How to configure dbconsole to display information from the ASM DISKGROUPS [ID 329581.1]

Oracle ASM 配置与监控

 

Oracle Server - Enterprise Edition - Version: 10.1.0.2 to 10.2.0.4

 

       This article will show how to display in dbconsole, information for the ASM instance used by the database.  This is particularly usefull if:

(1).      The database and ASM instance were manually created

(2).      The database was originally  created through dbca and it was configured to be managed thorugh dbconsole and the files were stored on filesystem.  In a subsequent step, the files were stored in an ASM diskgroup.

 

 

相关命令如下:

1In 10G Release 1

       emca -r -a

 

2In 10G Release 2

       emca -config all db -repos recreate

 

       This is an example of the execution of the previous command.  The config all option is required for an existant database that is using ASM.  This option will delete the current information stored into the repository.

 

Enter the following information:
Database SID: P10R2     
Central agent home: /oradata2/102b       ## This is the path for the ORACLE_HOME

# The following message is returned only if there is a configuration created for some
# database. 

The database P10R2 is already being monitored by central agent(s)
Database Control is already configured for the database P10R2
You have chosen the central agent /oradata2/102b for monitoring the database P10
R2
You have chosen to configure Database Control for managing the database P10R2
Do you wish to continue? [yes(Y)/no(N)]: Y
Listener port number: 1521               ## Listener port #
Password for SYS user:  r
Password for DBSNMP user:  a
Password for SYSMAN user:  r
Email address for notifications (optional):
Outgoing Mail (SMTP) server for notifications (optional):
ASM ORACLE_HOME [ /oradata2/102b ]:
ASM SID [ +ASM ]:
ASM port [ 1521 ]:
ASM user role [ SYSDBA ]:
ASM username [ SYS ]:
ASM user password:  a

 

以前整理的一篇文章:

       Oracle OEM 重建

http://www.cndba.cn/Dave/article/614

 

 

 

From Oracle

-------------------------------------------------------------------------------------------------------

QQ: 492913789
Email: ahdba@qq.com
Blog: http://www.cndba.cn/dave

DBA1 群:62697716();   DBA2 群:62697977()   DBA3 群:62697850()  

DBA 超级群:63306533();  DBA4 群: 83829929  DBA5群: 142216823   

聊天 群:40132017   聊天2群:69087192

--加群需要在备注说明Oracle表空间和数据文件的关系,否则拒绝申请

### Steps to Create a Virtual Machine (VM) in AWS and Set Up Security Firewall #### Step 1: Sign In to AWS Management Console 1. Open your web browser and go to [AWS Management Console](https://aws.amazon.com/console/). 2. Sign in using your AWS account credentials. #### Step 2: Launch an EC2 Instance 1. In the AWS Management Console, search for and select **EC2** from the services list. 2. Click on the **Launch Instance** button. 3. Choose an Amazon Machine Image (AMI), such as Amazon Linux 2 or Ubuntu Server. 4. Select an instance type (e.g., t2.micro for free tier eligible). 5. Configure instance details, including the number of instances, network, and subnet. 6. Add storage if needed, specifying the size and type of storage. 7. Tag the instance with meaningful key-value pairs for easier identification. 8. Configure the security group (firewall rules): - Click on **Configure Security Group**. - Choose to create a new security group or select an existing one. - Define inbound and outbound rules: - Inbound rules control traffic coming into the instance. - Outbound rules control traffic leaving the instance. 9. Review the instance configuration and click **Launch**. 10. Select an existing key pair or create a new one, then acknowledge the key pair warning and click **Launch Instances**. #### Step 3: Set Up Security Firewall (Security Group) 1. After launching the instance, navigate back to the **EC2 Dashboard**. 2. In the left-hand menu, under **Network & Security**, click on **Security Groups**. 3. Find the security group associated with your newly created instance. 4. Edit inbound rules: - Click on the **Inbound Rules** tab. - Click **Edit inbound rules**. - Add rules to allow traffic from specific IP addresses or ranges. Common rules include: - **SSH (port 22)** for remote access. - **HTTP (port 80)** and **HTTPS (port 443)** for web traffic. - **Custom TCP Rule** for database connections or other services. - Specify the source as `Anywhere` (`0.0.0.0/0`) for public access (use cautiously) or a specific IP range for restricted access. 5. Edit outbound rules (usually set to allow all outbound traffic by default): - Click on the **Outbound Rules** tab. - Click **Edit outbound rules**. - Adjust rules as necessary, but allowing all outbound traffic is generally safe. #### Step 4: Connect to Your Instance 1. Once the instance is running, connect to it using SSH (for Linux instances) or RDP (for Windows instances). 2. For Linux instances: - Use the `.pem` key file downloaded earlier. - Open a terminal and run the following command: ```bash ssh -i "your-key-pair.pem" ec2-user@your-instance-public-dns-name ``` 3. For Windows instances: - Use Remote Desktop Connection and the password retrieved from the AWS console. --- ### Key Concepts - **Security Groups**: Act as virtual firewalls for EC2 instances, controlling inbound and outbound traffic. - **Instance Types**: Determine the hardware specifications of the VM. - **Key Pairs**: Used for secure SSH access to Linux instances. By following these steps, you can create a secure and functional VM in AWS, ensuring that only authorized traffic reaches your instance.
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值