• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer navigation

The Geek Diary

  • OS
    • Linux
    • CentOS/RHEL
    • Solaris
    • Oracle Linux
    • VCS
  • Interview Questions
  • Database
    • oracle
    • oracle 12c
    • ASM
    • mysql
    • MariaDB
  • DevOps
    • Docker
    • Shell Scripting
  • Big Data
    • Hadoop
    • Cloudera
    • Hortonworks HDP

Archives for May 2021

How to pass a value from shell script to GoldenGate replicat for mapping to target table column

by admin

The value must be assigned to an environment variable and the replicat must be started from the OS command line and not within GGSCI. Example: Start the replicat via the command line as part of the script and not calling GGSCI inside the script. If GGSCI is called to start replicat it will not recognize […]

Filed Under: GoldenGate, oracle

Oracle GoldenGate: How to start Extract & Replicat using Shell Script

by admin

For simple commands, you can “pipe” the output of one command to GGSCI’s input; for example: $ echo “start EAIOU” | ggsci will issue the “start EIAOU” command to GGSCI. GGSI’s messages will appear on the terminal. For more than one command, you can either use the above with an OBEY command, or redirect the […]

Filed Under: GoldenGate, oracle

Oracle Multitenant: How to Create CDB and PDB

by admin

Creating a CDB The steps required to create a new CDB, using either DBCA or SQL*Plus, are the same. The first step, as for any database, non-CDB or CDB, consists of configuring an instance with an init.ora parameter file and then starting the instance. The second step is the creation of the CDB using the […]

Filed Under: oracle, oracle 12c, Oracle 18c

Beginners Guide to Oracle Database 18c Multitenant Architecture

by admin

Challenges Starting with Oracle Database 12c, the multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. What is the benefit of using the multitenant architecture in Oracle Database 18c? Currently, many Oracle customers have large numbers of “departmental” applications built on Oracle RDBMS. These applications rarely use a significant […]

Filed Under: oracle, Oracle 18c

How to take Logical Backups on a MySQL Replication Slave using shell script

by admin

The sample script in this post uses the bash shell. It is also assumed that MySQL has been installed and the slave has been initialized. For MySQL 5.7 and later, the script only works for single-source replication. The server to be backed up should be configured as a slave. If you have one or more […]

Filed Under: mysql, MySQL Cluster

How to log every shell command in Linux

by admin

Question: How to redirect the shell command history to Syslog? There are several methods to do this. You can try with any one of the 3 methods below: Method 1 – via rsyslog service To use rsyslog for logging every shell command, just follow steps below: 1. Create a new rsyslog configuration file, and define […]

Filed Under: Linux

How to Change the Default Shell In Linux

by admin

In the following example “

Filed Under: Linux

How To Configure Restricted Bash Shell in Linux

by admin

Restricted bash shell can be invoked using below command: # bash -r The ‘/bin/rbash‘ represents the restricted bash shell and can be created by creating as a soft link to ‘/bin/bash’ as shown below: # ln -s /bin/bash /bin/rbash Once soft link for /bin/rbash is created, one can launch restricted bash shell using below command: […]

Filed Under: CentOS/RHEL, Linux

How to generate PGP keys using GPG on Linux

by admin

How to generate PGP keys using GPG on Linux The GNU Privacy Guard application allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures. GPG is based on the use of a pair of keys, one public and one private (or “secret”). Data encrypted with one […]

Filed Under: CentOS/RHEL, Linux

How To Configure NIS (Network Information System) Master and Slave Servers in CentOS/RHEL

by admin

The Network Information Service consists of a client-server directory service protocol for distributing system configuration data such as user and host names between computers. NIS enables you to create user accounts that can be shared across all systems on your network. The description of NIS daemons are given below: portmap/rpcbind: The foundation RPC daemon upon […]

Filed Under: CentOS/RHEL, CentOS/RHEL 6, Linux

Next Page »

Primary Sidebar

Recent Posts

  • ncat Command Examples in Linux
  • ncat: command not found
  • nautilus Command Examples in Linux
  • namei: command not found

© 2023 · The Geek Diary

  • Archives
  • Contact Us
  • Copyright