Ensuring that the system has been backed up and is fully “recoverable”, is a very important aspect of the DBA’s responsibility.An RMAN command which is usually used to test the availability of the all these required backup files, is the RESTORE DATABASE VALIDATE command. This command looks at the backup set files in the destination […]
As part of the regular backup file log maintenance, the recovery window and redundancy commands are usually used within backup scripts to define how long the RMAN backups would stay on disk or on tape. For archive log retention, the DELETE ARCHIVELOG command is utilized. DELETE Archive Logs using RMAN To clean-up older archives the […]
While generating execution plans for queries, the optimizer decides at run time which indexes can be used to make query execute faster. The run time cost based optimizer is very efficient in its decisions. However, in the normal day to day operations there may be some situations where you would not like optimizer to use […]
Why manage Database Security Audit Trail files? Changing location of Aaudit trails Purging Old Data Automatic Purge Audit Trail Properties Protecting Database Security Audit Trail Enabling Enhanced Auditing Why manage Oracle Database Security Audit Trail files? Oracle Database Security provides numerous ways to audit user actions in database itself. The mere concept that everything a […]
When should Oracle Grid or RDBMS binaries be relinked? Read more ..
Oracle provides different types of Compression for data in the database. The BASIC compression type is the default and allows the data to be compressed while loading the table using direct path loads. This has been available since Oracle 9i. The second type, the OLTP compression, introduced in 11gR1, is part of Oracle Advanced Compression. […]
[dropcap1]S[/dropcap1]tring searching is a challenging and important part in any programming language. Regular expression is a well-known tool for string searching and Perl – Language is a renowned language for regular expression for several decades. In the area of computing, a regular expression provides a powerful, concise and flexible set of pattern matching capabilities. In […]
• Introduction • What are Secure Files and how to use them • Advantages • Deduplication • Compression • Encryption • Logging and Caching • Managing Secure Files • Moving existing LOBs to Secure Files Introduction There are two ways you can store unstructured data in the Oracle Database which include PDF, XML, Image files. […]