Data | database
Working diagram of a transaction
Transactions ensure the consistency and recoverability of data. The transaction works as shown in Figure 1.
Figure 1 Working schematic diagram of a transaction
After the transaction starts, all the operations of the Office are written to the transaction log in succession. There are generally two types of operations written to the log: one for data manipulation and one for task operations. Operations on data, such as insertions, deletions
it is monitoring the database, it is rarely necessary for an administrator to recover from an instance failure. When a DB instance fails, Oracle Restart attempts to restart the instance. If manual intervention is required, there may be a more serious problem preventing the instance from restarting, such as a memory CPU failure.
Understanding Instance Recovery: Checkpoint (CKPT) session
To understand instance recovery, you need to unders
Oracle Learning--buffer Cache in-depth analysis650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/40/BE/wKioL1PPVxOwPpjTAAL_LJN_ltc591.jpg "title=" 1.png " alt= "Wkiol1ppvxowppjtaal_ljn_ltc591.jpg"/>Server process and database buffer cache:When a block is required by the server, the block needs to be read by series steps:1. First, the server uses a hash function to check whether the required blocks can be obtained from the buffer cache. If a buffer is found, it is moved to the LRU list
sequence number when a dirty page is modified, and also to record checkpoint, which, through the LSN, can be specifically located in the Redo log file.To manage the dirty pages, the page on each instance in Buffer Pool is maintained on a flush List,flush list, sorted by the LSN number in which the page was modified. So when doing redo checkpoint periodically, the LSN of choice is always the oldest page on
acting on the buffer, and then dbwn will dump the dirty buffers into the disk. When does Dbwn write? Dbwn is a lazy process that writes as little as possible , in the following four cases it performs writes: A. There is no buffer available (you have to write it) B. Too many dirty buffers C.3 seconds Timeout (writes are performed once at the latest 3 seconds) D. A checkpoint, checkpoint (
, password Tiger
successfully logged into database.
Ggsci (localhost.localdomain) 2> add trandata scott.tcustmer
Logging of supplemental Redo data enabled for table SC OTT. Tcustmer.
Ggsci (localhost.localdomain) 3> add trandata scott.tcustord
Logging of supplemental Redo data enabled for table SC OTT. Tcustord.First, the initialization of loading dataConfigure an initialization extract on the source side to synchronize existing data in the tableGgsci (localhost.localdomain) 7> ADD EXTRACT e
prior to the dbwn process and performs real-time write operations at the same time of submission, there is always enough information in the redo stream, this allows you to rebuild any submitted changes that have not been written to the data file and roll back any uncommitted changes that have been written to the data file. The instance recovery mechanism of redo and rollback makes it impossible for the Oracle database to have a Rolling Error.
3.3 adjust instance recovery
MTTR (the average recov
Oracle SCN-system change number learning notes
SCN is the internal clock of Oracle, which is used to reflect changes in the database and is constantly updated during operation. SCN types include:
(1) Current SCN OF THE SYSTEM
(2) Checkpoint SCN (note that it will only be updated with the occurrence of the checkpoint: But in hot standby mode, the SCN will not change during
that affects all the operators in the application, so the performance cost is also relatively large. If we know probably where the problem is, and the entire application to open debug mode, but also easy to be overwhelmed by the vast number of debugging information. At this point, we need a more precise and inexpensive way to locate.2.7.2 using Checkpoint () to locateIf you know which chain the problem is on, but because the chain is upstream or down
System Checkpoint SCN (V$database (checkpoint_change#))
Data file Checkpoint (V$datafile (checkpoint_change#))
Data file termination SCN (V$datafile (last_change#))
Checkpoints stored in data files
Start SCN (V$datafile_header (checkpoint_change#)
1. System Checkpoint SCN
When a checkpoint action is complete, Ora
. When a checkpoint occurs:Dbwr moves all dirty buffers from the LRU list to the dirty list and writes data.5. When tablespace starts Hot Backup:Dbwr moves all dirty buffers belonging to the tablespace from the LRU list to the dirty list and starts to write data.6. When tablespace is offline:Dbwr moves all dirty buffers belonging to the tablespace from the LRU list to the dirty list and starts to write data.7. When you execute drop:DropTableOrIndexThi
the root operation, so the reserved space can be used up, but it can still be deleted. "The problem" is whether the available disk space is zero after deletion. This is not a real problem, but it only requires nilfs-clean-p 1 s-r to tell nilfs-cleanerd not to keep the checkpoint one second ago, by default, it always retains checkpoints within one hour.
NILFS snapshot is actually a specially marked checkpoint
most flexible.
The architecture of GG is: extract + Data Pump + replicat.
2.1 clear the previous Gg Environment
-- Target System
SQL> conn Dave/Dave;
Connected.
SQL> drop table pdba;
Table dropped.
Ggsci (gg2) 46> stop rep1
Sending stop request to replicat rep1...
Request processed.
Ggsci (gg2) 47> info all
Program Status group lag time since chkpt
Manager running
Replicat stopped rep1 00:00:00
Ggsci (gg2) 48> Delete rep1
Error: cocould not delete dB ch
help us reduce the size of the edits file and get an up-to-date Fsimage file, which will also reduce the pressure on the namenode. and secondary namenode is to help solve the above problems proposed, its responsibility is to merge Namenode edits to fsimage file. :Working principle, I also repeat here:
First, it periodically goes to Namenode to get edits, and updates to Fsimage.
Once it has a new fsimage file, it copies it back to the Namenode.
Namenode will use this new Fsimage
CPU speed and disk speed. The buffer pool is a large area of memory, which directly affects the overall performance of the DBMS. We strongly recommend that you install it in a 64-bit operating system to exceed the 32-bit maximum of 3G memory. A. the read record operation will FIX the page read from the disk to the buffer pool. When you read the same page again next time, check whether the buffer pool hits the page. Otherwise, read the disk. B. Write record operations first modify pages in the b
When talking about the transaction log, you have to talk about the Checkpoint, or CKP for short. The transaction log and the Checkpoint both exist for the rapid recovery of the database. We need to know what the checkpoint is and what it has to do with the transaction log.
What does CKP do?
In summary, data changes are not directly written to the mdf/ndf data fil
files in the current log group are not deletedAfter you force the log switch, you can delete the newly added log files.The following restrictions apply to deleting redo log files? You cannot delete a member of the current group to delete a command that performs a mandatory switchover redo log first: alter SYSTEM switch logfile? Activity log members cannot be deleted? Log members that are not archived cannot be deleted? Only one member of the current log group is or cannot be deletedLog group sw
Tags: Configure let yourself copy register with settings execution statement[Call Sqlplus.txt in 20170617]vim--//previously wrote an Emacs downgrade with Sqlplus article, has been wanted to learn Emacs, limited own vim, to learn it no interest, the original link is as follows:--//http://blog.itpub.net/267265/viewspace-1309032/--//actually VIM also has plug-in connection database, I feel not good, has not been so used.--//today when it comes to setting up vim-related settings, I find myself defin
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.