I. General restore and recoveryThe entire recovery process for RMAN can be divided into restoration (restore) and recovery (recover). They are very different in meaning, one refers to the physical meaning of the restoration and copy of the file, one refers to the recovery of database consistency, so the correct understanding of these two concepts, to facilitate t
1, the failure Point database recovery
For a recovery of the point of failure (Point-of-failure), also known as full database recovery, the online redo log must be required to be complete and undamaged. If you lose the online redo log, you must do a incomplete recovery of the database.
Let's assume that the online re
RAID5 server disk array, two disks bad data recovery , national onsite service, on-site server RAID5 data repairProfessional to provide server data recovery, server hard disk repair, RAID data recovery, RAID array data recovery, RAID5 data recovery, raid5e data
U disk damaged by viruses, artificial operation errors, equipment itself failure will result in data loss,U disk data Recovery Tool came into being, you can use a special technical means to rescue and restore the damaged data in U disk. Small series here for you to recommend several commonly used U disk data recovery Tool.
1. Efficiency source Flash data Recovery
Database-recovery policy and database imageRegister log files
Basic PrinciplesThe registration order is strictly in the time order of parallel transaction executionThe log file must be written before the databaseWrite a log file: indicates the modified log record.Write to log fileDatabase write operation: write data modifications to the database
Why Write The Write-Ahead Log first)Writing a database and writing a log file are two different operations.
When Will instance recovery be generated after in-depth analysis of instance recovery? When your database server suffers an abnormal power failure, instance recovery will occur when you restart the database. Instance recovery is automatically completed by the database without DBA interference. Of course, there is a pre
Originally the title Party wanted to write "in-depth JVM", but not too bold, I think a small blog I think it is not enough to explain the JVM, in this article, I would like to introduce you to the JVM a lot of internal knowledge, the concept will be relatively coarse, because too fine content to write, here is certainly not written; , in addition to some official information in the middle, there are some of their own understanding, so please do not fully trust the contents of this article; In ad
• List table space recovery at execution time (TSPITR) operations that will occur • Definitions of terms used by TSPITR • determining the appropriate conditions for using TSPITR as a solution • determining the correct target time for time point recovery • determining the cases where TSPITR cannot be used and solution • Execute automatic TSPITR
Table Space Time Point r
Recovery | Data 1.1. Loss of all data files
The major premise is that control files and log files are not corrupted.
1.1.1. Simulate loss of all data files
rman> shutdown abort;
Oracle routines are closed
Rman> host;
Microsoft Windows XP [version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>del d:\oracle92\test1\*.dbf
C:\>exit
Host command complete
Rman>
1.1.2. Mount Database
rman> startup Mount;
Connected to target d
What is a flashback recovery zone?
Oracle 10g has a new feature called Automatic Disk-Based Backup and Recovery ). The basis for implementing this function is the Flash Recovery Area described in this article ). Flash recovery zone is a new feature in Oracle 10g. In short, the flash
When the control file backup and recovery instance is started, the process must read the control file and write the control file. Therefore, if a control file is damaged, the instance cannot be mounted. That is, the control files in this phase are indispensable. If the disk is damaged, it can only be started to the NOMOUNT state. Backup control file backups include: online control file image backup, manual backup, automatic backup online image backup
Perform full recovery: the key data file of the SYSTEM is lost in ARCHIVELOG mode. If a data file is lost or damaged and the file belongs to the SYSTEM or UNDO tablespace, perform the following steps: 1. the instance may or may not be automatically closed. 2. If the instance is not automatically closed, use SHUTDOWNABORT to close the instance. 3. Load the database
Perform full recovery: the key data file of
Basic Concepts of Block Media RecoveryWhenever block corruption have been automatically detected, you can perform block media recovery manually with the RECOVER ... BLOCK command. By default, RMAN first searches for good blocks in the real-time query physical standby database, then flashback logs and Then blocks with full or level 0 incremental backups.Identification of corrupt BlocksThe V$database_block_corruption view displays blocks marked corrupt
Problem phenomenonAfter using shutdown abort to stop Dataguard Standby library, the library can not open, reported ORA-01196 error.Specific as follows:Found a standby library can not apply the log, view the repository log did not find an error, suspect that the standby Library application log service stopped, so try to restart the repository;May be because the standby library is busy reading business, shutdown immediate shut down the standby time is too long, so the use of the Shutdown Abort com
As an operational personnel, to ensure that the security of data is the fundamental responsibility, so in the maintenance of the system, to be cautious, but sometimes it will inevitably occur when the data is mistakenly deleted, at this time to change how to quickly and effectively recover data? In this article, we will introduce several data recovery tools commonly used in Linux systems.first, how to use the "RM-RF" commandUnder the Linux system, the
Previous articles on restoration of RMAN:
RMAN series (V)-RMAN restoration and Restoration
Http://blog.csdn.net/tianlesoftware/archive/2010/07/11/5700474.aspx
RMAN backup and recovery instance
Http://blog.csdn.net/tianlesoftware/archive/2009/10/20/4699320.aspx
Oracle RMAN cross-resetlogs version recovery
Http://blog.csdn.net/tianlesoftware/archive/2009/10/17/4682463.aspx
The RMAN in RAC focuses on the c
MySQL series: innodb source code analysis-redo log recovery, innodbredo
In the previous "innodb source code analysis-redo log structure", we know the basic structure and log writing steps of the redo log. How does the redo log recover data? When will redo log deduction be performed? Redo log deduction is performed only when the database is abnormal or shut down. When the database is restarted, the log deduction is performed to restore the database sta
As an operational personnel, to ensure that the security of data is the fundamental responsibility, so in the maintenance of the system, to be cautious, but sometimes it will inevitably occur when the data is mistakenly deleted, at this time to change how to quickly and effectively recover data? In this article, we will introduce several data recovery tools commonly used in Linux systems.First, how to use the "RM-RF" commandUnder the Linux system, the
Recommendation: 10 Technical Masterpiece: "High-performance Linux server construction combat Ⅱ" full-network distribution, with probation chapters and the book instance source download!As an operational personnel, to ensure that the security of data is the fundamental responsibility, so in the maintenance of the system, to be cautious, but sometimes it will inevitably occur when the data is mistakenly deleted, at this time to change how to quickly and effectively recover data? In this article, w
The Recovery Console (Recovery console) is a command-line-based repair platform dedicated to Windows 2000/xp/server 2003, which is equivalent to the "Repair computer"-"System recovery Options" provided by Windows Vista Installer-" Command prompt, which is used to manually repair the system on the command line when Windows encounters a failure to start. The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.