Muutke küpsiste eelistusi

E-raamat: Linux and Solaris Recipes for Oracle DBAs

  • Formaat: PDF+DRM
  • Ilmumisaeg: 27-Nov-2015
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484212547
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 27-Nov-2015
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484212547
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Linux and Solaris Recipes for Oracle DBAs, 2nd Edition is an example–based book on managing Oracle Database under Linux and Solaris. The book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a stack of operating-system documentation. What this book provides instead is task-oriented coverage designed around the needs of the Oracle Database Administrator. Find the right chapter. Look up the task to perform. See the solution. Implement the solution straight away in your own environment. Get the job done.

New in this edition is coverage of Oracle's own Solaris operating system. Oracle Corporation has been working diligently to bring commonality between Solaris and and Linux, and this book takes advantage of those efforts to provide task-oriented solutions that work on common distributions of Linux such as Red Hat Enterprise Linux and Oracle Enterprise Linux while also accommodating the growing number of Oracle Solaris customers. Examples in the book match the tasks DBAs perform daily, even hourly. Solutions come first in the book, but alway are followed by close explanations of the details.

Database administrators won't go wrong with <

Linux and Solaris Recipes for Oracle DBAs. It's the book to buy if you're after clear and reliable examples to help in getting the job done, and getting home to your family.

  • Takes you directly from problem to solution
  • Covers the "right" mix of operating-system tasks for database administrators
  • Respects your time by being succinct and to–the–point
  • Includes coverage of Solaris in addition to common Linux distributions
What You Will Learn
  • Execute Linux and Solaris commands applicable to Oracle Database.
  • Automate critical DBA tasks via operating-system shell scripts.
  • Monitor, tune, and optimize Linux and Solaris servers for Oracle.
  • Setup a VirtualBox environment for the Oracle database.
  • Perform system administration tasks relevant to Oracle Database.
Remotely (and securely!) manage Oracle on Linux and Solaris.

Who This Book Is For

Linux and Solaris Recipes for Oracle DBAs is a book for Oracle database administrators who want to expertly operate Oracle databases on the Linux and Solaris operating systems. If you’re new to Linux and Solaris and can benefit from detailed examples showing how to perform tasks that Oracle DBAs perform on Linux and Solaris servers, then this book is what you need to help you get the job done, and get home on time. 
About the Authors xxxix
About the Technical Reviewer xli
Acknowledgments xliii
Introduction xlv
Chapter 1 Getting Started 1(20)
1-1 Connecting Securely to a Remote Server
2(4)
Problem
2(1)
Solution
2(1)
How It Works
3(3)
1-2 Logging on Remotely via the Command Line
6(2)
Problem
6(1)
Solution
6(1)
How It Works
6(2)
1-3 Logging off the Server
8(1)
Problem
8(1)
Solution
8(1)
How It Works
8(1)
1-4 Running a Command
9(2)
Problem
9(1)
Solution
9(1)
How It Works
10(1)
1-5 Getting Help
11(6)
Problem
11(1)
Solution
11(5)
How It Works
16(1)
1-6 Correcting Command-Line Mistakes
17(1)
Problem
17(1)
Solution
17(1)
How It Works
17(1)
1-7 Clearing the Screen
17(1)
Problem
17(1)
Solution
17(1)
How It Works
18(1)
1-8 Resetting the Screen
18(3)
Problem
18(1)
Solution
18(1)
How It Works
19(2)
Chapter 2 Working in the Shell 21(30)
2-1 Displaying the Current Shell
22(2)
Problem
22(1)
Solution
22(1)
How It Works
23(1)
2-2 Running Previously Entered Commands
24(3)
Problem
24(1)
Solution
24(2)
How It Works
26(1)
2-3 Automatically Completing Long Commands
27(1)
Problem
27(1)
Solution
27(1)
How It Works
28(1)
2-4 Viewing Environment Variables
28(2)
Problem
28(1)
Solution
28(1)
How It Works
29(1)
2-5 Automatically Setting Shell Variables
30(2)
Problem
30(1)
Solution
30(1)
How It Works
31(1)
2-6 Customizing the Command Prompt
32(2)
Problem
32(1)
Solution
32(1)
How It Works
33(1)
2-7 Creating a Command Shortcut
34(2)
Problem
34(1)
Solution
34(1)
How It Works
34(2)
2-8 Providing Input to Commands
36(2)
Problem
36(1)
Solution
36(1)
How It Works
37(1)
2-9 Redirecting Command Output
38(1)
Problem
38(1)
Solution
39(1)
How It Works
39(1)
2-10 Sending Output to Nowhere
39(2)
Problem
39(1)
Solution
39(1)
How It Works
40(1)
2-11 Displaying and Capturing Command Output
41(1)
Problem
41(1)
Solution
41(1)
How It Works
41(1)
2-12 Recording All Shell Command Output
42(1)
Problem
42(1)
Solution
42(1)
How It Works
42(1)
2-13 Changing the Login Shell
43(1)
Problem
43(1)
Solution
43(1)
How It Works
43(1)
2-14 Modifying Command Path Search
44(1)
Problem
44(1)
Solution
44(1)
How It Works
45(1)
2-15 Viewing Built-in Commands
45(3)
Problem
45(1)
Solution
46(1)
How It Works
46(2)
2-16 Setting the Backspace Key
48(1)
Problem
48(1)
Solution
48(1)
How It Works
48(1)
2-17 Typing a Long Command in Multiple Lines
48(3)
Problem
48(1)
Solution
49(1)
How It Works
49(2)
Chapter 3 Managing Processes and Users 51(18)
3-1 Listing Processes
51(2)
Problem
51(1)
Solution
51(1)
How It Works
52(1)
3-2 Terminating Processes
53(3)
Problem
53(1)
Solution
53(1)
How It Works
53(3)
3-3 Listing the Users Logged On
56(2)
Problem
56(1)
Solution
56(1)
How It Works
57(1)
3-4 Listing the Last Logon Time of a User
58(1)
Problem
58(1)
Solution
58(1)
How It Works
58(1)
3-5 Limiting the Number of User Processes
59(1)
Problem
59(1)
Solution
59(1)
How It Works
59(1)
3-6 Viewing How Long the Server Has Been Running
60(1)
Problem
60(1)
Solution
60(1)
How It Works
60(1)
3-7 Viewing How Long a Process Has Been Running
60(1)
Problem
60(1)
Solution
60(1)
How It Works
61(1)
3-8 Displaying Your Username
61(1)
Problem
61(1)
Solution
61(1)
How It Works
61(1)
3-9 Changing Your Password
62(1)
Problem
62(1)
Solution
62(1)
How It Works
62(1)
3-10 Becoming the System Privileged (root) User
63(1)
Problem
63(1)
Solution
63(1)
How It Works
64(1)
3-11 Running Commands as the root User
64(1)
Problem
64(1)
Solution
64(1)
How It Works
65(1)
3-12 Adding a Group
65(1)
Problem
65(1)
Solution
65(1)
How It Works
66(1)
3-13 Removing a Group
66(1)
Problem
66(1)
Solution
66(1)
How It Works
67(1)
3-14 Adding a User
67(1)
Problem
67(1)
Solution
67(1)
How It Works
67(1)
3-15 Removing a User
68(1)
Problem
68(1)
Solution
68(1)
How It Works
68(1)
Chapter 4 Creating and Editing Files 69(18)
4-1 Creating a File
70(3)
Problem
70(1)
Solution
70(1)
How It Works
70(3)
4-2 Maneuvering Within a File
73(1)
Problem
73(1)
Solution
73(1)
How It Works
73(1)
4-3 Copying and Pasting
74(1)
Problem
74(1)
Solution
74(1)
How It Works
74(1)
4-4 Manipulating Text
75(1)
Problem
75(1)
Solution
75(1)
How It Works
75(1)
4-5 Searching for and Replacing Text
76(1)
Problem
76(1)
Solution
76(1)
How It Works
77(1)
4-6 Inserting One File into Another
77(1)
Problem
77(1)
Solution
77(1)
How It Works
77(1)
4-7 Joining Lines
78(1)
Problem
78(1)
Solution
78(1)
How It Works
78(1)
4-8 Running Operating System Commands
79(1)
Problem
79(1)
Solution
79(1)
How It Works
79(1)
4-9 Repeating a Command
80(1)
Problem
80(1)
Solution
80(1)
How It Works
80(1)
4-10 Undoing a Command
80(1)
Problem
80(1)
Solution
80(1)
How It Works
81(1)
4-11 Displaying Line Numbers
81(1)
Problem
81(1)
Solution
81(1)
How It Works
81(1)
4-12 Automatically Configuring Settings
82(1)
Problem
82(1)
Solution
82(1)
How It Works
82(1)
4-13 Creating Shortcuts for Commands
83(1)
Problem
83(1)
Solution
83(1)
How It Works
83(1)
4-14 Setting the Shell Default Text Editor
84(1)
Problem
84(1)
Solution
84(1)
How It Works
84(1)
4-15 Setting the SQL*Plus Text Editor
84(2)
Problem
84(1)
Solution
85(1)
How It Works
85(1)
4-16 Toggling Syntax Text Color
86(1)
Problem
86(1)
Solution
86(1)
How It Works
86(1)
Chapter 5 Managing Files and Directories 87(52)
5-1 Showing the Current Working Directory
88(1)
Problem
88(1)
Solution
88(1)
How It Works
89(1)
5-2 Changing Directories
89(4)
Problem
89(1)
Solution
90(1)
How It Works
90(3)
5-3 Creating a Directory
93(1)
Problem
93(1)
Solution
93(1)
How It Works
93(1)
5-4 Viewing a List of Directories
94(1)
Problem
94(1)
Solution
94(1)
How It Works
94(1)
5-5 Removing a Directory
95(1)
Problem
95(1)
Solution
95(1)
How It Works
95(1)
5-6 Listing Files
96(2)
Problem
96(1)
Solution
96(1)
How It Works
96(2)
5-7 Creating a File Quickly
98(1)
Problem
98(1)
Solution
98(1)
How It Works
99(1)
5-8 Changing File Permissions
99(4)
Problem
99(1)
Solution
99(1)
How It Works
100(3)
5-9 Changing File Ownership and Group Membership
103(1)
Problem
103(1)
Solution
103(1)
How It Works
103(1)
5-10 Viewing the Contents of a Text File
103(2)
Problem
103(1)
Solution
104(1)
How It Works
104(1)
5-11 Viewing Nonprinting Characters in a File
105(1)
Problem
105(1)
Solution
105(1)
How It Works
105(1)
5-12 Viewing Hidden Files
106(1)
Problem
106(1)
Solution
106(1)
How It Works
107(1)
5-13 Determining File Type
107(2)
Problem
107(1)
Solution
107(1)
How It Works
108(1)
5-14 Finding Differences Between Files
109(2)
Problem
109(1)
Solution
109(1)
How It Works
110(1)
5-15 Comparing Contents of Directories
111(1)
Problem
111(1)
Solution
111(1)
How It Works
111(1)
5-16 Copying Files
112(2)
Problem
112(1)
Solution
112(1)
How It Works
113(1)
5-17 Copying Directories
114(1)
Problem
114(1)
Solution
114(1)
How It Works
115(1)
5-18 Moving Files and Directories
115(2)
Problem
115(1)
Solution
116(1)
How It Works
116(1)
5-19 Renaming a File or Directory
117(1)
Problem
117(1)
Solution
117(1)
How It Works
117(1)
5-20 Removing a File
118(1)
Problem
118(1)
Solution
118(1)
How It Works
118(1)
5-21 Removing Protected Files Without Being Prompted
119(1)
Problem
119(1)
Solution
119(1)
How It Works
119(1)
5-22 Removing Oddly Named Files
120(1)
Problem
120(1)
Solution
120(1)
How It Works
120(1)
5-23 Finding Files
121(1)
Problem
121(1)
Solution
121(1)
How It Works
121(1)
5-24 Finding Strings in Files
122(2)
Problem
122(1)
Solution
122(1)
How It Works
122(2)
5-25 Finding a Recently Modified File
124(2)
Problem
124(1)
Solution
124(1)
How It Works
125(1)
5-26 Finding and Removing Old Files
126(1)
Problem
126(1)
Solution
126(1)
How It Works
127(1)
5-27 Finding the Largest Files
127(1)
Problem
127(1)
Solution
127(1)
How It Works
127(1)
5-28 Finding a File of a Certain Size
128(1)
Problem
128(1)
Solution
128(1)
How It Works
128(1)
5-29 Sorting Files by Size
129(1)
Problem
129(1)
Solution
129(1)
How It Works
129(1)
5-30 Finding the Largest Space-Consuming Directories
130(1)
Problem
130(1)
Solution
130(1)
How It Works
131(1)
5-31 Truncating an Operating System File
131(1)
Problem
131(1)
Solution
131(1)
How It Works
131(1)
5-32 Counting Lines and Words in a File
132(1)
Problem
132(1)
Solution
132(1)
How It Works
132(1)
5-33 Creating a Second Name for a File
133(1)
Problem
133(1)
Solution
133(1)
How It Works
133(1)
5-34 Creating a Second Name for a Directory
133(2)
Problem
133(1)
Solution
134(1)
How It Works
135(1)
5-35 Viewing a Large File
135(2)
Problem
135(1)
Solution
136(1)
How It Works
136(1)
5-36 Downloading Files
137(2)
Problem
137(1)
Solution
137(1)
How It Works
138(1)
Chapter 6 Archiving and Compressing Files 139(18)
6-1 Bundling Files Using tar
140(3)
Problem
140(1)
Solution
140(1)
How It Works
141(2)
6-2 Unbundling Files Using tar
143(2)
Problem
143(1)
Solution
143(1)
How It Works
144(1)
6-3 Finding Differences in Bundled Files Using tar
145(1)
Problem
145(1)
Solution
145(1)
How It Works
146(1)
6-4 Bundling Files Using cpio
146(2)
Problem
146(1)
Solution
146(1)
How It Works
147(1)
6-5 Unbundling Files Using cpio
148(1)
Problem
148(1)
Solution
148(1)
How It Works
149(1)
6-6 Bundling Files Using zip
149(1)
Problem
149(1)
Solution
149(1)
How It Works
150(1)
6-7 Unbundling Files Using zip
150(1)
Problem
150(1)
Solution
150(1)
How It Works
151(1)
6-8 Bundling Files Using find
151(1)
Problem
151(1)
Solution
151(1)
How It Works
152(1)
6-9 Compressing and Uncompressing Files
152(2)
Problem
152(1)
Solution
152(2)
How It Works
154(1)
6-10 Validating File Contents
154(3)
Problem
154(1)
Solution
154(1)
How It Works
155(2)
Chapter 7 Shell Scripting 157(44)
7-1 Writing a Simple Shell Script
158(2)
Problem
158(1)
Solution
158(1)
How It Works
159(1)
7-2 Checking Simple Conditions
160(2)
Problem
160(1)
Solution
160(1)
How It Works
161(1)
7-3 Testing a Condition
162(6)
Problem
162(1)
Solution
162(3)
How It Works
165(3)
7-4 Checking Complex Conditions
168(5)
Problem
168(1)
Solution
169(1)
How It Works
170(3)
7-5 Repeating a Task
173(2)
Problem
173(1)
Solution
173(1)
How It Works
173(2)
7-6 Iterating Until a Condition Is Met
175(2)
Problem
175(1)
Solution
175(1)
How It Works
176(1)
7-7 Displaying a Menu of Choices
177(3)
Problem
177(1)
Solution
177(2)
How It Works
179(1)
7-8 Running Commands Based on Success/Failure of the Previous Command
180(1)
Problem
180(1)
Solution
180(1)
How It Works
181(1)
7-9 Modularizing Scripts
181(3)
Problem
181(1)
Solution
181(2)
How It Works
183(1)
7-10 Passing Parameters to Scripts
184(1)
Problem
184(1)
Solution
184(1)
How It Works
184(1)
7-11 Processing Parameters
185(3)
Problem
185(1)
Solution
186(1)
How It Works
187(1)
7-12 Running Database Commands in Scripts
188(2)
Problem
188(1)
Solution
188(1)
How It Works
189(1)
7-13 Crafting a Robust DBA Shell Script
190(4)
Problem
190(1)
Solution
191(1)
How It Works
192(2)
7-14 Running Scripts in the Background
194(3)
Problem
194(1)
Solution
194(1)
How It Works
195(2)
7-15 Monitoring the Progress of a Script
197(1)
Problem
197(1)
Solution
197(1)
How It Works
197(1)
7-16 Debugging a Script
198(3)
Problem
198(1)
Solution
198(1)
How It Works
199(2)
Chapter 8 Analyzing Server Performance 201(36)
8-1 Identifying System Bottlenecks
203(3)
Problem
203(1)
Solution
203(1)
How It Works
204(2)
8-2 Analyzing Current and Past System Performance
206(5)
Problem
206(1)
Solution
206(3)
How It Works
209(2)
8-3 Identifying CPU-Intensive Processes
211(6)
Problem
211(1)
Solution
211(3)
How It Works
214(3)
8-4 Identifying CPU Bottlenecks
217(2)
Problem
217(1)
Solution
217(1)
How It Works
218(1)
8-5 Identifying Memory-Intensive Processes
219(1)
Problem
219(1)
Solution
219(1)
How It Works
220(1)
8-6 Identifying Memory Bottlenecks
220(3)
Problem
220(1)
Solution
220(1)
How It Works
221(2)
8-7 Identifying I/O-Intensive Processes
223(1)
Problem
223(1)
Solution
223(1)
How It Works
224(1)
8-8 Identifying I/O Bottlenecks
224(4)
Problem
224(1)
Solution
224(1)
How It Works
225(3)
8-9 Monitoring Network Traffic
228(1)
Problem
228(1)
Solution
228(1)
How It Works
229(1)
8-10 Troubleshooting Database Connectivity
229(2)
Problem
229(1)
Solution
229(2)
How It Works
231(1)
8-11 Tracing a Process
231(3)
Problem
231(1)
Solution
231(2)
How It Works
233(1)
8-12 Listing Files Opened by Processes
234(3)
Problem
234(1)
Solution
234(1)
How It Works
234(3)
Chapter 9 Viewing and Configuring System Resources 237(30)
9-1 Displaying Server Hardware and the Operating System
238(2)
Problem
238(1)
Solution
238(1)
How It Works
239(1)
9-2 Listing CPUs
240(1)
Problem
240(1)
Solution
240(1)
How It Works
241(1)
9-3 Displaying Physical Memory
241(3)
Problem
241(1)
Solution
241(1)
How It Works
242(2)
9-4 Viewing Kernel Parameters
244(3)
Problem
244(1)
Solution
244(1)
How It Works
245(2)
9-5 Modifying Kernel Parameters
247(4)
Problem
247(1)
Solution
247(1)
How It Works
248(3)
9-6 Displaying Semaphores
251(2)
Problem
251(1)
Solution
251(1)
How It Works
252(1)
9-7 Configuring Semaphores
253(1)
Problem
253(1)
Solution
253(1)
How It Works
254(1)
9-8 Viewing Memory Structures
254(2)
Problem
254(1)
Solution
254(1)
How It Works
255(1)
9-9 Removing In-Memory Structures
256(2)
Problem
256(1)
Solution
256(1)
How It Works
257(1)
9-10 Viewing Network Configuration Settings
258(2)
Problem
258(1)
Solution
258(1)
How It Works
258(2)
9-11 Configuring Network Settings
260(1)
Problem
260(1)
Solution
260(1)
How It Works
260(1)
9-12 Modifying System Open File Limits
261(1)
Problem
261(1)
Solution
261(1)
How It Works
261(1)
9-13 Showing Shell Limits
262(1)
Problem
262(1)
Solution
262(1)
How It Works
262(1)
9-14 Changing Shell Limits
263(4)
Problem
263(1)
Solution
263(1)
How It Works
263(4)
Chapter 10 Automating Jobs with cron 267(18)
10-1 Enabling Access to Schedule Jobs
267(2)
Problem
267(1)
Solution
267(1)
How It Works
268(1)
10-2 Editing the cron Table
269(2)
Problem
269(1)
Solution
269(1)
How It Works
270(1)
10-3 Understanding cron Table Entries
271(4)
Problem
271(1)
Solution
272(1)
How It Works
273(2)
10-4 Setting Operating System Variables
275(2)
Problem
275(1)
Solution
276(1)
How It Works
276(1)
10-5 Specifying the Execution Shell
277(1)
Problem
277(1)
Solution
277(1)
How It Works
278(1)
10-6 Redirecting cron Output
278(2)
Problem
278(1)
Solution
278(1)
How It Works
278(2)
10-7 Embedding Conditional Logic
280(2)
Problem
280(1)
Solution
280(1)
How It Works
281(1)
10-8 Troubleshooting cron
282(3)
Problem
282(1)
Solution
282(1)
How It Works
282(3)
Chapter 11 Managing Server Software 285(40)
11-1 Installing Packages
285(2)
Problem
285(1)
Solution #1
285(1)
Solution #2
286(1)
How It Works
286(1)
11-2 Switching to the Oracle Unbreakable Linux Network
287(3)
Problem
287(1)
Solution
287(2)
How It Works
289(1)
11-3 Associating Linux Files with RPM Packages
290(1)
Problem
290(1)
Solution #1
290(1)
Solution #2
290(1)
How It Works
291(1)
11-4 Listing the Contents of an RPM Package
291(3)
Problem
291(1)
Solution #1
291(1)
Solution #2
292(1)
How It Works
293(1)
11-5 Downloading Packages
294(1)
Problem
294(1)
Solution
294(1)
How It Works
295(1)
11-6 Automating Server Builds with Oracle RDBMS Server Prelnstall RPM
295(3)
Problem
295(1)
Solution
295(2)
How It Works
297(1)
11-7 Upgrading Packages
298(1)
Problem
298(1)
Solution #1
299(1)
Solution #2
299(1)
How It Works
299(1)
11-8 Removing Packages
299(2)
Problem
299(1)
Solution #1
300(1)
Solution #2
300(1)
How It Works
301(1)
11-9 Checking RPM Requirements to Install Oracle Database
301(1)
Problem
301(1)
Solution
301(1)
How It Works
302(1)
11-10 Performing Initial Silent Oracle Software Installation with Response Files
302(7)
Problem
302(1)
Solution #1
303(2)
Solution #2
305(3)
How It Works
308(1)
11-11 Creating a Database with a Response File
309(3)
Problem
309(1)
Solution
309(2)
How It Works
311(1)
11-12 Creating a Network Configuration with a Response File
312(3)
Problem
312(1)
Solution
312(1)
How It Works
313(2)
11-13 Applying Patch Set Updates (PSUs) and Interim Patches
315(4)
Problem
315(1)
Solution
315(3)
How It Works
318(1)
11-14 Cloning an Oracle Home
319(3)
Problem
319(1)
Solution
319(2)
How It Works
321(1)
11-15 Attaching an Oracle Home
322(3)
Problem
322(1)
Solution
322(1)
How It Works
323(2)
Chapter 12 VirtualBox for Oracle 325(20)
12-1 Installing Oracle VM VirtualBox
325(2)
Problem
325(1)
Solution
325(1)
How It Works
326(1)
12-2 Setting Up VirtualBox Virtual Machine (VM)
327(3)
Problem
327(1)
Solution
327(2)
How It Works
329(1)
12-3 Starting Up a VM for the First Time
330(1)
Problem
330(1)
Solution
330(1)
How It Works
331(1)
12-4 Creating Additional Virtual Disks
331(3)
Problem
331(1)
Solution
331(3)
How It Works
334(1)
12-5 Provisioning/Sharing a Disk with Another VM
334(2)
Problem
334(1)
Solution
334(1)
How It Works
335(1)
12-6 Configuring the Virtual Network
336(2)
Problem
336(1)
Solution
336(1)
How It Works
337(1)
12-7 Leveraging/Creating Oracle VM VirtualBox Prebuilt Templates
338(2)
Problem
338(1)
Solution #1: Leveraging Oracle's Prebuilt Template
338(1)
Solution #2: Creating Your Own OVA Template
339(1)
How It Works
339(1)
12-8 Cloning a VM
340(1)
Problem
340(1)
Solution
340(1)
How It Works
341(1)
12-9 Working with Snapshots
341(4)
Problem
341(1)
Solution
341(2)
How It Works
343(2)
Chapter 13 Optimizing Linux for Oracle Databases 345(22)
13-1 Minimalizing the Linux Environment for Performance and Security
345(2)
Problem
345(1)
Solution
345(1)
How It Works
346(1)
13-2 Configuring Hugepages
347(6)
Problem
347(1)
Solution
347(1)
How It Works
347(1)
Automating Hugepages Server Configuration
348(3)
Computing the Value of Huge Pages on an Existing Linux Server
351(1)
Disabling Transparent Huge Pages
352(1)
13-3 Enabling Jumbo Frames
353(2)
Problem
353(1)
Solution
353(2)
How It Works
355(1)
13-4 Determining and Implementing the Right I/O Scheduler
355(1)
Problem
355(1)
Solution
355(1)
How It Works
356(1)
13-5 Setting Pertinent Kernel Parameters for Oracle Databases
356(4)
Problem
356(1)
Solution
357(1)
How It Works
358(2)
13-6 Configuring NTP for Oracle
360(1)
Problem
360(1)
Solution
360(1)
How It Works
361(1)
13-7 Bonding Network Interfaces
361(3)
Problem
361(1)
Solution
362(1)
How It Works
363(1)
13-8 Enabling Network Services Cache Daemon (nscd)
364(1)
Problem
364(1)
Solution
364(1)
How It Works
364(1)
13-9 Aligning Disk Partitions Correctly
364(3)
Problem
364(1)
Solution
364(1)
How It Works
365(2)
Chapter 14 Working Securely Across a Network 367(20)
14-1 Setting Up SSH
368(4)
Problem
368(1)
Solution
368(3)
How It Works
371(1)
14-2 Generating Host Keys
372(3)
Problem
372(1)
Solution
372(1)
How It Works
373(2)
14-3 Logging On Securely
375(3)
Problem
375(1)
Solution
375(1)
How It Works
376(2)
14-4 Copying Files Securely
378(2)
Problem
378(1)
Solution
378(1)
How It Works
379(1)
14-5 Authenticating Through Public Keys
380(3)
Problem
380(1)
Solution
380(2)
How It Works
382(1)
14-6 Configuring a Promptless Logon
383(4)
Problem
383(1)
Solution
383(1)
How It Works
384(3)
Chapter 15 Managing X Window 387(14)
15-1 Configuring an X Server
388(1)
Problem
388(1)
Solution
388(1)
How It Works
389(1)
15-2 Starting an X Server
389(3)
Problem
389(1)
Solution
389(1)
How It Works
390(2)
15-3 Stopping the X Server
392(1)
Problem
392(1)
Solution
392(1)
How It Works
392(1)
15-4 Displaying an X Client on a Remote Server
393(3)
Problem
393(1)
Solution
393(1)
How It Works
394(2)
15-5 Tunneling X Over SSH
396(2)
Problem
396(1)
Solution
396(1)
How It Works
397(1)
15-6 Manipulating the Terminal Emulator for X Windows
398(3)
Problem
398(1)
Solution
398(1)
How It Works
399(2)
Chapter 16 Managing Remote Servers with VNC 401(22)
16-1 Downloading the VNC Software
402(1)
Problem
402(1)
Solution
402(1)
How It Works
403(1)
16-2 Installing the VNC Software
403(3)
Problem
403(1)
Solution
403(3)
How It Works
406(1)
16-3 Manually Starting and Stopping the VNC Server
406(2)
Problem
406(1)
Solution
406(1)
How It Works
406(2)
16-4 Automatically Starting the VNC Server on Linux
408(3)
Problem
408(1)
Solution
408(3)
How It Works
411(1)
16-5 Automatically Starting the VNC Server on Solaris
411(1)
Problem
411(1)
Solution
411(1)
How It Works
412(1)
16-6 Starting the VNC Viewer
412(2)
Problem
412(1)
Solution
412(2)
How It Works
414(1)
16-7 Securing a VNC Connection
414(1)
Problem
414(1)
Solution
414(1)
How It Works
415(1)
16-8 Accessing VNC via a Proxy Server
415(2)
Problem
415(1)
Solution
415(2)
How It Works
417(1)
16-9 Running X Applications with VNC
417(1)
Problem
417(1)
Solution
417(1)
How It Works
418(1)
16-10 Troubleshooting VNC
418(5)
Problem
418(1)
Solution
418(3)
How It Works
421(2)
Appendix A: RAID Concepts 423(16)
Understanding RAID
423(5)
Defining Array, Stripe Width, Stripe Size, Chunk Size
424(1)
RAID 0
425(1)
RAID 1
426(2)
Generating Parity
428(4)
RAID 4
429(2)
RAID 5
431(1)
Building Hybrid (Nested) RAID Devices
432(4)
RAID 0+1
433(1)
RAID 1+0
434(1)
RAID 5+0
435(1)
Determining Disk Requirements
436(1)
Capacity Planning
437(2)
Appendix B: Server Log Files 439(6)
Managing Linux Log Files
439(3)
Rotating Log Files
439(2)
Setting Up a Custom Log Rotation
441(1)
Monitoring Log Files
442(1)
Managing Solaris Log Files
442(2)
Viewing System Message Log Files
443(1)
Rotating Solaris Log Files
443(1)
Summary
444(1)
Index 445
Darl Kuhn is a senior database administrator working for Oracle. He handles all facets of database administration from design and development to production support. He also teaches advanced database courses at Regis University in Colorado. Darl does volunteer DBA work for the Rocky Mountain Oracle Users Group. He has a graduate degree from Colorado State University and lives near Spanish Peaks, Colorado, with his wife, Heidi, and daughters, Brandi and Lisa.