.
3. Insert tablespace
Invoke the Data Pump utility to plug the set of tablespaces into the primary database. Redo data will be generated and applied at the standby site to plug the tablespace into the standby database.
Call the Data Pump to insert the tablespace to the master database. Then, the slave database will obtain the redo data and apply the tablespace to the slave database.
References:
Important configuration parameters of Oracle Data Guard
/redo13.log' size 50 m;Alter database add standby logfile thread 1 group 14'/u01/app/oracle/oradata/xcldb/redo14.log 'size 50 m;
Note:When adding standby logfile, if thread 1 is a single instance database, but it is a RAC database,Add related Standby logs for each instance;In addition, you can use the following command to create an OMF-managed system:Alter database add standby logfile thread 1 group 11 size 500 m;Verification results:Col member format a50Select group #, type, member from v $ log
Apply before you can change the log files.
1. If the redo application is running, you must cancel the redo application after you change the log file.
2.
If the STANDBY_FILE_MANAGEMENT initialization parameter is set to AUTO, change the value to MANUAL.
If the STANDBY_FILE_MANAGEMENT initialization parameter is set to AUTO, change it to MANUAL.
3.
Add or drop an online redo log file:
3. add or delete online redo log files:
Bytes
To add an online redo log file, use a SQL statement such as this:
A
database to the control file. Note: The STANDBY_FILE_MANAGEMENT initialization parameter must be set to MANUAL.SQL> ALTER DATABASE RENAME FILE '/disk1/oracle/oradata/payroll/tbs_4.dbf' 2> TO '/disk1/oracle/oradata/payroll/tbs_x.dbf ';
On the standby database, restart Redo Apply:9. Restart the redo application in the slave database:SQL> ALTER DATABASE RECOVER MANAGED STANDBY DATABASE2> DISCONNECT FROM SESSION;
If you do not rename the corresponding datafile at the standby system, and then try
Starting from PHP5.3 If you want to support Zendguard encrypted PHP code, you must install Zend Guard Loader, and the old Zend Optimizer will not be supported.
This article describes how to install Zend Guard Loader support for PHP5.3 in a Linux system.
The operating system is centos5.5,php version 5.3.8 (the PHP default version in CentOS5.5 is lower, if you want to upgrade to the latest version of PHP,
Manager () Trojan scan results
False positives remain.
It's the turn of Kingsoft guard to make the debut.
Upgrade Kingsoft guard to the latest version, and then specify C:/Windows/system32/drivers, C:/program files/Lenovo/hidden partition management, D: /■ // data recovery/easyrecovery three folders for scanning:
07-time when the scan result of Kingsoft guard
configuration file implementations, back to the primary database. The SQL configuration file implemented on the primary database is recommended to be applied to the ADG standby database using the Redo application mechanism.For more new features, please click :Oracle 12.2 New features handheld handbook-Performance and Diagnostics for volume sixth ADGDeploying Columnstore on ADGWe are doomed to lose the people we love, otherwise how do we know how important they are in our lives? From "Rejuvenati
How to reinforce the security coefficient of the system through 360 security guard anti-Black
System anti-Black reinforcement can scan and detect the "weakness" of computers that are prone to hacker attacks, such as remote registry service, Teinet service, and hidden drive letter sharing, database password, and other security vulnerabilities, the 360 security guard comes with the anti-Black reinforcement f
Cracking Telecom Netcom's vro is mainly achieved by downloading shared guard, which is a method for cracking Telecom Netcom's vro. You can give it a try. It's easy to crack. Hurry into the Wireless World.
Download shared guard to easily crack the Telecom China Netcom vro
Recently, some friends said that China Telecom Netcom shared Internet access through vrouters. Today, my colleagues also asked this questi
Starting from PHP5.3 If you want to support Zendguard encrypted PHP code, you must install Zend Guard Loader, and the old Zend Optimizer will not be supported.1.Zend Guard Loader Installation[Email protected] opt]# tar zxf zendguardloader-70429-php-5.4-linux-glibc23-x86_64.tar.gz[Email protected] opt]# Mkdir/usr/local/zend[email protected] opt]# CP zendguardloader-70429-php-5.4-linux-glibc23-x86_64/php-5.4.
We have provided an overview of the unique features of Oracle 11g R2. At the same time, we also describe the enhancement of the data warehouse performance related to Oracle 11g R2. The following describes the enhanced features of Data guard in Oracle 11g R2:
The backup database management is improved. Data guard specifically improves the data warehouse business. Oracle 11g R2 provides many management functi
We all know that the main function of Oracle data guard is disaster tolerance. We all know that data guard has the following features: high availability, performance improvement, DATA protection, and fault recovery.
Oracle data guard can be divided into two types: Physical STANDBY and logical STANDBY. The biggest difference between the two is that physical STAND
Suppose the C-June is (0, 0), then the upper right is (n-1, n-1).The premise that a point (x, y) can be seen is gcd (x, y) = 1, so answer =∑phi (i) * 2 + 2-1 =∑phi (i) * 2 + 1 (1 -------------------------------------------------------------------------#include using namespace std;const int MAXN = 40009;int PHI[MAXN], n; void Phis () {for (int i = 1; i for (int i = 2; i For (int j = i; J Phi[j] = phi[j]/I * (i-1);}int main () {int ans = 0;cin >> N;phis ();for (int i = 1; i cout return 0;}--------
[Learn Android while working on a project] mobile security guard 03: gets the updated server configuration, displays the update dialog box, and learns androidConfigure the name and icon of the application displayed on the mobile desktop-AndroidManifest. xml:
After configuration
① ②Obtain the updated server configuration process:
Server Configuration:
Use tomcat as the server, create an update. xml file in the TOMCAT_HOME/ROOT directory, and add inform
Previously, I tried to configure the logic and physical standby structure of the Oracle instance and perform some role exchange operations. However, I did not pay attention to the part of RMAN commands I learned yesterday, the archivel gap still exists in standby dB in maximum protection mode. As a result, the Standby experiment environment created earlier is completely suspended, primary dB also stops automatically. I had to change primary dB to maximum performance mode in nomount mode, and set
Data guard is a solution provided by Oracle to ensure high availability, data protection, and disaster recovery of enterprise data.
1. Data guard configuration
Data guard consists of a product database and one or more slave databases, which can be distributed to different locations and regions. The interconnection between these databases is achieved through O
The current popular two PHP encryption, decryption tools Zend Guard and Iconcube Introduction, Zendiconcube
There are two main types of software that are currently on the market that are more popular for PHP encryption authorization:
(1) Zend Company's Zendguard.
(2) Ioncube Company's Ioncube PHP Encode.
Zendguard can only encrypt files with PHP tags or source code (such as:. Php,inc, etc.), for other text without PHP tags saved files can not be encr
Does the Data Guard broker change attributes to be executed separately on both sides?Data Guard Broker has some properties that can be seen through show configuration.I sometimes wonder if these attributes, respectively, belong to primary and standby, and ifIf you want to change, do you need to log in to primary and standby separately to modify it?This is also a question that many customers often have. So I
Xiaotian competition: Host guard VS dongle protection Comparison Test report
Recently, the server security software dongle released a new version and held a race to bypass server guard. Similar Products include host guard. The following is a comparative test on the effectiveness of the two software detection and removal.
I. Environment Construction
First, foll
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.