Skip navigation.

Feed aggregator

Annonce : Devenez expert Cloud Oracle !

Jean-Philippe Pinte - Thu, 2015-01-29 03:37
Vous souhaitez évoluer dans votre carrière?
Rejoignez l'un de nos partenaires pour devenir un expert des solutions Cloud Oracle !

Documentum Multiple ADTS - Ratio of rendition creations between instances (Part 2)

Yann Neuhaus - Thu, 2015-01-29 02:15

This is the second part of my previous blog concerning rendition creation ratio between two ADTS servers. In this part I will talk about another way of getting this ratio. In addition this one doesn't require to enable auditing and this way is preferable concerning database space footprint.

DMR_CONTENT

This method uses objects that already exist in the docbase and are populated each time a rendition is done. Because in fact, it is the content of the rendition itself! Fortunately the server where the content has been created is listed in the object.

You just have to adapt the following query and execute it:

select set_client,count(*) as val from dmr_content where full_format = 'pdf' and set_client like '%chbsmv_dmrsp%' group by set_client;

ADTS_dmr_content_ratio_blur.PNG

And now you have all your ADTS servers listed with the total rendition they did.

Is Linux haunted by ghosts?

Chris Foot - Thu, 2015-01-29 01:06

While malicious spirits aren't invading the house of Linus Torvald, there is a serious vulnerability in Linux that enables attackers to execute malicious code on servers running the OS.

The flaw known as "GHOST" by some researchers resides in the GNU C Library, according to Ars Technica. Specifically, machines that are used to deliver email, host websites and conduct a variety of Web-based tasks are at risk. Those using Linux to run Web application servers should consider contacting their Linux consultants to resolve the issue, if such partnerships have been established.

What the flaw actually is
Ars Technica noted GHOST is a buffer overflow bug that resides in the glibc function __nss_hostname_digits_dots(). A cybercriminal could employ the gethostbyname() and gethostbyname2() commands and implement arbitrary code through the permissions assigned to a user running a Web application. The source noted that cybersecurity company Qualys tested GHOST, stating its specialists were able to bypass exploit protections on both 32-bit and 64-bit machines.

The thing that's so scary about this particular bug is that glibc is the most popular code library that Linux uses, consisting of basic functions written in C and C++ to conduct common actions. In addition, GHOST also affects Linux distributions and applications written in Python, Ruby and a wide variety of other languages.

Which releases were impacted?
Exim is one particular app that is likely flawed as a result of GHOST, as well as MySQL servers, Secure Shell machines, form submission tools and other kinds of mail servers, as noted by Ars Technica. ZDNet contributor Steven Vaughan-Nichols acknowledged that Debian &, RHEL 5, 6 and 7, CentOS 6 and 7 and Ubuntu 12.04 are a few Linux operating systems that are likely to experience attacks as a result of the GHOST vulnerability. However, he did note that Ubuntu 12.04 is expected to receive a patch for the bug.

"Given the sheer number of systems based on glibc, we believe this is a high severity vulnerability and should be addressed immediately. The best course of action to mitigate the risk is to apply a patch from your Linux vendor," said Qualys CTO Wolfgang Kandek, as quoted by Vaughan-Nichols.

Once a patch is made to your Linux OS, Vaughan-Nichols advises Linux users to reboot their systems, on account of the fact that multiple core processes are initiated by the gethostbyname() command. For companies that require guidance through this process, contacting their Linux vendors is a necessity.

The post Is Linux haunted by ghosts? appeared first on Remote DBA Experts.

Flush one SQL statement to hard parse it again

Yann Neuhaus - Wed, 2015-01-28 22:12

If you want a statement to be hard parsed on its next execution, you can flush the shared pool, but you don't want all the cursors to be hard parsed. Here is how to flush only one statement, illustrated with the case where it can be useful.
During the performance training, here is how I introduce Adaptive Cursor Sharing, here is how I show the bind variable peeking problem that is well known by everyone that was DBA at the times of 9iR2 upgrades.

I've a customer table with very few ones born before 30's and lot of ones born in 70's. Optimal plan is index access for those from 1913 and full table scan for those born in 1971.

I've an histogram on that column so the optimizer can choose the optimal plan, whatever the value is. But I'm a good developer and I'm using bind variables in order to avoid to parse and waste shared pool memory for each value.

Here is my first user that executes the query for the value 1913

SQL> execute :YEAR:=1913;
PL/SQL procedure successfully completed.

SQL> select cust_gender,count(*) from CUSTOMERS where cust_year_of_birth=:YEAR group by cust_gender;

C   COUNT(*)
- ----------
M          4
F          1

Here is the execution plan:
SQL> select * from table(dbms_xplan.display_cursor(format=>'iostats last +peeked_binds'));

PLAN_TABLE_OUTPUT
-------------------------------------------------------------------------------------------------
SQL_ID  dpxj8c5y81bdr, child number 0
-------------------------------------
select cust_gender,count(*) from CUSTOMERS where
cust_year_of_birth=:YEAR group by cust_gender

Plan hash value: 790974867

------------------------------- ------------ --------------------------------------
| Id  | Operation               | Name       | Starts | E-Rows | A-Rows | Buffers |
------------------------------- ------------ --------------------------------------
|   0 | SELECT STATEMENT        |            |      1 |        |      2 |       7 |
|   1 |  HASH GROUP BY          |            |      1 |      2 |      2 |       7 |
|   2 |   TABLE ACCESS BY INDEX | CUSTOMERS  |      1 |      5 |      5 |       7 |
|*  3 |    INDEX RANGE SCAN     | DEMO_CUST_ |      1 |      5 |      5 |       2 |
------------------------------- ------------ --------------------------------------
And thanks to the '+peeked_binds' I know that it has been optimized for 1913
Peeked Binds (identified by position):
--------------------------------------
   1 - :1 (NUMBER): 1913

Predicate Information (identified by operation id):
---------------------------------------------------
   3 - access("CUST_YEAR_OF_BIRTH"=:YEAR)
I've the right plan, optimal for my value.

But I've used bind variables in order to share my cursor. Others will execute the same with other values. They will soft parse only and share my cursor. Look at it:

SQL> execute :YEAR:=1971;
PL/SQL procedure successfully completed.

SQL> select cust_gender,count(*) from CUSTOMERS where cust_year_of_birth=:YEAR group by cust_gender;

C   COUNT(*)
- ----------
M        613
F        312
Look at the plan, it's the same:
SQL> select * from table(dbms_xplan.display_cursor(format=>'iostats last +peeked_binds'));

PLAN_TABLE_OUTPUT
--------------------------------------------------------------------------------------
SQL_ID  dpxj8c5y81bdr, child number 0
-------------------------------------
select cust_gender,count(*) from CUSTOMERS where
cust_year_of_birth=:YEAR group by cust_gender

Plan hash value: 790974867

------------------------------- --------------- --------------------------------------
| Id  | Operation               | Name          | Starts | E-Rows | A-Rows | Buffers |
------------------------------- --------------- --------------------------------------
|   0 | SELECT STATEMENT        |               |      1 |        |      2 |     228 |
|   1 |  HASH GROUP BY          |               |      1 |      2 |      2 |     228 |
|   2 |   TABLE ACCESS BY INDEX | CUSTOMERS     |      1 |      5 |    925 |     228 |
|*  3 |    INDEX RANGE SCAN     | DEMO_CUST_YEA |      1 |      5 |    925 |       4 |
------------------------------- --------------- --------------------------------------

Peeked Binds (identified by position):
--------------------------------------
   1 - :1 (NUMBER): 1913

Predicate Information (identified by operation id):
---------------------------------------------------
   3 - access("CUST_YEAR_OF_BIRTH"=:YEAR)
The plan is optimized for 1913, estimating 5 rows (E-Rows) but now returning 925 rows (A-Rows). That may be bad. Imagine a nested loop planned for few rows but finally running on million of rows...

The goal of this post is not to show Adaptive Cursor Sharing that may solve the issue once the problem has occured. And Adaptive Cursor Sharing do not work in all contexts (see Bug 8357294: ADAPTIVE CURSOR SHARING DOESN'T WORK FOR STATIC SQL CURSORS FROM PL/SQL)

The goal is to answer to a question I had during the workshop: Can we flush one cursor in order to have it hard parsed again ? It's a good question and It's a good idea to avoid to flush the whole shared pool!

This is not new (see here, here, here, here, here,...). But here is the query I use to quickly flush a statement with its sql_id.

I have the following cursor in memory:

SQL> select child_number,address,hash_value,last_load_time from v$sql where sql_id='dpxj8c5y81bdr';

CHILD_NUMBER ADDRESS          HASH_VALUE LAST_LOAD_TIME
------------ ---------------- ---------- -------------------
           0 00000000862A0E08 2088807863 2015-01-29/14:56:46
and I flush it with dbms_shared_pool.purge:
SQL> exec for c in (select address,hash_value,users_executing,sql_text from v$sqlarea where sql_id='dpxj8c5y81bdr') loop sys.dbms_shared_pool.purge(c.address||','||c.hash_value,'...'); end loop;

PL/SQL procedure successfully completed.
I've 3 remarks about it:

1. If the cursor is currently running, the procedure will wait.

2. In 10g you have to set the following event for your session:

alter session set events '5614566 trace name context forever';

3. The '...' is anything you want which is not a P,Q,R,T which are used for Procedures, seQences, tRigger, Type. Anything else is for cursors. Don't worry, this is in the doc.

Ok, the cursor is not there anymore:

SQL> select child_number,address,hash_value,last_load_time from v$sql where sql_id='dpxj8c5y81bdr';
no rows selected
And the next execution will optimize it for its peeked bind value:
SQL> execute :YEAR:=1971;
PL/SQL procedure successfully completed.

SQL> select cust_gender,count(*) from CUSTOMERS where cust_year_of_birth=:YEAR group by cust_gender;

C   COUNT(*)
- ----------
M          4
F          1

SQL> select * from table(dbms_xplan.display_cursor(format=>'iostats last +peeked_binds'));

PLAN_TABLE_OUTPUT
------------------------------------------------------------------------------------------
SQL_ID  dpxj8c5y81bdr, child number 0
-------------------------------------
select cust_gender,count(*) from CUSTOMERS where
cust_year_of_birth=:YEAR group by cust_gender

Plan hash value: 1577413243

-----------------------------------------------------------------------------
| Id  | Operation          | Name      | Starts | E-Rows | A-Rows | Buffers |
-----------------------------------------------------------------------------
|   0 | SELECT STATEMENT   |           |      1 |        |      2 |     233 |
|   1 |  HASH GROUP BY     |           |      1 |      2 |      2 |     233 |
|*  2 |   TABLE ACCESS FULL| CUSTOMERS |      1 |    925 |      5 |     233 |
-----------------------------------------------------------------------------

Peeked Binds (identified by position):
--------------------------------------
   1 - :1 (NUMBER): 1971

Predicate Information (identified by operation id):
---------------------------------------------------
   2 - filter("CUST_YEAR_OF_BIRTH"=:YEAR)

Here is the cursor that have been re-loaded, re-parsed, and re-optimized:
SQL> select child_number,address,hash_value,last_load_time from v$sql where sql_id='dpxj8c5y81bdr';

CHILD_NUMBER ADDRESS          HASH_VALUE LAST_LOAD_TIME
------------ ---------------- ---------- -------------------
           0 00000000862A0E08 2088807863 2015-01-29/14:56:49
That's the right plan. A full table scan when I want to read lot of rows.

Don't take it wrong. This is not a solution. It's just a quick fix when a plan has gone wrong because the first execution was done by a special value. We flush the plan and expect that the following execution is done with a regular value.
You probably have the sql_id as you have seen a long running query with a bad plan. Here is the way to flush all its children - ready to copy/paste in case of emergency:

set serveroutput on
begin
 for c in (select address,hash_value,users_executing,sql_text from v$sqlarea where sql_id='&sql_id') 
 loop 
  dbms_output.put_line(c.users_executing||' users executing '||c.sql_text);
  sys.dbms_shared_pool.purge(c.address||','||c.hash_value,'...'); 
  dbms_output.put_line('flushed.');
 end loop;
end;
/

Oracle Maven Repository - Rolling News

Steve Button - Wed, 2015-01-28 17:44
Oracle Maven Repository Is Live  The Oracle Maven Repository is live and available for public access to the public APIs, libraries, utilities and archetypes that are shipped as part of the Oracle WebLogic Server 12.1.2 and 12.1.3 releases, including corresponding Coherence versions.

** The repository also publishes the same from the ADF, SOA, OSB  and other Fusion Middleware options.
 
Oracle Maven Repository http://maven.oracle.com

Using the Oracle Maven Repository https://maven.oracle.com/doc.html
 Rolling News   Oracle Maven Repository is Live

https://redstack.wordpress.com/2015/01/14/happy-new-year-happy-new-oracle-maven-repository

WebLogic Server and Oracle Maven Repository

https://blogs.oracle.com/WebLogicServer/entry/weblogic_server_and_the_oracle

Oracle Maven Repository Index Available

https://redstack.wordpress.com/2015/01/23/oracle-maven-repository-index-now-available-more-to-come/

https://blogs.oracle.com/WebLogicServer/entry/oracle_maven_repository_index_now


Evènement: Oracle Virtual Cloud Summit

Jean-Philippe Pinte - Wed, 2015-01-28 16:08
4 séminaires en ligne :
  • Back up your Database securely to the Cloud
  • Move your Test & Development to the Cloud
  • Secure Document File-sync & share in the Cloud
  • Accelerate Application development in the Cloud
Enregistrez-vous à l'évènement Oracle Virtual Cloud Summit : http://cloud.oraclevirtualsummit.com

Defining Cache nodes with BatchEdit

Anthony Shorten - Wed, 2015-01-28 16:00

In Oracle Utilities Application Framework V4.2.0.2.0, a new batch command line based wizard, named Batch Edit (or bedit for short), was introduced to simplify the configuration of the batch architecture. It allows for clusters, threadpools and submitters to be defined quickly using predefined templates.

A new article has been made available which focuses on the implementation of cache nodes within the cluster. Cache nodes are extremely useful for clusters where you have lots of  threadpools and/or threads executing by optimizing the network traffic between individual nodes. A cache node does not execute threads, it is only there to act as a conduit for all the threads it is linked with. Think of it as a supervisor process that concentrates the traffic leaving the threads to do their work whilst keeping a "eye" on them on behalf of the cluster.

Typically one or more cache nodes should exist per physical node in your cluster to act as a concentrator.

The instructions on how to do this are now documented in FW 2.4.0.2 Cache Nodes Configuration using BatchEdit utility (Doc ID 1965395.1) available from My Oracle Support.

ERROR - CLONE-20372 Server port validation failed

Vikram Das - Wed, 2015-01-28 15:19
Alok and Shoaib pinged me about this error. This error is reported in logs when adcfgclone.pl is run for a R12.2.4 appsTier where the source and target instances are on same physical server.

SEVERE : Jan 27, 2015 3:40:09 PM - ERROR - CLONE-20372   Server port validation failed.
SEVERE : Jan 27, 2015 3:40:09 PM - CAUSE - CLONE-20372   Ports of following servers - oacore_server2(7256),forms_server2(7456),oafm_server2(7656),forms-c4ws_server2(7856),oaea_server1(6856) - are not available.
4:00 PM
SEVERE : Jan 27, 2015 3:40:09 PM - ERROR - CLONE-20372   Server port validation failed.
SEVERE : Jan 27, 2015 3:40:09 PM - CAUSE - CLONE-20372   Ports of following servers - oacore_server2(7256),forms_server2(7456),oafm_server2(7656),forms-c4ws_server2(7856),oaea_server1(6856) - are not available.
SEVERE : Jan 27, 2015 3:40:09 PM - ACTION - CLONE-20372   Provide valid free ports.
oracle.as.t2p.exceptions.FMWT2PPasteConfigException: PasteConfig failed. Make sure that the move plan and the values specified in moveplan are correct

The ports reported are those in the source instance.  Searching on support.oracle.com bug database I found three articles:

EBS 12.2.2.4 RAPID CLONE FAILS WITH ERROR - CLONE-20372 SERVER PORT VALIDATION(Bug ID 20147454)

12.2: N->1 CLONING TO SAME APPS TIER FAILING DUE TO PORT CONFLICT(Bug ID 20389864)

FS_CLONE IS NOT ABLE TO COMPLETE FOR MULTI-NODE SETUP(Bug ID 18460148)

The situation described in the first two bugs is same.  The articles reference each other but don't provide any solution.

Logically thinking, adcfgclone.pl is picking this up from source configuration that is in $COMMON_TOP/clone directory.  So we did grep on subdirectories of $COMMON_TOP/clone:

cd $COMMON_TOP/clone
find . -type f -print | xargs grep 7256

7256 is one of the ports that failed validation.

It is present in

CTXORIG.xml and
FMW/ohs/moveplan.xml
FMW/wls/moveplan.xml

We tried changing the port numbers in CTXORIG.xml and re-tried adcfgclone.pl and it failed again.

So we changed the port numbers of the ports that failed validation in

$COMMON_TOP/clone/FMW/ohs/moveplan.xml and
$COMMON_TOP/clone/FMW/wls/moveplan.xml

cd $FMW_HOME
find . -name detachHome.sh |grep -v Template

The above command returns the detachHome.sh scripts for all the ORACLE_HOMEs inside FMW_HOME.  Executed this to detach all of them.

Removed the FMW_HOME directory

Re-executed
adcfgclone.pl appsTier

It succeeded this time.  Till we get a patch for this bug, we will continue to use this workaround to complete clones.


Categories: APPS Blogs

Stories Are the Best, Plus News on Nest!

Oracle AppsLab - Wed, 2015-01-28 14:21

Friend of the ‘Lab, Kathy, has been using Storify for a while now to compile easy-to-consume, erm, stories about the exploits of Oracle Applications User Experience (@usableapps).

You might remember Storify from past stories such as the In the U.K.: Special events and Apps 14 with UKOUG and Our OpenWorld 2014 Journey.

Anyway, Kathy has a new story, The Internet of Things and the Oracle user experience, which just so happens to feature some of our content. If you read here with any regularity or know Noel (@noelportugal), you’ll know we love our internet-connect things.

So, check out Kathy’s story to get the bigger picture, and hey, why not read all the stories on the Usableapps Storify page.

And bonus content on IoT!

Google keeps making the Nest smarter and marginally, depending on your perspective, more useful. In December, a Google Now integration rolled out, pairing a couple of my favorite products.

More gimmick than useful feature, at least for me, I ran into issues with the NLP on commands, as you can see:

Screenshot_2015-01-28-12-01-40

Saying “set the temperature to 70 degrees” frequently results in an interpretation of 270 degrees. Works fine if you don’t say “to” there. Google Now becomes a more effective assistant, this integration will be more useful, I’ve no doubt.

Then, at CES, Nest announced partnerships that form a loose alliance of household appliances. It may take a big player like Nest (ahem, Google) to standardize the home IoT ecosystem.

And just this week, Misfit announced a partnership with Nest to allow their fitness tracker, the one I used to wear, to control the Nest. I’m tempted to give the Shine another go, but I’m worried about falling back into a streak-spiral.

Thoughts on IoT? Nest? Ad-supported world domination? You know what to do.Possibly Related Posts:

Innovating with Middleware Platform

Anshu Sharma - Wed, 2015-01-28 13:01

I was recently discussing with a partner executive on how Oracle can help the ISV innovate. Decided to pen my thoughts here too -

1) WebLogic Innovation - WebLogic is our market leading App Server. The area which I would like to highlight is Exalogic. Seeing more and more cases where Telco, Financial Services, Govt solution providers are seeing business benefits of running their business critical application on Exalogic. With the upcoming launch of Exalogic Cloud Software 12c and already available X5-2 hardware, WebLogic performance on Exalogic will continue to get better. But more importantly partners would be able to get a simplified experience, similar to Oracle Public Cloud, on Exalogic as explained in this blog post.

2) Middleware Platform for Industry solutions - Oracle SOA Suite solves core integration challenges for Healthcare entities, Retailers/Manufacturers, Airlines etc. Oracle BPM allows you to design complex processes for Financial Services, Telcos, Public Sector etc. Oracle Event Processing allows you to analyze and act on data from a variety of devices (IoT) in Fast Data Solutions being deployed in Telcos (Mobile Data offloading, QoS Management), Transportation (Vehicle Monitoring), Retail (Real Time Coupons), Utilities (Smart Grids) etc. Partners providing process management and integration solutions for vertical industries can roll out innovations while keeping the lights running by deploying on Oracle Middleware Platform (SOA, BPM, OEP, WLS, Exalogic, Enterprise Manager).

3) Mobile Platform - Adoption of mobility in enterprises offers tremendous opportunities to ISVs. We asked one partner, RapidValue, to share their experience. In this writeup, RapidValue explains how they were able to use power of Oracle Mobile Platform to quickly bring to market a suite of Mobile Applications for Field Service, HRMS, Approvals, Order Management, Inventory Management, and Expense Management.

4) Public Cloud – In recent years the world of application development has adopted new methodologies, like Agile, that improve the quality and speed in which applications are delivered. Tools such as automatic build utilities combined with continuous integration platforms simplify the adoption of these new methodologies. These tools are available in Oracle Developer Cloud Service for every licensee of Java Cloud Service. 

Peter Rowley: "Definition of Insanity - Using the Same Performance Management Tools and Expecting a Different Result"

Linda Fishman Hoyle - Wed, 2015-01-28 12:14
Peter Rowley (pictured left) enthusiastically believes in the power of HR technology to transform HR and, ultimately, transform a business.  Rowley,  works in Oracle HCM Solution Consulting and recently wrote an informative article about performance management tools and processes.

According to Rowley, “organizations continue to expect that the performance management process will drive business change and transformation and greater results.”When companies don’t get the hoped-for results, they try making some cosmetic changes to their existing system or retrain some staff and managers.  However, the modifications might only improve the experience to a small degree, but not the results. Why? Because the business, the workforce and the underlying psychological contract have changed dramatically, “but one of the main tools to drive change [the performance management process] remains static.”

So now companies are starting to make some radical changes with new tools and modernized approaches to performance management. Managers are switching from a very structured and formal approach to doing regular check-ins to assess progress, managing with trust, and leveraging social tools. And of course, “our HCM Cloud applications are reflecting this shift in thinking and underpinning this new approach.”

There are plenty of good details in this article and plenty of good reasons to share it with your colleagues.

Oracle Voice: A Technical Innovation from Oracle

Linda Fishman Hoyle - Wed, 2015-01-28 12:12

Oracle is a big company, but it can turn on a dime to beat the competition.

One of the charters of the Oracle Applications User Experience team, explains Misha Vaughn (pictured left), Director, Communications & Outreach, Applications User Experience, is to explore emerging technology and possible enterprise use cases and quickly turn that into product. Oracle Voice, for sales reps who use the Oracle Sales Cloud, is a great example of that.

In October 2013, the UX team tested a prototype of Oracle Voice on Oracle sales reps at Oracle OpenWorld in San Francisco and gathered feedback to build a solid product. It became available on iTunes in June 2014.

Oracle Voice allows sales reps to efficiently retrieve and capture sales information before and after meetings. Research shows that we tend to forget what we just learned if we don’t write it down within 20 minutes. With Oracle Voice, sales reps using Oracle Sales Cloud can capture key account information by speaking rather than typing.

The Oracle Voice press release gives you more details on this innovative development.

Oracle Voice is just the beginning of the dramatic technologies coming from the Oracle AppsLab. We're exploring wearables, augmented reality, beacons, and much more—and building applications that enhance the user experience of Oracle Applications using these emerging technologies.

GGSCI Commands : History and Command (!) recall

DBASolved - Wed, 2015-01-28 11:08

Ever get tired of typing commands?  Ever wish there was a way to recall commands from GGSCI?  Well, you are in luck!  There are two ways this can be done (listed below).

Commands:
1. History
2. ! (command)

The first option, History, is a command that allows you to view a list of the most recent commands executed in the GGSCI interface since the session started.  

Example:

GGSCI> history

Output:

GGSCI Command History

    3: stats ext ext
    4: stats exti
    5: info all
    6: info manager
    7: edit mgr
    8: edit manager
    9: edit params mgr
   10: set editor vi
   11: edit params mgr
   12: history

Notice that the last 10 commands are listed with the history command.  This list can be tailered by using a number after the history command.

Example:

GGSCI> history [n]

Output:
GGSCI Command History

    9: edit params mgr
   10: set editor vi
   11: edit params mgr
   12: history
   13: history 5

By using the a number with the history command, the last N commands will be displayed.  In the example above, I wanted the last five commands.  So commands that meet this requriement are displayed including the command ran.

Now that we can see a list of the last commands ran, how can we execute the command that we would like to execute from the list.  This is quite simple, just use the command (!) option.  An exclamation point (!) in Oracle GoldenGate acts as a command recall/execution.

Example:

GGSCI> !

In the example above, the command (!) will execute the last command in the list of commands store in the session history.  By adding a number to the command (!), we can tell GGSCI to excute that command.

Example:

GGSCI> ! 5

In the example above, I’m asking to rerun the “info all” command that can be seen in the history earlier in the post.  The output from running the command will be a listing of the current status of the Oracle GoldenGate environment.

Output:

GGSCI (oel.acme.com) 15> ! 5
info all

Program     Status      Group       Lag at Chkpt  Time Since Chkpt

MANAGER     RUNNING
JAGENT      RUNNING
EXTRACT     RUNNING     EXT         00:00:00      00:00:02  
EXTRACT     RUNNING     EXTI        00:00:06      00:00:09  Description “Integrated Extract”
EXTRACT     RUNNING     PMP         00:00:00      00:00:00
EXTRACT     RUNNING     PMPI        00:00:00      00:00:05  Description “Integrated Pump”

Both of these commands can be used to cut down on typing in the GGSCI utility and make working a bit easier. 

Enjoy!

about.me: http://about.me/dbasolved


Filed under: Golden Gate
Categories: DBA Blogs

Stay with non-CDB or go to CDB?

Yann Neuhaus - Wed, 2015-01-28 10:19

This is a question that starts to be raised quite frequently. Oracle released the multitenant architecture 1.5 year ago. And now says that the previous architecture - known as non-CDB - is deprecated. What does it mean? Do we have to go to the CDB architecture even if we dont want to use/pay multi-tenant?

Making DevOps Business Driven - a service view

Steve Jones - Wed, 2015-01-28 08:59
I've been doing a bit recently around DevOps and what I've been seeing is that companies that having been scaling DevOps tend to run into a problem: exactly what is a good boundary for a DevOps team? Now I've talked before about how Microservices are just SOA with a new logo, well there is an interesting piece about DevOps as well, its not actually a brand new thing.  Its an evolution and
Categories: Fusion Middleware

University of Melbourne Improves Student Self-Service with Oracle WebCenter

WebCenter Team - Wed, 2015-01-28 08:40
by Richard Maldonado, Principal Product Manager, Oracle WebCenter

Learn how The University of Melbourne with WebCenter streamlined the student services experience  while also improving operational efficiencies by reducing dependencies on IT.

Established in 1853, the University of Melbourne is a public-spirited institution that makes contributions to society in research, teaching and knowledge transfer. Consistently ranked in the world’s top 50 universities the University of Melbourne is Australia’s leading university. 

Their older Student Portal, which ran on Oracle Portal 10g, required a technology platform replacement and the school desired a modern self-service experience for the students.  Top goals for their new portal included:

  • All student information in one place
  • Richer, more attractive page design
  • Ability to personalize content displayed
  • Administrators can update Portal pages without technical support
  • Handle high load to handle peak registration


Oracle WebCenter forms the basis of the new Student Portal. It surfaces data from multiple applications including learning management, student information systems and delivers a dashboard for students in their busy University life.

To learn more about this WebCenter success, watch this special event featuring experts from University of Melbourne and Oracle Consulting Services.

How invested are millennials in cybersecurity?

Chris Foot - Wed, 2015-01-28 00:30

As 2014 is increasingly becoming known as "the year of the breach" among some, security analysts are looking toward the future.

Specifically, these professionals are wondering whether millennials will exercise cybersecurity best practices or disregard them as basic accommodations. In addition, some fear that this generation isn't interested in making careers as data protection specialists.

A case of misplaced values?
Millennials aren't ignorant of the prevalence of database security monitoring and other IT asset defense services – they essentially grew up with the Internet at their disposal. They're aware of the security breaches that occurred at Target and other major corporations, but Dark Reading's Chris Rouland maintained millennial concern for cybersecurity pales in comparison to the way they value organic food, for instance.

Rouland asserted that millennials essentially regard security breaches as a part of daily life. After famed mobile app Snapchat was infiltrated, divulging user photos and personal information, the app's usage rose in the aftermath of the ordeal.

Services can only go so far
Essentially, the millennial culture expects these incidents to occur. Furthermore, it appears they have completely sacrificed any sense of privacy. The problem for enterprises is wondering whether this attitude will permeate into operations. Rouland referenced a survey of millennials conducted by TrackIT, which found that millennials "aren't concerned about corporate security when they use personal apps instead of corporate-approved apps."

An organization could have the best team of network and database analysts on the planet at its disposal, but if its employees are disregarding rudimentary security protocols, it makes the jobs of cybersecurity professionals that much more difficult. The idea that "there's always going to be a breach" could be eliminated if greater value for corporate security was prevalent.

Little interest in a career path?
If millennials' general attitude toward cybersecurity persists, it would be easy to assume they wouldn't pursue the topic as a career. However, maybe organizations and professionals are missing the mark: What if the issue lies not in a generation's lack of care, but ignorance?

A survey conducted by Raytheon discovered that approximately one-quarter of millennials want a job in cybersecurity. However, awareness of technology wasn't ubiquitous among participants. The largest number of respondents asserted they wanted careers as app designers and developers while others strove to become computer software engineers.

So why is cybersecurity getting the short end of the stick? Two-thirds of millennials reported they either "don't know" or "aren't sure" about what being a cybersecurity professional entails. In this regard, education seems to be the best course of action.

The post How invested are millennials in cybersecurity? appeared first on Remote DBA Experts.

Coding in PL/SQL in C style, UKOUG, OUG Ireland and more

Pete Finnigan - Tue, 2015-01-27 21:05

My favourite language is hard to pin point; is it C or is it PL/SQL? My first language was C and I love the elegance and expression of C. Our product PFCLScan has its main functionallity written in C. The....[Read More]

Posted by Pete On 23/07/14 At 08:44 PM

Categories: Security Blogs

Integrating PFCLScan and Creating SQL Reports

Pete Finnigan - Tue, 2015-01-27 21:05

We were asked by a customer whether PFCLScan can generate SQL reports instead of the normal HTML, PDF, MS Word reports so that they could potentially scan all of the databases in their estate and then insert either high level....[Read More]

Posted by Pete On 25/06/14 At 09:41 AM

Categories: Security Blogs

Automatically Add License Protection and Obfuscation to PL/SQL

Pete Finnigan - Tue, 2015-01-27 21:05

Yesterday we released the new version 2.0 of our product PFCLObfuscate . This is a tool that allows you to automatically protect the intellectual property in your PL/SQL code (your design secrets) using obfuscation and now in version 2.0 we....[Read More]

Posted by Pete On 17/04/14 At 03:56 PM

Categories: Security Blogs