This article describes how to change the id and name of a database that is running as RAC, what operations should be done before and …
Read More »
This article describes how to change the id and name of a database that is running as RAC, what operations should be done before and …
Read More »One of the first things that we look at to improve performance in systems that have performance problems is the ones that finding queries that …
Read More »When nfslock service is turned off, export ends with an ORA-27086 error when trying to backup on a NFS mounted directory. To resolve this error, …
Read More »When you authorize logins as db_owner in the database, your disks may be full at an unexpected time. Because a login who has the db_owner …
Read More »For improved security, RMAN backups can be encrypted. Encrypted backups cannot be read by unauthorized persons. A password or wallet is required to return from …
Read More »When authorizing users in databases, you can use system-defined roles such as db_datareader, db_datawriter, db_owner, or database-level permissions, such as Execute, View Definition. If there …
Read More »You can take advantage of the following views to find scheduled jobs and currently running jobs in Oracle databases. USER_SCHEDULER_JOBS, ALL_SCHEDULER_JOBS, DBA_SCHEDULER_JOBS views can be …
Read More »While creating a database with DBCA, when “General_Purpose” template is selected, this error is received because the “compatible” parameter in the template is lower than …
Read More »Due to the principle of “minimum authority for maximum security”, we should regularly check which user is authorized on the sql server, and revoke the …
Read More »To send mail through the SQL Server, you must first configure Database Mail. You can find details in the article “How To Configure Database Mail …
Read More »