In-depth understanding of Oracle 12c Database Management (second edition) PDF

Source: Internet
Author: User
Tags create index dba

One: Download get location:

Second: The book Pattern:

Three: The book Directory:

Book catalog:
1th Install Oracle
1.1 learn OFA
1.1.1 Oracle manifest directory
1.1.2 Oracle Base directory
1.1.3 Oracle home directory
1.1.4 Oracle Network File  Catalog
1.1.5 Automatic Diagnostics Repository
1.2 install Oracle
1.2.1 Step 1: Create OS groups and Users
1.2.2 Step 2: Make sure the OS
1.2 is fully configured. 3 Step 3: Get Oracle installation software
1.2.4 Step 4: Unzip the file
1.2.5 Step 5: Create a Orainst.loc file
1.2.6 Step 6: Configure the answer file, and then run Setup
1.2.7 Step 7: Troubleshoot any problems
1.3 Use a copy of the installed program to install Oracle
1.3.1 Step 1: Use the OS utility to copy an installed program
1.3.2 Step 2: Additional Oracle home directory
1.4 upgrade Oracle Software
1.5 Reinstall after failed installation
1.6 Installing a temporary patch
1.7 performing a remote installation using the graphical interface installer
1.7.1 Step 1: Install the X Window System and network Utility on the local computer
1.7.2 Step 2: Start the X Window System session on the local computer
 1.7.3 Step 3: Copy the Oracle installation files to the remote server
1.7.4 Step 4: Run the xhost command
1.7.5 Step 5: Log on to the remote computer via the X Window System
1.7.6 Step 6: Make sure that the display variable
1.7 is set correctly on the remote computer. 7 Step 7: Run the Runinstaller utility
1.7.8 Step 8: Resolve the issue
1.8 summary

2nd Implementation Database
2.1 setting OS Variables
2.1.1 Manual Reinforcement method
2.1.2 Setting OS variables using Oracle's method
2.1.3 My favorite way to set OS variables
2.2 Create a database
2.2.1 Step 1: Set the OS variable
2.2.2 Step 2: Configure the initialization file
2.2.3 Step 3: Create the required directory
2.2.4 Step 4: Create a Database
2.2.5 Step 5: Create Data Catalog
2.3 configuration and Implementation listener
2.3. 1 Configuring the Listener manually
2.3.2 using NET Configuration Assistant to implement listeners
2.3.3 to connect to the database
2.4 to create a password file
2.5 Start and stop the database
2.5.1 Understanding OS Recognition Certificate
2.5.2 Start database
2.5.3 Stop database
2.6 Create a database using DBCA
2.7 Delete a database
2.8 How many databases are running on a single server
2.9 Understanding Oracle Architecture
2.10 Small Knot

3rd. Configuring an Efficient environment
3.1 Customizing the OS command prompt
3.2 Customizing the SQL prompt
3.3 Creating shortcuts for common commands
3.3.1 Using aliases
3.3.2 Using Functions
3.4 Quick Run command again
3.4.1 Use up ARROW keys and DOWN ARROW keys to scroll
3.4.2 using Ctrl+p and CTRL + N key Combinations
3.4.3 List The history of a command
3.4.4 Reverse Search
3.4.5 Settings Command Editor
3.5 Developing standard Scripts
3.5.1 Dba_setup
3.5.2 Dba_fcns
3.5.4 CONN.BSH
3.5.6 Login.sql
3.5.7 Top.sql
3.5.8 Lock.sql
3.5.9 Users.sql
3.6 Organizing Scripts
3.6.1 Step 1: Create a directory
3.6.2 Step 2: Copy the files to the directory
3.6.3 Step 3: Configure the Startup file
3.7 Summary

Chapter 4th table space and data files
4.1 Initially created 5 table spaces
4.2 Learn more about our needs
4.3 Creating a table space
4.4 Renaming a table space
4.5 Control Redo Log
4.6 Changing the Write mode of tablespace
4.7 Deleting a table space
4.8 Using Oracle-managed files
4.9 Creating large File Table spaces
4.10 Enable default table compression in a tablespace
4.11 showing the size of the table space
4.12 Changing Table space dimensions
4.13 Toggle the online status of the data file
4.14 Renaming and moving data files
4.14.1 performing data File online operations
4.14.2 performing a data file offline operation
4.15 Summary

5th Chapter Management Control file, online redo log and archive
5.1 Administrative control files
5.1.1 View the name and location of the control file
5.1.2 Adding control files
5.1.3 Mobile Control files
5.1.4 Deleting a control file
5.2 Managing online Redo logs
5.2.1 Displaying online redo log information
5.2.2 determining the optimal size of an online redo log group
5.2.3 determining the optimal number of redo log groups
5.2.4 Adding online Redo log groups
5.2.5 resizing online redo log groups and deleting online redo log groups
5.2.6 Adding online redo log files to a log group
5.2.7 Removing online redo log files from a log group
5.2.8 moving or renaming redo log files
5.3 Implementing Archiving Mode
5.3.1 Architecture Decisions
5.3.2 Setting the storage location for archive redo log files
5.3.3 "Non-Oracle mode" FRA idea
5.3.4 Enable archive logging mode
5.3.5 Disabling the archive logging mode
5.3.6 when the storage location of the archive log is missing free space
5.3.7 Backup archive redo log files
5.4 Summary

6th Chapter user account and Basic security
6.1 Managing Default Users
6.1.1 Lock account and password expiration
6.1.2 Differentiate DBA-created accounts
6.1.3 Checking the default password
6.2 Creating a user account
6.2.1 Select User Name and authentication method
6.2.2 Assigning default persistent and temporary tablespace
6.3 Change Password
6.4 Log in with a different user account
6.5 Modifying users
6.6 Deleting a user
6.7 Improve password security and resource usage limits
Basic security of 6.7.1 passwords
6.7.2 Password Length
6.7.3 restricting the use of database resources
6.8 Administrative rights
6.8.1 Assigning database system permissions
6.8.2 Assigning Database object permissions
6.8.3 assigning permissions in a centralized manner
6.9 Summary

7th Chapter and Constraint
7.1 table type
7.2 data Type
7.2.1 character Type
7.2.2 numeric Type
7.2.3 Date type
7.2.4 RAW
7.2.5 ROWID
7.2.6 Big Pair Like
7.2.7 Extensible Character type
7.3.1 Create a heap organization table
7.3.2 Implementing a virtual column
7.3.3 Implementing a hidden column
7.3.4 Create a read-only table
7.3.5 Create a delay segment
7.3. 6 Create a table with an autogrow (identity) column
7.3.7 Default SQL Parallel execution
7.3.8 Compress table Data
7.3.9 Reduce Redo Log
7.3.10 CREATE table from query results
7.4 Modify Table
7.4.1 Getting required Lock mechanism
7.4.2 renaming table
7.4.3 Add Column
7.4.4 Change Column
7.4.5 rename column
7.4.6 Delete column
7.5 Show Table DDL code
7.6 Delete Table
7.7 recover deleted table
7.8 Delete data from a table
7.8.1 use the DELETE statement
7.8.2 Use the TRUNCATE statement
7.9 to view and adjust the high watermark Mark
7.10 performance issues related to high watermark
7.10.1 Trace Detection high watermark Space underneath the tag
7.10.2 use the Dbms_space package to check the space beneath the high watermark marker
7.10.3 View Partitioned view of data dictionary
7.10.4 lowering high watermark Mark
7.11 creating a temporary table
7.12 Create INDEX Organization TABLE
7.13 Administrative Constraints
7.13.1 Create a PRIMARY KEY constraint
7.13.2 enforce unique keys
7.13.3 Create FOREIGN KEY constraint
7.13.4 Check specific data conditions
7.13.5 enforces NOT null approximately Bundle
7.13.6 Disable constraint
7.13.7 Enable constraint
7.14 summary

8th Index
8.1 The time to create an index
8.1.1 creating an index in a positive way
8.1.2 Creating an index in a negative way
8.2 planning Robustness
8.2.1 The type of the index
8.2.2 estimate the size of the index
8.2. 3 Create a stand-alone tablespace for an index
8.2.4 Create a portable script
8.2.5 Create a naming standard
8.3 Create an index
8.3.1 Create a two-tree index
8.3.2 Create a composite index
8.3.3 Implement a function-based index
8.3 .4 Creating a unique index
8.3.5 Implementing a bitmap index
8.3.6 Creating a bitmap connection Index
8.3.7 Implementing a Reverse key index
8.3.8 Creating a Compression key index
8.3.9 Creating indexes in parallel
8.3.10 reduce build when index is created Redo Log
8.3.11 Implement hidden Index
8.4 maintain index
8.4.1 Rename index
8.4.2 displays code to re-create the index
8.4.3 Rebuild Index
8.4.4 mark the index as unavailable
8.4.5 Monitoring Index usage
8.4.6 Delete Index
8.5 Create an index on a foreign key column
8.5.1 Create an index on a foreign key column
8.5.2 Determines whether an index is created on the Foreign key column
8.6 summary

9th chapter Views, synonyms, and sequences
9.1 Implementation View
9.1.1 Creating a View
9.1.2 Checking for updated data
9.1.3 creating a read-only view
9.1.4 an updatable connection view
9.1.5 creating instead OF triggers
9.1.6 Implementing Hidden columns
9.1.7 Modifying a View definition
9.1.8 displaying the SQL code used to create the view
9.1.9 Renaming a View
9.1.10 Deleting a view
9.2 Managing synonyms
9.2.1 Creating synonyms
9.2.2 Creating a public synonym
9.2.3 creating synonyms in a dynamic manner
9.2.4 displaying synonym metadata
9.2.5 Renaming synonyms
9.2.6 Deleting synonyms
9.3 Managing Sequences
9.3.1 Creating a sequence
9.3.2 using sequence pseudo-columns
9.3.3 Auto-Grow column
9.3.4 implementing multiple sequences that generate unique values
9.3.5 creating one or more sequences
9.3.6 Viewing sequence metadata
9.3.7 Renaming a sequence
9.3.8 Deleting a sequence
9.3.9 Reset Sequence
9.4 Summary

10th basic structure of data dictionary
10.1 Structure of the data dictionary
10.1.1 Static View
10.1.2 Dynamic Performance View
10.2 Additional views of metadata
10.3 Several flexible usages of data dictionaries
10.3.1 Traceability Documentation
10.3.2 Displaying user information
10.3.3 shows the number of rows in a table
10.3.4 Show primary key and foreign key relationships
10.3.5 Display Object Dependencies
10.4 Summary

11th Large Object
11.1 Description Large Object type
11.2 Large Object locator, index and block
11.3 differentiate basicfiles and securefiles
11.3.1 basicfiles
11.3.2 Secu Refiles
11.4 Create a table with large object columns
11.4.1 Create basicfiles large object column
11.4.2 implement large objects in specified tablespace
11.4.3 Create securefiles large object column
11.4.4 Implementing a partitioned table large object
11.5 managing large Object Columns
11.5.1 Moving large object columns
11.5.2 Adding large object columns
11.5.3 Delete Large object columns
11.5.4 Cache Large Objects
11.5.5 large objects are embedded and out-of-line stored br>11.6 implementing Securefiles Advanced Features
11.6.1 compressing large Objects
11.6.2 Apply deduplication to large Objects
11.6.3 Encrypt large Objects
11.6.4 Migrating from Basicfiles to Securefiles
11.7 loading large Objects
11.7.1 Loading CLOB data
11.7.2 Loading BLOB data
11.8 measuring space occupied by large objects
11.8.1 Basicfiles large objects occupy space
11.8.2 securefiles large objects occupy space
11.9 read bfile Data
11.10 Summary

Chapter 12th Division: Divide and conquer
12.1 What kind of table should be applied to partition function
12.2 Creating a partitioned table
12.2.1 Partitioning by Range
12.2.2 using tablespace storage partitions
12.2.3 partitioning based on list values
12.2.4 Hash Partition
12.2.5 combination using multiple partitioning methods
12.2.6 creating partitions as needed
12.2.7 partition according to parent table
12.2.8 Virtual Column Partitioning
12.2.9 gives the ability to apply control zoning
12.3 Managing Partitions
12.3.1 viewing metadata for a partition
12.3.2 Moving partitions
12.3.3 automatic movement of updated rows
12.3.4 Creating a partition for an existing table
12.3.5 Adding partitions
12.3.6 through existing table swap partitions
12.3.7 Renaming partitions
12.3.8 Splitting partitions
12.3.9 Merging Partitions
12.3.10 Deleting a partition
12.3.11 Statistics Partition data
12.3.12 deleting rows in a partition
12.3.13 data in the operations partition
12.4 Index Partition
12.4.1 Creating index partitions using table partitioning policies
12.4.2 creating an index partition using a partition policy different from the table
12.4.3 Partial Index
12.5 Partition Trimming
12.6 Summary

The 13th Chapter Data Pump
13.1 Structure of the data pump
13.2 Getting Started
13.2.1 Performing an export operation
13.2.2 Importing Tables
13.2.3 Using parameter files
13.3 deeper understanding of export and import operations
13.3.1 Full Database level
13.3.2 Program Level
13.3.3 table level
13.3.4 Table Space Level
13.4 Transferring data
13.4.1 Export and import operations directly over the network
13.4.2 Copying data files
13.5 functions for managing storage methods
13.5.1 Exporting Table Space metadata
13.5.2 setting a different data file path and name
13.5.3 Importing table spaces to a destination database that is not the same as the source database
13.5.4 changing the size of a data file
13.5.5 changing segments and storage properties
13.6 Filtering data and objects
13.6.1 Setting the query parameter
13.6.2 Export Data by percentage
13.6.3 excluding objects from an export file
13.6.4 Exclude statistical data
13.6.5 only include the specified object in the export file
13.6.6 exporting tables, indexes, constraints, and triggers DDL
13.6.7 excluding objects from the import file
13.6.8 include objects in the import content
13.7 Common Data Pump tasks
13.7.1 Estimating the size of an export job
13.7.2 List The contents of the data Pump file
13.7.3 Cloning users
13.7.4 creating a consistent export file
13.7.5 performing an import operation if an object already exists
13.7.6 Renaming a table
13.7.7 Re-mapping data
13.7.8 do not create log files
13.7.9 using parallel mechanisms
13.7.10 setting additional data pump files
13.7.11 Reusing export file names
13.7.12 creating DDL files to handle daily tasks
13.7.13 compressing export files
13.7.14 changing the compression properties of a table when importing
13.7.15 Encrypting data
13.7.16 exporting a view as a table
13.7.17 Disabling the Redo logging feature when importing
13.8 command-line interaction mode
13.8.1 entering command line interactive mode
13.8.2 attaching a running job
13.8.3 Stop and restart jobs
13.8.4 terminating the data pump operation
13.9 Monitoring Data pump operation
13.9.1 Data Pump log file
13.9.2 Data dictionary View
13.9.3 Data Pump Warning log
13.9.4 Status Table
13.9.5 command line interactive mode status command
13.9.6 OS Utility
13.10 Data Pump Traditional mode
13.10.1 mapping the data pump to the EXP utility
13.10.2 mapping the data pump to the IMP utility
13.11 Summary

14th Chapter External Table
14.1 Sql*loader and external tables
14.2 loading a CSV file into the database
14.2.1 creating directory objects and assigning access rights
14.2.2 Creating an external table
14.2.3 Generating SQL code for creating external tables
14.2.4 Viewing External table metadata
14.2.5 loading data for normal tables via external tables
14.3 Performing Advanced conversion tasks
14.4 viewing text files with SQL
14.5 unloading and loading data using external tables
14.5.1 enable parallel mechanism to speed up processing
14.5.2 Compressed Data Pump file
14.5.3 Encrypting data Pump file
14.6 Summary

15th Chapter materialized View
15.1 MV Introduction
15.1.1 MV Terminology
15.1.2 refer to useful views
15.2 Creating a basic materialized view
15.2.1 creating a fully refreshed MV
15.2.2 creating a fast-refreshed MV
15.3 MV Advanced
15.3.1 creating MV and setting table spaces for MV and indexes
15.3.2 Creating an index on the MV
15.3.3 Partition MV
15.3.4 compression MV
15.3.5 Encrypted MV Column
15.3.6 creating MV with pre-built tables
15.3.7 creating a MV with no data
15.3.8 create MV to refresh on commit
15.3.9 Create a MV that never refreshes
15.3.10 creating MV for query rewriting
15.3.11 creating a fast refresh MV using complex query operations
15.3.12 Viewing the DDL code for MV
15.3.13 deleting MV
15.4 Changing the MV
15.4.1 Modify the DDL code of the main table and make the MV reflect those changes
15.4.2 to trigger the Redo log function on MV
15.4.3 changing the parallelism mechanism
15.4.4 Moving MV
15.5 Managing MV Logs
15.5.1 Creating a MV Log
15.5.2 Index MV Log column
15.5.3 Viewing the space occupied by the MV log
15.5.4 reducing the space occupied by the MV log
15.5.5 Check the number of MV log lines
15.5.6 moving the MV Log
15.5.7 Deleting the MV Log
15.6 Refresh MV
15.6.1 manually refresh MV with Sql*plus
15.6.2 using shell scripts and dispatch utilities to perform automatic refreshes
15.6.3 automatically refreshes MV with Oracle's built-in job scheduler
15.6.4 perform a full refresh operation efficiently
15.6.5 Handling ORA-12034 Errors
15.7 Monitoring MV Refresh operation
15.7.1 View last Refresh Time
15.7.2 determine if the refresh job is in progress
15.7.3 monitoring the progress of the refresh operation
15.7.4 Check if MV is refreshed on schedule
15.8 Creating a remote MV
15.8.1 understanding the structure of remote refresh operations
15.8.2 viewing information for MV Main Table
15.8.3 determine how many MV references are in the center MV Log
15.9 Managing MV Groups
15.9.1 Creating a MV Group
15.9.2 Changing the MV Group
15.9.3 Refresh MV Group
15.9.4 Dbms_mview and Dbms_refresh
15.9.5 determining MV in the MV Group
15.9.6 adding MV to the MV Group
15.9.7 removing MV from the MV Group
15.9.8 Deleting the MV Group
15.10 Summary

16th User-managed backup and recovery
16.1 implement a cold backup policy for a database that is not in archived log mode
16.1.1 Cold backup non-archive mode database
16.1.2 using a cold backup containing online redo logs to recover non-archived log mode databases
16.1.3 a database that uses cold backups that do not contain online redo logs to recover non-archived log patterns
16.1.4 write scripts to perform cold backup and recovery
16.2 Cold backup database in archived log mode
16.3 Hot backup Policy
16.3.1 Create a hot backup br>16.3.2 using a script to perform a hot backup
16.3.3 Understanding the split block problem
16.3.4 understand the need to generate redo logs during backup
16.3.5 Understanding update of data Files
16.4 Perform a full restore of the database in Archive redo log mode
16.4.1 to recover the database offline
16.4.2 Recovering the online database
16.4.3 Recovery control File
16.5 performing incomplete recovery of databases in archived log mode
16.6 Summary

17th. Configuring Rman
17.1 Understanding Rman
17.2 starting Rman
17.3 Rman Structure Decision
17.3.1 running the Rman client remotely or locally
17.3.2 setting up a backup user
17.3.3 using online or offline backups
17.3.4 Setting the storage location and file format for archive redo logs
17.3.5 Configuring the storage location and file format for Rman backups
17.3.6 setting up automatic backup control file function
17.3.7 Setting the storage location for automatic backup of control files
17.3.8 Backup Archive Redo Log
17.3.9 determining where the control file snapshot is stored
17.3.10 Using Recovery Catalog
17.3.11 using Media Manager
17.3.12 Set Initialization Parameters Control_file_record_keep_time
17.3.13 Configuring retention policies for Rman backups
17.3.14 Configuring the Delete policy for archive redo logs
17.3.15 setting the degree of parallelism
17.3.16 using a backup set or mirror copy
17.3.17 Using incremental backups
17.3.18 using Incremental update backups
17.3.19 using block modification tracking
17.3.20 Configuring the binary file compression feature
17.3.21 Configuring encryption Features
17.3.22 Configuring various settings
17.3.23 Configuring output Information
17.4 Follow-up decisions
17.5 Summary

18th. Rman Backup and Reporting
18.1 Preparing to run the Rman backup command
18.1.1 Setting the Nls_date_format variable
18.1.2 Setting the Echo parameter
18.1.3 Viewing Rman variables
18.2 Running a backup operation
18.2.1 backing up the entire database
18.2.2 Backup Table Space
18.2.3 backing up data files
18.2.4 Backup control files
18.2.5 Backup SPFile
18.2.6 Backup Archive Redo Log
18.2.7 Backup fra
18.2.8 Removing a table space backup from a backup
18.2.9 backing up data files that have not been backed up
18.2.10 Skip read-only table space
18.2.11 skipping offline files and inaccessible files
18.2.12 backing up large files in parallel
18.2.13 adding Rman Backup information to the Rman warehouse
18.3 Backing up pluggable databases
18.3.1 connecting the root container database
18.3.2 Connecting pluggable databases
18.4 Creating an incremental backup
18.4.1 Creating a tiered incremental backup
18.4.2 Creating an incremental update backup
18.4.3 using block modification tracking
18.5 checking for bad blocks in data files and backup files
18.5.1 using the Validate command
18.5.2 using Backup ... Validate command
18.5.3 using Restore ... Validate command
18.6 Using the Recovery catalog
18.6.1 Creating a Recovery Directory
18.6.2 Registering the target database
18.6.3 Backup Recovery Directory
18.6.4 Synchronizing Recovery Directory
18.6.5 Creating an Oracle version of the recovery directory
18.6.6 Deleting a recovery directory
18.7 recording the output of Rman
18.7.1 redirecting output results to a file
18.7.2 using Linux/unix logging command to capture output information
18.7.3 Logging of output information to a file
18.7.4 querying output information through a data dictionary
18.8 Rman Report
18.8.1 using the list command
18.8.2 using the report command
18.8.3 using SQL query commands
18.9 Summary

19th Rman Recovery Action
19.1 Determine if a media restore operation is required
19.2 determine what needs to be recovered
19.2.1 operation process of recovery operation
19.2.2 using data Recovery Advisor
19 .3 use Rman to shut down or start the database
19.3.1 Close Database
19.3.2 Start Database
19.4 full restore
19.4.1 Test restore Operation
19.4.2 Restore the entire database
19.4.3 Restore Tablespace 19.4.4 recover read-only tablespace
19.4.5 Recover temporary Tablespace
19.4.6 Restore data File
19.4.7 Restore data files to a nondefault location
19.4.8 Perform block-level restore operations
19.4.9 Recover the container database and Its associated pluggable database
19.5 Recovery Archive log file
19.5.1 Restore the backup to the default location
19.5.2 Restore the backup to a nondefault location
19.6 Recovery control file
19.6.1 using the Recover directory
19.6.2 using the Backup
19.6.3 Specify the name of the backup file
19.7 Restore the SPFile file
19.8 incomplete Recovery
19.8.1 How to select an incomplete restore Operation
19.8.2 time-based recovery operations
19.8.3 based on log sequence number Recovery Action
19.8.4 SCN-based recovery operations
19.8.5 revert to restore point
19.8.6 Restore table to past point in time
19.9 Flashback table
19.9.1 FLASHBACK table to before DRO P command
19.9.2 Flash the table back to the past point in time
19.10 Flash back to the database
19.11 restore the backup to a different server
19.12 summary

20th Oracle Secure backup
20.1 OSB versions and features
20.2 OSB terminology
20.2.1 OSB management domains and servers
20.2.2 OSB interface
20.2.3 OSB user and level
20.2.  4 OSB daemon
20.3 download and install
20.4 access the OSB
20.5 configuration OSB
20.5 from the command line interface. 1 configuring Users and Levels
20.5.2 Configuring the Media family
20.5.3 Metabase Backup storage Selector
20.6 Database backup
20.7 recovering a database operation
20.8 file system backup
20.8.1 Creating a DataSet file
20.8.2 Configuring Backup Windows
20.8.3 Configuring Backup schedules and Triggers
20.8.4 Based on File system backup operation required
20.9 file System Restore operation
20.9.1 performing a directory-based restore operation
20.9.2 performing the raw data recovery operation
20.9.3 Execute the Obtar command
20.10 Monitor the OSB job
20  .10.1 List Jobs
20.10.2 show script for Job
20.10.3 Monitor OSB log
20.11 virtual test device
20.12 Oracle database backup in cloud computing
20.13 upgrade OSB software
20.14 Summary

21st Job Automation
21.1 Automating jobs with Oracle Scheduler
21.1.1 Creating and dispatching jobs
21.1.2 View details of the job
21.1.3 Modify the log history for the job
21.1.4 Repair Change Job
21.1.5 stop Job
21.1.6 Pause Job
21.1.7 Start Job
21.1.8 Copy Job
21.1.9 Run job manually
21.1.10 Delete Job
21.2 Oracle Sch Eduler and cron
21.3 automate jobs with cron
21.3.1 how cron works
21.3.2 Enable cron
21.3.3 Understanding Cron Table Entries
21.3.4 Making jobs run automatically
21.3 .5 redirect Cron output
21.3.6 Handling Cron Problems
21.4 Example of an automated DBA job
21.4.1 Start and stop database and listener
21.4.2 check the available space for archive redo log storage
21.4.3 Trace Large log file
21.4.4 Check the locked Product database account
21.4.5 Check the file before a point in time
21.4.6 check for excessive processes
21.4.7 Check the integrity of the Rman backup
21.5 Summary

22nd Troubleshooting Database
22.1 Quick Classification
22.1.1 Check availability of databases
22.1.2 check free space
22.1.3 Check warning log
22.2 identify bottlenecks through OS utility
22.2.1 Looking for system bottlenecks
22.2.2 correspond the operating system process to the SQL command
22.3 find resource-intensive SQL commands
22.3.1 Real-time monitoring of SQL command execution
22.3.2 Running the Oracle Diagnostic utility
22.4 Detecting and resolving locking issues
22.5 resolving the maximum number of open cursors problems
22.6 Troubleshooting table Space
22.6.1 Determine if the undo tablespace size is correct
22.6.2 check for SQL commands using undo tablespace
22.7 Handling temporary tablespace issues
22.7.1 Determine whether the temporary tablespace is dimensioned correctly
22.7.2 check the SQL command that uses the temporary tablespace
22.8 summary

Chapter 23rd pluggable Databases
23.1 Understanding Pluggable Architecture
23.1.1 Conversion Paradigm
23.1.2 the meaning of backup and recovery operations
23.1.3 Fine Tuning
23.2 Creating a CDB
23.2.1 creating a CDB manually using SQL commands
23.2.2 using DBCA
23.2.3 creating a CDB script from DBCA
23.2.4 Check if the CDB has been created
23.3 Managing the root container
23.3.1 Connecting the root container
23.3.2 displaying information for the current connection container
23.3.3 starting and stopping the root container
23.3.4 Creating a public user
23.3.5 Creating a common role
23.3.6 report information about container space
23.3.7 Switching containers
23.4 creating a pluggable database in CDB
23.4.1 Cloning seed Container
23.4.2 cloning an existing pluggable database
23.4.3 cloning non-CDB database
23.4.4 unplugging a pluggable database from the CDB
23.4.5 inserting the unplugged database into the CDB
23.4.6 using DBCA to create pluggable databases from seed containers
23.4.7 to check the status of pluggable databases
23.5 Managing pluggable databases
23.5.1 Connecting pluggable databases
23.5.2 managing listeners in a pluggable environment
23.5.3 View the currently connected pluggable database
23.5.4 starting and stopping pluggable databases
23.5.5 modifying initialization parameters that are applied to pluggable databases
23.5.6 Renaming pluggable databases
23.5.7 limit the size of a pluggable database using space
23.5.8 viewing the history of pluggable databases
23.5.9 removing pluggable databases
23.6 Summary

In-depth understanding of Oracle 12c Database Management (second edition) PDF

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.