22) What is System Activity Reporter (SAR) and SHMMAX?
• SAR is a utility to display resource usage on the UNIX system.• sar –u shows CPU activity.
• Sar –w shows swapping activity
• Sar –b shows buffer activity
• SHMMAX is the maximum size of a shared memory segment on a Linux system.
23) List out some major environment variable used in installation?
• ORACLE_BASE=/u01/app/<installation-directory>• ORACLE_HOME=$ORACLE_BASE/product/11.2.0(for 11g)/dbhome_1
• ORACLE_SID=<instance-name>
• PATH=$ORACLE_HOME/bin:$PATH
• LD_LIBRARY_PATH=$ORACLE_HOME/lib:$LD_LIBRARY_PATH
• TNS_ADMIN=$ORACLE_HOME/network/admin
• These are absolutely critical environment variables in running OUI.
24) What is a control file?
• Control file is a binary file which records the physical structure of a database.• It includes number of log files and their respective location, Database name and timestamp when database is created, checkpoint information.
• We find CONTROL_FILE parameter in initialization parameter file which stores information about control file location.
• We can multiplex control files, store in different locations to make control files available even if one is corrupted.
• We can also avoid the risk of single point of failure.
25) At what stage of instance, control file information is read and can we recover control file and how to know information in a control file?
• During database mounting, control file information is read.• We can’t recover or restore lost control file, but we can still startup the database using control files created using multiplexing in different locations.
• We can query the following command
SQL> alter database backup controlfile to trace;
• We find a trace file(.trc) in udump location,we can edit it and find the complete database structure.
• Multiplexing can also be done using Following command
SQL> alter database backup controlfile to <Different location/path>.
26) How can you obtain Information about control file?
• Control file information can be shown in initialization parameter file.• We can query v$controlfile to display the names of control files
• From sql we can execute
SQL> show parameter control_files;
• The above query gives the name, Location of control files in our physical disk.
• We can edit PFILE using a vi editor and control_files parameter gives us information about number of and location of control files.
27) How do you resize a data file and tablespace?
• Prior to Oracle 7.2 you can’t resize a datafile.• The solution was to delete the tablespace, recreating it with different sized datafiles.
• After 7.2 you can resize a datafile by using ALTER DATABASE DATAFILE <file_name> RESIZE;
• Resizing Table space includes creation of new data file or resizing existing data file.
• ALTER TABLESPACE <tablespacename> ADD DATAFILE ‘<datafile name> ‘ size M; creates a new datafile.
28) Name the views used to look at the size of a datafile, controlfiles, block size, determine free space in a tablespace ?
• DBA_DATA_FILES or v$datafile view can be used to look at the size of a datafile .• DBA_FREE_SPACE is used to determine free space in a tablespace.
• V$contolfile used to look at the size of a control file which includes maxlogfiles, maxlogmembers, maxinstances.
• Select * from v$controlfile gives the size of a controlfile.
• From sqlplus, query show parameter block_size to get size of db_block_size.
29) What is archive log file?
• In archive log mode, the database will makes archive of all redo log files that are filled, called as archived redo logs or archive log files.• By default your database runs in NO ARCHIVE LOG mode, so we can’t perform online backup’s (HOT backup).
• You must shut down database to perform clean backup (COLD backup) and recovery can be done to the previous backup state.
• Archive log files are stored in a default location called FRA (Flash Recovery Area).
• We can also define our own backup location by setting log_archive_dest parameter.
30) Assume you work in an xyz company as senior DBA and on your absence your back up DBA has corrupted all the control files while working with the ALTER DATABASE BACKUP CONTROLFILE command. What do you do?
• As long as all data files are safe and on a successful completion of BACKUP control file command by your Back up DBA you are in safe zone.• We can restore the control file by performing following commands
1) CONNECT INTERNAL STARTUP MOUNT
2) TAKE ANY OFFLINE TABLESPACE (Read-only)
3) ALTER DATABASE DATAFILE (OFFLINE)
4) RECOVER DATABASE USING BACKUP CONTROL FILE
5) ALTER DATABASE OPEN RESETLOGS
6) BRING READ ONLY TABLE SPACE BACK ONLINE
• Shutdown and back up the system. Then restart.
• Then give the command ALTER DATABSE BACKUP CONTROL FILE TO TRACE
• This output can be used for control file recovery as well.
If control file backup is not available, then the following will be required
1) CONNECT INTERNAL STARTUP NOMOUNT
2) CREATE CONTROL FILE .....;
• But we need to know all of the datafiles, logfiles, and settings of MAXLOGFILES, MAXLOGMEMBERS, MAXLOGHISTORY, MAXDATAFILES for the database to use the command.
31) Can we reduce the space of TEMP datafile? How?
• Yes, we can reduce the space of the TEMP datafile.• Prior to oracle 11g,,you had to recreate the datafile.
• In oracle 11g you reduce space of TEMP datafile by shrinking the TEMP tablespace.It is a new feature to 11g.
• The dynamic performance view can be very useful in determining which table space to shrink.
32) What do you mean by database backup and which files must be backed up?
• Database stores most crucial data of business ,so it’s important to keep the data safe and this can be achieved by backup.• The following files must be backed up
• Database files (Header of datafiles is freezed during backup)
• Control files
• Archived log files
• Parameter files (spfile and pfile)
• Password file
33) What is a full backup and name some tools you use for full backup?
• A full backup is a backup of all the control files, data files, and parameter file (SPFILE or PFILE).• You must also backup your ORACLE_HOME binaries which are used for cloning.
• A full backup can be performed when our database runs in NON ARCHIVE LOG mode.
• As a thumb rule, you must shutdown your database before you perform full backup.
• Full or COLD backup can be performed by using copy command in unix.
34) What are the different types of backup’s available and also explain the difference between them?
• There are 2 types of backup’s1) COLD backup(User managed & RMAN)
2) HOT backup(User managed & RMAN)
• Hot backup is taken when the database is still online and database should be in ARCHIVE LOG MODE.
• Cold backup is taken when the database is in offline mode.
• Hot backup is inconsistent backup where as cold backup is consistent backup.
• You can begin backup by using the following command
SQL> alter database begin backup;
• End backup by
SQL> alter database end backup;
35) How to recover database if we lost the control file and we do not have a backup and what is RMAN?
• We can recover our database at any point of time, when we have backup of our control files in different mount points.• Also check whether the control file is available in trace file located in USERDUMP or the alert log to recover the database.
RMAN
• RMAN called as Recovery manager tool supplied by oracle that can be used to manage backup and recovery activities.
• You can perform both offline (Cold) and online (Hot) backup’s using RMAN.
• We need to configure Flash_Recovery_Area of database to use RMAN.
• RMAN maintains the repository of backup information in control file.
36) Name the architectural components of RMAN
• RMAN executable• Server process
• Channels
• Target database
• Recovery catalog database
• Media management layer
• Backup sets and backup pieces
37) What is a recovery catalog?
• Recovery catalog is an inventory of backup taken by RMAN for the database.• The size of the recovery catalog schema depends upon the number of databases monitored by the catalog.
• It is used to restore a physical backup, reconstruct it, and make it available to the oracle server.
• RMAN can be used without recovery catalog.
• Recovery catalog also holds RMAN stored scripts.
38) List some advantages of using RMAN.
• Table spaces are not put in the backup mode ,therefore there is no extra redo log file during online backups.• Incremental backups that only copy data blocks, which have changed since last backup.
• Detection of corrupt blocks.
• Built in reporting and listing commands.
• Parallelization of I/O operations.
39) How to bring a database from ARCHIVE LOG mode to NON ARCHIVE LOG MODE?
• You should change your init<SID>.ora file with the following information• log_archive_dest=’/u01/oradata/archlog’ (for example)
• log_archive_format=’%t_%s.dbf’
• log_archive_start=true (prior to 10g)
• sql>shutdown;
• sql> startup mount;
• sql> alter database archivelog;
• sql>alter database open;
• Make sure you backup your database before switching to ARCHIVELOG mode.
40) What are the different stages of database startup?
• Database undergoes different stages before making itself available to end users• Following stages are involved in the startup of database
? NoMount
? Mount
? Open
• NoMount – Oracle Instance is available based on the parameters defined in SPFile.
• Mount - Based on the Information from parameter control files location in spfile, it opens and reads them and available to next stage.
• Open - Datafiles, redo log files are available to the end users.
41) Name some of the important dynamic performance views used in Oracle.
• V$Parameter• V$Database
• V$Instance
• V$Datafiles
• V$controlfiles
• V$logfiles
42) What are the different methods we can shutdown our database?
• SHUTDOWN (or) SHUTDOWN NORMALNo new connections are accepted and wait for the user to close the session.
• SHUTDOWN TRANSACTIONAL
No new connections are accepted and wait for the existing transactions to commit and logouts the session without the permission of user.
• SHUTDOWN IMMEDIATE
No new connections are accepted and all committed transactions are reflected in database and all the transactions are about to commit are rolled back to previous value.
• SHUTDOWN ABORT
It’s just like an immediate power off for a database, it doesn’t mind what are the transactions running it just stops entire activity -(even committed transactions are not reflected in database) and make database unavailable. SMON process takes responsibility for recovery during next startup of database.
• SHUTDOWN NORMAL, TRANSACTIONAL, IMMEDIATE are clean shutdown methods as database maintains its consistency.
• SHUTDOWN ABORT leaves our database in an inconsistent state,data integrity is lost.
43) What are the different types of indexes available in Oracle?
Oracle provides several Indexing schemas• B-tree index – Retrieves a small amount of information from a large table.
• Global and Local index – Relates to partitioned tables and indexes.
• Reverse Key Index - It Is most useful for oracle real application clusters applications.
• Domain Index – Refers to an application
• Hash cluster Index – Refers to the index that is defined specifically for a hash cluster.
44) What is the use of ALERT log file? Where can you find the ALERT log file?
• Alert log file is a log file that records database-wide events which is used for trouble shooting.• We can find the Log file in BACKGROUND_DUMP_DEST parameter.
• Following events are recorded in ALERT log file:
• Database shutdown and startup information.
• All non-default parameters.
• Oracle internal (ORA-600) errors.
• Information about a modified control file.
• Log switch change.
45) What is a user process trace file?
• It is an optional file which is produced by user session.• It is generated only if the value of SQL_TRACE parameter is set to true for a session.
• SQL_TRACE parameter can be set at database, instance, or session level.
• If it set at instance level, trace file will be created for all connected sessions.
• If it is set at session level, trace file will be generated only for specified session.
• The location of user process trace file is specified in the USER_DUMP_DEST parameter.
46) What are different types of locks?
There are different types of locks, which are given as follows:• System locks – controlled by oracle and held for a very brief period of time.
• User locks – Created and managed using dbms_lock package.
• Different types of user locks are given as follows
• UL Lock – Defined with dbms_lock package.
• TX Lock – Acquired once for every transaction. It isa row transaction lock.
• TM Lock – Acquired once for each object, which is being changed. It is a DML lock. The ID1 column identifies the object being modified.
47) What do db_file_sequential_read and db_file_scattered_read events define?
• Db_file_sequential_read event generally indicates index usage.• It shows an access by row id.
• While the db_file-scattered_read event indicates full table scan.
• Db_file_sequential_read event reads a single block at one time.
• Whereas db_file_scattered_read event reads multiple blocks.
48) What is a latch and explain its significance?
• Latch is an on/off switch in oracle that a process must access in order to perform certain type of activities.• They enforce serial access to the resources and limit the amount of time for which a single process can use a resource.
• A latch is acquired for a very short amount of time to ensure that the resource is allocated.
• We may face performance issues which may be due to either of the two following reasons
• Lack of availability of resource.
• Poor application programming resulting in high number of requests for resource.
• Latch information is available in the v$LATCH and v$LATCHHOLDER dynamic performance views.
49) Explain the architecture of data guard?
Data guard architecture includes the following components• Primary database – Refers to the production database.
• Standby Database – Refers to a copy of primary or production database.It may have more than one standby database.
• Log transport service – Manages transfer of archive log files primary to standby database.
• Network configuration – Refers to the network connection between primary and standby database.
• Applies archived logs to the standby database.
• Role management services – Manages the role change between primary and standby database.
• Data guard broker – Manages data guard creation process and monitors the dataguard.
50) What is role transition and when does it happen?
• Database operates in one of the following mutually exclusive rolesPrimary
Standby
• Role transition is the change of role between primary and standby databases.
• Data guard enables you to change this roles dynamically by issuing the sql statements.
• Transition happens in between primary and standby databases in the following way
• Switchover, where primary database is switched to standby database and standby to primary database.
• Failover, where a standby database can be used as a disaster recovery solution in case of a failure in primary database.
• DRM allows you to create resource plans, which specify resource allocation to various consumer groups.
• DRM offers an easy-to-use and flexible system by defining distinct independent components.
• Enables you to limit the length of time a user session can stay idle and automatically terminates long-running SQL statement and users sessions.
• Sets the initial login priorities for various consumer groups.
• DRM will automatically queue all the subsequent requests until the currently running sessions complete.
No comments:
Post a Comment