Wednesday, January 19, 2011

Oracle Listener 11g

Listener Commands
LSNRCTL> help
LSNRCTL> change_password
LSNRCTL> save_config #Create new updated listner.ora file
LSNRCTL> quit
LSNRCTL> reload #reread the listener.ora file

Set the configuration
LSNRCTL> set current_listener uwlistener
LSNRCTL> set inound_connect_timeout 0
LSNRCTL> set password
LSNRCTL> set inbound_connect_timeout
LSNRCTL> set trc_level 0 #Set Trace Level
Value Description
0 - 1 off
2 - 3 err
4 - 5 user
6 - 14 admin
15 dev
16 - 99 support

Show the configuration
LSNRCTL> show current_listener
LSNRCTL> show inbound_connect_timeout
LSNRCTL> show startup_waittime
LSNRCTL> show trc_level #Shows the Trace Level
LSNRCTL> show log_status

==>To Prevent remote modification of listener.ora using lsnrctl commands
ADMIN_RESTRICTIONS_[listener_name]=

==>Force the database to register, or reregister, with the listener
ALTER SYSTEM REGISTER;

for more: http://psoug.org/reference/listener.html

Wednesday, January 5, 2011

SSH Without a Password

Client
Steps: For SSH Without a Password

On the client run the following commands:
$ mkdir -p $HOME/.ssh
$ chmod 0700 $HOME/.ssh
$ ssh-keygen -t dsa -f $HOME/.ssh/id_dsa -P ''

This should result in two files,
$HOME/.ssh/id_dsa (private key) & $HOME/.ssh/id_dsa.pub (public key).
Copy $HOME/.ssh/id_dsa.pub to the server.

Server:
On the server run the following commands:
$ mkdir -p $HOME/.ssh
$ cat id_dsa.pub >> $HOME/.ssh/authorized_keys2
$ chmod 0600 $HOME/.ssh/authorized_keys2

Depending on the version of OpenSSH the following commands may also be required:
$ cat id_dsa.pub >> $HOME/.ssh/authorized_keys
$ chmod 0600 $HOME/.ssh/authorized_keys

An alternative is to create a link from authorized_keys2 to authorized_keys:
$ cd $HOME/.ssh && ln -s authorized_keys2 authorized_keys

On the client test the results by ssh'ing to the server:
$ ssh -i $HOME/.ssh/id_dsa server

(Optional) Add the following $HOME/.ssh/config on the client:
Host server
IdentityFile ~/.ssh/id_dsa
This allows ssh access to the server without having to specify the path to the id_dsa file as an argument to ssh each time.

Tuesday, January 4, 2011

R12: Oracle responsibility not visible

From 12.1.1 you do not have to run the Synchronize WF Local Tables any more - all of the user roles and changes via the functional process - is processed by a business event in WF Java Deferred. The Workflow Agent listeners process them and all of the user role information is stored in the Workflow Directory Services tables now.
Execute the concurrent program “Workflow Directory Services User/Role Validation” with below parameters:
p_BatchSize – 10000 (Default Value 10000)
p_Check_Dangling – Yes (Default value No)
Add missing user/role assignments – Yes (Default Value No)
Update WHO columns in WF tables – No (Default Value No)
This concurrent program syncs all the user and role related WF tables with latest information viz., WF_LOCAL_ROLES, WF_LOCAL_USER_ROLES, WF_USER_ROLE_ASSIGNMENTS etc..
If after that the problem is not solved yet, then it’s possible to use the System Administrator responsibility: Workflow -> Oracle Applications Manager -> Workflow Manager
Selecting ‘Service Components’ and starting the following listeners:- Workflow Deferred Notification Agent Listener
- Workflow Error Agent Listener
- Workflow Java Deferred Agent Listener
- Workflow Java Error Agent Listener

Monday, January 3, 2011

Fater copy accross unix/ Linux servers

While doing a clone or other activies you all use a tar+scp+untar.
You can get it done in one command and much fater:
tar cvf - >source< | ssh user@server "cd >destination<; tar xvf -"

where:
>source< is the directory/ file to be scp'ed
>destination< is the directory/ path on the destination server where contents are to be copied