You are previewing Linux Recipes for Oracle DBAs.
O'Reilly logo
Linux Recipes for Oracle DBAs

Book Description

Linux Recipes for Oracle DBAs is an example-based book on managing Oracle Database in a Linux environment. Covering commonly used distributions such as Red Hat Enterprise Linux and Oracle Enterprise Linux, the book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a stack of Linux documentation. The book is task-oriented: Look up the task to perform. See the solution. Read up on the details. Get the job done.

  • Takes you directly from problem to solution

  • Covers the "right" mix of Linux user and administration tasks for database administrators

  • Respects your time by being succinct and to-the-point

Table of Contents

  1. Copyright
  2. About the Authors
  3. Acknowledgments
  4. Introduction
    1. Audience
    2. Book Structure
    3. Conventions
    4. Downloading Linux and Oracle
    5. Comments
    6. Contacting Us
  5. 1. Getting Started
    1. 1.1. Connecting Securely to a Remote Server
      1. 1.1.1. Problem
      2. 1.1.2. Solution
      3. 1.1.3. How It Works
        1. 1.1.3.1. Connecting via a Proxy Server
        2. 1.1.3.2. Connecting via SSH Tunneling
    2. 1.2. Logging On Remotely via the Command Line
      1. 1.2.1. Problem
      2. 1.2.2. Solution
      3. 1.2.3. How It Works
    3. 1.3. Logging Off the Server
      1. 1.3.1. Problem
      2. 1.3.2. Solution
      3. 1.3.3. How It Works
    4. 1.4. Running a Command
      1. 1.4.1. Problem
      2. 1.4.2. Solution
      3. 1.4.3. How It Works
    5. 1.5. Getting Help
      1. 1.5.1. Problem
      2. 1.5.2. Solution
        1. 1.5.2.1. Reading Manual Pages
        2. 1.5.2.2. Viewing a Brief Description of a Command
        3. 1.5.2.3. Locating a Command
        4. 1.5.2.4. Getting the Version
        5. 1.5.2.5. Showing Help
        6. 1.5.2.6. Finding Manual Page Documentation
        7. 1.5.2.7. Listing Extensive Documentation
        8. 1.5.2.8. Showing Available Commands
      3. 1.5.3. How It Works
    6. 1.6. Correcting Command-Line Mistakes
      1. 1.6.1. Problem
      2. 1.6.2. Solution
      3. 1.6.3. How It Works
    7. 1.7. Clearing the Screen
      1. 1.7.1. Problem
      2. 1.7.2. Solution
      3. 1.7.3. How It Works
    8. 1.8. Resetting the Screen
      1. 1.8.1. Problem
      2. 1.8.2. Solution
      3. 1.8.3. How It Works
  6. 2. Working in the Shell
    1. 2.1. Running Previously Entered Commands
      1. 2.1.1. Problem
      2. 2.1.2. Solution
        1. 2.1.2.1. Scrolling with the Up and Down Arrow Keys
        2. 2.1.2.2. Pressing Ctrl+P and Ctrl+N
        3. 2.1.2.3. Listing Command History
        4. 2.1.2.4. Searching in Reverse
        5. 2.1.2.5. Setting the Command Editor
      3. 2.1.3. How It Works
    2. 2.2. Automatically Completing Long Commands
      1. 2.2.1. Problem
      2. 2.2.2. Solution
      3. 2.2.3. How It Works
    3. 2.3. Viewing Environment Variables
      1. 2.3.1. Problem
      2. 2.3.2. Solution
      3. 2.3.3. How It Works
    4. 2.4. Displaying the Current Shell
      1. 2.4.1. Problem
      2. 2.4.2. Solution
      3. 2.4.3. How It Works
    5. 2.5. Automatically Setting Shell Variables
      1. 2.5.1. Problem
      2. 2.5.2. Solution
      3. 2.5.3. How It Works
    6. 2.6. Customizing the Command Prompt
      1. 2.6.1. Problem
      2. 2.6.2. Solution
      3. 2.6.3. How It Works
    7. 2.7. Creating a Command Shortcut
      1. 2.7.1. Problem
      2. 2.7.2. Solution
        1. 2.7.2.1. Using an Alias
        2. 2.7.2.2. Using a Function
      3. 2.7.3. How It Works
    8. 2.8. Providing Input to Commands
      1. 2.8.1. Problem
      2. 2.8.2. Solution
      3. 2.8.3. How It Works
    9. 2.9. Redirecting Command Output
      1. 2.9.1. Problem
      2. 2.9.2. Solution
      3. 2.9.3. How It Works
    10. 2.10. Sending Output to Nowhere
      1. 2.10.1. Problem
      2. 2.10.2. Solution
      3. 2.10.3. How It Works
    11. 2.11. Displaying and Capturing Command Output
      1. 2.11.1. Problem
      2. 2.11.2. Solution
      3. 2.11.3. How It Works
    12. 2.12. Recording All Shell Command Output
      1. 2.12.1. Problem
      2. 2.12.2. Solution
      3. 2.12.3. How It Works
    13. 2.13. Changing the Login Shell
      1. 2.13.1. Problem
      2. 2.13.2. Solution
      3. 2.13.3. How It Works
    14. 2.14. Modifying Command Path Search
      1. 2.14.1. Problem
      2. 2.14.2. Solution
      3. 2.14.3. How It Works
    15. 2.15. Viewing Built-in Commands
      1. 2.15.1. Problem
      2. 2.15.2. Solution
      3. 2.15.3. How It Works
    16. 2.16. Setting the Backspace Key
      1. 2.16.1. Problem
      2. 2.16.2. Solution
      3. 2.16.3. How It Works
    17. 2.17. Typing a Long Command in Multiple Lines
      1. 2.17.1. Problem
      2. 2.17.2. Solution
      3. 2.17.3. How It Works
  7. 3. Managing Processes and Users
    1. 3.1. Listing Processes
      1. 3.1.1. Problem
      2. 3.1.2. Solution
      3. 3.1.3. How It Works
    2. 3.2. Terminating Processes
      1. 3.2.1. Problem
      2. 3.2.2. Solution
      3. 3.2.3. How It Works
    3. 3.3. Listing the Users Logged On
      1. 3.3.1. Problem
      2. 3.3.2. Solution
      3. 3.3.3. How It Works
    4. 3.4. Listing the Last Logon Time of a User
      1. 3.4.1. Problem
      2. 3.4.2. Solution
      3. 3.4.3. How It Works
    5. 3.5. Limiting the Number of User Processes
      1. 3.5.1. Problem
      2. 3.5.2. Solution
      3. 3.5.3. How It Works
    6. 3.6. Viewing How Long the Server Has Been Running
      1. 3.6.1. Problem
      2. 3.6.2. Solution
      3. 3.6.3. How It Works
    7. 3.7. Viewing How Long a Process Has Been Running
      1. 3.7.1. Problem
      2. 3.7.2. Solution
      3. 3.7.3. How It Works
    8. 3.8. Displaying Your Username
      1. 3.8.1. Problem
      2. 3.8.2. Solution
      3. 3.8.3. How It Works
    9. 3.9. Changing Your Password
      1. 3.9.1. Problem
      2. 3.9.2. Solution
      3. 3.9.3. How It Works
    10. 3.10. Becoming the System Privileged (root) User
      1. 3.10.1. Problem
      2. 3.10.2. Solution
      3. 3.10.3. How It Works
    11. 3.11. Running Commands As the root User
      1. 3.11.1. Problem
      2. 3.11.2. Solution
      3. 3.11.3. How It Works
    12. 3.12. Adding a Group
      1. 3.12.1. Problem
      2. 3.12.2. Solution
      3. 3.12.3. How It Works
    13. 3.13. Removing a Group
      1. 3.13.1. Problem
      2. 3.13.2. Solution
      3. 3.13.3. How It Works
    14. 3.14. Adding a User
      1. 3.14.1. Problem
      2. 3.14.2. Solution
      3. 3.14.3. How It Works
    15. 3.15. Removing a User
      1. 3.15.1. Problem
      2. 3.15.2. Solution
      3. 3.15.3. How It Works
  8. 4. Creating and Editing Files
    1. 4.1. Creating a File
      1. 4.1.1. Problem
      2. 4.1.2. Solution
      3. 4.1.3. How It Works
    2. 4.2. Maneuvering Within a File
      1. 4.2.1. Problem
      2. 4.2.2. Solution
      3. 4.2.3. How It Works
    3. 4.3. Copying and Pasting
      1. 4.3.1. Problem
      2. 4.3.2. Solution
      3. 4.3.3. How It Works
    4. 4.4. Manipulating Text
      1. 4.4.1. Problem
      2. 4.4.2. Solution
      3. 4.4.3. How It Works
    5. 4.5. Searching for and Replacing Text
      1. 4.5.1. Problem
      2. 4.5.2. Solution
      3. 4.5.3. How It Works
    6. 4.6. Inserting One File into Another
      1. 4.6.1. Problem
      2. 4.6.2. Solution
      3. 4.6.3. How It Works
    7. 4.7. Joining Lines
      1. 4.7.1. Problem
      2. 4.7.2. Solution
      3. 4.7.3. How It Works
    8. 4.8. Running Operating System Commands
      1. 4.8.1. Problem
      2. 4.8.2. Solution
      3. 4.8.3. How It Works
    9. 4.9. Repeating a Command
      1. 4.9.1. Problem
      2. 4.9.2. Solution
      3. 4.9.3. How It Works
    10. 4.10. Undoing a Command
      1. 4.10.1.
        1. 4.10.1.1. Problem
        2. 4.10.1.2. Solution
        3. 4.10.1.3. How It Works
    11. 4.11. Displaying Line Numbers
      1. 4.11.1. Problem
      2. 4.11.2. Solution
      3. 4.11.3. How It Works
    12. 4.12. Automatically Configuring Settings
      1. 4.12.1. Problem
      2. 4.12.2. Solution
      3. 4.12.3. How It Works
    13. 4.13. Creating Shortcuts for Commands
      1. 4.13.1.
        1. 4.13.1.1. Problem
        2. 4.13.1.2. Solution
        3. 4.13.1.3. How It Works
    14. 4.14. Setting the Default Editor
      1. 4.14.1. Problem
      2. 4.14.2. Solution
      3. 4.14.3. How It Works
  9. 5. Managing Files and Directories
    1. 5.1. Showing the Current Working Directory
      1. 5.1.1. Problem
      2. 5.1.2. Solution
      3. 5.1.3. How It Works
    2. 5.2. Changing Directories
      1. 5.2.1. Problem
      2. 5.2.2. Solution
      3. 5.2.3. How It Works
        1. 5.2.3.1. Navigating HOME
        2. 5.2.3.2. Navigating to the Parent Directory
        3. 5.2.3.3. Navigating to a Subdirectory
        4. 5.2.3.4. Using Wildcards
        5. 5.2.3.5. Navigating to the Previous Directory
    3. 5.3. Creating a Directory
      1. 5.3.1. Problem
      2. 5.3.2. Solution
      3. 5.3.3. How It Works
    4. 5.4. Viewing a List of Directories
      1. 5.4.1. Problem
      2. 5.4.2. Solution
      3. 5.4.3. How It Works
    5. 5.5. Removing a Directory
      1. 5.5.1. Problem
      2. 5.5.2. Solution
      3. 5.5.3. How It Works
    6. 5.6. Listing Files
      1. 5.6.1. Problem
      2. 5.6.2. Solution
      3. 5.6.3. How It Works
    7. 5.7. Creating a File Quickly
      1. 5.7.1. Problem
      2. 5.7.2. Solution
      3. 5.7.3. How It Works
    8. 5.8. Changing File Permissions
      1. 5.8.1. Problem
      2. 5.8.2. Solution
      3. 5.8.3. How It Works
    9. 5.9. Changing File Ownership and Group Membership
      1. 5.9.1. Problem
      2. 5.9.2. Solution
      3. 5.9.3. How It Works
    10. 5.10. Viewing the Contents of a Text File
      1. 5.10.1. Problem
      2. 5.10.2. Solution
      3. 5.10.3. How It Works
    11. 5.11. Viewing Nonprinting Characters in a File
      1. 5.11.1. Problem
      2. 5.11.2. Solution
      3. 5.11.3. How It Works
    12. 5.12. Viewing Hidden Files
      1. 5.12.1. Problem
      2. 5.12.2. Solution
      3. 5.12.3. How It Works
    13. 5.13. Determining File Type
      1. 5.13.1. Problem
      2. 5.13.2. Solution
      3. 5.13.3. How It Works
    14. 5.14. Finding Differences Between Files
      1. 5.14.1. Problem
      2. 5.14.2. Solution
      3. 5.14.3. How It Works
    15. 5.15. Comparing Contents of Directories
      1. 5.15.1. Problem
      2. 5.15.2. Solution
      3. 5.15.3. How It Works
    16. 5.16. Copying Files
      1. 5.16.1. Problem
      2. 5.16.2. Solution
      3. 5.16.3. How It Works
    17. 5.17. Copying Directories
      1. 5.17.1. Problem
      2. 5.17.2. Solution
      3. 5.17.3. How It Works
    18. 5.18. Moving Files and Directories
      1. 5.18.1. Problem
      2. 5.18.2. Solution
      3. 5.18.3. How It Works
    19. 5.19. Renaming a File or Directory
      1. 5.19.1. Problem
      2. 5.19.2. Solution
      3. 5.19.3. How It Works
    20. 5.20. Removing a File
      1. 5.20.1. Problem
      2. 5.20.2. Solution
      3. 5.20.3. How It Works
    21. 5.21. Removing Protected Files Without Being Prompted
      1. 5.21.1. Problem
      2. 5.21.2. Solution
      3. 5.21.3. How It Works
    22. 5.22. Removing Oddly Named Files
      1. 5.22.1. Problem
      2. 5.22.2. Solution
      3. 5.22.3. How It Works
    23. 5.23. Finding Files
      1. 5.23.1. Problem
      2. 5.23.2. Solution
      3. 5.23.3. How It Works
    24. 5.24. Finding Strings in Files
      1. 5.24.1. Problem
      2. 5.24.2. Solution
      3. 5.24.3. How It Works
    25. 5.25. Finding a Recently Modified File
      1. 5.25.1. Problem
      2. 5.25.2. Solution
      3. 5.25.3. How It Works
    26. 5.26. Finding and Removing Old Files
      1. 5.26.1. Problem
      2. 5.26.2. Solution
      3. 5.26.3. How It Works
    27. 5.27. Finding the Largest Files
      1. 5.27.1. Problem
      2. 5.27.2. Solution
      3. 5.27.3. How It Works
    28. 5.28. Finding a File of a Certain Size
      1. 5.28.1. Problem
      2. 5.28.2. Solution
      3. 5.28.3. How It Works
    29. 5.29. Sorting Files by Size
      1. 5.29.1. Problem
      2. 5.29.2. Solution
      3. 5.29.3. How It Works
    30. 5.30. Finding the Largest Space-Consuming Directories
      1. 5.30.1. Problem
      2. 5.30.2. Solution
      3. 5.30.3. How It Works
    31. 5.31. Truncating an Operating System File
      1. 5.31.1. Problem
      2. 5.31.2. Solution
      3. 5.31.3. How It Works
    32. 5.32. Counting Lines and Words in a File
      1. 5.32.1. Problem
      2. 5.32.2. Solution
      3. 5.32.3. How It Works
    33. 5.33. Creating a Second Name for a File
      1. 5.33.1. Problem
      2. 5.33.2. Solution
      3. 5.33.3. How It Works
    34. 5.34. Creating a Second Name for a Directory
      1. 5.34.1. Problem
      2. 5.34.2. Solution
      3. 5.34.3. How It Works
  10. 6. Archiving and Compressing Files
    1. 6.1. Bundling Files Using tar
      1. 6.1.1. Problem
      2. 6.1.2. Solution
      3. 6.1.3. How It Works
    2. 6.2. Unbundling Files Using tar
      1. 6.2.1. Problem
      2. 6.2.2. Solution
      3. 6.2.3. How It Works
    3. 6.3. Finding Differences in Bundled Files Using tar
      1. 6.3.1. Problem
      2. 6.3.2. Solution
      3. 6.3.3. How It Works
    4. 6.4. Bundling Files Using cpio
      1. 6.4.1. Problem
      2. 6.4.2. Solution
      3. 6.4.3. How It Works
    5. 6.5. Unbundling Files Using cpio
      1. 6.5.1. Problem
      2. 6.5.2. Solution
      3. 6.5.3. How It Works
    6. 6.6. Bundling Files Using zip
      1. 6.6.1. Problem
      2. 6.6.2. Solution
      3. 6.6.3. How It Works
    7. 6.7. Unbundling Files Using zip
      1. 6.7.1. Problem
      2. 6.7.2. Solution
      3. 6.7.3. How It Works
    8. 6.8. Listing the Contents of a Bundled File
      1. 6.8.1. Problem
      2. 6.8.2. Solution
        1. 6.8.2.1. tar
        2. 6.8.2.2. cpio
        3. 6.8.2.3. zip
      3. 6.8.3. How It Works
    9. 6.9. Bundling Files Using find
      1. 6.9.1. Problem
      2. 6.9.2. Solution
      3. 6.9.3. How It Works
    10. 6.10. Adding to a Bundled File
      1. 6.10.1. Problem
      2. 6.10.2. Solution
        1. 6.10.2.1. tar
        2. 6.10.2.2. cpio
        3. 6.10.2.3. zip
      3. 6.10.3. How It Works
    11. 6.11. Compressing and Uncompressing Files
      1. 6.11.1. Problem
      2. 6.11.2. Solution
      3. 6.11.3. gzip and gunzip
      4. 6.11.4. bzip2 and bunzip2
      5. 6.11.5. compress and uncompress
      6. 6.11.6. How It Works
    12. 6.12. Validating File Contents
      1. 6.12.1. Problem
      2. 6.12.2. Solution
      3. 6.12.3. How It Works
    13. 6.13. Encrypting and Decrypting Files
      1. 6.13.1. Problem
      2. 6.13.2. Solution
      3. 6.13.3. How It Works
  11. 7. Shell Scripting
    1. 7.1. Writing a Simple Shell Script
      1. 7.1.1. Problem
      2. 7.1.2. Solution
      3. 7.1.3. How It Works
    2. 7.2. Checking Simple Conditions
      1. 7.2.1. Problem
      2. 7.2.2. Solution
      3. 7.2.3. How It Works
    3. 7.3. Testing a Condition
      1. 7.3.1. Problem
      2. 7.3.2. Solution
        1. 7.3.2.1. Verifying the Number of Parameters
        2. 7.3.2.2. Verifying the Amount of Physical Memory
        3. 7.3.2.3. Checking the Name of User Running the Script
        4. 7.3.2.4. Accepting Input from the Command Line
      3. 7.3.3. How It Works
    4. 7.4. Checking Complex Conditions
      1. 7.4.1. Problem
      2. 7.4.2. Solution
      3. 7.4.3. How It Works
    5. 7.5. Repeating a Task
      1. 7.5.1. Problem
      2. 7.5.2. Solution
      3. 7.5.3. How It Works
    6. 7.6. Iterating Until a Condition Is Met
      1. 7.6.1. Problem
      2. 7.6.2. Solution
      3. 7.6.3. How It Works
    7. 7.7. Displaying a Menu of Choices
      1. 7.7.1. Problem
      2. 7.7.2. Solution
      3. 7.7.3. How It Works
    8. 7.8. Running Commands Based on Success/Failure of the Previous Command
      1. 7.8.1. Problem
      2. 7.8.2. Solution
      3. 7.8.3. How It Works
    9. 7.9. Modularizing Scripts
      1. 7.9.1. Problem
      2. 7.9.2. Solution
      3. 7.9.3. How It Works
    10. 7.10. Passing Parameters to Scripts
      1. 7.10.1. Problem
      2. 7.10.2. Solution
      3. 7.10.3. How It Works
    11. 7.11. Processing Parameters
      1. 7.11.1. Problem
      2. 7.11.2. Solution
      3. 7.11.3. How It Works
    12. 7.12. Running Database Commands in Scripts
      1. 7.12.1. Problem
      2. 7.12.2. Solution
        1. 7.12.2.1. Running a Command Directly
        2. 7.12.2.2. Capturing Output in a Variable
      3. 7.12.3. How It Works
    13. 7.13. Crafting a Robust DBA Shell Script
      1. 7.13.1. Problem
      2. 7.13.2. Solution
      3. 7.13.3. How It Works
    14. 7.14. Running Scripts in the Background
      1. 7.14.1. Problem
      2. 7.14.2. Solution
      3. 7.14.3. How It Works
    15. 7.15. Monitoring the Progress of a Script
      1. 7.15.1. Problem
      2. 7.15.2. Solution
      3. 7.15.3. How It Works
    16. 7.16. Debugging a Script
      1. 7.16.1. Problem
      2. 7.16.2. Solution
      3. 7.16.3. How It Works
  12. 8. Analyzing Server Performance
    1. 8.1. Identifying System Bottlenecks
      1. 8.1.1. Problem
      2. 8.1.2. Solution
      3. 8.1.3. How It Works
    2. 8.2. Identifying CPU-Intensive Processes
      1. 8.2.1. Problem
      2. 8.2.2. Solution
      3. 8.2.3. How It Works
    3. 8.3. Identifying CPU Bottlenecks
      1. 8.3.1. Problem
      2. 8.3.2. Solution
      3. 8.3.3. How It Works
    4. 8.4. Analyzing Historical CPU Load
      1. 8.4.1. Problem
      2. 8.4.2. Solution
      3. 8.4.3. How It Works
    5. 8.5. Identifying Memory-Intensive Processes
      1. 8.5.1. Problem
      2. 8.5.2. Solution
      3. 8.5.3. How It Works
    6. 8.6. Identifying Memory Bottlenecks
      1. 8.6.1. Problem
      2. 8.6.2. Solution
      3. 8.6.3. How It Works
    7. 8.7. Analyzing Historical Memory Load
      1. 8.7.1. Problem
      2. 8.7.2. Solution
      3. 8.7.3. How It Works
    8. 8.8. Monitoring Disk Space
      1. 8.8.1. Problem
      2. 8.8.2. Solution
      3. 8.8.3. How It Works
    9. 8.9. Monitoring I/O
      1. 8.9.1. Problem
      2. 8.9.2. Solution
      3. 8.9.3. How It Works
    10. 8.10. Analyzing Historical I/O Load
      1. 8.10.1. Problem
      2. 8.10.2. Solution
      3. 8.10.3. How It Works
    11. 8.11. Monitoring Network Traffic
      1. 8.11.1. Problem
      2. 8.11.2. Solution
      3. 8.11.3. How It Works
  13. 9. Viewing and Configuring System Resources
    1. 9.1. Displaying Server Hardware and the Operating System
      1. 9.1.1. Problem
      2. 9.1.2. Solution
      3. 9.1.3. How It Works
    2. 9.2. Listing CPUs
      1. 9.2.1. Problem
      2. 9.2.2. Solution
      3. 9.2.3. How It Works
    3. 9.3. Displaying Physical Memory
      1. 9.3.1. Problem
      2. 9.3.2. Solution
      3. 9.3.3. How It Works
    4. 9.4. Viewing Kernel Parameters
      1. 9.4.1. Problem
      2. 9.4.2. Solution
      3. 9.4.3. How It Works
    5. 9.5. Modifying Kernel Parameters
      1. 9.5.1. Problem
      2. 9.5.2. Solution
        1. 9.5.2.1. Running sysctl
        2. 9.5.2.2. Editing sysctl.conf
        3. 9.5.2.3. Adding Entries with echo
        4. 9.5.2.4. Adding Entries with cat
      3. 9.5.3. How It Works
    6. 9.6. Displaying Semaphores
      1. 9.6.1. Problem
      2. 9.6.2. Solution
      3. 9.6.3. How It Works
    7. 9.7. Configuring Semaphores
      1. 9.7.1. Problem
      2. 9.7.2. Solution
      3. 9.7.3. How It Works
    8. 9.8. Viewing Shared Memory Settings
      1. 9.8.1. Problem
      2. 9.8.2. Solution
      3. 9.8.3. How It Works
    9. 9.9. Modifying Shared Memory
      1. 9.9.1. Problem
      2. 9.9.2. Solution
      3. 9.9.3. How It Works
    10. 9.10. Viewing Memory Structures
      1. 9.10.1. Problem
      2. 9.10.2. Solution
      3. 9.10.3. How It Works
    11. 9.11. Removing In-Memory Structures
      1. 9.11.1. Problem
      2. 9.11.2. Solution
      3. 9.11.3. How It Works
    12. 9.12. Viewing Network Configuration Settings
      1. 9.12.1. Problem
      2. 9.12.2. Solution
      3. 9.12.3. How It Works
    13. 9.13. Configuring Network Settings
      1. 9.13.1. Problem
      2. 9.13.2. Solution
      3. 9.13.3. How It Works
    14. 9.14. Modifying System Open File Limits
      1. 9.14.1. Problem
      2. 9.14.2. Solution
      3. 9.14.3. How It Works
    15. 9.15. Showing Shell Limits
      1. 9.15.1. Problem
      2. 9.15.2. Solution
      3. 9.15.3. How It Works
    16. 9.16. Changing Shell Limits
      1. 9.16.1. Problem
      2. 9.16.2. Solution
      3. 9.16.3. How It Works
  14. 10. Managing Server Software
    1. 10.1. Installing Packages
      1. 10.1.1. Problem
      2. 10.1.2. Solution #1
      3. 10.1.3. Solution #2
      4. 10.1.4. How It Works
    2. 10.2. Switching to Oracle's Unbreakable Linux Network
      1. 10.2.1. Problem
      2. 10.2.2. Solution
        1. 10.2.2.1. Installing Oracle's up2date
        2. 10.2.2.2. Registering with ULN
      3. 10.2.3. How It Works
    3. 10.3. Associating Linux Files with RPM Packages
      1. 10.3.1. Problem
      2. 10.3.2. Solution
      3. 10.3.3. How It Works
    4. 10.4. Listing the Contents of an RPM Package
      1. 10.4.1. Problem
      2. 10.4.2. Solution
      3. 10.4.3. How It Works
    5. 10.5. Downloading RPMs
      1. 10.5.1. Problem
      2. 10.5.2. Solution
      3. 10.5.3. How It Works
    6. 10.6. Automating with Oracle Validated Install
      1. 10.6.1. Problem
      2. 10.6.2. Solution
      3. 10.6.3. How It Works
    7. 10.7. Upgrading Packages
      1. 10.7.1. Problem
      2. 10.7.2. Solution
      3. 10.7.3. How It Works
    8. 10.8. Removing Packages
      1. 10.8.1. Problem
      2. 10.8.2. Solution
      3. 10.8.3. How It Works
    9. 10.9. Checking RPM Requirements to Install Oracle Database
      1. 10.9.1. Problem
      2. 10.9.2. Solution
      3. 10.9.3. How It Works
    10. 10.10. Checking RPM Requirements for Grid Control and E-Business Suite
      1. 10.10.1. Problem
      2. 10.10.2. Solution
      3. 10.10.3. How It Works
    11. 10.11. Performing Silent Oracle Software Installation
      1. 10.11.1. Problem
      2. 10.11.2. Solution
      3. 10.11.3. How It Works
        1. 10.11.3.1. Troubleshooting Installation
        2. 10.11.3.2. Performing an Upgrade of Oracle Software
    12. 10.12. Ignoring System Prerequisites
      1. 10.12.1. Problem
      2. 10.12.2. Solution
      3. 10.12.3. How It Works
    13. 10.13. Creating a Database with a Response File
      1. 10.13.1. Problem
      2. 10.13.2. Solution
      3. 10.13.3. How It Works
    14. 10.14. Creating a Network Configuration with a Response File
      1. 10.14.1. Problem
      2. 10.14.2. Solution
      3. 10.14.3. How It Works
    15. 10.15. Applying Interim Patches
      1. 10.15.1. Problem
      2. 10.15.2. Solution
      3. 10.15.3. How It Works
    16. 10.16. Attaching an Oracle Home
      1. 10.16.1. Problem
      2. 10.16.2. Solution
      3. 10.16.3. How It Works
  15. 11. Automating Jobs
    1. 11.1. Automating Database Shutdown and Startup
      1. 11.1.1. Problem
      2. 11.1.2. Solution
      3. 11.1.3. How It Works
    2. 11.2. Automating the Shutdown and Startup of Oracle Application Server
      1. 11.2.1. Problem
      2. 11.2.2. Solution
      3. 11.2.3. How It Works
    3. 11.3. Enabling Access to Schedule Jobs
      1. 11.3.1. Problem
      2. 11.3.2. Solution
      3. 11.3.3. How It Works
    4. 11.4. Scheduling a Job to Run Automatically
      1. 11.4.1. Problem
      2. 11.4.2. Solution
        1. 11.4.2.1. Editing the cron Table Directly
        2. 11.4.2.2. Loading the cron Table from a File
      3. 11.4.3. How It Works
        1. 11.4.3.1. Formatting cron Table Entries
        2. 11.4.3.2. Redirecting cron Output
        3. 11.4.3.3. Troubleshooting cron
    5. 11.5. Automating Oracle Performance Reports
      1. 11.5.1. Problem
      2. 11.5.2. Solution
      3. 11.5.3. How It Works
    6. 11.6. Monitoring Jobs Using the Data Dictionary
      1. 11.6.1. Problem
      2. 11.6.2. Solution
      3. 11.6.3. How It Works
    7. 11.7. Monitoring Tablespace Fullness
      1. 11.7.1. Problem
      2. 11.7.2. Solution
      3. 11.7.3. How It Works
    8. 11.8. Automating File Maintenance
      1. 11.8.1. Problem
      2. 11.8.2. Solution
      3. 11.8.3. How It Works
    9. 11.9. Rotating Your Log Files
      1. 11.9.1. Problem
      2. 11.9.2. Solution
      3. 11.9.3. How It Works
    10. 11.10. Scheduling a Job using DBMS_SCHEDULER
      1. 11.10.1. Problem
      2. 11.10.2. Solution
      3. 11.10.3. How It Works
  16. 12. Implementing Automatic Storage Management on Linux
    1. 12.1. Installing RPMs for ASMLIB
      1. 12.1.1. Problem
      2. 12.1.2. Solution
      3. 12.1.3. How It Works
    2. 12.2. Installing ASMLIB from Oracle's Unbreakable Linux Network
      1. 12.2.1. Problem
      2. 12.2.2. Solution
      3. 12.2.3. How It Works
    3. 12.3. Autostarting the Non-RAC ASM Instance After a Reboot
      1. 12.3.1. Problem
      2. 12.3.2. Solution
      3. 12.3.3. How It Works
    4. 12.4. Configuring ASMLIB
      1. 12.4.1. Problem
      2. 12.4.2. Solution
      3. 12.4.3. How It Works
    5. 12.5. Labeling Disks with ASMLIB
      1. 12.5.1. Problem
      2. 12.5.2. Solution
      3. 12.5.3. How It Works
    6. 12.6. Unmarking ASMLIB Disks
      1. 12.6.1. Problem
      2. 12.6.2. Solution
      3. 12.6.3. How It Works
    7. 12.7. Changing the Disk Label of Member Disks
      1. 12.7.1. Problem
      2. 12.7.2. Solution
      3. 12.7.3. How It Works
    8. 12.8. Listing ASMLIB Disks
      1. 12.8.1. Problem
      2. 12.8.2. Solution
      3. 12.8.3. How It Works
    9. 12.9. Troubleshooting ASMLIB
      1. 12.9.1. Problem
      2. 12.9.2. Solution
    10. 12.10. Checking ASMLIB Status
      1. 12.10.1. Problem
      2. 12.10.2. Solution
      3. 12.10.3. How It Works
    11. 12.11. Installing ASM Software on a Non-RAC Implementation
      1. 12.11.1. Problem
      2. 12.11.2. Solution
      3. 12.11.3. How It Works
    12. 12.12. Creating the ASM Instance
      1. 12.12.1. Problem
      2. 12.12.2. Solution
      3. 12.12.3. How It Works
    13. 12.13. Connecting to a Remote ASM Instance
      1. 12.13.1. Problem
      2. 12.13.2. Solution
      3. 12.13.3. How It Works
    14. 12.14. Creating an ASM Diskgroup
      1. 12.14.1. Problem
      2. 12.14.2. Solution
      3. 12.14.3. How It Works
    15. 12.15. Adding Disks to an Existing Diskgroup
      1. 12.15.1. Problem
      2. 12.15.2. Solution
      3. 12.15.3. How It Works
    16. 12.16. Dropping an ASM Diskgroup
      1. 12.16.1. Problem
      2. 12.16.2. Solution
      3. 12.16.3. How It Works
    17. 12.17. Invoking the ASM Command Shell
      1. 12.17.1. Problem
      2. 12.17.2. Solution
      3. 12.17.3. How It Works
    18. 12.18. Displaying Online Manual Pages
      1. 12.18.1. Problem
      2. 12.18.2. Solution
      3. 12.18.3. How It Works
    19. 12.19. Removing Files or Directories for a Database with asmcmd
      1. 12.19.1. Problem
      2. 12.19.2. Solution
      3. 12.19.3. How It Works
    20. 12.20. Reviewing Disk Usage with asmcmd
      1. 12.20.1. Problem
      2. 12.20.2. Solution
      3. 12.20.3. How It Works
    21. 12.21. Locating Files in ASM with asmcmd
      1. 12.21.1. Problem
      2. 12.21.2. Solution
      3. 12.21.3. How It Works
    22. 12.22. Listing Currently Connected Clients
      1. 12.22.1. Problem
      2. 12.22.2. Solution
      3. 12.22.3. How It Works
    23. 12.23. Retrieving Diskgroup Information with asmcmd
      1. 12.23.1. Problem
      2. 12.23.2. Solution
      3. 12.23.3. How It Works
    24. 12.24. Retrieving Disk Information with asmcmd
      1. 12.24.1. Problem
      2. 12.24.2. Solution
      3. 12.24.3. How It Works
    25. 12.25. Migrating to ASM from the Filesystem
      1. 12.25.1. Problem
      2. 12.25.2. Solution #1 (Preferred)
      3. 12.25.3. How It Works #1
      4. 12.25.4. Solution #2
      5. 12.25.5. How It Works
    26. 12.26. Creating a Database in ASM
      1. 12.26.1. Problem
      2. 12.26.2. Solution
      3. 12.26.3. How It Works
    27. 12.27. Creating/Adding Database Files in ASM
      1. 12.27.1. Problem
      2. 12.27.2. Solution
      3. 12.27.3. How It Works
  17. 13. Implementing Real Application Clusters on Linux
    1. 13.1. Architecting a RAC Environment
      1. 13.1.1. Problem
      2. 13.1.2. Solution
      3. 13.1.3. How It Works
    2. 13.2. Setting Up the Linux Kernel Parameters for RAC
      1. 13.2.1. Problem
      2. 13.2.2. Solution
      3. 13.2.3. How It Works
    3. 13.3. Installing the cvuqdisk Package
      1. 13.3.1. Problem
      2. 13.3.2. Solution
      3. 13.3.3. How It Works
    4. 13.4. Setting Up the /etc/hosts File
      1. 13.4.1. Problem
      2. 13.4.2. Solution
      3. 13.4.3. How It Works
    5. 13.5. Setting Up User Equivalence
      1. 13.5.1. Problem
      2. 13.5.2. Solution
      3. 13.5.3. How It Works
    6. 13.6. Checking the OS and Hardware Configuration
      1. 13.6.1. Problem
      2. 13.6.2. Solution
      3. 13.6.3. How It Works
    7. 13.7. Installing Oracle Clusterware
      1. 13.7.1. Problem
      2. 13.7.2. Solution
      3. 13.7.3. How It Works
    8. 13.8. Removing Oracle Clusterware Software
      1. 13.8.1. Problem
      2. 13.8.2. Solution
      3. 13.8.3. How It Works
    9. 13.9. Registering RAC Resources
      1. 13.9.1. Problem
      2. 13.9.2. Solution
      3. 13.9.3. How It Works
    10. 13.10. Starting and Shutting Down RAC Resources
      1. 13.10.1. Problem
      2. 13.10.2. Solution
      3. 13.10.3. How It Works
    11. 13.11. Obtaining Help for the srvctl Command
      1. 13.11.1. Problem
      2. 13.11.2. Solution
      3. 13.11.3. How It Works
    12. 13.12. Viewing CRS Resources
      1. 13.12.1. Problem
      2. 13.12.2. Solution
      3. 13.12.3. How It Works
    13. 13.13. Debugging srvctl
      1. 13.13.1. Problem
      2. 13.13.2. Solution
      3. 13.13.3. How It Works
    14. 13.14. Configuring the hangcheck-timer Kernel Module
      1. 13.14.1. Problem
      2. 13.14.2. Solution
      3. 13.14.3. How It Works
    15. 13.15. Starting and Stopping Oracle Clusterware
      1. 13.15.1. Problem
      2. 13.15.2. Solution
      3. 13.15.3. How It Works
    16. 13.16. Enabling and Disabling CRS from Autostartup
      1. 13.16.1. Problem
      2. 13.16.2. Solution
      3. 13.16.3. How It Works
    17. 13.17. Checking the Viability of Oracle Clusterware
      1. 13.17.1. Problem
      2. 13.17.2. Solution
      3. 13.17.3. How It Works
    18. 13.18. Converting a Stand-Alone Database to RAC
      1. 13.18.1. Problem
      2. 13.18.2. Solution
      3. 13.18.3. How It Works
    19. 13.19. Bonding Network Interface Cards
      1. 13.19.1. Problem
      2. 13.19.2. Solution
      3. 13.19.3. How It Works
    20. 13.20. Implementing RAC on NFS
      1. 13.20.1. Problem
      2. 13.20.2. Solution
      3. 13.20.3. How It Works
    21. 13.21. Adding Voting Disks
      1. 13.21.1. Problem
      2. 13.21.2. Solution
      3. 13.21.3. How It Works
    22. 13.22. Removing/Moving a Voting Disk
      1. 13.22.1. Problem
      2. 13.22.2. Solution
      3. 13.22.3. How It Works
    23. 13.23. Implementing RAC on OCFS2
      1. 13.23.1. Problem
      2. 13.23.2. Solution
      3. 13.23.3. How It Works
  18. 14. Working Securely Across a Network
    1. 14.1. Setting Up SSH
      1. 14.1.1. Problem
      2. 14.1.2. Solution
      3. 14.1.3. How It Works
    2. 14.2. Generating Host Keys
      1. 14.2.1. Problem
      2. 14.2.2. Solution
      3. 14.2.3. How It Works
    3. 14.3. Logging On Securely
      1. 14.3.1. Problem
      2. 14.3.2. Solution
      3. 14.3.3. How It Works
    4. 14.4. Copying Files Securely
      1. 14.4.1. Problem
      2. 14.4.2. Solution
      3. 14.4.3. How It Works
    5. 14.5. Authenticating Through Public Keys
      1. 14.5.1. Problem
      2. 14.5.2. Solution
      3. 14.5.3. How It Works
    6. 14.6. Configuring a Promptless Logon
      1. 14.6.1. Problem
      2. 14.6.2. Solution
      3. 14.6.3. How It Works
    7. 14.7. Securing an Unsecured Connection
      1. 14.7.1. Problem
      2. 14.7.2. Solution
      3. 14.7.3. How It Works
  19. 15. Managing X Window
    1. 15.1. Configuring an X Server
      1. 15.1.1. Problem
      2. 15.1.2. Solution
        1. 15.1.2.1. Running system-config-display
        2. 15.1.2.2. Running Xorg
      3. 15.1.3. How It Works
    2. 15.2. Starting an X Server
      1. 15.2.1. Problem
      2. 15.2.2. Solution
      3. 15.2.3. How It Works
    3. 15.3. Stopping the X Server
      1. 15.3.1. Problem
      2. 15.3.2. Solution
      3. 15.3.3. How It Works
    4. 15.4. Displaying an X Client on a Remote Server
      1. 15.4.1. Problem
      2. 15.4.2. Solution
      3. 15.4.3. How It Works
    5. 15.5. Tunneling X Over SSH
      1. 15.5.1. Problem
      2. 15.5.2. Solution
      3. 15.5.3. How It Works
    6. 15.6. Changing Desktop Environment
      1. 15.6.1. Problem
      2. 15.6.2. Solution
      3. 15.6.3. How It Works
    7. 15.7. Manipulating the Terminal Emulator for X Windows
      1. 15.7.1. Problem
      2. 15.7.2. Solution
      3. 15.7.3. How It Works
  20. 16. Managing Remote Servers with VNC
    1. 16.1. Downloading the VNC Software
      1. 16.1.1. Problem
      2. 16.1.2. Solution
      3. 16.1.3. How It Works
    2. 16.2. Installing the VNC Software
      1. 16.2.1. Problem
      2. 16.2.2. Solution
      3. 16.2.3. How It Works
    3. 16.3. Manually Starting and Stopping the VNC Server
      1. 16.3.1. Problem
      2. 16.3.2. Solution
      3. 16.3.3. How It Works
    4. 16.4. Automatically Starting the VNC Server
      1. 16.4.1. Problem
      2. 16.4.2. Solution
      3. 16.4.3. How It Works
    5. 16.5. Starting the VNC Viewer
      1. 16.5.1. Problem
      2. 16.5.2. Solution
      3. 16.5.3. How It Works
    6. 16.6. Sharing a VNC Connection
      1. 16.6.1. Problem
      2. 16.6.2. Solution
      3. 16.6.3. How It Works
    7. 16.7. Securing a VNC Connection
      1. 16.7.1. Problem
      2. 16.7.2. Solution
      3. 16.7.3. How It Works
    8. 16.8. 16-8 Accessing VNC via a Proxy Server
      1. 16.8.1. Problem
      2. 16.8.2. Solution
      3. 16.8.3. How It Works
    9. 16.9. Running X Applications with VNC
      1. 16.9.1. Problem
      2. 16.9.2. Solution
      3. 16.9.3. How It Works
    10. 16.10. Troubleshooting VNC
      1. 16.10.1. Problem
      2. 16.10.2. Solution
        1. 16.10.2.1. VNC Server
        2. 16.10.2.2. VNC Viewer
        3. 16.10.2.3. Connectivity
      3. 16.10.3. How It Works
  21. A. RAID Concepts
    1. A.1. Understanding RAID
      1. A.1.1. Defining Array, Stripe Width, Stripe Size, Chunk Size
      2. A.1.2. RAID 0
      3. A.1.3. RAID 1
    2. A.2. Generating Parity
      1. A.2.1. RAID 4
      2. A.2.2. RAID 5
    3. A.3. Building Hybrid (Nested) RAID Devices
      1. A.3.1. RAID 0+1
      2. A.3.2. RAID 1+0
      3. A.3.3. RAID 5+0
    4. A.4. Determining Disk Requirements
    5. A.5. Capacity Planning
    6. A.6. Summary
  22. B. Server Log Files
    1. B.1. Rotating Log Files
    2. B.2. Setting Up a Custom Log Rotation
    3. B.3. Monitoring Log Files