zoukankan      html  css  js  c++  java
  • Oracle12C

    1888485 - Database Parameter for 12.1.0.2

    1. Today, when I tried to expend the tablespace on oracle using BRTOOLS,  I got the error as following:

    BR0301E SQL error -1580 at location BrCtlFileBackup-2, SQL statement:

    '/* BRSPACE */ALTER DATABASE BACKUP CONTROLFILE TO '/oracle/<SID>/sapreorg/sfcauplx/cntrl<SID>.old''

    ORA-01580: error creating control bacli[ file /oracle/<SID>/sapreorg/cntrl<SID>.old

    ORA-27040: file create error ,unable to create file

    Additional information:1

    BR032E Copying of control file tp /oracle/<SID>/sareorg/sfcauokx/cntrlHEQ.old failed

    1.1 note 1598594 - BR*Tools configuration for Oracle installation using user "oracle"

    Configuration of the BR executables

    Comment:
    In many of the examples listed below, PRD was set for <SAPSID>.

    BR*Tools are installed in the "sap-exe" directory (default: /usr/sap/<SAPSID>/SYS/exe/run) and have the following permissions (note the owner and S-Bits):

    -rwsrwsr-- 1 oracle oinstall 7732338 May 31 16:30 brarchive
    -rwsrwsr-- 1 oracle oinstall 7908129 May 31 16:30 brbackup
    -rwsrwsr-- 1 oracle oinstall 9970354 May 31 16:30 brconnect
    -rwsrwsr-- 1 oracle oinstall 8376747 May 31 16:31 brrecover
    -rwsrwsr-- 1 oracle oinstall 2783544 May 31 16:31 brrestore
    -rwsrwsr-- 1 oracle oinstall 10479944 May 31 16:31 brspace
    -rwxr-xr-x 1 prdadm sapsys 4103679 May 31 16:31 brtools

    You can use the "root" user to set these authorizations as follows; for example:
    > su - root
    > cd /usr/sap/PRD/SYS/exe/run
    > chown oracle:oinstall brarchive brbackup brconnect brrecover brrestore brspace
    > chmod 6774 brarchive brbackup brconnect brrecover brrestore brspace

    You can achieve the same by calling the script "oraroot.sh" with the user "root" as follows:
    > su - root
    > cd /usr/sap/PRD/SYS/exe/run
    > oraroot.sh PRD oracle

    ***All BR*Tools programs can be used with the OS user <sapsid>adm and the OS user ora<dbsid>. By default, they are started with the user <sapsid>adm.

  • 相关阅读:
    撒旦撒旦撒
    的释放的是分
    识别真假搜索引擎(搜索蜘蛛)方法(baidu,google,Msn,sogou,soso等)
    [转]Tesseract-OCR (Tesseract的OCR引擎最先由HP实验室于1985年开始研发)
    使用SQLMAP对网站和数据库进行SQL注入攻击
    Kali Linux 安装教程-转
    【教程】如何修改路由表?
    基于comet服务器推送技术(web实时聊天)
    Ghost硬盘对拷
    Web 通信 之 长连接、长轮询(long polling)
  • 原文地址:https://www.cnblogs.com/weikui/p/11540697.html
Copyright © 2011-2022 走看看