 Implementation Essentials" (exam 1Z0-485), which is currently available in production.
If you plan to take the 1Z0-536 exam, register now to take this exam, or review the exam topics for exam 1Z0-485 and plan to adjust your preparation to take the new exam. Existing certification holders, note that this retirement suspends the delivery of any further exams, but does not affect your certification. If you currently hold the Oracle Exadata 11g Certified Implementation Specialist certification, your credential remains fully valid.
|Retiring Exam||Newer Version of Retiring Exam|
|Oracle Exadata 11g Essentials (1Z0-536)||Exadata Database Machine Models X3-2 and X3-8 Implementation Essential (1Z0-485)|
|Retiring Certification Path||Newer Version of Retiring Certification Path|
|Oracle Exadata 11g Certified Implementation Specialist||Exadata Database Machine Models X3-2 and X3-8 Certified Implementation Specialist|
Posted on November 23, 2013 at 5:17 am by Fahd Mirza | Comments Off
What do swaying palms, turquoise water, white sandy beaches and absolutely pristine fauna remind you of? Correct! It’s Log Buffer. This Log Buffer brings you beads of blog posts related to data dexterity crafted by leading bloggers across the planet.
When are Exadata’s storage indexes used?
Oracle 12c has increased the maximum length of character-based columns to 32K bytes.
Oracle has extended the maximum length of varchar2, nvarchar and raw columns to 32K, but this comes with some challenges when it comes to indexing such columns.
Martin has applying PSU 126.96.36.199.1 in the lab environment.
It is easier to create one or two AWR reports quickly using OEM. But what if you have to create AWR reports for several snapshots?
A demonstration of Power BI for Office 365, shows you how all the various tools and technologies work together.
Executing powershell script in a SQL Agent job – Host errors
Optimizing SQL Server Performance: Changing Your Settings
What Exactly Is This Sysadmin You Speak Of?
Automated Permissions Auditing With Powershell and T-SQL.
Here is a commentary on MySQL‘s slow query collection sources.
Integrating pt-online-schema-change with a Scripted Deployment
How to add VIPs to Percona XtraDB Cluster or MHA with Pacemaker.
The binary and source versions of MySQL Cluster 7.3.3 have now been made available.
Since MariaDB aims to be a compatible/drop-in replacement to MySQL, it’s crucial that in 10.0 it supports all the 5.6 options/system variables.
Posted on November 23, 2013 at 5:15 am by Utsab Chattopadhyay | Comments Off
Section A (Theory)
One of the typical reasons for performance issues is runaway queries executed by end users on a busy production database. This problem is fairly common in OLAP or shared systems (OLTP/OLAP) where business users begin executing complex (and often poorly written) queries, leaving their office for hours, and expecting their data to be ready when they return. Although these problems are apparently very easy to resolve by killing the offending query, in reality it is not that straightforward. We cannot just kill those queries without some explicit business approval, as we do not understand the business impact of killing the offending queries halfway through.
The traditional way to handle this problem is to educate users about when they can execute big queries, and also to review and approve each query before they could be executed on production. However, this approach is very expensive and prone to failure from human error and/or business needs. I found a huge benefit from using Resource Governor to handle such situations. Please refer to http://technet.microsoft.com/en-us/library/bb934084(v=sql.105).aspx to learn more about Resource Governor.
At this point, let us focus on how we can use Resource Governor to handle this situation efficiently. All of these runaway queries are typically generated from SQL Server Management Studio, and ideally no one should connect to Production OLTP Systems directly using Management Studio. Therefore, we can establish a business rule stating that any queries coming from SQL Server Management Studio will be deprioritized if SQL Server is busy serving anything else (i.e. OLTP Applications, etc.) Once this rule is established and approved, we can use Resource Governor to design and implement a solution. These steps are described in Section B (Demo) of this post.
Ensure that you have a thorough plan while implementing Resource Governor on Production using the steps from Section B (Demo). First, you need to be absolutely sure that no business critical query is connecting to production using SQL Server Management Studio. You also need to identify what the optimum resource constraint is for your environment. For example, in the demo I will maximize CPU and memory at 25%, but this may not be the best number for your environment. Lastly, you should explain the possible impact after implementation to all stakeholders (i.e. their ad hoc queries will run fine if the system is not busy serving OLTP Applications. However, it will get deprioritized and performance will be degraded once the system is busy.)
Section B (Demo)
In this section, we will configure Resource Governor on a SQL Server 2008 R2 Enterprise Edition. Please use the following steps to complete the configuration:
- Make sure you are connected to correct SQL Server Instance – A very basic, but vital step while working on production.
- Define Resource Pool with the parameters identified beforehand.
- Reconfigure Resource Governor
- Create a workload group with the parameters identified beforehand. Basically, all connections coming from SQL Server Management Studio will be handled through this group.
- Reconfigure Resource Governor
- Create a Classifier Function
- Configure Resource Governor to use Classifier Function created in Step#6
- Reconfigure Resource Governor
- Now verify all the changes are successful:After this point, any queries coming through SQL Server Management Studio (ad hoc query) will be screened by Resource Governor and will be deprioritized if needed, ensuring vital application does not experience performance issues from runaway queries.You can check which SPID is using which Resource Group by using the query below to ensure that the configuration is working as expected. Please note that in this case, Resource Governor classified SPID 54 and 55 under GROUP_ADHOC_QUERY_SS which means these two SP will not be able to take more than 25% of CPU and memory of the system (as per the configuration we defined here) irrespective of how much demanding query they are running.Section C (Appendix)
Please find the codes used in Section B (Demo) for your reference:
Create RESOURCE POOL POOL_ADHOC_QUERY
(MIN_CPU_PERCENT = 1, MAX_CPU_PERCENT=25,MIN_MEMORY_PERCENT = 1, MAX_MEMORY_PERCENT = 25);
ALTER RESOURCE GOVERNOR RECONFIGURE;
CREATE WORKLOAD GROUP [GROUP_ADHOC_QUERY_SSMS] WITH(group_max_requests=0,importance=Low,request_max_cpu_time_sec=600,
request_max_memory_grant_percent=25,request_memory_grant_timeout_sec=0,max_dop=0) USING [POOL_ADHOC_QUERY]
ALTER RESOURCE GOVERNOR RECONFIGURE;
CREATE FUNCTION RG_Classifier() RETURNS SYSNAME WITH SCHEMABINDING
DECLARE @workload_group sysname;
IF (APP_NAME() LIKE ‘%Microsoft SQL Server Management Studio – Query%’)
SET @workload_group = ‘GROUP_ADHOC_QUERY_SSMS’;
ALTER RESOURCE GOVERNOR
ALTER RESOURCE GOVERNOR RECONFIGURE
ALTER RESOURCE GOVERNOR RECONFIGURE;
SELECT * FROM sys.resource_governor_resource_pools
SELECT * FROM sys.resource_governor_workload_groups
SELECT s.group_id, CAST(g.name as nvarchar(20)), s.session_id, s.login_time, CAST(s.host_name as nvarchar(20)), CAST(s.program_name AS nvarchar(20))
FROM sys.dm_exec_sessions s
INNER JOIN sys.dm_resource_governor_workload_groups g
ON g.group_id = s.group_id
ORDER BY g.name
Posted on November 23, 2013 at 4:39 am by Stefan Knecht | Comments Off
I was contacted by a colleague about a problem he was having. “I’m trying to set up something simple which I’ve done millions of times, but it’s not working. I might be missing something obvious.”
The issue was that the SSH public key authentication didn’t work. The environment was running a virtualized Oracle Enterprise Linux 6.4 operating system (similar to Red Hat Enterprise Linux RHEL or Centos 6.) We’ll call this box Badboy for the purpose of this post.
I logged onto Badboy and attempted to do it myself, following the basic steps to set up public key authentication on Linux:
[knecht@random-client ~]$ ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/home/knecht/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/knecht/.ssh/id_rsa.
Your public key has been saved in /home/knecht/.ssh/id_rsa.pub.
The key fingerprint is:
The key's randomart image is:
+–[ RSA 2048]—-+
| . |
| + o |
| . * + . . |
| . = S . ..+ |
| *o…+. o |
| E o…. + .|
| . . . .|
| . |
I then copied that public key file to Badboy and added the key to the
Let’s verify that the public key authentication has not been disabled in
[root@client ~]# grep Pubkey /etc/ssh/sshd_config
The value isn’t set explicitly, so the default setting comes into play which is
I then switched back to my random-client and attempted to log in using SSH with the public key.
[knecht@random-client ~]$ ssh knecht@badboy
Hmm, it’s asking for a password. That’s not what you would expect. Let’s disable password authentication entirely in the client:
[knecht@random-client ~]$ ssh -o "PasswordAuthentication no" knecht@badboy
Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password).
This box was really not behaving nicely. Badboy it is then.
I checked the logs to see if anything shows up by doing a
tail -f /var/log/secure while logging on from a second session, trying again with password authentication disabled.
The only entry that showed up was:
Nov 21 20:14:21 badboy sshd: Connection closed by xx.xx.xxx.xxx
That’s helpful. Move on.
Hoping to get a little bit more insight, I increased the logging verbosity of sshd, by changing
Retrying the previous exercise, we now have a wee bit more information:
Nov 21 20:21:59 badboy sshd: Failed publickey for knecht from xx.xx.xxx.xxx port 36189 ssh2
Nov 21 20:21:59 badboy sshd: Connection closed by xx.xx.xxx.xxx
Well, you’re not very talkative Mr. Badboy, are you? I went again and triple-checked all of the possible options, read the main pages, and couldn’t determine what was wrong with Badboy’s configuration. As my colleague mentioned, it’s a simple exercise. We’ve all done it countless times… So what was the problem now?
It dawned on me that I had a similar experience in the past, when things just wouldn’t work without any clear reason. The new suspect was now Mr. Badboy’s big brother, SELinux.
[root@badboy ~]# sestatus
SELinux status: enabled
SELinuxfs mount: /selinux
Current mode: enforcing
Mode from config file: enforcing
Policy version: 26
Policy from config file: targeted
Well, there you have it. A quick peek in
/var/log/audit/audit.log showed several actions being denied during an attempted connection.
How to configure SELinux to get this to work is beyond the scope of this document. In our environment, we are not using SELinux so we disabled it by setting
/etc/selinux/config and rebooted the system.
As soon as it was back up:
[knecht@random-client ~]# ssh knecht@badboy
Posted on November 23, 2013 at 4:27 am by Chris Kawalek | Comments Off
Happy Friday, folks, hope you had a great week.
Today, we've got a great video for you that describes the Oracle Linux and Oracle VM implementation at dcVAST:
We'll see you next week with a Thanksgiving week (here in the US!) edition of the Friday Spotlight.
Posted on November 23, 2013 at 2:29 am by John Abraham | Comments Off
Oracle E-Business Suite Release 11i (188.8.131.52) is now certified with the Oracle Database 11gR2 (184.108.40.206) for Oracle Solaris 11 on SPARC running on the database tier only.
The application tier of E-Business Suite Release 11i (220.127.116.11) is not certified with Oracle Solaris 11 on SPARC. Customers must run the application tier on a different OS such as Oracle Solaris 10 on SPARC.
With this certification, EBS 11i customers can run their 11gR2 Databases on the SPARC Supercluster with Solaris 11 and use various engineered system performance optimizations:
- Exadata storage cells
- Infiniband technology
- On-chip encryption
- Memory improvements
- Kernel-level acceleration of features such as Real Application Clusters (RAC)
This announcement for
E-Business Suite Release 11i (18.104.22.168)
following database options and features:
- Oracle Database 11gR2 version 22.214.171.124
- Oracle Database Real Application Clusters (RAC) 11gR2 version 126.96.36.199
- Oracle Database Data Guard 11gR2 version 188.8.131.52
- Oracle Database Vault 11gR2 version 184.108.40.206
- Transparent Data Encryption (TDE) Column Encryption using Oracle Database 11gR2 version 220.127.116.11
- TDE Tablespace Encryption using Oracle Database 11gR2 version 18.104.22.168
- Advanced Security Option (ASO)/Advanced Networking Option (ANO) with Oracle Database 11gR2 version 22.214.171.124
- Export/Import Process for Oracle E-Business Suite Release 11i Database Instances
Database and Transportable
Tablespaces Data Migration
Processes for Oracle E-Business
Suite Release 11i
Updates to certification data in
My Oracle Support (http://support.oracle.com)
are in progress - please review the documents below for
all requirements and additional details:
- MOS Document 881505.1 - Interoperability Notes - Oracle E-Business Suite Release 11i with Oracle Database 11g Release 2 (11.2.0)
- MOS Document 946413.1 - Using Oracle E-Business Suite with a Split Configuration Database Tier on Oracle 11g Release 2
Parameters for Oracle
Applications Release 11i
- MOS Document 823586.1 - Using
11g Release 2
- MOS Document 1091086.1 - Integrating Oracle E-Business Suite Release 11i with Oracle Database Vault 11gR2
- MOS Document 403294.1 - Using TDE Column Encryption with Oracle E-Business Suite Release 11i
- MOS Document 557738.1 - Export/Import Process for Oracle E-Business Suite Release 11i Database Instances Using Oracle Database 11g Release 1 or 2
to Migrate Oracle
Release 11i Using
Oracle Database 10g
Release 2 or 11g
Transportable Tablespaces to
Migrate Oracle Applications
Release 11i Using Oracle
Database 11g Release 2
Posted on November 23, 2013 at 12:54 am by Todd Hoff | Comments Off
Hey, it's HighScalability time:
Test your sense of scale. Is this image of something microscopic or macroscopic? Find out.
- 26,496: number of cores in Amazon's supercomputer; 128 billion: WDC's huge web graph publicly available; 400 million: Snapchat more photos than Facebook per day; 300,000: Microsoft's servers for Xbox; 1 million: MessageMe user growth in one week
- Quotable Quotes:
- Jony Ive: I feel that ideas are very fragile, so you have to be tender when they are in development. I realized that if he pissed on this, it would be so sad because I know it was so important.
- @BenedictEvans: 100m users is the new 1m users. $4bn is the new $400m. 30 staff is the new 300 staff.
- @postwait: Knowing the latency of every I/O on every spindle in every machine in every rack... over all of time. Done & eye-opening. Thanks @circonus.
- @mrb_bk: Things that hurt: unbounded memory growth. Things that help: concurrency control.
- @sogrady: the latest version of chaos monkey described by @adrianco at re:invent is positively sadistic. most weaponizable software ever?
- Joe Landman: More efficient, faster units, pay for themselves very quickly when compared to inspecific designs that make fine mail servers, but terrible storage controllers, or network hubs, or … The argument makes sense at scale and at small scale.
- Sync: In other words, a dumb rule (majority rule) running on a smart architecture (a small world) achieved performances that broke the world.
- Jamestown was a startup established in ~1617. Lethal conditions soon required hiring more employees. The hiring bonus used to induce people to sign on was greater independence and self rule. The first American pivot.
- Everyone hates cubicles, yet they are still the best packing algorithm for humans in rectangular spaces. And if we lose productivity to noise and other cube farm diseases, does that really matter? Research: Cubicles Are the Absolute Worst
- My how the world has changed. In 1996 The Oracle of Bacon, a web site for automatically computing the shortest possible chain of costars between Kevin Bacon and any other film actor, was selected by Time magazine as a top 10 web site. At its height the site was bludgeoned with as many as 20,000 hits a day.
- You can't compete with a entrenched technology like the cloud by doing more or better cloud. You need to take a leap. Here's an example of what a leap looks like. +PeerServer: a peer-to-peer client server using WebRTC, where your browser acts as a server for other browsers across WebRTC peer-to-peer data channels.
Don't miss all that the Internet has to say on Scalability, click below and become eventually consistent with all scalability knowledge...
Posted on November 22, 2013 at 10:19 pm by Samer Forzley | Comments Off
Black Friday is fast approaching and all eyes have turned toward retail and the holiday shopping season. After initial reports that 2013 would be the worst shopping season since 2009, new forecasts have upped the total sales estimate. The 2013 holiday shopping season is now expected to drive $602.1 billion in total sales for the months of November and December, a 3.9 percent bump over 2012.
But more important than the sales is how they’re being made. For the first time ever, online shopping could be the top choice for consumers during the holiday season, with 47 percent of shoppers in a recent survey listing the Internet as their favorite shopping destination, and analysts predicting $2.27 billion in sales on Cyber Monday alone.
As online shopping grows, so too does omni-channel shopping, in which consumers take advantage of all retail channels – online, in-store, and mobile – to browse online before purchasing a product in store, or walk the aisles before purchasing online. In fact, the growth of omni-channel shopping is significant enough to coin the next two months the omni-channel holiday season, underscoring the need for retailers to establish smooth and integrated channels for consumers to easily transition from one medium to the next.
ResearchNow conducted an omnibus survey this month of 1,000 U.S. consumers on behalf of Pythian and asked them about their shopping habits and retail preferences. The results not only reflect the growing omni-channel trend among consumers but also offer retailers important insight into millennials’ shopping habits, and what must be done to improve the shopping experience for Generation Y. Here are the survey’s most important findings and what retailers can do both this holiday shopping season and beyond.
What retailers need to know about omni-channel shopping trends
1. Omni-channel shopping is popular in both directions.
- 60.5 percent of respondents browse online before eventually making a purchase in brick and mortar stores.
- 48.5 percent of respondents admitted to showrooming, saying they browsed for items in stores, then purchased them online at a later date.
2. Omni-channel shopping is much more popular among millennials
- 77.1 percent of millennial respondents reported browsing online before purchasing in the store, nearly 17 percentage points higher than the general population.
- 58 percent of millennial respondents admitted to showrooming, nearly 10 percentage points higher than older shoppers.
- 56.3 percent of millennial respondents admitted to browsing for an item in the store, yet purchasing the item online from a different retailer – double the rate of the general population.
3. Millennials are more likely to showroom using their mobile phones
- 19.45 percent of millennial shoppers have been in a store and purchased an item via their mobile phone from a different retailer while still in the store – double the rate of all other respondents.
4. Many retailers aren’t prepared for omni-channel shoppers
- While retailers attempt to provide a seamless online and in-store shopping experience, disconnect among database interactions is leaving many shoppers unsatisfied, especially among the millennial generation.
- 44 percent of respondents – and 57 percent of millennials specifically — have confirmed an item’s availability online, yet found it unavailable when attempting to purchase the same item in person at the store.
How retailers can retain millennial shoppers
Despite millennials’ high rates of showrooming and a lack of loyalty to any one retailer, certain retail tactics have been show to attract younger generation shoppers.
- Discounts: 97 percent of millennial respondents claimed that receiving discounts before shopping would drive them back to the retailer for future shopping events.
- Rewards programs: 43 percent of millennial respondents noted that they were very likely to frequent a store if it provided a rewards program.
- Inventory consistency: 89 percent of millennials said they wouldn’t return to a store if the inventory they confirmed was there was not available upon visit, integrating your online and offline data is crucial to capturing sales from this demographic.
- Fast and functional websites: 84 percent of younger generation respondents reported they would not return to a retail website if it ran slowly or crashed during use, make sure all your systems are tuned and performing well for the holiday season and beyond.
Retailers that want to successfully navigate this year’s holiday shopping season and beyond must acknowledge the modern shopper’s drive for online, in-store, and mobile purchasing, and utilize that knowledge to run cohesive omni-channel networks that can better retain customers both old and young.
Posted on November 22, 2013 at 10:08 pm by 小荷 | Comments Off
Copyright (c) 1995, 2002, Oracle Corporation. All rights reserved.
executing command: SET DBID
connected to target database: (not mounted)
connected to recovery catalog database
RMAN> 2> 3> 4> 5> 6> 7> 8> 9> 10> 11> 12> 13> 14> 15> 16> 17> 18> 19> 20> 21> 22>
allocated channel: ch1
channel ch1: sid=11 devtype=SBT_TAPE
channel ch1: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
allocated channel: ch2
channel ch2: sid=12 devtype=SBT_TAPE
channel ch2: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
allocated channel: ch3
channel ch3: sid=13 devtype=SBT_TAPE
channel ch3: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
allocated channel: ch4
channel ch4: sid=14 devtype=SBT_TAPE
channel ch4: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
allocated channel: ch5
channel ch5: sid=15 devtype=SBT_TAPE
channel ch5: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
allocated channel: ch6
channel ch6: sid=16 devtype=SBT_TAPE
channel ch6: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
allocated channel: ch7
channel ch7: sid=17 devtype=SBT_TAPE
channel ch7: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
allocated channel: ch8
channel ch8: sid=18 devtype=SBT_TAPE
channel ch8: Veritas NetBackup for Oracle - Release 7.1 (2011120716)
sent command to channel: ch1
sent command to channel: ch2
sent command to channel: ch3
sent command to channel: ch4
sent command to channel: ch5
sent command to channel: ch6
sent command to channel: ch7
sent command to channel: ch8
Starting restore at 2013-10-28 18:35:47
released channel: ch1
released channel: ch2
released channel: ch3
released channel: ch4
released channel: ch5
released channel: ch6
released channel: ch7
released channel: ch8
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-03002: failure of restore command at 10/28/2013 18:35:48
RMAN-06004: ORACLE error from recovery catalog database: ORA-01455: converting column overflows integer datat
Recovery Manager complete.
根据RMAN-06004和ORA-01455，我们很容易就能发现9i catalog库的一个bug：bug 1260760，详见 Known RMAN Bugs in Oracle9i (Doc ID 227398.1)
2 from dba_data_files
3 where round(bytes / 1024 / 1024 / 1024 / 1024, 2) > 0.05
4 order by 2;
19 rows selected
2 where x.start_time>x.completion_time
DB_KEY DB_ID BP_KEY RECID STAMP BS_KEY SET_STAMP SET_COUNT BACKUP_TYPE INCREMENTAL_LEVEL PIECE# COPY# DEVICE_TYPE HANDLE COMMENTS MEDIA MEDIA_POOL CONCUR TAG START_TIME COMPLETION_TIME ELAPSED_SECONDS STATUS
---------- ---------- ---------- ---------- ---------- ---------- ---------- ---------- ----------- ----------------- ---------- ---------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- ---------- ------ -------------------------------- ----------- --------------- --------------- ------
2 group by db_name
2 where bs_key<'4294967295'
3 group by db_name
verdb 2013/10/11 12:24:03
impdb 2013/10/11 12:12:37
mandb 2013/5/22 4:43:54