Objective:
10.13.8.186 archived log relay machine. Required from the Production node mxrac01,03,04,05 (10.13.67.171/172/174/175)
Any file that copies all nodes in a single platform and then is routed to the RAC standby machine (10.13.9.171/173/174 any one).
Steps:
1, first, to generate public key on the transit machine
dfms-arc-shipping<*mxdell1*/u01/run>$ cd/home/oracle
Dfms-arc-shipping<*mxdell1*/u01/run> $mkdir. SSH
Dfms-arc-shipping<*mxdell1*/u01/run> $chmod. SSH
dfms-arc-shipping<*mxdell1*/u01/run>$ cd/home/oracle
dfms-arc-shipping<*mxdell1*/home/oracle>$ ssh-keygen-t RSA
You can then see the. SSH directory generates a id_rsa.pub file.
2. Then in the production each node (in fact, in a ready to copy the node job can be, here in order to prevent problems with nodes) will transfer the public key to
Each node already exists in the Authorized_keys file, and then test the connectivity to the RAC by testing the SSH mxrac01 date on the staging machine.
mxrac01<*mxdell1*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
mxrac03<*mxdell3*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
mxrac04<*mxdell4*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
mxrac05<*mxdell5*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
3. Similarly, the archived log on the relay will be transferred to the RAC standby, and we will transfer the public key in transit to the nodes of the RAC standby Authorized_keys
, the public key for the other machine does not need to be passed to the Authorized_keys (so it does not have to generate this file) because the medium transfer is the active role. Transit to RAC in same test
Standby the connectivity of each node.
mxrac01<*mxdell1*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
mxrac03<*mxdell3*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
mxrac04<*mxdell4*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
mxrac05<*mxdell5*/home/oracle/.ssh> $ssh 10.13.8.186 cat/home/oracle/.ssh/id_rsa.pub >>authorized_keys
Note: At present all copies of the work are production DB and standby db in the node 4 and the transfer machine, only all to join the public key to connect to all nodes, establish SSH trust relationship,
The main purpose is to prevent node 4 failure, just modify the IP in the rsync script.
4. Setup script (script on the transit machine):
Dfms-arc-shipping<*mxdell1*/u01/run> $cat Rsync_rac_arc
#!/bin/bash
Pid= '/sbin/pidof rsync '
If ["$pid"]
Then
echo "Rsync is already running ..."
Else
echo "Starting rsync from production db to Middle server ' Date '"
RSYNC-E Ssh-av oracle@10.13.67.174:/ocfs_data/mxdell/arch//ocfs_data/mxdell/arch/
echo "Starting rsync from Middle server to standby server ' date '"
RSYNC-E ssh-av/ocfs_data/mxdell/arch/oracle@10.13.9.174:/ocfs_data/mxdell/arch/
echo "Completed rsync ' Date '"
Fi
Exit 0
5. Finally set crontab (on the transit machine):
Dfms-arc-shipping<*mxdell1*/u01/run> $crontab-L
*/10 * * * * bash/u01/run/rsync_rac_arc 1>>/u01/run/log/rsync_rac_arc.log 2>>/u01/run/log/ Rsync_rac_arc.bad