Learn about data guard oracle 11g step by step, we have the largest and most updated data guard oracle 11g step by step information on alibabacloud.com
) Select the [create and manage release] command from the [copy] sub-menu in the [tools] menu.
(2) Select the database for which you want to create the publication, and click [Create release]
(3) In the prompt dialog box of the [Create release wizard], click [next]. A dialog box is displayed.
The dialog box contains three types of copies. Now we select the first one, that is, the default snapshot release (the other two can be checked for help)
(4) Click [next] system requirements to specify the
[create and manage release] command from the [copy] sub-menu in the [tools] menu.(2) Select the database for which you want to create the publication, and click [Create release](3) In the prompt dialog box of the [Create release wizard], click [next]. A dialog box is displayed.The dialog box contains three types of copies. Now we select the first one, that is, the default snapshot release (the other two can be checked for help)(4) Click [next] system requirements to specify the database server
Oracle Data Guard synchronizes Data through archive files. The archive files of the master database can be deleted during RMAN backup, but the archive files of the slave database cannot be deleted automatically. You need to write scripts to delete them regularly.
If you delete an archive file directly, you may find tha
[Oracle] Data Guard series (1)-three Protection modes Data Guard provides the following three Data Protection modes: 1) Maximum Protection) the "maximum protection" here refers to protecting d
Android Network requests json data, parses json data, and generates corresponding java bean classes in one step for quick development
Android Network requests generally involve image and JSON data. How can I quickly request network JSON data, parse JSON
In the previous section, "Data Guard series (2)-Log Transfer", we introduced the DG Log Transport service, the log Application service is introduced in this section after the log is transferred from the main library to the standby repository, and the repository needs to apply logs to maintain synchronization with the main library.
Redo application or SQL application?
We know that there are two types of re
Data Guard provides two services:1) Redo transmission service: Transfers Redo logs of Primay to one or more Standby destinations.2) Redo Application Service: The Redo log transmitted from Primay on the Standby side.This article describes the Redo transmission service.
1. Use ARCn to transmit Redo logsBy default, ARCn is used to transmit redo logs. However, ARCn can be used only in the highest-performance mo
To configure transparent gateway for Sybase
1. Install Sybase client on the server where Oracle is located (or install Oracle and Sybase servers on the same server) to ensure that the Sybase database can be accessed;
2. Install the transparent gateway for Sybase option, which must be customized. Correctly select the Sybase installation directory;
3. Select a sid string to be assigned to the Sybase Database.
The FAL gap problem of Oracle Data Guard logs is found in the OracleData Guard environment. A standby database has a problem and needs to be redone. Because the previously configured environment is good, you only need to back up the full database of the master database to the slave database. However, after the
Data Guard offers two main services:1 Redo Transport Service: The Primay end of the redo log transmission to one or more standby destinations.2 Redo Application Service: The redo log which is transmitted from the Primay end is applied to the standby end.This article first discusses the redo transport services.
1, the use of ARCN transmission redo logBy default, the ARCN transport redo log, but only in the
Step code for creating a tablespace in oracle. For more information, see
Step code for creating a tablespace in oracle. For more information, see
/* Step 2: create a temporary tablespace */Create temporary tablespace user_tempTempfile 'd: \
The data guard provides the following three kinds of protection modes:
1 Maximum protection mode (Maximum Protection)
"Maximum protection" here refers to the maximum protection of the data is not lost, that is, at least one standby and primary maintain real-time synchronization, but this is costly, that is, when a transaction is committed, not only to write to
Non-Data guard patch installation tutorials refer to the [Oracle] CPU/PSU patch installation detailed tutorial, where Data Guard requires primary and standby to be patched at the same time, so the steps are more complex and the main steps are as follows:
1. Stop log transfer
Oracle Data Guard (iii) Switchover 1. check the status of the Primary database SQL> select switchover_status from v $ database; Role Switching can be performed only when the status is "TO STANDBY" or "SESSIONS ACTIVE. 2. switch the role SQL of the Primary database> alter database commit to switchover to physical standby with session shutdown; SQL> shutdown immedi
); insert INTO Employee (Id,name) Span class= "Hljs-keyword" >values (03, ' Rose '); You've noticed that some data needs to be enclosed in single quotes, such as the names of Tom, Jack, and Rose, because their data types are char type. In addition, Varchar,text,date,time,enum and other types of data also require single-quote decoration, while int,float,double
RAC, Data Gurad, Stream are three tools in the Oracle High-availability system, each of which can be used independently or in conjunction with each other. Their respective emphasis is different, the application scenario is also different.
RAC its strength lies in solving single point of failure and load balancing, so the RAC scheme is often used in the core system of 7*24, but the
reserved. Most of these digital binaries are used by standard SQL as column names and/or table names (for example, GROUP). A few are retained because MySQL needs them and (currently) uses the YACC parser. Reserved words can be used as identifiers when they are caused.MySQL allows some of the keywords to be used as unrecognized identifiers, because many people have been using them before. Some examples are listed below:
ACTION
BIT
DATE
Enum
NO
TEXT
Time
TIMES
Oracle Data Guard from the macroscopic point of view, mainly provides the following two services:
1) Log transmission: The main library transmits the generated redo log to the standby library;
2 log application: The redo log, which is transferred from the main library, is used by the standby library.
This article first describes the log Transport service, the
[Oracle] Data Guard series (3)-log application Redo application or SQL application? We know that there are two types of standby databases: Physical standby database and logical standby database. The log application of the physical standby database is called the Redo application, the log application of the logical standby database is called the SQL application. Th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.