Failed to install RAC on Linux, complete removal of the CRS steps as follows:
1. Stop Nodeapps at all nodes
Srvctl Stop Nodeapps-n NodeName
2. Remove CRS Auto Start program
rm/etc/oracle/*
Rm-f/ETC/INIT.D/INIT.CSSD
Rm-f/etc/init.d/init.crs
Rm-f/ETC/
When a user logs on to the Linux system, Linux will check for the following:
1 match the user name entered in the/etc/passwd file, get the UID and GID (where GID and/etc/group are associated), home directory, and Shell settings
2 Check the user's
When we use Linux to set up Web servers and FTP servers, we may encounter the need to implement multiple sites on a single service (virtual host), in which case we can increase the physical network card to solve. But how many extra slots do we
There are two ways of doing this:
1, Ulimit-n 5000
Modify the descriptor that allows maximum opening to 5000, only valid for applications that are currently open to the current terminal.
2. Modify Vim/etc/security/limits.conf
Add the following
1, first to an existing user to establish a quota:
A: Modify/etc/fstab files (e.g.: label=//ext3 Defaults,usrquota,grquota 1 1)
B: Reboot the system for the setting to take effect: reboot
C: Create quota file: Quotacheck-cmug/(View established
Recently sorted out the usual work in the regular use of the command, mainly divided into two pieces, one is to look at the hardware information command, the other is to monitor the operation of the hardware command. This article only involves
Starting from this article, we introduce the whole process of installing, configuring and deploying the detailed cluster environment in the Linux environment. In this process, we will give you a detailed description of the operation of Linux and the
The QEMU Simulator Project founder Fabrice Bellard has developed a simulator that runs in JavaScript, allowing users to start Linux on the browser (support for Firefox 4 and Google Chrome 11). Now another developer modifies the js/linux of the
Linux's most traditional disk File system (FileSystem) uses ext2, so it's up to ext2 to get to the file system.
First, file system characteristics
After the partition is finished, the partition needs to be formatted before the operating system can
First, the basic knowledge of hard disk
1. Hardware structure of hard disk
External structure:
Internal structure:
Component Introduction:
Head: Is the most expensive part of the hard drive, the use of non-contact structure, power after the
For security controls on server local terminals, you can start with the following:
1, the immediate prohibition of ordinary users Login
When the server is in backup or debugging and other maintenance work, you may not want to have a new user login
Package class failures are more common in Linux systems, such as: when you need to compile the source package program, the system does not have the GCC compilation tool installed, the installation of the RPM software package has unresolved
Files that are frequently edited in Windows are routed to Linux with a ^m symbol at the end of each line, which can cause the shell script to run incorrectly.
This is because the DOS editor and the Linux editor are inconsistent with carriage return
Today's new Redhat 5.4 Enterprise Edition, configure a bit of PPPoE, ready to drive on the books to travel, but I am surprised that the connection between the PPP Non-stop, a new terminal, has been ping, found that the network every minute or so
In Linux, there is no concept of file creation time. Only the file's access time, modification time, and state change time.
That is, you cannot know when the file was created. However, if the file has not been modified after creation, the
VMware Tools is a required installation tool for you to configure VMware virtual machines.
It can enhance display performance and improve user experience.
It can synchronize the time between the virtual machine and the host.
My colleague recently
Often found that the time of the virtual machine and the machine is not synchronized, and sometimes even affect the experimental results, often with date (date of the day of the year. seconds) command to modify the system time, after the
DHCP is the full name of the Dynamic Host Configuration Protocol, its purpose is to reduce the TCP/IP network planning, management and maintenance of the burden of addressing the lack of IP address space. DHCP is divided into two parts: one is the
When you add a disk to a virtual machine on a Windows system, you need to go through the console to the operating system's Disk Management menu, initialize > Online > Create New Volume operations on the added disks, and the Linux system also
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service