11gR2 RAC exclusive mode replace votedisk encounters PROC-26, restore ocr encounters CRS-4000, PROT-35, proc-26crs-4000
Link: http://blog.itpub.net/23135684/viewspace-748816/
The storage data of the 11gR2 RAC system is completely lost. The software of all nodes is installed on the local disk, and the local disk retains the OCR backup, the following describes how to restore the normal operation of Clusterwar
1. Complete recoveryEnterprise Manager -- Right-click "Database" -- all tasks -- Restore database-- Enter the restored database name in "Restore to Database" and set it to test.-- Restore select "from device" -- select device -- add your backup file-- OK. Return to the database restoration page.-- "Restore backup set",
In order to solve problems in our computer, we can restore the problem as soon as possible, many users have set a key restore command on their computers, but sometimes we inadvertently point to this command, how can we avoid this problem? Today's little book teaches you how to hide a key restore command.
Hide Method:
Step One: Open Explorer, set the folder vi
: 192.168.1.108 Tue Dec 3 06:11:41.618 DATABASE: tank to /home/zhangy/mongodb/tank Tue Dec 3 06:11:41.623 tank.system.indexes to /home/zhangy/mongodb/tank/system.indexes.bson Tue Dec 3 06:11:41.623 2 objects Tue Dec 3 06:11:41.623 tank.contact to /home/zhangy/mongodb/tank/contact.bson Tue Dec 3 06:11:41.669 2 objects Tue Dec 3 06:11:41.670 Metadata for tank.contact to /home/zhangy/mongodb/tank/contact.metadata.json Tue Dec 3 06:11:41.670 tank.users to /home/zhangy/mongodb/tank/users.bson
Prompt setup prompt
[Applicable] when you get bored with the c: \> prompt or you want to make your prompt different, you canTry the very interesting doscommand to display the time and date at any time.
[Usage] prompt $ p $ G uses the current directory name and> as the prompt, which is the most common prompt
Prompt $ t indicates the time prompt $ D indicates the date
Prompt $ prompt $ q =
Prompt $ V indicates the current version of prompt $ L
Prompt $ B | prompt $ h indicates the r
Steps to manually back up the registry in XP
Click Start, click Run, type%systemroot%system32restorerstrui.exe, and then click OK.
On the Welcome to the System Restore page, click Create a restore point, and then click Next.
On the Create a Restore Point page, type the restore point name, and then click Create
Wh
MSSQL is a Microsoft company's database management system, this article will detail the MSSQL2000 database backup and restore functions.
1, first please ensure that your backup file is Bak file, and backup files can be normal restore.
2, open "Enterprise Manager" → "Database", select the database you want to restore, right "All Tasks" → "
Green Eagle One-click Restore software to restore the specified partitions, support backup and restore operations on Non-system disks, security and stability, support for NTFS-formatted disks, and multiple hard disk systems, you can set protection passwords to prevent misoperation. Easy restore virus Trojan damage, sys
Dedecms is the most used CMS website system in China, basically do not need any technology can have their own website, the site backup and migration is also very convenient, summarized below four backup restore methods to provide you with reference.Dedecms Backup Restore method one: traditional way1. Log in to the old station background backup database.2, on the old station FTP download three folders:The Ba
The difference between recover and restore:Restore just copy the physical file, recover'll consistent the database.Restore is a restored, file-level restore. is the physical file restore.Recover is recovery, data-level recovery. Logical recovery, such as application archive logs, redo logs, all synchronized, consistent.In my own dialect, I use Restore to copy the backup files to the database directory to re
The email address is disabled. You can enable it again to restore it. What if the user's email address is deleted? For exchange, you can easily restore deleted user email data within the "retention period of deleted mailboxes" period. Note that the recovered email address is no longer the user's email address. Because the original user has been deleted when the mailbox is deleted, even if a new user with th
Tags: successful SEL product create user extend Dblink cal Sele DMIRecently the company switched the original database server. Not before the whole piece, but also a bunch of degrees Niang. After a constant groping, finally succeeded. Now it is hard to record this hardship, to facilitate their later access to the same time, to facilitate the students with similar needs reference. We are switching total: ERP, LOS, WMS three systems. These three systems are all in the same instance as a result of
Tags: will add target line data share JPG failed item sectionError when restoring a database backed up from SQL Server 2005 in the SQL Server 2008 release: "The database backup in the backup set is not the same as the existing ' * * * ' database. RESTORE DATABASE is terminating abnormally. (Microsoft SQL Server, Error: 3154) ". Here is a record of the SQL Server2008 3154 error Resolution, we hope to help.Cause analysis
1In SQL Server2005 and
Tags: poi shared printf Echo database transaction target Restore Dev The script updates again, share! #!/bin/sh#Usage#./restore.sh/full path of your backup files#[email protected] Innobackupex=innobackupexinnobackupex_path=/usr/bin/$INNOBACKUPEXTmp_log= "/var/log/restore.$$.log"My_cnf=/usr/local/mysql/my.cnfBackup_dir=/backup # Your backup home folderfullbackup_dir= $BACKUP _dir/full # full-Library backup
Label:1. View the logical file name (logical file name) and physical path (operation system file name) of the Northwind database files in SQL Server 2000:Use Nothwind
go
select name, filename, * from Dbo.sysfiles
Name filename
-------------- ------------------------------------------------------------------
Northwind d:/program files/microsoft sql Server/mssql$sqla/data/northwnd.mdf
northwind_log d:/ Program Files/microsoft SQL Server/mssql$sqla/data/northwnd.ldf
2. Backing
"Linux instructions from beginner to proficient" in the 3rd chapter of document management, this chapter introduces many common commands, such as CP, LN, chmod, Chown, diff, Tar, MV, etc., because these are related to file management, used in daily use, so this chapter is the key chapter of this book. This section introduces you to dump (file system backup).AD:3.19 Dump (file system backup)(1) Frequency level: ☆(2) Function Description:Dump is a backup utility that backs up a directory or entire
An important report on the product meeting was deleted because of the misoperation, an unknown virus infection. The file opened overnight, the completion of the work of the document turned off, one day on the computer will warn about the loss of important documents, and then the stability of the system is hidden enough to destroy our carefully constructed security line of the time bomb, A small loophole can be a deadly weapon in the important documents we have painstakingly written. However, whe
In today's society, the use of computer work has become commonplace, so the most worried about the system error resulting in the inability to work. The problem is small and easy to solve, afraid of the big problem will make the system crashes, the computer white is undoubtedly a thunderbolt. Software manufacturers also fully consider the problem for users, a variety of System Restore software in endlessly. But most people don't know, actually. Win7 sy
In the Windows 7 operating system, after you create a restore point, if your computer fails, you can restore your computer to a normal state by using the System Restore feature that comes with the Windows XP operating system. The following describes how to restore the operating system.
1, click "Start"-"All Programs"-
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.