About the Authors |
|
xxxix | |
About the Technical Reviewer |
|
xli | |
Acknowledgments |
|
xliii | |
Introduction |
|
xlv | |
Chapter 1 Getting Started |
|
1 | (20) |
|
1-1 Connecting Securely to a Remote Server |
|
|
2 | (4) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (3) |
|
1-2 Logging on Remotely via the Command Line |
|
|
6 | (2) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (2) |
|
1-3 Logging off the Server |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (6) |
|
|
11 | (1) |
|
|
11 | (5) |
|
|
16 | (1) |
|
1-6 Correcting Command-Line Mistakes |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (3) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (2) |
Chapter 2 Working in the Shell |
|
21 | (30) |
|
2-1 Displaying the Current Shell |
|
|
22 | (2) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
2-2 Running Previously Entered Commands |
|
|
24 | (3) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (1) |
|
2-3 Automatically Completing Long Commands |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
2-4 Viewing Environment Variables |
|
|
28 | (2) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
2-5 Automatically Setting Shell Variables |
|
|
30 | (2) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
2-6 Customizing the Command Prompt |
|
|
32 | (2) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
2-7 Creating a Command Shortcut |
|
|
34 | (2) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (2) |
|
2-8 Providing Input to Commands |
|
|
36 | (2) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
2-9 Redirecting Command Output |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
2-10 Sending Output to Nowhere |
|
|
39 | (2) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
2-11 Displaying and Capturing Command Output |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
2-12 Recording All Shell Command Output |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
2-13 Changing the Login Shell |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
2-14 Modifying Command Path Search |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
2-15 Viewing Built-in Commands |
|
|
45 | (3) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (2) |
|
2-16 Setting the Backspace Key |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
2-17 Typing a Long Command in Multiple Lines |
|
|
48 | (3) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (2) |
Chapter 3 Managing Processes and Users |
|
51 | (18) |
|
|
51 | (2) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
3-2 Terminating Processes |
|
|
53 | (3) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (3) |
|
3-3 Listing the Users Logged On |
|
|
56 | (2) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
3-4 Listing the Last Logon Time of a User |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
3-5 Limiting the Number of User Processes |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
3-6 Viewing How Long the Server Has Been Running |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
3-7 Viewing How Long a Process Has Been Running |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
3-8 Displaying Your Username |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
3-9 Changing Your Password |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
3-10 Becoming the System Privileged (root) User |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
3-11 Running Commands as the root User |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
Chapter 4 Creating and Editing Files |
|
69 | (18) |
|
|
70 | (3) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (3) |
|
4-2 Maneuvering Within a File |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
4-5 Searching for and Replacing Text |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
4-6 Inserting One File into Another |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
4-8 Running Operating System Commands |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
4-11 Displaying Line Numbers |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
4-12 Automatically Configuring Settings |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
4-13 Creating Shortcuts for Commands |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
4-14 Setting the Shell Default Text Editor |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
4-15 Setting the SQL*Plus Text Editor |
|
|
84 | (2) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
4-16 Toggling Syntax Text Color |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
Chapter 5 Managing Files and Directories |
|
87 | (52) |
|
5-1 Showing the Current Working Directory |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (4) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
5-4 Viewing a List of Directories |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (2) |
|
5-7 Creating a File Quickly |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
5-8 Changing File Permissions |
|
|
99 | (4) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (3) |
|
5-9 Changing File Ownership and Group Membership |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
5-10 Viewing the Contents of a Text File |
|
|
103 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
5-11 Viewing Nonprinting Characters in a File |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
5-12 Viewing Hidden Files |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
5-13 Determining File Type |
|
|
107 | (2) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
5-14 Finding Differences Between Files |
|
|
109 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
5-15 Comparing Contents of Directories |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
5-18 Moving Files and Directories |
|
|
115 | (2) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
5-19 Renaming a File or Directory |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
5-21 Removing Protected Files Without Being Prompted |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
5-22 Removing Oddly Named Files |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
5-24 Finding Strings in Files |
|
|
122 | (2) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (2) |
|
5-25 Finding a Recently Modified File |
|
|
124 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
5-26 Finding and Removing Old Files |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
5-27 Finding the Largest Files |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
5-28 Finding a File of a Certain Size |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
5-29 Sorting Files by Size |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
5-30 Finding the Largest Space-Consuming Directories |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
5-31 Truncating an Operating System File |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
5-32 Counting Lines and Words in a File |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
5-33 Creating a Second Name for a File |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
5-34 Creating a Second Name for a Directory |
|
|
133 | (2) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
5-35 Viewing a Large File |
|
|
135 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (2) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
Chapter 6 Archiving and Compressing Files |
|
139 | (18) |
|
6-1 Bundling Files Using tar |
|
|
140 | (3) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (2) |
|
6-2 Unbundling Files Using tar |
|
|
143 | (2) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
6-3 Finding Differences in Bundled Files Using tar |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
6-4 Bundling Files Using cpio |
|
|
146 | (2) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
6-5 Unbundling Files Using cpio |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
6-6 Bundling Files Using zip |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
6-7 Unbundling Files Using zip |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
6-8 Bundling Files Using find |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
6-9 Compressing and Uncompressing Files |
|
|
152 | (2) |
|
|
152 | (1) |
|
|
152 | (2) |
|
|
154 | (1) |
|
6-10 Validating File Contents |
|
|
154 | (3) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (2) |
Chapter 7 Shell Scripting |
|
157 | (44) |
|
7-1 Writing a Simple Shell Script |
|
|
158 | (2) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
7-2 Checking Simple Conditions |
|
|
160 | (2) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (6) |
|
|
162 | (1) |
|
|
162 | (3) |
|
|
165 | (3) |
|
7-4 Checking Complex Conditions |
|
|
168 | (5) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (3) |
|
|
173 | (2) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (2) |
|
7-6 Iterating Until a Condition Is Met |
|
|
175 | (2) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
7-7 Displaying a Menu of Choices |
|
|
177 | (3) |
|
|
177 | (1) |
|
|
177 | (2) |
|
|
179 | (1) |
|
7-8 Running Commands Based on Success/Failure of the Previous Command |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (3) |
|
|
181 | (1) |
|
|
181 | (2) |
|
|
183 | (1) |
|
7-10 Passing Parameters to Scripts |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
7-11 Processing Parameters |
|
|
185 | (3) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
7-12 Running Database Commands in Scripts |
|
|
188 | (2) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
7-13 Crafting a Robust DBA Shell Script |
|
|
190 | (4) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (2) |
|
7-14 Running Scripts in the Background |
|
|
194 | (3) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (2) |
|
7-15 Monitoring the Progress of a Script |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (3) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (2) |
Chapter 8 Analyzing Server Performance |
|
201 | (36) |
|
8-1 Identifying System Bottlenecks |
|
|
203 | (3) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (2) |
|
8-2 Analyzing Current and Past System Performance |
|
|
206 | (5) |
|
|
206 | (1) |
|
|
206 | (3) |
|
|
209 | (2) |
|
8-3 Identifying CPU-Intensive Processes |
|
|
211 | (6) |
|
|
211 | (1) |
|
|
211 | (3) |
|
|
214 | (3) |
|
8-4 Identifying CPU Bottlenecks |
|
|
217 | (2) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
8-5 Identifying Memory-Intensive Processes |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
8-6 Identifying Memory Bottlenecks |
|
|
220 | (3) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (2) |
|
8-7 Identifying I/O-Intensive Processes |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
8-8 Identifying I/O Bottlenecks |
|
|
224 | (4) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (3) |
|
8-9 Monitoring Network Traffic |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
8-10 Troubleshooting Database Connectivity |
|
|
229 | (2) |
|
|
229 | (1) |
|
|
229 | (2) |
|
|
231 | (1) |
|
|
231 | (3) |
|
|
231 | (1) |
|
|
231 | (2) |
|
|
233 | (1) |
|
8-12 Listing Files Opened by Processes |
|
|
234 | (3) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (3) |
Chapter 9 Viewing and Configuring System Resources |
|
237 | (30) |
|
9-1 Displaying Server Hardware and the Operating System |
|
|
238 | (2) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
9-3 Displaying Physical Memory |
|
|
241 | (3) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (2) |
|
9-4 Viewing Kernel Parameters |
|
|
244 | (3) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
|
9-5 Modifying Kernel Parameters |
|
|
247 | (4) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (3) |
|
9-6 Displaying Semaphores |
|
|
251 | (2) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
9-7 Configuring Semaphores |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
9-8 Viewing Memory Structures |
|
|
254 | (2) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
9-9 Removing In-Memory Structures |
|
|
256 | (2) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
9-10 Viewing Network Configuration Settings |
|
|
258 | (2) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
258 | (2) |
|
9-11 Configuring Network Settings |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
260 | (1) |
|
9-12 Modifying System Open File Limits |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
9-13 Showing Shell Limits |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
9-14 Changing Shell Limits |
|
|
263 | (4) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (4) |
Chapter 10 Automating Jobs with cron |
|
267 | (18) |
|
10-1 Enabling Access to Schedule Jobs |
|
|
267 | (2) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
10-2 Editing the cron Table |
|
|
269 | (2) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
10-3 Understanding cron Table Entries |
|
|
271 | (4) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (2) |
|
10-4 Setting Operating System Variables |
|
|
275 | (2) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
10-5 Specifying the Execution Shell |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
10-6 Redirecting cron Output |
|
|
278 | (2) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (2) |
|
10-7 Embedding Conditional Logic |
|
|
280 | (2) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
10-8 Troubleshooting cron |
|
|
282 | (3) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
282 | (3) |
Chapter 11 Managing Server Software |
|
285 | (40) |
|
|
285 | (2) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
11-2 Switching to the Oracle Unbreakable Linux Network |
|
|
287 | (3) |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (1) |
|
11-3 Associating Linux Files with RPM Packages |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
11-4 Listing the Contents of an RPM Package |
|
|
291 | (3) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
11-5 Downloading Packages |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
11-6 Automating Server Builds with Oracle RDBMS Server Prelnstall RPM |
|
|
295 | (3) |
|
|
295 | (1) |
|
|
295 | (2) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (2) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
11-9 Checking RPM Requirements to Install Oracle Database |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
11-10 Performing Initial Silent Oracle Software Installation with Response Files |
|
|
302 | (7) |
|
|
302 | (1) |
|
|
303 | (2) |
|
|
305 | (3) |
|
|
308 | (1) |
|
11-11 Creating a Database with a Response File |
|
|
309 | (3) |
|
|
309 | (1) |
|
|
309 | (2) |
|
|
311 | (1) |
|
11-12 Creating a Network Configuration with a Response File |
|
|
312 | (3) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (2) |
|
11-13 Applying Patch Set Updates (PSUs) and Interim Patches |
|
|
315 | (4) |
|
|
315 | (1) |
|
|
315 | (3) |
|
|
318 | (1) |
|
11-14 Cloning an Oracle Home |
|
|
319 | (3) |
|
|
319 | (1) |
|
|
319 | (2) |
|
|
321 | (1) |
|
11-15 Attaching an Oracle Home |
|
|
322 | (3) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (2) |
Chapter 12 VirtualBox for Oracle |
|
325 | (20) |
|
12-1 Installing Oracle VM VirtualBox |
|
|
325 | (2) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
12-2 Setting Up VirtualBox Virtual Machine (VM) |
|
|
327 | (3) |
|
|
327 | (1) |
|
|
327 | (2) |
|
|
329 | (1) |
|
12-3 Starting Up a VM for the First Time |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
12-4 Creating Additional Virtual Disks |
|
|
331 | (3) |
|
|
331 | (1) |
|
|
331 | (3) |
|
|
334 | (1) |
|
12-5 Provisioning/Sharing a Disk with Another VM |
|
|
334 | (2) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
12-6 Configuring the Virtual Network |
|
|
336 | (2) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
12-7 Leveraging/Creating Oracle VM VirtualBox Prebuilt Templates |
|
|
338 | (2) |
|
|
338 | (1) |
|
Solution #1: Leveraging Oracle's Prebuilt Template |
|
|
338 | (1) |
|
Solution #2: Creating Your Own OVA Template |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
12-9 Working with Snapshots |
|
|
341 | (4) |
|
|
341 | (1) |
|
|
341 | (2) |
|
|
343 | (2) |
Chapter 13 Optimizing Linux for Oracle Databases |
|
345 | (22) |
|
13-1 Minimalizing the Linux Environment for Performance and Security |
|
|
345 | (2) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
13-2 Configuring Hugepages |
|
|
347 | (6) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
Automating Hugepages Server Configuration |
|
|
348 | (3) |
|
Computing the Value of Huge Pages on an Existing Linux Server |
|
|
351 | (1) |
|
Disabling Transparent Huge Pages |
|
|
352 | (1) |
|
13-3 Enabling Jumbo Frames |
|
|
353 | (2) |
|
|
353 | (1) |
|
|
353 | (2) |
|
|
355 | (1) |
|
13-4 Determining and Implementing the Right I/O Scheduler |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
13-5 Setting Pertinent Kernel Parameters for Oracle Databases |
|
|
356 | (4) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (2) |
|
13-6 Configuring NTP for Oracle |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
13-7 Bonding Network Interfaces |
|
|
361 | (3) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
13-8 Enabling Network Services Cache Daemon (nscd) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
13-9 Aligning Disk Partitions Correctly |
|
|
364 | (3) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (2) |
Chapter 14 Working Securely Across a Network |
|
367 | (20) |
|
|
368 | (4) |
|
|
368 | (1) |
|
|
368 | (3) |
|
|
371 | (1) |
|
14-2 Generating Host Keys |
|
|
372 | (3) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (2) |
|
|
375 | (3) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (2) |
|
14-4 Copying Files Securely |
|
|
378 | (2) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
14-5 Authenticating Through Public Keys |
|
|
380 | (3) |
|
|
380 | (1) |
|
|
380 | (2) |
|
|
382 | (1) |
|
14-6 Configuring a Promptless Logon |
|
|
383 | (4) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (3) |
Chapter 15 Managing X Window |
|
387 | (14) |
|
15-1 Configuring an X Server |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
15-2 Starting an X Server |
|
|
389 | (3) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (2) |
|
15-3 Stopping the X Server |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
15-4 Displaying an X Client on a Remote Server |
|
|
393 | (3) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
394 | (2) |
|
15-5 Tunneling X Over SSH |
|
|
396 | (2) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
15-6 Manipulating the Terminal Emulator for X Windows |
|
|
398 | (3) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
399 | (2) |
Chapter 16 Managing Remote Servers with VNC |
|
401 | (22) |
|
16-1 Downloading the VNC Software |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
16-2 Installing the VNC Software |
|
|
403 | (3) |
|
|
403 | (1) |
|
|
403 | (3) |
|
|
406 | (1) |
|
16-3 Manually Starting and Stopping the VNC Server |
|
|
406 | (2) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (2) |
|
16-4 Automatically Starting the VNC Server on Linux |
|
|
408 | (3) |
|
|
408 | (1) |
|
|
408 | (3) |
|
|
411 | (1) |
|
16-5 Automatically Starting the VNC Server on Solaris |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
16-6 Starting the VNC Viewer |
|
|
412 | (2) |
|
|
412 | (1) |
|
|
412 | (2) |
|
|
414 | (1) |
|
16-7 Securing a VNC Connection |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (1) |
|
16-8 Accessing VNC via a Proxy Server |
|
|
415 | (2) |
|
|
415 | (1) |
|
|
415 | (2) |
|
|
417 | (1) |
|
16-9 Running X Applications with VNC |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
16-10 Troubleshooting VNC |
|
|
418 | (5) |
|
|
418 | (1) |
|
|
418 | (3) |
|
|
421 | (2) |
Appendix A: RAID Concepts |
|
423 | (16) |
|
|
423 | (5) |
|
Defining Array, Stripe Width, Stripe Size, Chunk Size |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
426 | (2) |
|
|
428 | (4) |
|
|
429 | (2) |
|
|
431 | (1) |
|
Building Hybrid (Nested) RAID Devices |
|
|
432 | (4) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
435 | (1) |
|
Determining Disk Requirements |
|
|
436 | (1) |
|
|
437 | (2) |
Appendix B: Server Log Files |
|
439 | (6) |
|
|
439 | (3) |
|
|
439 | (2) |
|
Setting Up a Custom Log Rotation |
|
|
441 | (1) |
|
|
442 | (1) |
|
Managing Solaris Log Files |
|
|
442 | (2) |
|
Viewing System Message Log Files |
|
|
443 | (1) |
|
Rotating Solaris Log Files |
|
|
443 | (1) |
|
|
444 | (1) |
Index |
|
445 | |