The value must be assigned to an environment variable and the replicat must be started from the OS command line and not within GGSCI. Example: Start the replicat via the command line as part of the script and not calling GGSCI inside the script. If GGSCI is called to start replicat it will not recognize […]
Archives for May 2021
Oracle GoldenGate: How to start Extract & Replicat using Shell Script
For simple commands, you can “pipe” the output of one command to GGSCI’s input; for example: $ echo “start EAIOU” | ggsci will issue the “start EIAOU” command to GGSCI. GGSI’s messages will appear on the terminal. For more than one command, you can either use the above with an OBEY command, or redirect the […]
Oracle Multitenant: How to Create CDB and PDB
Creating a CDB The steps required to create a new CDB, using either DBCA or SQL*Plus, are the same. The first step, as for any database, non-CDB or CDB, consists of configuring an instance with an init.ora parameter file and then starting the instance. The second step is the creation of the CDB using the […]
Beginners Guide to Oracle Database 18c Multitenant Architecture
Challenges Starting with Oracle Database 12c, the multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. What is the benefit of using the multitenant architecture in Oracle Database 18c? Currently, many Oracle customers have large numbers of “departmental” applications built on Oracle RDBMS. These applications rarely use a significant […]
How to take Logical Backups on a MySQL Replication Slave using shell script
The sample script in this post uses the bash shell. It is also assumed that MySQL has been installed and the slave has been initialized. For MySQL 5.7 and later, the script only works for single-source replication. The server to be backed up should be configured as a slave. If you have one or more […]
How to log every shell command in Linux
Question: How to redirect the shell command history to Syslog? There are several methods to do this. You can try with any one of the 3 methods below: Method 1 – via rsyslog service To use rsyslog for logging every shell command, just follow steps below: 1. Create a new rsyslog configuration file, and define […]
How to Change the Default Shell In Linux
In the following example “
How To Configure Restricted Bash Shell in Linux
Restricted bash shell can be invoked using below command: # bash -r The ‘/bin/rbash‘ represents the restricted bash shell and can be created by creating as a soft link to ‘/bin/bash’ as shown below: # ln -s /bin/bash /bin/rbash Once soft link for /bin/rbash is created, one can launch restricted bash shell using below command: […]
How to generate PGP keys using GPG on Linux
How to generate PGP keys using GPG on Linux The GNU Privacy Guard application allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures. GPG is based on the use of a pair of keys, one public and one private (or “secret”). Data encrypted with one […]
How To Configure NIS (Network Information System) Master and Slave Servers in CentOS/RHEL
The Network Information Service consists of a client-server directory service protocol for distributing system configuration data such as user and host names between computers. NIS enables you to create user accounts that can be shared across all systems on your network. The description of NIS daemons are given below: portmap/rpcbind: The foundation RPC daemon upon […]