Home Page Icon
Home Page
Table of Contents for
Title
Close
Title
by Bernard Lopuz, Charles Kim, Darl Kuhn
Linux and Solaris Recipes for Oracle DBAs, Second Edition
Cover
Title
Copyright
Dedication
Contents at a Glance
Contents
About the Authors
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Getting Started
1-1. Connecting Securely to a Remote Server
Problem
Solution
How It Works
1-2. Logging on Remotely via the Command Line
Problem
Solution
How It Works
1-3. Logging off the Server
Problem
Solution
How It Works
1-4. Running a Command
Problem
Solution
How It Works
1-5. Getting Help
Problem
Solution
How It Works
1-6. Correcting Command-Line Mistakes
Problem
Solution
How It Works
1-7. Clearing the Screen
Problem
Solution
How It Works
1-8. Resetting the Screen
Problem
Solution
How It Works
Chapter 2: Working in the Shell
2-1. Displaying the Current Shell
Problem
Solution
How It Works
2-2. Running Previously Entered Commands
Problem
Solution
How It Works
2-3. Automatically Completing Long Commands
Problem
Solution
How It Works
2-4. Viewing Environment Variables
Problem
Solution
How It Works
2-5. Automatically Setting Shell Variables
Problem
Solution
How It Works
2-6. Customizing the Command Prompt
Problem
Solution
How It Works
2-7. Creating a Command Shortcut
Problem
Solution
How It Works
2-8. Providing Input to Commands
Problem
Solution
How It Works
2-9. Redirecting Command Output
Problem
Solution
How It Works
2-10. Sending Output to Nowhere
Problem
Solution
How It Works
2-11. Displaying and Capturing Command Output
Problem
Solution
How It Works
2-12. Recording All Shell Command Output
Problem
Solution
How It Works
2-13. Changing the Login Shell
Problem
Solution
How It Works
2-14. Modifying Command Path Search
Problem
Solution
How It Works
2-15. Viewing Built-in Commands
Problem
Solution
How It Works
2-16. Setting the Backspace Key
Problem
Solution
How It Works
2-17. Typing a Long Command in Multiple Lines
Problem
Solution
How It Works
Chapter 3: Managing Processes and Users
3-1. Listing Processes
Problem
Solution
How It Works
3-2. Terminating Processes
Problem
Solution
How It Works
3-3. Listing the Users Logged On
Problem
Solution
How It Works
3-4. Listing the Last Logon Time of a User
Problem
Solution
How It Works
3-5. Limiting the Number of User Processes
Problem
Solution
How It Works
3-6. Viewing How Long the Server Has Been Running
Problem
Solution
How It Works
3-7. Viewing How Long a Process Has Been Running
Problem
Solution
How It Works
3-8. Displaying Your Username
Problem
Solution
How It Works
3-9. Changing Your Password
Problem
Solution
How It Works
3-10. Becoming the System Privileged (root) User
Problem
Solution
How It Works
3-11. Running Commands as the root User
Problem
Solution
How It Works
3-12. Adding a Group
Problem
Solution
How It Works
3-13. Removing a Group
Problem
Solution
How It Works
3-14. Adding a User
Problem
Solution
How It Works
3-15. Removing a User
Problem
Solution
How It Works
Chapter 4: Creating and Editing Files
4-1. Creating a File
Problem
Solution
How It Works
4-2. Maneuvering Within a File
Problem
Solution
How It Works
4-3. Copying and Pasting
Problem
Solution
How It Works
4-4. Manipulating Text
Problem
Solution
How It Works
4-5. Searching for and Replacing Text
Problem
Solution
How It Works
4-6. Inserting One File into Another
Problem
Solution
How It Works
4-7. Joining Lines
Problem
Solution
How It Works
4-8. Running Operating System Commands
Problem
Solution
How It Works
4-9. Repeating a Command
Problem
Solution
How It Works
4-10. Undoing a Command
Problem
Solution
How It Works
4-11. Displaying Line Numbers
Problem
Solution
How It Works
4-12. Automatically Configuring Settings
Problem
Solution
How It Works
4-13. Creating Shortcuts for Commands
Problem
Solution
How It Works
4-14. Setting the Shell Default Text Editor
Problem
Solution
How It Works
4-15. Setting the SQL*Plus Text Editor
Problem
Solution
How It Works
4-16. Toggling Syntax Text Color
Problem
Solution
How It Works
Chapter 5: Managing Files and Directories
5-1. Showing the Current Working Directory
Problem
Solution
How It Works
5-2. Changing Directories
Problem
Solution
How It Works
5-3. Creating a Directory
Problem
Solution
How It Works
5-4. Viewing a List of Directories
Problem
Solution
How It Works
5-5. Removing a Directory
Problem
Solution
How It Works
5-6. Listing Files
Problem
Solution
How It Works
5-7. Creating a File Quickly
Problem
Solution
How It Works
5-8. Changing File Permissions
Problem
Solution
How It Works
5-9. Changing File Ownership and Group Membership
Problem
Solution
How It Works
5-10. Viewing the Contents of a Text File
Problem
Solution
How It Works
5-11. Viewing Nonprinting Characters in a File
Problem
Solution
How It Works
5-12. Viewing Hidden Files
Problem
Solution
How It Works
5-13. Determining File Type
Problem
Solution
How It Works
5-14. Finding Differences Between Files
Problem
Solution
How It Works
5-15. Comparing Contents of Directories
Problem
Solution
How It Works
5-16. Copying Files
Problem
Solution
How It Works
5-17. Copying Directories
Problem
Solution
How It Works
5-18. Moving Files and Directories
Problem
Solution
How It Works
5-19. Renaming a File or Directory
Problem
Solution
How It Works
5-20. Removing a File
Problem
Solution
How It Works
5-21. Removing Protected Files Without Being Prompted
Problem
Solution
How It Works
5-22. Removing Oddly Named Files
Problem
Solution
How It Works
5-23. Finding Files
Problem
Solution
How It Works
5-24. Finding Strings in Files
Problem
Solution
How It Works
5-25. Finding a Recently Modified File
Problem
Solution
How It Works
5-26. Finding and Removing Old Files
Problem
Solution
How It Works
5-27. Finding the Largest Files
Problem
Solution
How It Works
5-28. Finding a File of a Certain Size
Problem
Solution
How It Works
5-29. Sorting Files by Size
Problem
Solution
How It Works
5-30. Finding the Largest Space-Consuming Directories
Problem
Solution
How It Works
5-31. Truncating an Operating System File
Problem
Solution
How It Works
5-32. Counting Lines and Words in a File
Problem
Solution
How It Works
5-33. Creating a Second Name for a File
Problem
Solution
How It Works
5-34. Creating a Second Name for a Directory
Problem
Solution
How It Works
5-35. Viewing a Large File
Problem
Solution
How It Works
5-36. Downloading Files
Problem
Solution
How It Works
Chapter 6: Archiving and Compressing Files
6-1. Bundling Files Using tar
Problem
Solution
How It Works
6-2. Unbundling Files Using tar
Problem
Solution
How It Works
6-3. Finding Differences in Bundled Files Using tar
Problem
Solution
How It Works
6-4. Bundling Files Using cpio
Problem
Solution
How It Works
6-5. Unbundling Files Using cpio
Problem
Solution
How It Works
6-6. Bundling Files Using zip
Problem
Solution
How It Works
6-7. Unbundling Files Using zip
Problem
Solution
How It Works
6-8. Bundling Files Using find
Problem
Solution
How It Works
6-9. Compressing and Uncompressing Files
Problem
Solution
How It Works
6-10. Validating File Contents
Problem
Solution
How It Works
Chapter 7: Shell Scripting
7-1. Writing a Simple Shell Script
Problem
Solution
How It Works
7-2. Checking Simple Conditions
Problem
Solution
How It Works
7-3. Testing a Condition
Problem
Solution
How It Works
7-4. Checking Complex Conditions
Problem
Solution
How It Works
7-5. Repeating a Task
Problem
Solution
How It Works
7-6. Iterating Until a Condition Is Met
Problem
Solution
How It Works
7-7. Displaying a Menu of Choices
Problem
Solution
How It Works
7-8. Running Commands Based on Success/Failure of the Previous Command
Problem
Solution
How It Works
7-9. Modularizing Scripts
Problem
Solution
How It Works
7-10. Passing Parameters to Scripts
Problem
Solution
How It Works
7-11. Processing Parameters
Problem
Solution
How It Works
7-12. Running Database Commands in Scripts
Problem
Solution
How It Works
7-13. Crafting a Robust DBA Shell Script
Problem
Solution
How It Works
7-14. Running Scripts in the Background
Problem
Solution
How It Works
7-15. Monitoring the Progress of a Script
Problem
Solution
How It Works
7-16. Debugging a Script
Problem
Solution
How It Works
Chapter 8: Analyzing Server Performance
8-1. Identifying System Bottlenecks
Problem
Solution
How It Works
8-2. Analyzing Current and Past System Performance
Problem
Solution
How It Works
8-3. Identifying CPU-Intensive Processes
Problem
Solution
How It Works
8-4. Identifying CPU Bottlenecks
Problem
Solution
How It Works
8-5. Identifying Memory-Intensive Processes
Problem
Solution
How It Works
8-6. Identifying Memory Bottlenecks
Problem
Solution
How It Works
8-7. Identifying I/O-Intensive Processes
Problem
Solution
How It Works
8-8. Identifying I/O Bottlenecks
Problem
Solution
How It Works
8-9. Monitoring Network Traffic
Problem
Solution
How It Works
8-10. Troubleshooting Database Connectivity
Problem
Solution
How It Works
8-11. Tracing a Process
Problem
Solution
How It Works
8-12. Listing Files Opened by Processes
Problem
Solution
How It Works
Chapter 9: Viewing and Configuring System Resources
9-1. Displaying Server Hardware and the Operating System
Problem
Solution
How It Works
9-2. Listing CPUs
Problem
Solution
How It Works
9-3. Displaying Physical Memory
Problem
Solution
How It Works
9-4. Viewing Kernel Parameters
Problem
Solution
How It Works
9-5. Modifying Kernel Parameters
Problem
Solution
How It Works
9-6. Displaying Semaphores
Problem
Solution
How It Works
9-7. Configuring Semaphores
Problem
Solution
How It Works
9-8. Viewing Memory Structures
Problem
Solution
How It Works
9-9. Removing In-Memory Structures
Problem
Solution
How It Works
9-10. Viewing Network Configuration Settings
Problem
Solution
How It Works
9-11. Configuring Network Settings
Problem
Solution
How It Works
9-12. Modifying System Open File Limits
Problem
Solution
How It Works
9-13. Showing Shell Limits
Problem
Solution
How It Works
9-14. Changing Shell Limits
Problem
Solution
How It Works
Chapter 10: Automating Jobs with cron
10-1. Enabling Access to Schedule Jobs
Problem
Solution
How It Works
10-2. Editing the cron Table
Problem
Solution
How It Works
10-3. Understanding cron Table Entries
Problem
Solution
How It Works
10-4. Setting Operating System Variables
Problem
Solution
How It Works
10-5. Specifying the Execution Shell
Problem
Solution
How It Works
10-6. Redirecting cron Output
Problem
Solution
How It Works
10-7. Embedding Conditional Logic
Problem
Solution
How It Works
10-8. Troubleshooting cron
Problem
Solution
How It Works
Chapter 11: Managing Server Software
11-1. Installing Packages
Problem
Solution #1
Solution #2
How It Works
11-2. Switching to the Oracle Unbreakable Linux Network
Problem
Solution
How It Works
11-3. Associating Linux Files with RPM Packages
Problem
Solution #1
Solution #2
How It Works
11-4. Listing the Contents of an RPM Package
Problem
Solution #1
Solution #2
How It Works
11-5. Downloading Packages
Problem
Solution
How It Works
11-6. Automating Server Builds with Oracle RDBMS Server PreInstall RPM
Problem
Solution
How It Works
11-7. Upgrading Packages
Problem
Solution #1
Solution #2
How It Works
11-8. Removing Packages
Problem
Solution #1
Solution #2
How It Works
11-9. Checking RPM Requirements to Install Oracle Database
Problem
Solution
How It Works
11-10. Performing Initial Silent Oracle Software Installation with Response Files
Problem
Solution #1
Solution #2
How It Works
11-11. Creating a Database with a Response File
Problem
Solution
How It Works
11-12. Creating a Network Configuration with a Response File
Problem
Solution
How It Works
11-13. Applying Patch Set Updates (PSUs) and Interim Patches
Problem
Solution
How It Works
11-14. Cloning an Oracle Home
Problem
Solution
How It Works
11-15. Attaching an Oracle Home
Problem
Solution
How It Works
Chapter 12: VirtualBox for Oracle
12-1. Installing Oracle VM VirtualBox
Problem
Solution
How It Works
12-2. Setting Up VirtualBox Virtual Machine (VM)
Problem
Solution
How It Works
12-3. Starting Up a VM for the First Time
Problem
Solution
How It Works
12-4. Creating Additional Virtual Disks
Problem
Solution
How It Works
12-5. Provisioning/Sharing a Disk with Another VM
Problem
Solution
How It Works
12-6. Configuring the Virtual Network
Problem
Solution
How It Works
12-7. Leveraging/Creating Oracle VM VirtualBox Prebuilt Templates
Problem
Solution #1: Leveraging Oracle’s Prebuilt Template
Solution #2: Creating Your Own OVA Template
How It Works
12-8. Cloning a VM
Problem
Solution
How It Works
12-9. Working with Snapshots
Problem
Solution
How It Works
Chapter 13: Optimizing Linux for Oracle Databases
13-1. Minimalizing the Linux Environment for Performance and Security
Problem
Solution
How It Works
13-2. Configuring Hugepages
Problem
Solution
How It Works
Automating Hugepages Server Configuration
Computing the Value of Huge Pages on an Existing Linux Server
Disabling Transparent Huge Pages
13-3. Enabling Jumbo Frames
Problem
Solution
How It Works
13-4. Determining and Implementing the Right I/O Scheduler
Problem
Solution
How It Works
13-5. Setting Pertinent Kernel Parameters for Oracle Databases
Problem
Solution
How It Works
13-6. Configuring NTP for Oracle
Problem
Solution
How It Works
13-7. Bonding Network Interfaces
Problem
Solution
How It Works
13-8. Enabling Network Services Cache Daemon (nscd)
Problem
Solution
How It Works
13-9. Aligning Disk Partitions Correctly
Problem
Solution
How It Works
Chapter 14: Working Securely Across a Network
14-1. Setting Up SSH
Problem
Solution
How It Works
14-2. Generating Host Keys
Problem
Solution
How It Works
14-3. Logging On Securely
Problem
Solution
How It Works
14-4. Copying Files Securely
Problem
Solution
How It Works
14-5. Authenticating Through Public Keys
Problem
Solution
How It Works
14-6. Configuring a Promptless Logon
Problem
Solution
How It Works
Chapter 15: Managing X Window
15-1. Configuring an X Server
Problem
Solution
How It Works
15-2. Starting an X Server
Problem
Solution
How It Works
15-3. Stopping the X Server
Problem
Solution
How It Works
15-4. Displaying an X Client on a Remote Server
Problem
Solution
How It Works
15-5. Tunneling X Over SSH
Problem
Solution
How It Works
15-6. Manipulating the Terminal Emulator for X Windows
Problem
Solution
How It Works
Chapter 16: Managing Remote Servers with VNC
16-1. Downloading the VNC Software
Problem
Solution
How It Works
16-2. Installing the VNC Software
Problem
Solution
How It Works
16-3. Manually Starting and Stopping the VNC Server
Problem
Solution
How It Works
16-4. Automatically Starting the VNC Server on Linux
Problem
Solution
How It Works
16-5. Automatically Starting the VNC Server on Solaris
Problem
Solution
How It Works
16-6. Starting the VNC Viewer
Problem
Solution
How It Works
16-7. Securing a VNC Connection
Problem
Solution
How It Works
16-8. Accessing VNC via a Proxy Server
Problem
Solution
How It Works
16-9. Running X Applications with VNC
Problem
Solution
How It Works
16-10. Troubleshooting VNC
Problem
Solution
How It Works
Appendix A: RAID Concepts
Understanding RAID
Defining Array, Stripe Width, Stripe Size, Chunk Size
RAID 0
RAID 1
Generating Parity
RAID 4
RAID 5
Building Hybrid (Nested) RAID Devices
RAID 0+1
RAID 1+0
RAID 5+0
Determining Disk Requirements
Capacity Planning
Appendix B: Server Log Files
Managing Linux Log Files
Rotating Log Files
Setting Up a Custom Log Rotation
Monitoring Log Files
Managing Solaris Log Files
Viewing System Message Log Files
Rotating Solaris Log Files
Summary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Copyright
Linux and Solaris Recipes for Oracle DBAs
Second Edition
Darl Kuhn
Charles Kim
Bernard Lopuz
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset