Free Essay

Creating Data Guard

In:

Submitted By subhasg
Words 2998
Pages 12
DataGuard : Step-by-Step Instructions for Creating a Physical Standby DatabaseThis is a featured page
DataGuard : Step-by-Step Instructions for Creating a Physical StandbyDatabase (By Wissem EL KHLIFI)
Step-by-Step Instructions for Creating a Physical Standby Database using SQL commands

1. General Overview :

The purpose of this document is to create a step by step guideline for using the Oracle Dataguard a High available mechanism. I spent about 7 days investigating about a problem faced from my first dataguard experience. Both primary and standby servers are on linux redhat : same version of OS. - Primary DB : 10.2.0.1
- Standby DB : 10.2.0.3 - Host Name of Primary DB : arcdb01.es.egwn.lan
- Host Name of Standby DB : x06.d15.lan I m trying to setup oracle dataguard for 10G ; both primary and standby databases are in 10GR2.
Configuring Oracle DataGuard using SQL commands – Creating a physical standby database ; I can’t get the log files or Archive logs on my StandBy db.
Checking v$archive_dest_status view on PRIMARY DB, I found the error below : FROM PRIMARY DB : I getting an error Oracle not available SELECT * FROM v$archive_dest_status DEST_ID 2
DEST_NAME LOG_ARCHIVE_DEST_2
STATUS ERROR
TYPE PHYSICAL
DATABASE_MODE UNKNOWN
RECOVERY_MODE UNKNOWN
PROTECTION_MODE MAXIMUM PERFORMANCE
DESTINATION X06.D15.LAN
STANDBY_LOGFILE_COUNT 0
STANDBY_LOGFILE_ACTIVE 0
ARCHIVED_THREAD# 0
ARCHIVED_SEQ# 0
APPLIED_THREAD# 0
APPLIED_SEQ# 0
ERROR ORA-01034: ORACLE not available
SRL NO
DB_UNIQUE_NAME STANDBY
SYNCHRONIZATION_STATUS CHECK CONFIGURATION
SYNCHRONIZED NO
Logfiles were not applied on my standby DB even I thougth all confirgurations were succesfully done, until I realized the origin of my problem was the version of Oracle on both server. Even both oracle servers were in Oracle 10GR2, please always make sure that they have the SAME VERSION.
I spent a little bit more than hour to patch my Primary DB to 10.2.0.3 and now My dataguard works perfectly.

2- Step by Step :

In this section we will perform our Data Guard WorkShop, which outlines the procedure to create a Physical standby. Steps are :
- Create a backup of the primary
- Create a Standby Control file
- adjust the pfile of the Primary
- Transfer the datafiles to the standby host
- create same directories for trace files
- edit the pfile of the standby
- mount the standby Notes : Both primary and standby servers are on linux redhat : same version of OS - Primary DB : 10.2.0.3
- Standby DB : 10.2.0.3 - Host Name of Primary DB : arcdb01.es.egwn.lan
- Host Name of Standby DB : x06.d15.lan Step 1 : Setup Listeners
Tnsnames.ora of the Primary DB :
[oracle@arcdb01 ~]$ export TNS_ADMIN=$ORACLE_HOME/network/admin
[oracle@arcdb01 ~]$ cat /u01/app/oracle/oracle/product/10.2.0/ARCDB01/network/admin/tnsnames.ora
X06.D15.LAN =
(DESCRIPTION =
(ADDRESS_LIST =
(ADDRESS = (PROTOCOL = TCP)(HOST = X06.D15.LAN)(PORT = 1521))
)
(CONNECT_DATA =
(SID = ARCDB01)
(SERVER = DEDICATED)
)
)
ARCDB01.ES.EGWN.LAN =
(DESCRIPTION =
(ADDRESS_LIST =
(ADDRESS = (PROTOCOL = TCP)(HOST = ARCDB01.ES.EGWN.LAN)(PORT = 1521))
)
(CONNECT_DATA =
(SID = ARCDB01)
(SERVER = DEDICATED)
)
) Tnsnames.ora of the Standby DB :
[oracle@x06 dbf]$ export TNS_ADMIN=$ORACLE_HOME/network/admin
[oracle@x06 dbf]$ cat $TNS_ADMIN/tnsnames.ora
# tnsnames.ora Network Configuration File: /u01/app/oracle/oracle/product/10.2.0/X06/oracle/network/admin/tnsnames.ora
# Generated by Oracle configuration tools.
ARCDB01.ES.EGWN.LAN =
(DESCRIPTION =
(ADDRESS_LIST =
(ADDRESS = (PROTOCOL = TCP)(HOST = ARCDB01.ES.EGWN.LAN)(PORT = 1521))
)
(CONNECT_DATA =
(SID = ARCDB01)
(SERVER = DEDICATED)
)
)
X06.D15.LAN =
(DESCRIPTION =
(ADDRESS_LIST =
(ADDRESS = (PROTOCOL = TCP)(HOST = X06.D15.LAN)(PORT = 1521))
)
(CONNECT_DATA =
(SID = ARCDB01)
(SERVER = DEDICATED)
)
)
[oracle@x06 dbf]$
Step 2 : check Listeners status

TNSPING of the STANDBY DB from the PRIMARY DB : [oracle@arcdb01 ~]$ tnsping x06.d15.lan TNS Ping Utility for Linux: Version 10.2.0.3.0 – Production on 26-MAR-2010 15:33:12 Copyright (c) 1997, 2005, Oracle. All rights reserved. Used parameter files:
/u01/app/oracle/oracle/product/10.2.0/ARCDB01/network/admin/sqlnet.ora Used TNSNAMES adapter to resolve the alias
Attempting to contact (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP)(HOST = X06.D15.LAN)(PORT = 1521))) (CONNECT_DATA = (SID = ARCDB01) (SERVER = DEDICATED)))
OK (0 msec)
[oracle@arcdb01 ~]$

TNSPING Of the Primary DB from the Standby DB : [oracle@x06 bdump]$ tnsping ARCDB01.ES.EGWN.LAN TNS Ping Utility for Linux: Version 10.2.0.3.0 – Production on 26-MAR-2010 15:34:05 Copyright (c) 1997, 2006, Oracle. All rights reserved. Used parameter files:
/u01/app/oracle/oracle/product/10.2.0/X06/oracle/network/admin/sqlnet.ora Used TNSNAMES adapter to resolve the alias
Attempting to contact (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = TCP)(HOST = ARCDB01.ES.EGWN.LAN)(PORT = 1521))) (CONNECT_DATA = (SID = ARCDB01) (SERVER = DEDICATED)))
OK (20 msec)
[oracle@x06 bdump]$ Step 3 : Enable archiving and force logging As a dataguard is dependent on redo to maintain the standby, we must assure that the primary database is in archivelog mode. To place the primary into archivelog, perform the following steps :
[oracle@arcdb01 ~]$ sqlplus /nolog SQL*Plus: Release 10.2.0.3.0 – Production on Mon Mar 22 20:26:19 2010 Copyright (c) 1982, 2005, Oracle. All rights reserved. SQL> connect sys as sysdba
Enter password:
Connected.
SQL>
SQL> show parameter spfile NAME TYPE VALUE
———————————— ———– —————————— spfile string /u01/app/oracle/oracle/product
/10.2.0/ARCDB01/dbs/spfileARCD
B01.ora
SQL> select force_logging from v$database
2 ; FOR

NO SQL> archive log list
Database log mode Archive Mode
Automatic archival Enabled
Archive destination /u01/app/oracle/flash_recovery_area/ARCDB01/archivelog/
Oldest online log sequence 1418
Next log sequence to archive 1420
Current log sequence 1420
SQL> shutdown immediate;
Database closed.
Database dismounted.
ORACLE instance shut down.
SQL> startup mount
ORACLE instance started. Total System Global Area 419430400 bytes
Fixed Size 2021280 bytes
Variable Size 117442656 bytes
Database Buffers 293601280 bytes
Redo Buffers 6365184 bytes
Database mounted.
SQL> alter database archivelog ; Database altered. SQL> alter database force logging; Database altered. SQL> alter database open; Database altered. SQL>
SQL>
SQL> select log_mode, force_logging from v$database; LOG_MODE FOR
———— —
ARCHIVELOG YES
Step 4 : Create a password file
Due to new log transport security and authentification features, it is madatory that every database in a Dataguard configuration utilize a password file. In addition, the password for the sys user must be identical on every system for log transport services to function, If the primary DB does not currently have a password file, create one with the following steps : [oracle@arcdb01 ~]$ orapwd file=/u00/oracle/product/10.2.0/db_1/dbs/orapwarcdb01 password=orawiss entries=5 force=y Once the password file is created, you must set the following parameter in the spfile while the database is in nomount state : alter system set remote_login_passwordfile=exclusive scope=spfile; Tansfer the password file to the standby DB :
[oracle@x06 dbf]$ cd /u01/app/oracle/oracle/product/10.2.0/X06/oracle/dbs/
[oracle@x06 dbs]$ ls hc_X06.dat initdw.ora init.ora lkSTANDBY lkX06 orapwarcdb01 orapwX06 spfileX06.ora
[oracle@x06 dbs]$ Step 5 : Configure the primary initilization paraneters We must configure the parameters to control log transport services and log apply services so that the database will operate in either role with no parameter modification. While the database is mounted on a primry controlfile , the standby parameters are not read and are not into effect, so they will not affect the operation of the database while in the primary role.
The parameters shown here are in bold, to be placed into a primary standby.ora pfile :
[oracle@arcdb01 ~]$ vi /home/oracle/ADVDB/standby.ora ARCDB01.__db_cache_size=297795584
ARCDB01.__java_pool_size=4194304
ARCDB01.__large_pool_size=4194304
ARCDB01.__shared_pool_size=100663296
ARCDB01.__streams_pool_size=4194304
*.audit_file_dest=’/u01/app/oracle/admin/ARCDB01/adump’
*.background_dump_dest=’/u01/app/oracle/admin/ARCDB01/bdump’
*.compatible=’10.2.0.1.0?
*.control_file_record_keep_time=8
*.control_files=’/u01/app/oracle/oradata/ARCDB01/control01.ctl’,'/u01/app/oracle/oradata/ARCDB01/control02.ctl’,'/u01/app/oracle/oradata/ARCDB01/control03.ctl’
*.core_dump_dest=’/u01/app/oracle/admin/ARCDB01/cdump’
*.db_block_checking=’TRUE’
*.db_block_size=8192
*.db_domain=”
*.db_file_multiblock_read_count=16
*.db_name=’ARCDB01?
*.db_recovery_file_dest=’/u01/app/oracle/flash_recovery_area’
*.db_recovery_file_dest_size=2147483648
*.db_unique_name=’PRIMARY’
*.dispatchers=’(PROTOCOL=TCP) (SERVICE=ARCDB01XDB)’
*.FAL_Client=’ARCDB01.ES.EGWN.LAN’
*.FAL_Server=’X06.D15.LAN’
*.job_queue_processes=10
*.LOG_ARCHIVE_CONFIG=’DG_CONFIG=(PRIMARY,STANDBY)’
*.log_archive_dest_1=’location=/u01/app/oracle/flash_recovery_area/ARCDB01/archivelog/’
*.log_archive_dest_2=’Service=X06.D15.LAN LGWR ASYNC
VALID_FOR=(ONLINE_LOGFILES,PRIMARY_ROLE)
DB_UNIQUE_NAME=STANDBY’
*.log_archive_dest_state_1=’ENABLE’
*.log_archive_dest_state_2=’DEFER’
*.log_archive_format=’%s_arc_ln%r_db%d_%t.arc’
*.open_cursors=300
*.pga_aggregate_target=16777216
*.processes=200
*.remote_login_passwordfile=’EXCLUSIVE’
*.SERVICE_NAMES=’PRIMARY’
*.sessions=205
*.sga_max_size=419430400
*.sga_target=419430400
*.Standby_File_Management=’AUTO’
*.undo_management=’AUTO’
*.undo_tablespace=’UNDOTBS1?
*.user_dump_dest=’/u01/app/oracle/admin/ARCDB01/udump’
*.utl_file_dir=’/home/oracle/my_logminer’

Step 6 : Create a backup of the primary database
A physical standby can be created using either a hot or cold backup as long as all the necessary archivelogs are available to bring the database to be a consistent state. You can simply use RMAN to backup the primary database.
RMAN> backup database plus archivelog; Step 7 : Create the Primary spfile and Standby controlfile
First, restard the primary DB using the pfile created in step 5 and then, with the primary DB in either a mount or open state, create a standby controlfile with the following syntaxes :
[oracle@arcdb01 ~]$ vi /home/oracle/ADVDB/standby.ora
[oracle@arcdb01 ~]$ sqlplus /nolog SQL*Plus: Release 10.2.0.3.0 – Production on Sun Mar 28 14:53:18 2010 Copyright (c) 1982, 2006, Oracle. All Rights Reserved. SQL> connect sys as sysdba
Enter password:
Connected to an idle instance.
SQL> create spfile from pfile=’/home/oracle/ADVDB/standby.ora’; File created. SQL> startup
ORACLE instance started. Total System Global Area 419430400 bytes
Fixed Size 2073248 bytes
Variable Size 113249632 bytes
Database Buffers 297795584 bytes
Redo Buffers 6311936 bytes
Database mounted.
Database opened.
SQL> alter database create standby controlfile as ‘/home/oracle/ADVDB/standby_x06.ctl’;
Database altered.
SQL>
SQL> create pfile=’/home/oracle/ADVDB/standby.ora’ from spfile;
File created.
SQL> As you can see in te last command, we create a standby pfile from the spfile, jut to be sure to have the correct pfile when this will be transferred to the standby Db, modified and the used as a pfile of the standby db.
Step 7 : Create the Standby spfile
Remember, at the previous step, we have created the pfile, this should be transferred to the standby host using for example scp or sftp commands.
Now, we should modify the pfile of the standby DB. below, are parameters that needed to be modified in our configuration. ARCDB01.__java_pool_size=4194304
ARCDB01.__large_pool_size=4194304
ARCDB01.__shared_pool_size=100663296
ARCDB01.__streams_pool_size=4194304
*.audit_file_dest=’/u01/app/oracle/admin/ARCDB01/adump’
*.background_dump_dest=’/u01/app/oracle/admin/ARCDB01/bdump’
*.compatible=’10.2.0.1.0?
*.control_file_record_keep_time=8
*.control_files=’/home/oracle/dbf/standby_x06.ctl’
*.db_file_name_convert=’/u01/app/oracle/oradata/ARCDB01?,’/home/oracle/dbf’,'/home/oracle/oradata’,'/home/oracle/dbf’
*.log_file_name_convert=’/u01/app/oracle/oradata/ARCDB01?,’/home/oracle/dbf’,'/home/oracle/oradata’,'/home/oracle/dbf’
*.core_dump_dest=’/u01/app/oracle/admin/ARCDB01/cdump’
*.db_block_checking=’TRUE’
*.db_block_size=8192
*.db_domain=”
*.db_file_multiblock_read_count=16
*.db_name=’ARCDB01?
*.db_recovery_file_dest=’/u01/app/oracle/flash_recovery_area’
*.db_recovery_file_dest_size=2147483648
*.db_unique_name=’STANDBY’
*.dispatchers=’(PROTOCOL=TCP) (SERVICE=ARCDB01XDB)’
*.FAL_Server=’ARCDB01.ES.EGWN.LAN’
*.FAL_client=’X06.D15.LAN’
*.job_queue_processes=10
*.LOG_ARCHIVE_CONFIG=’DG_CONFIG=(PRIMARY,STANDBY)’
*.log_archive_dest_1=’location=/u01/app/oracle/flash_recovery_area/ARCDB01/archivelog/’
*.log_archive_dest_2=’Service=ARCDB01.ES.EGWN.LAN
VALID_FOR=(ONLINE_LOGFILES,PRIMARY_ROLE)
DB_UNIQUE_NAME=PRIMARY’
*.log_archive_dest_state_1=’ENABLE’
*.log_archive_dest_state_2=’ENABLE’
*.log_archive_format=’%s_arc_ln%r_db%d_%t.arc’
*.open_cursors=300
*.pga_aggregate_target=16777216
*.processes=200
*.remote_login_passwordfile=’EXCLUSIVE’
*.SERVICE_NAMES=’PRIMARY’
*.sessions=205
*.sga_max_size=419430400
*.sga_target=419430400
*.Standby_File_Management=’AUTO’
*.undo_management=’AUTO’
*.undo_tablespace=’UNDOTBS1?
*.user_dump_dest=’/u01/app/oracle/admin/ARCDB01/udump’
*.utl_file_dir=’/home/oracle/my_logminer’ Please not that other parameters, such as dump destinations, may need to be modified depending on your environment.
Step 8 : Transfer files to the standby host
Using an operating system utility, transfer the files of the primary DB to the standby DB including :
- The controlfile generated previously (standby_x06.ctl)
- The Standby.ora pfile modified in the previous step
- All primary DB datafiles, you can use the steps below : from the Primary DB, connect as a DBA :

SQL> SELECT *
FROM Dba_Data_Files ;
FILE_NAME
/u01/app/oracle/oradata/ARCDB01/users01.dbf
/u01/app/oracle/oradata/ARCDB01/sysaux01.dbf
/u01/app/oracle/oradata/ARCDB01/undotbs01.dbf
/u01/app/oracle/oradata/ARCDB01/system01.dbf
/u01/app/oracle/oradata/ARCDB01/rep_for_rman_devexen15.dbf
/u01/app/oracle/oradata/ARCDB01/REP_FOR_BACKRECK_TEST_01.dbf
/u01/app/oracle/oradata/ARCDB01/indx_01.dbf
SQL> shutdown immediate ;
Database closed.
Database dismounted.
ORACLE instance shut down. from the standby DB :
Using username “oracle”.
Authenticating with public key “imported-openssh-key”
Red Hat Enterprise Linux Server release 5.4 – Linux 2.6.18-164.11.1.el5xen
Four 2.83GHz Intel Pentium Xeon cpus with 4GB RAM
-> x06.d15.lan get *.dbf
Fetching /u01/app/oracle/oradata/ARCDB01/REP_FOR_BACKRECK_TEST_01.dbf to REP_FOR _BACKRECK_TEST_01.dbf
/u01/app/oracle/oradata/ARCDB01/REP_FOR_BACKRECK_TEST_01.dbf 100% 3315MB 24.0MB/s 02:18
Fetching /u01/app/oracle/oradata/ARCDB01/cp_indx_01.dbf to cp_indx_01.dbf
/u01/app/oracle/oradata/ARCDB01/cp_indx_01.dbf 100% 600MB 26.1MB/s 00:23
Fetching /u01/app/oracle/oradata/ARCDB01/indx_01.dbf to indx_01.dbf
/u01/app/oracle/oradata/ARCDB01/indx_01.dbf 100% 600MB 26.1MB/s 00:23
Fetching /u01/app/oracle/oradata/ARCDB01/rep_for_rman_devexen15.dbf to rep_for_rman_devexen15.dbf
/u01/app/oracle/oradata/ARCDB01/rep_for_rman_devexen15.dbf 100% 50MB 25.0MB/s 00:02
Fetching /u01/app/oracle/oradata/ARCDB01/sysaux01.dbf to sysaux01.dbf
/u01/app/oracle/oradata/ARCDB01/sysaux01.dbf 100% 530MB 21.2MB/s 00:25
Fetching /u01/app/oracle/oradata/ARCDB01/system01.dbf to system01.dbf
/u01/app/oracle/oradata/ARCDB01/system01.dbf 100% 520MB 27.4MB/s 00:19
Fetching /u01/app/oracle/oradata/ARCDB01/temp01.dbf to temp01.dbf
/u01/app/oracle/oradata/ARCDB01/temp01.dbf 100% 164MB 23.4MB/s 00:07
Fetching /u01/app/oracle/oradata/ARCDB01/undotbs01.dbf to undotbs01.dbf
/u01/app/oracle/oradata/ARCDB01/undotbs01.dbf 100% 655MB 26.2MB/s 00:25
Fetching /u01/app/oracle/oradata/ARCDB01/users01.dbf to users01.dbf
/u01/app/oracle/oradata/ARCDB01/users01.dbf 100% 5128KB 5.0MB/s 00:00 sftp> Step 9 : Create an spfile for the standby instance
From the standby DB :
SQL> shutdown immediate;
ORA-01109: database not open
Database dismounted.
ORACLE instance shut down.
SQL> create spfile from pfile=’/home/oracle/dbf/standby.ora’;
File created.
SQL> startup nomount;
ORACLE instance started.
Total System Global Area 419430400 bytes
Fixed Size 2073248 bytes
Variable Size 134221152 bytes
Database Buffers 276824064 bytes
Redo Buffers 6311936 bytes
SQL> alter database mount standby database;
Database altered.
SQL> Step 10 : Begin shipping redo to the standby database if you remember, earlier we deferred log_archive_dest_2 on the primary until we had the standby mounted. Now, it is time to enable that destination and begin shipping redo to the standby.
On the primary, enter the following command : alter system set log_archive_dest_state_2=enable scope=both; Sometimes it happens that you face the problem of Archive Gaps where by a range of archived redo log files is created. Archive gaps are created whenever the next archived redo log file generated by the primary database is not applied to the standby database. It is usually recommended to increase the LOG_ARCHIVE_MAX_PROCESSES parameter in order to resolve archive gaps by controlling the number of archive processes the instance uses.
I recommand you to increase your archive max processes parameter at your both primary and standby db : alter system set log_archive_max_processes=4 scope=both;
From the primary DB, Check the sequence # and the archiving mode by executing following command :
SQL> Archive Log List
Database log mode Archive Mode
Automatic archival Enabled
Archive destination /u01/app/oracle/flash_recovery_area/ARCDB01/archivelog/
Oldest online log sequence 1592
Next log sequence to archive 1594
Current log sequence 1594 Next, peform a log switch on the primary and verify that the transmission of the log was successful :
SQL> alter system switch logfile; System altered.
SQL> SELECT * FROM v$archive_dest where dest_id=2 ;
DEST_ID 2
DEST_NAME LOG_ARCHIVE_DEST_2
STATUS VALID
BINDING OPTIONAL
NAME_SPACE SYSTEM
TARGET STANDBY
ARCHIVER LGWR
SCHEDULE ACTIVE
DESTINATION X06.D15.LAN
LOG_SEQUENCE 1599
REOPEN_SECS 300
DELAY_MINS 0
MAX_CONNECTIONS 1
NET_TIMEOUT 180
PROCESS LGWR
REGISTER YES
FAIL_DATE
FAIL_SEQUENCE 0
FAIL_BLOCK 0
FAILURE_COUNT 0
MAX_FAILURE 0
ERROR
ALTERNATE NONE
DEPENDENCY NONE
REMOTE_TEMPLATE NONE
QUOTA_SIZE 0
QUOTA_USED 0
MOUNTID 0
TRANSMIT_MODE ASYNCHRONOUS
ASYNC_BLOCKS 61440
AFFIRM NO
TYPE PUBLIC
VALID_NOW YES
VALID_TYPE ONLINE_LOGFILE
VALID_ROLE PRIMARY_ROLE
DB_UNIQUE_NAME STANDBY
VERIFY NO if the transmission was successful, the status of the destination should be valid. If the status is invalid, investigate the error listed in the error column to correct any issues. Now, lets make a real test on our dataguard system : From the primary DB : Connected to Oracle Database 10g Enterprise Edition Release 10.2.0.3.0
Connected as wissem
SQL> create table test (teste number);
Table created
SQL> insert into test values (1);
1 row inserted
SQL> commit;
Commit complete
SQL> From the Standby DB : SQL> select * from dba_users d where d.username = ‘WISSEM’;
USERNAME USER_ID PASSWORD
—————————— ———- ——————————
ACCOUNT_STATUS LOCK_DATE EXPIRY_DA
——————————– ——— ———
DEFAULT_TABLESPACE TEMPORARY_TABLESPACE CREATED
—————————— —————————— ———
PROFILE INITIAL_RSRC_CONSUMER_GROUP
—————————— ——————————
EXTERNAL_NAME
——————————————————————————–
WISSEM 61 4531384AFBFF9B98
OPEN
USERS TEMP 21-AUG-08 USERNAME USER_ID PASSWORD
—————————— ———- ——————————
ACCOUNT_STATUS LOCK_DATE EXPIRY_DA
——————————– ——— ———
DEFAULT_TABLESPACE TEMPORARY_TABLESPACE CREATED
—————————— —————————— ———
PROFILE INITIAL_RSRC_CONSUMER_GROUP
—————————— ——————————
EXTERNAL_NAME
——————————————————————————–
DEFAULT DEFAULT_CONSUMER_GROUP SQL> select * from wissem.test; select * from wissem.test
*
ERROR at line 1:
ORA-00942: table or view does not exist BACK to the primary DB and perform a log switch :
SQL> alter system switch logfile;
System altered.
SQL> Archive Log List
Database log mode Archive Mode
Automatic archival Enabled
Archive destination /u01/app/oracle/flash_recovery_area/ARCDB01/archivelog/
Oldest online log sequence 1598
Next log sequence to archive 1600
Current log sequence 1600
SQL> Check Log list from the STANDBY DB : SQL> alter database recover managed standby database disconnect from session
2 ;
Database altered.
SQL> Archive Log List
Database log mode Archive Mode
Automatic archival Enabled
Archive destination /u01/app/oracle/flash_recovery_area/ARCDB01/archivelog/
Oldest online log sequence 1598
Next log sequence to archive 0
Current log sequence 1600
SQL> alter database recover managed standby database cancel;
Database altered.
SQL> alter database open read only;
Database altered.
SQL> select * from wissem.test
2 ;
TESTE
———-
1
SQL> Now, we can see the results of our new table from the standby DB.
Happy dataguard!

Written By : Wissem el KHLIFI

Similar Documents

Premium Essay

Review Questions

...security option, an application that offers encryptions and authentication tools to keep data confidential and secure both inside the database and while in transit. Label Security, a set of tools designed to provide multitiered security capabilities for protecting data by classifying data for which access rights and privileges are then assigned and monitored. Oracle Active Data Guard, improves performance and ensures data recovery by maintaining a replica of a main database to act as a secondary database for workload sharing and failsafe. 3. Explain the advantages and disadvantages of offering an unrestricted, freely downloadable full version of Oracle Database to learners and developers. A: Oracle offers a free download of all editions of the Oracle Database for purposes of education, testing, or development. Personal info or a license key is not required. Disadvantages to this may include granting crackers or cyber threats the ability to freely download versions of Oracle Database for the purpose of understanding how to damage it without any real repercussions. 4. Explain two different password policies that can be enforced on an Oracle Server. A: A password is the first defense in maintaining a secure account. The default password for all unlocked accounts needs to be changed either during or immediately after an install. Passwords should also follow strong security standards, creating strong passwords for default user...

Words: 382 - Pages: 2

Premium Essay

Chapter 5

...security option, an application that offers encryptions and authentication tools to keep data confidential and secure both inside the database and while in transit. Label Security, a set of tools designed to provide multitiered security capabilities for protecting data by classifying data for which access rights and privileges are then assigned and monitored. Oracle Active Data Guard, improves performance and ensures data recovery by maintaining a replica of a main database to act as a secondary database for workload sharing and failsafe. 3. Explain the advantages and disadvantages of offering an unrestricted, freely downloadable full version of Oracle Database to learners and developers. A: Oracle offers a free download of all editions of the Oracle Database for purposes of education, testing, or development. Personal info or a license key is not required. Disadvantages to this may include granting crackers or cyber threats the ability to freely download versions of Oracle Database for the purpose of understanding how to damage it without any real repercussions. 4. Explain two different password policies that can be enforced on an Oracle Server. A: A password is the first defense in maintaining a secure account. The default password for all unlocked accounts needs to be changed either during or immediately after an install. Passwords should also follow strong security standards, creating strong passwords for...

Words: 384 - Pages: 2

Premium Essay

Term Paper

...including datafiles, redo log files, and control files. Datafiles: Every Oracle database has one or more physical datafiles. The datafiles contain all the database data. Control Files: Every Oracle database has a control file. A control file contains entries that specify the physical structure of the database. Redo Log Files: Every Oracle database has a set of two or more redo log files. The set of redo log files is collectively known as the redo log for the database.  Archive Log Files: You can enable automatic archiving of the redo log. Oracle automatically archives log files when the database is in ARCHIVELOG mode. Parameter Files: Parameter files contain a list of configuration parameters for that instance and database. A server parameter file lets you store and manage your initialization parameters persistently in a server-side disk file. Alert and Trace Log Files: Each server and background process can write to an associated trace file. When an internal error is detected by a process, it dumps information about the error to its trace file. Backup Files To restore a file is to replace it with a backup file. Typically, you restore a file when a media failure or user error has damaged or deleted the original file. Overview of Logical Database Structures The logical storage structures, including data blocks, extents, and segments, enable Oracle to have fine-grained control of disk space use. Tablespaces A database is divided into logical storage units called tablespaces...

Words: 492 - Pages: 2

Free Essay

Jagat

...Oracle 10g OCM Oracle 10g RAC Teradata Certified Certified Expert Masters (V2R5) Oracle 10g OCP Oracle 9i OCP ITIL V3 Certified Jagatsing Sursing Patil Email:- jagat_patil@yahoo.co.in Mobile+91-9320340010 Professional Summary Over all 16+ years experience in IT industries. 14+ years experience in Oracle 7,8i,9i,10g ,11g and Exadata engineering system. 2+ years experience in Teradata Database Administrator. Initial Level of experience in BIG Data Hadoop. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Expertise in proactively handling Oracle database issues to avoid major incident. Expertise in Root Cause Analysis and trouble shooting skills Expertise in mentoring database specialists and Handling Escalated calls. Expertise in providing solution within given SLA to avoid SLA bridge. Expertise in reviewing plan, risk and impact analysis before change. Expertise in implementing exact solution within given SLA. Expertise in providing exact solution during incident to avoid / reduce problem. Expertise in applying permanent fix to avoid problem. Expertise in providing different types of solution to migrate Non-Exadata into Exadata. Expertise in capacity management of databases according to their growth. More than 10 end to end RAC setup implemented in Oracle 10G and 11G on various platforms like RHEL ,SUN Solaris and AIX. More than 20 Dataguard setup implemented in Oracle 9i,10g and...

Words: 4360 - Pages: 18

Premium Essay

Private Policing

...Propelled by public panic over crime, the private security industry is one of the fastest growing businesses in the U.S., spending more money and employing more guards than public police forces around the country. In 1990 alone, $52 billion was spent on private security, compared to $30 billion on police. More than 10,000 private security companies employ some 1.5 million guards, nearly triple the 554,000 state and local police officers and the industry which generates billions in profits is growing rapidly. One congressional advocate of increased regulation says national labor statistics indicate that more jobs will be created in the private security field than any other categories over the next decade. Industry executives estimate that the number of private guards will surge to 2 million by the year 2000 It could be said that private security has been around since the beginning of time. The king’s personal guard would be a great example. For today’s purposes we will be looking at companies such as Wackenhut and Blackwater. These companies are responsible for a large range of private policing. Blackwater is most notable for its protection of high level CEOs and their work within the combat theater of Iraq and Afghanistan. Wackenhut is more responsible for places like court houses and construction sites. Business should and have the right to hire their private security to ensure that their property is not damaged or stolen. The problem comes in when these private companies...

Words: 1584 - Pages: 7

Premium Essay

Prison

...Stanford Prison Experiment by Saul McLeod  published 2008 Aim: To investigate how readily people would conform to the roles of guard and prisoner in a role-playing exercise that simulated prison life. Zimbardo (1973) was interested in finding out whether the brutality reported among guards in American prisons was due to the sadistic personalities of the guards or had more to do with the prison environment. Procedure: Zimbardo used a lab experiment to study conformity. To study the roles people play in prison situations, Zimbardo converted a basement of the Stanford University psychology building into a mock prison. He advertised for students to play the roles of prisoners and guards for a fortnight. 21 male college students (chosen from 75 volunteers) were screened for psychological normality and paid $15 per day to take part in the experiment. Participants were randomly assigned to either the role of prisoner or guard in a simulated prison environment. The prison simulation was kept as “real life” as possible. Prisoners were arrested at their own homes, without warning, and taken to the local police station. Guards were also issued a khaki uniform, together with whistles, handcuffs and dark glasses, to make eye contact with prisoners impossible. No physical violence was permitted. Zimbardo observed the behavior of the prisoners and guards. Here they were treated like every other criminal.  They were fingerprinted, photographed and ‘booked’.  Then they were blindfolded...

Words: 1212 - Pages: 5

Free Essay

Transforming Tadl Model to Uppaal for Context Aware System

...XI`AN JIAOTONG-LIVERPOOL UNIVERSITY TRANSFORMING TADL MODEL TO UPPAAL FOR CONTEXT AWARE SYSTEM SHEN LU Department of Computer Science and Software Engineering ©SHEN LU, 2008 ABSTRACT The focus of this paper is on the design and development of a model translation tool for context-aware system based on the existing research outcome of Naseem [2] and Shujun [5]. This tool, named as T2Uppaal, facilitates automatic conversion from TADL description to Uppaal model. This paper will analyze the context aware system in TADL architecture, design the transformation rules involved context and physical properties, and present the specification of the format for input file. Moreover, this paper discusses a case study to to ensure the conversion is correct, efficient and applicabilit ACKNOWLEDGMENTS I would like to start off thanking my supervisor Dr.Wan for her support and guidance. Furthermore, I am also indebted to my schoolmate Bai Wei for the help and support to this project. Finally, and most importantly, I want to thank my roommates, for the encouragement and help. This work can not exist without you. Contents ABSTRACT .............................................................................................................. - 0 ACKNOWLEDGMENTS ........................................................................................ - 0 1 Introduction ..................................................................................................

Words: 3889 - Pages: 16

Free Essay

Unit 1 Db Crjs 405

...Nikki Jones CRSJ 405- Unit 1 DB July 24, 2013 The ways the data is collected through surveillance in the observation of what is happening this can also eliminate those who are afraid to speak out on the abuse or wrong doing of their actions. (Draper, & Swift, 2011) For those who do come forward, there is a process to go through of interviewing as a way to recreate the situation and the even as it happened. There is a story that has to unfold allowing the law enforcement to place them self in the scene and solve the problem as the best of their abilities. In the start of the interview, there are questions asked to make the person more comfortable this lets the official learn how the person will react to the information and look into the person’s ways. Having the victim to open up and build a relationship with the law enforcement member doing the interview, A brief history of the person such as marriage, family, and location of extended family, additionally this allows the In the event of suspect or danger to the partner, mom, dad, sisters, brothers, and children. The place of employment to not the route and routine the victim goes through each day. Items out of the ordinary for the day are pieced as a probable cause of the action being more likely to occur than a typical day. Once the basics are outlined the story or capturing of the ordeal this can be compared with a painting, to writing a story as there need to be information on who was involved. What was around and...

Words: 1239 - Pages: 5

Premium Essay

Security Threat

...Smith CMGT/400 July 27, 2015 Professor Iwona Rusin Security Considerations for Pro Trans To identify any of the vulnerabilities that may be associated with Pro Trans, I would first conduct a detailed risk analysis report that would include data related to variable aspects of the business. First, all of the possible risks will need to be evaluated. How those risks are being controlled will need to be assessed. It will be important to identify any assets that belong to the company that can be tampered with or stolen. The past and possible threats will also need to be documented. Simulated attacks can provide information on the possible impact they would have on the company. This data includes SLE or Single Loss Expectancy rating and an Annualized Loss Expectancy rating with monetary values for both. How much control the company has over specific and general attacks is important also. This data will reveal how safe the system truly is. Conducting interviews with each department staff leader will also be a key step in assessing risk. This would give a general idea of how day-to-day operations are run, how many employees have access to the system, and how many remote locations they have. Since the servers used for data storage are connected to the same network as the servers used for software and Internet programs, there is a serious risk when using web components. For example, all of the employees in the accounting department use a payment posting web application...

Words: 2340 - Pages: 10

Premium Essay

Relationship Between Corporate Financial Analysis and Financial Risk

...corporate financial risk prevention. First, the financial analysis of the current Chinese enterprises widely used (A) comparative analysis Comparative analysis, as the name suggests, is to more than one set, or a set of comparative data or index, pairwise comparison, analysis, study, to determine the actual operating current business situation of enterprises and financial risks. Normally enterprises in comparison, and more is the issue and planned, the current number and the number of installments, business data and industry data, the actual number of the department and other departments and other indicators of the actual number of comparisons and analysis. (B) the structure analysis Structure analysis method refers to a particular financial indicators seen a whole, with its data as a part of the molecule, divided by the overall financial indicators to calculate the ratio of its structure. By analyzing the ratio of structure, not only to understand the gravity and the structure of various factors, but also on the structure and composition of the various factors that were reasonable evaluation, and to identify the factors of variation. (C) factor analysis Factors one may have multiple data indicators, factor analysis is to a certain index data broken down...

Words: 1537 - Pages: 7

Free Essay

Business Resume

...Proficient with event planning and logistics including vendor relations and budgeting  ● Skilled in Cost / Vendor negotiations  ● Exceptional Customer Service  ● Sales/Marketing Support and Project and Event Coordination  ● Light experience in recruiting, hiring, and training administrative staff    Work Experience:  Flooring International, Norcross GA  Accounts Receivables/Purchasing  ● Creating purchase orders, follow up, receiving/shipping, Inventory adjustments  ● Maintain an accurate aging report and conduct account research/analysis   ● Interact with customers, Sales reps & Customer Service to resolve outstanding issues    ● Make daily collections calls on past due accounts, mail/email Invoices and statements  ● Assist with bankruptcies, legal files, liens holds, and other advanced collections.   ● Review the customer’s account history, analyze the payment trend, gather internal and external  information and make business decision based on the above    Flooring Design Group, Doraville GA  Purchasing Coordinator  ● Handled purchase orders, shipping/receiving matters and maintaining vendor contact data  ● Responsible for inventory management, status reports on inventory and refreshing stock  ● Developed relationships with suppliers and vendors to negotiate pricing  ●...

Words: 510 - Pages: 3

Premium Essay

Task 1 a

...concerning this paper should be addressed to Dave Christian, Founder, Helpology, 2340 E. University Dr., Lot 85, Tempe, AZ 85281; Phone: (480) 331-9631; Email: Mr.Dave.Christian@gmail.com; Web site: helpology.org. Risk Management: Task 1A One of the world's wealthiest investors of all time, Warren Buffett (n.d.), said, "Risk comes from not knowing what you're doing." Furthermore, "Denial is a common tactic that substitutes deliberate ignorance for thoughtful planning," said risk management author Charles Tremper (n.d.). As a newly hired consultant, we have been tasked with the duties of creating and presenting a risk management/business contingency plan for our first client. The legal department and the IT department have both expressed concerns regarding the ethical use and protection of sensitive data, customer records, and other information systems content. In the interest of creating confidence and job satisfaction in this new position, our new employer has decided to let us select our first client. For this task, we may select our client from our actual place of employment, a local small business, or a well-known public company. The client must operate internationally in at least some aspects of its business. Any information that would be considered confidential, proprietary, or personal in nature, should not be included. We will not include the actual names of people, suppliers, the...

Words: 3363 - Pages: 14

Premium Essay

Risk Managment Tas1

...concerning this paper should be addressed to Dave Christian, Founder, Helpology, 2340 E. University Dr., Lot 85, Tempe, AZ 85281; Phone: (480) 331-9631; Email: Mr.Dave.Christian@gmail.com; Web site: helpology.org. Risk Management: Task 1A One of the world's wealthiest investors of all time, Warren Buffett (n.d.), said, "Risk comes from not knowing what you're doing." Furthermore, "Denial is a common tactic that substitutes deliberate ignorance for thoughtful planning," said risk management author Charles Tremper (n.d.). As a newly hired consultant, we have been tasked with the duties of creating and presenting a risk management/business contingency plan for our first client. The legal department and the IT department have both expressed concerns regarding the ethical use and protection of sensitive data, customer records, and other information systems content. In the interest of creating confidence and job satisfaction in this new position, our new employer has decided to let us select our first client. For this task, we may select our client from our actual place of employment, a local small business, or a well-known public company. The client must operate internationally in at least some aspects of its business. Any information that would be considered confidential, proprietary, or personal in nature, should not be included. We will not include the actual names of people, suppliers, the...

Words: 3363 - Pages: 14

Free Essay

Computer System Support

...through HTML • Determined how your emails & accounts are hack from scams such as hijacking and phishing. • Ability to build the page structure, add text, images, and link through Adobe Dreamwaver CC. CISM-130 Using PC Operating Systems • To perform Windows 7 as an in-place upgrade, a clean install, or a dual boot. • Managing files, folder, and storage devices. • Backup and restore data and system files • Manually installing/removing software • Troubleshooting blue screen errors by using Memory Diagnostic Tool to test memory during the boot or System File Checker tool to verify and restore system files. • Connecting a Computer to a Network by configuring the TCP/IP settings CISM-162 Micro Apps Using Spreadsheets • Entering, analyzing, and calculating company data such as sale taxes and commission through Microsoft Excel • Turn spreadsheet of numbers into a bar graph, pie chart, or any variety of visual diagrams • Ability to calculate trends, deciphering profits and creating numeral formats CISM-164 Micro Apps/Relational Database • Create and modify database such as creating a table, forms, and reports • Input information such as list of products, employees, users, address, inventory, and etc. • Modify/Edit the records rapidly and efficiently •...

Words: 546 - Pages: 3

Free Essay

Term Paper on Cad

...work process of the device “Automobile guard with alarm system” 4 1.1. Description of the input and output values of the device 4 1.2. States of the system : 4 2. Design of a finite state machine 5 3. State diagram design 6 4. State table design 6 5. Design of the full – adder 7 5.1. Creation of project in Quartus II 8 5.2. Creation of a block diagram file in Quartus II 11 5.3. Compiling and simulating of our design in Quartus II 17 5.4. Design of full adder on VHDL 21 Conclusions 24 Reference list 25 Appendix 1 : VHDL-code for full-adder 26 Appendix 2 : VHDL-code for test bench of full-adder program 27 Introduction This year we’ve started studing the new course,that’s named “Basics of Computer Aided Design”.Actually,I find this discipline really interesting and useful to learn.That’s really pity that we don’t have much time for being able to study the designing of the computer devices more precisely. In my term work I’m going to try describing few first steps in designing the own project of a device.We don’t have the possibility to realise our projects on the hardware,but still I think that the process of imagining its work is already quite exciting : defining the states of working of the device,its principle of work,thinking of the approximate look of the device. I’ve decided to investigate the process of building the automobile guard,because nowadays lots of people use automobiles...

Words: 4304 - Pages: 18