Get-VirtualSwitch -Name DistributedSwitch_NAME | Get-VirtualPortGroup | select name
Get-VM -name VMGuest_NAME | Get-NetworkAdapter | Set-NetworkAdapter -NetworkName "DistributedPort_NAME"
Friday, December 23, 2016
Export OVA vmware powercli
Get-VM VmGuestName | Export-VApp -Destination "F:\path_to_file" -Format ova
Friday, December 2, 2016
VMware Powercli migrate vm ( vmotion)
Get-VM -Location source-esxi-host | Where-Object { $_.PowerState -eq "PoweredOn"} | Move-VM -Destination dest-esxi-host -RunAsync
Wednesday, November 23, 2016
Create Custom Views using XPath on WINDOWS Event LOGs
Create Custom Views using XPath on WINDOWS Event LOGs
:example event for filter
*[System[(EventID=6278)]] and
*[EventData[Data[@Name='NASIPv4Address'] = 'xxx.xxx.xxx.xxx']] and
*[EventData[Data[@Name='NASIdentifier'] = 'FreeRadius-Profile']] and
*[EventData[Data[@Name='NASIdentifier'] = 'Captive-Portal-Profile']] and
*[EventData[Data[@Name='SubjectUserName'] ='user@domain.com']] and
*[EventData[Data[@Name='SubjectDomainName'] ='DomainName']] and
:Template XPath on Windows Event LOGs
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security"> <----- ( Application,Security,Setup,System, Forward Event )
*event for filter
*event for filter
*event for filter
</Select>
</Query>
</QueryList>
:filter by domain and LOGON Success/Fail
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security">
*[System[(EventID='6278') and (EventID='6273')]] and
*[EventData[Data[@Name='SubjectDomainName'] ='DomainName']]
</Select>
</Query>
</QueryList>
:filter by domain and username
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security">
*[EventData[Data[@Name='SubjectUserName'] ='user@domain.com']] and
*[EventData[Data[@Name='SubjectDomainName'] ='DomainName']
</Select>
</Query>
</QueryList>
:example event for filter
*[System[(EventID=6278)]] and
*[EventData[Data[@Name='NASIPv4Address'] = 'xxx.xxx.xxx.xxx']] and
*[EventData[Data[@Name='NASIdentifier'] = 'FreeRadius-Profile']] and
*[EventData[Data[@Name='NASIdentifier'] = 'Captive-Portal-Profile']] and
*[EventData[Data[@Name='SubjectUserName'] ='user@domain.com']] and
*[EventData[Data[@Name='SubjectDomainName'] ='DomainName']] and
:Template XPath on Windows Event LOGs
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security"> <----- ( Application,Security,Setup,System, Forward Event )
*event for filter
*event for filter
*event for filter
</Select>
</Query>
</QueryList>
:filter by domain and LOGON Success/Fail
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security">
*[System[(EventID='6278') and (EventID='6273')]] and
*[EventData[Data[@Name='SubjectDomainName'] ='DomainName']]
</Select>
</Query>
</QueryList>
:filter by domain and username
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security">
*[EventData[Data[@Name='SubjectUserName'] ='user@domain.com']] and
*[EventData[Data[@Name='SubjectDomainName'] ='DomainName']
</Select>
</Query>
</QueryList>
Monday, November 21, 2016
Clear User Session palo alto
show user ip-user-mapping ip xxx.xxx.xxx.xxx
clear user-cache-mp ip xxx.xxx.xxx.xxx
clear user-cache ip xxx.xxx.xxx.xxx
clear user-cache-mp ip xxx.xxx.xxx.xxx
clear user-cache ip xxx.xxx.xxx.xxx
Sunday, November 13, 2016
MAC OS error "no matching host key type found. Their offer: ssh-dss "
edit file /etc/ssh/ssh_config
1. Scroll down until you see this line:
# MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
2. Delete the pound sign, which will un-comment that line and make it active.
3. Now scroll down to the bottom of the document and add this line:
HostkeyAlgorithms ssh-dss
Tuesday, November 8, 2016
Dynamic Link aggregate Alcatel Lucent
lacp linkagg 11 size 2 actor admin key 11
lacp agg 1/15 actor admin key 11
lacp agg 1/16 actor admin key 11
lacp linkagg 12 size 2 actor admin key 12
lacp agg 1/17 actor admin key 12
lacp agg 1/18 actor admin key 12
lacp agg no sw_port
no lacp linkagg link_num
lacp agg 1/15 actor admin key 11
lacp agg 1/16 actor admin key 11
lacp linkagg 12 size 2 actor admin key 12
lacp agg 1/17 actor admin key 12
lacp agg 1/18 actor admin key 12
lacp agg no sw_port
no lacp linkagg link_num
Tuesday, October 18, 2016
VMware ESXi 5.5 host fails to detect local disk after patching or applying Update 1 on HP Proliant Gen 9 servers
SSH to esxi-server.domain.local
esxcli software vib update -n esx-base -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n tools-light -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n misc-drivers -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n scsi-bnx2i -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n sata-ahci -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n lsu-lsi-lsi-mr3-plugin -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n lsu-lsi-megaraid-sas-plugin -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n esx-base -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n tools-light -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n misc-drivers -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n scsi-bnx2i -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n sata-ahci -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n lsu-lsi-lsi-mr3-plugin -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
esxcli software vib update -n lsu-lsi-megaraid-sas-plugin -d /vmfs/volumes/550a56a5-7d0cb318-161c-90b11c44d433/Patch/ESXi550-201609001.zip
Wednesday, September 28, 2016
Basic Shell Script for Oracle RMAN backup
#Oracle RMAN backup by Surapong Naowasate
#!/bin/bash
cd
. .bash_profile
export BACKUPPATH="/Path_to_Store_RMAN_BACKUPSET"
for i in DB1 DB2....DBn
do
export DATAFILE="BACKUP_${i}_DATA_$(date '+%Y%m%d')"
echo $DATAFILE
export ARCHIVEDLOG="BACKUP_${i}_ARC_$(date '+%Y%m%d')"
echo $ARCHIVEDLOG
export CONTROLFILE="BACKUP_${i}_CTL_$(date '+%Y%m%d')"
echo $CONTROLFILE
export RMAN_LOG_FILE="BACKUP_${i}_$(date '+%Y%m%d').out"
echo $RMAN_LOG_FILE
echo Backup_data_file_path=$BACKUPPATH
export ORACLE_SID=$i
#EXPORT pfile
sqlplus '/ as sysdba' << EOF
CREATE pfile='${BACKUPPATH}/${i}/pfile-$i-$(date '+%Y%m%d').ora' from spfile;
EXIT;
EOF
#RMAN REPORT DATABASE INFORMATION
rman target / msglog ${BACKUPPATH}/${i}/DATABASE_${i}_info.txt <<EOF
run
{
REPORT SCHEMA;
}
EXIT;
EOF
#<<'test'
#RMAN BACKUPSET FOR Migration
rman target / msglog ${BACKUPPATH}/log/$RMAN_LOG_FILE <<EOF
run
{
ALLOCATE CHANNEL ch00 TYPE DISK;
ALLOCATE CHANNEL ch01 TYPE DISK;
ALLOCATE CHANNEL ch02 TYPE DISK;
ALLOCATE CHANNEL ch03 TYPE DISK;
BACKUP
TAG "${DATAFILE}"
FORMAT '${BACKUPPATH}/${i}/DATA_${i}_%s_%p_%t'
DATABASE;
sql 'alter system archive log current';
RELEASE CHANNEL ch00;
RELEASE CHANNEL ch01;
RELEASE CHANNEL ch02;
RELEASE CHANNEL ch03;
ALLOCATE CHANNEL ch00 TYPE DISK;
ALLOCATE CHANNEL ch01 TYPE DISK;
BACKUP
TAG "${ARCHIVEDLOG}"
FORMAT '${BACKUPPATH}/${i}/arc_${i}_%s_%p_%t'
ARCHIVELOG ALL ;
RELEASE CHANNEL ch00;
RELEASE CHANNEL ch01;
ALLOCATE CHANNEL ch00 TYPE DISK;
BACKUP
TAG "${CONTROLFILE}"
FORMAT '${BACKUPPATH}/${i}/cntrl_${i}_%s_%p_%t'
CURRENT CONTROLFILE;
RELEASE CHANNEL ch00;
}
EXIT;
EOF
#test
echo $i
done
Wednesday, August 3, 2016
Manual FIX IP and Change Hostname on Solaris 11
1. Switch From Automatic Network Configuration Mode to Manual Network Configuration Mode
# netadm enable -p ncp DefaultFixed
2. Verify that DefaultFixed profile is applied
# netadm list
netadm: DefaultFixed NCP is enabled;
automatic network management is not available.
'netadm list' is only supported when automatic network management is active.
3. Determine the interface that you want to configure
# dladm show-phys
4. Configure the vmxnet3s0 interface
# ipadm create-ip net0
# ipadm create-addr -T static -a 192.168.1.10/24 vmxnet3s0/v4
5. Verify
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
vmxnet3s0/v4 static ok 192.168.1.10/24
lo0/v6 static ok ::1/128
root@solaris:~# dladm show-link
LINK CLASS MTU STATE OVER
net0 phys 1500 up --
6. Add default route
# route -p add default 192.168.1.1
7. Add DNS Name Server
root@solaris:~# svccfg -s dns/client
svc:/network/dns/client> setprop config/nameserver = (8.8.8.8 8.8.4.4)
svc:/network/dns/client> listprop config
config application
config/value_authorization astring solaris.smf.value.name-service.dns.client
config/nameserver net_address 8.8.8.8 8.8.4.4
svc:/network/dns/client> exit
root@solaris:~#
root@solaris:~# svcadm refresh dns/client
root@solaris:~# svcadm restart dns/client
8. Set name service switch
root@solaris:~# svccfg -s name-service/switch
svc:/system/name-service/switch> setprop config/host = "files dns"
svc:/system/name-service/switch> listprop config
config application
config/default astring files
config/value_authorization astring solaris.smf.value.name-service.switch
config/printer astring "user files"
config/host astring "files dns"
svc:/system/name-service/switch> exit
9. Testing
root@solaris:~# ping google.com
google.com is alive
10. Change Hostname
root@solaris:~# svccfg <
select /system/identity:node
#listprop config
setprop config/nodename="newhost"
setprop config/loopback="newhost"
refresh
# netadm enable -p ncp DefaultFixed
2. Verify that DefaultFixed profile is applied
# netadm list
netadm: DefaultFixed NCP is enabled;
automatic network management is not available.
'netadm list' is only supported when automatic network management is active.
3. Determine the interface that you want to configure
# dladm show-phys
4. Configure the vmxnet3s0 interface
# ipadm create-ip net0
# ipadm create-addr -T static -a 192.168.1.10/24 vmxnet3s0/v4
5. Verify
# ipadm show-addr
ADDROBJ TYPE STATE ADDR
lo0/v4 static ok 127.0.0.1/8
vmxnet3s0/v4 static ok 192.168.1.10/24
lo0/v6 static ok ::1/128
root@solaris:~# dladm show-link
LINK CLASS MTU STATE OVER
net0 phys 1500 up --
6. Add default route
# route -p add default 192.168.1.1
7. Add DNS Name Server
root@solaris:~# svccfg -s dns/client
svc:/network/dns/client> setprop config/nameserver = (8.8.8.8 8.8.4.4)
svc:/network/dns/client> listprop config
config application
config/value_authorization astring solaris.smf.value.name-service.dns.client
config/nameserver net_address 8.8.8.8 8.8.4.4
svc:/network/dns/client> exit
root@solaris:~#
root@solaris:~# svcadm refresh dns/client
root@solaris:~# svcadm restart dns/client
8. Set name service switch
root@solaris:~# svccfg -s name-service/switch
svc:/system/name-service/switch> setprop config/host = "files dns"
svc:/system/name-service/switch> listprop config
config application
config/default astring files
config/value_authorization astring solaris.smf.value.name-service.switch
config/printer astring "user files"
config/host astring "files dns"
svc:/system/name-service/switch> exit
9. Testing
root@solaris:~# ping google.com
google.com is alive
10. Change Hostname
root@solaris:~# svccfg <
select /system/identity:node
#listprop config
setprop config/nodename="newhost"
setprop config/loopback="newhost"
refresh
Monday, August 1, 2016
Clear iSCSI Configuration VSphere ESXi 6.0
- Winscp to the host using SFTP -> navigate to /etc/vmware/vmkiscsid/ and copy the contents to your workstation
- Once copied, delete the contents in /etc/vmware/vmkiscsid/
- Reboot the host
- Create a new software iscsi adapter - > write over the IQN with the old one we copied earlier
- Add iscsi port bindings and targets.
- Once copied, delete the contents in /etc/vmware/vmkiscsid/
- Reboot the host
- Create a new software iscsi adapter - > write over the IQN with the old one we copied earlier
- Add iscsi port bindings and targets.
Tuesday, July 19, 2016
Disable Auto Open App Photo MAC os
defaults -currentHost write com.apple.ImageCapture disableHotPlug -bool YES
Monday, July 4, 2016
Disable virbr0 NAT Interface Oracle Linux
# ifconfig
# virsh net-list
# virsh net-destroy default
# virsh net-undefine default
# service libvirtd restart
# ifconfig
# virsh net-list
# virsh net-destroy default
# virsh net-undefine default
# service libvirtd restart
# ifconfig
Thursday, June 16, 2016
Find failed LOGON timestamp in ORACLE
"DBA_AUDIT_SESSION"
ex:
select
USERNAME, USERHOST, ACTION_NAME, RETURNCODE, TO_CHAR(TIMESTAMP,'MM/DD HH24:MI') TIMESTAMP
from
dba_audit_session
where
USERNAME like 'ORACLE_USERNAME'
and
RETURNCODE > 0
RETURNCODE:
1017 invalid username/password
28000 Account is Lock
0 Normal Login
ex:
select
USERNAME, USERHOST, ACTION_NAME, RETURNCODE, TO_CHAR(TIMESTAMP,'MM/DD HH24:MI') TIMESTAMP
from
dba_audit_session
where
USERNAME like 'ORACLE_USERNAME'
and
RETURNCODE > 0
RETURNCODE:
1017 invalid username/password
28000 Account is Lock
0 Normal Login
Monday, June 13, 2016
PowerShell Backup Script For VMware Server (Clone VMs using 'NEW-VM')
Backup Script Info /Surapong Naowasate v 1.0
Home path
=========
c:\vmware\
Folder:
- Script
- Hostlist
- Log-backup
File:
sc_xxx.ps1 - Script For backup
hl_xxx.txt - Host List For backup
VMware-Backup-xxx.log - Log Backup
Daily Backup info file path
===========================
c:\vmware\Script\Daily\sc_daily.ps1
c:\vmware\Hostlist\hl_daily.txt
c:\vmware\Log-backup\Daily\VMware-Backup-daily-$backup_date-$backup_timestamp
Weekly Backup info file path
===========================
c:\vmware\Script\Weekly\sc_weekly.ps1
c:\vmware\Hostlist\hl_weekly.txt
c:\vmware\Log-backup\Weekly\VMware-Backup-weekly-$backup_date-$backup_timestamp
Monthly Backup info file path
===========================
c:\vmware\Script\Monthly\sc_monthly.ps1
c:\vmware\Hostlist\hl_monthly.txt
c:\vmware\Log-backup\Monthly\VMware-Backup-Monthly-$backup_date-$backup_timestamp
EXP:Daily Backup Script
-------------------------------
Add-PSSnapin VMware.VimAutomation.Core
#Call VMware library
$VM = Get-Content c:\vmware\Hostlist\hl_daily.txt
#get hosting name for backup
$BackupvCenter = "vCenter.domain.local"
#set vCenter Name for connected to Backup
$BackupHost = "esxiHost.domain.local"
#Destination Host for Stored backup VMs ( by clone VMs)
$backupDate = Get-Date -Format yyyyMMdd-HHmm
#set date format
$backupDatastore = "VMware-Backup-Storage"
#set DataStore for backup
Connect-VIServer -Server $BackupvCenter -User backupuser@domain.local -Password backupuserpassword
#Connet to vCenter
$VM_LOG = 'c:\vmware\Log-backup\Daily\VMware-Backup-daily-'+$backupDate+'.log'
#set log path and backup filename
foreach ($line in $VM) {
Get-VM -Server $BackupvCenter | where { $_.PowerState -like 'PoweredOn' -and $_.name -like $line } | select name, vmhost, guestid, numcpu,memorymb | Out-File $VM_LOG -Append
#get information Guest VMs for backup
$VM_TMP = 'Backup-VMs-daily-'+$backupDate+'-'+$line
#set newname Guest VMs for backup
New-VM -Name $VM_TMP -VM $line -VMHost $BackupHost -Datastore $backupDatastore -Location Daily | Out-File $VM_LOG -Append
#clone VMs to backup Storage
$last7day = (get-date (get-date).AddDays(-7) -Format yyyyMMdd)
$VM_OLD_BACKUP = 'Backup-VMs-daily-'+$last7day+'-0000-'+$line
Remove-VM $VM_OLD_BACKUP -DeleteFromDisk -Confirm:$false#remove VM from Datastore Last 7 day (dailybackup)
}
---------------------------------------
ADD to Windows TASK Schedule
============================
- Create Task
- Set name of Schedule JOB
- Set Account for run backup schedule (DOMAIN\backupuser)
- Set Run whether user is logged on or not
- Create Trigger for job ex. daily, weekly, monthly
- Set Action for job ex. run powershell
- start a program 'powershell'
- add argument '-file c:\vmware\script\powershell_script'
- start in directory 'c:\vmware\script'
- Click OK , Scheduled Task will asked for password of backup user (DOMAIN\backupuser)
Home path
=========
c:\vmware\
Folder:
- Script
- Hostlist
- Log-backup
File:
sc_xxx.ps1 - Script For backup
hl_xxx.txt - Host List For backup
VMware-Backup-xxx.log - Log Backup
Daily Backup info file path
===========================
c:\vmware\Script\Daily\sc_daily.ps1
c:\vmware\Hostlist\hl_daily.txt
c:\vmware\Log-backup\Daily\VMware-Backup-daily-$backup_date-$backup_timestamp
Weekly Backup info file path
===========================
c:\vmware\Script\Weekly\sc_weekly.ps1
c:\vmware\Hostlist\hl_weekly.txt
c:\vmware\Log-backup\Weekly\VMware-Backup-weekly-$backup_date-$backup_timestamp
Monthly Backup info file path
===========================
c:\vmware\Script\Monthly\sc_monthly.ps1
c:\vmware\Hostlist\hl_monthly.txt
c:\vmware\Log-backup\Monthly\VMware-Backup-Monthly-$backup_date-$backup_timestamp
EXP:Daily Backup Script
-------------------------------
Add-PSSnapin VMware.VimAutomation.Core
#Call VMware library
$VM = Get-Content c:\vmware\Hostlist\hl_daily.txt
#get hosting name for backup
$BackupvCenter = "vCenter.domain.local"
#set vCenter Name for connected to Backup
$BackupHost = "esxiHost.domain.local"
#Destination Host for Stored backup VMs ( by clone VMs)
$backupDate = Get-Date -Format yyyyMMdd-HHmm
#set date format
$backupDatastore = "VMware-Backup-Storage"
#set DataStore for backup
Connect-VIServer -Server $BackupvCenter -User backupuser@domain.local -Password backupuserpassword
#Connet to vCenter
$VM_LOG = 'c:\vmware\Log-backup\Daily\VMware-Backup-daily-'+$backupDate+'.log'
#set log path and backup filename
foreach ($line in $VM) {
Get-VM -Server $BackupvCenter | where { $_.PowerState -like 'PoweredOn' -and $_.name -like $line } | select name, vmhost, guestid, numcpu,memorymb | Out-File $VM_LOG -Append
#get information Guest VMs for backup
$VM_TMP = 'Backup-VMs-daily-'+$backupDate+'-'+$line
#set newname Guest VMs for backup
New-VM -Name $VM_TMP -VM $line -VMHost $BackupHost -Datastore $backupDatastore -Location Daily | Out-File $VM_LOG -Append
#clone VMs to backup Storage
$last7day = (get-date (get-date).AddDays(-7) -Format yyyyMMdd)
$VM_OLD_BACKUP = 'Backup-VMs-daily-'+$last7day+'-0000-'+$line
Remove-VM $VM_OLD_BACKUP -DeleteFromDisk -Confirm:$false#remove VM from Datastore Last 7 day (dailybackup)
}
---------------------------------------
ADD to Windows TASK Schedule
============================
- Create Task
- Set name of Schedule JOB
- Set Account for run backup schedule (DOMAIN\backupuser)
- Set Run whether user is logged on or not
- Create Trigger for job ex. daily, weekly, monthly
- Set Action for job ex. run powershell
- start a program 'powershell'
- add argument '-file c:\vmware\script\powershell_script'
- start in directory 'c:\vmware\script'
- Click OK , Scheduled Task will asked for password of backup user (DOMAIN\backupuser)
Friday, June 10, 2016
Run Vmware PowerCLI on Windows Schedule Task
There 2 way to Doing:
1. Load Vmware LIB
Add-PSSnapin Vmware.VimAutomation.Core
in vmware powershell script (*.ps1)
2. exec in windows schedule task
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -PSConsoleFile "C:\Program Files (x86)\VMware\Infrastructure\vSphere PowerCLI" $ "Parh_to_PowerShell_Script"
1. Load Vmware LIB
Add-PSSnapin Vmware.VimAutomation.Core
in vmware powershell script (*.ps1)
2. exec in windows schedule task
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -PSConsoleFile "C:\Program Files (x86)\VMware\Infrastructure\vSphere PowerCLI" $ "Parh_to_PowerShell_Script"
Thursday, June 9, 2016
ORA-00845: MEMORY_TARGET not supported on this system
:Manual Mount tmpfs
mount -t tmpfs shmfs -o size=12g /dev/shm
:Auto Mount on fstab
tmpfs /dev/shm tmpfs size=12g 0 0
Size of tmpfs = MemorySize x 2
mount -t tmpfs shmfs -o size=12g /dev/shm
:Auto Mount on fstab
tmpfs /dev/shm tmpfs size=12g 0 0
Size of tmpfs = MemorySize x 2
Wednesday, April 27, 2016
Tuesday, April 26, 2016
Add static route gateway persistent
add static route gateway persistent
:windows
route -p add dest_network mask dest_netmask gateway
ex:
route -p add 192.168.1.0 mask 255.255.255.0 10.10.10.1
:solaris 10
route -p -net dest_network/24 -gateway gateway
ex:
route -p add 192.168.1.0/24 -gateway 10.10.10.1
:OracleLinux 6.5
# cd /etc/sysconfig/network-scripts
# cat route-eth2
# echo ‘10.11.18.0/24 via 10.10.18.4′ >> /etc/sysconfig/network-scripts/route-eth0
:windows
route -p add dest_network mask dest_netmask gateway
ex:
route -p add 192.168.1.0 mask 255.255.255.0 10.10.10.1
:solaris 10
route -p -net dest_network/24 -gateway gateway
ex:
route -p add 192.168.1.0/24 -gateway 10.10.10.1
:OracleLinux 6.5
# cd /etc/sysconfig/network-scripts
# cat route-eth2
# echo ‘10.11.18.0/24 via 10.10.18.4′ >> /etc/sysconfig/network-scripts/route-eth0
Tuesday, April 19, 2016
Clear Alert log /Trace file in Oracle 11g using adrci
adrci command line
:ON Database SID (alert log & trace file)
show home
set homepath diag/rdbms/db_sid/db_sid
show alert -tail
show tracefile -tail
PURGE -AGE 7200 -TYPE ALERT;
:ON Listener log (alertlog & tracefile)
show home
set home diag/tnslsnr/db_hostname/listener
show alert -tail
show tracefile -tail
PURGE -AGE 7200 -TYPE ALERT;
-age in sec
:ON Database SID (alert log & trace file)
show home
set homepath diag/rdbms/db_sid/db_sid
show alert -tail
show tracefile -tail
PURGE -AGE 7200 -TYPE ALERT;
:ON Listener log (alertlog & tracefile)
show home
set home diag/tnslsnr/db_hostname/listener
show alert -tail
show tracefile -tail
PURGE -AGE 7200 -TYPE ALERT;
-age in sec
lock account/unlock account Office 365 user
To block a user account:
Set-MsolUser –UserPrincipalName user@yourdomain –blockcredential $true
To unlock a user accout:
Set-MsolUser -UserPrincipalName user@yourdomain –blockcredential $false
Set-MsolUser –UserPrincipalName user@yourdomain –blockcredential $true
To unlock a user accout:
Set-MsolUser -UserPrincipalName user@yourdomain –blockcredential $false
Tuesday, March 22, 2016
Source.list mirror.ku.ac.th Ubuntu 15.10 wily warewolf
#####Main,Restriced Update#####
deb http://mirror1.ku.ac.th/ubuntu/ wily main restricted
deb http://mirror1.ku.ac.th/ubuntu/ wily-updates main restricted
deb http://mirror1.ku.ac.th/ubuntu-security/ wily-security main restricted
#####KU Multiverse,Universe Update(Optional)#####
deb http://mirror1.ku.ac.th/ubuntu/ wily multiverse universe
deb http://mirror1.ku.ac.th/ubuntu/ wily-updates multiverse universe
deb http://mirror1.ku.ac.th/ubuntu-security/ wily-security multiverse universe
#####Source File Main, Restriced (Optional)#####
deb-src http://mirror1.ku.ac.th/ubuntu/ wily main restricted
deb-src http://mirror1.ku.ac.th/ubuntu/ wily-updates main restricted
deb-src http://mirror1.ku.ac.th/ubuntu-security/ wily-security main restricted
#####Source File Multiverse,Universe (Optional)#####
deb-src http://mirror1.ku.ac.th/ubuntu/ wily multiverse universe
deb-src http://mirror1.ku.ac.th/ubuntu/ wily-updates multiverse universe
deb-src http://mirror1.ku.ac.th/ubuntu-security/ wily-security multiverse universe
OR
edit source.list
vi search and replace
:%s/soure_url/mirror_url
ex:
:%s/us.archive.ubuntu.com/mirror1.ku.ac.th
Friday, March 18, 2016
Assigned IP Address to new NIC and restart network services Solaris10 without REBOOT
List Physical NIC
#ifconfig -a plumb up
pri-db# dladm show-link
vmxnet3s0 type: non-vlan mtu: 1500 device: vmxnet3s0
vmxnet3s1 type: non-vlan mtu: 1500 device: vmxnet3s1 <---new NIC
cat /etc/path_to_inst
Assigned NIC interface
edit /etc/hostname.vmxnet3s1
new-hostname
Assigned IP Address
edit /etc/hosts
new-hostname 192.168.1.111
Assigned Netmask
edit /etc/netmask
192.168.1.0 255.255.255.0
Restart Network Services
#svcadm restart network/physical
#ifconfig -a plumb up
pri-db# dladm show-link
vmxnet3s0 type: non-vlan mtu: 1500 device: vmxnet3s0
vmxnet3s1 type: non-vlan mtu: 1500 device: vmxnet3s1 <---new NIC
cat /etc/path_to_inst
Assigned NIC interface
edit /etc/hostname.vmxnet3s1
new-hostname
Assigned IP Address
edit /etc/hosts
new-hostname 192.168.1.111
Assigned Netmask
edit /etc/netmask
192.168.1.0 255.255.255.0
Restart Network Services
#svcadm restart network/physical
Friday, February 26, 2016
Fail2BAN Test
Add configure to /etc/fail2ban/jail.local
========================
[http-get-dos]
enabled = true
port = http,https
filter = http-get-dos
logpath = /var/log/apache2/access.log
# maxretry is how many GETs we can have in the findtime period before getting narky
maxretry = 300
# findtime is the time period in seconds in which we're counting "retries" (300 seconds = 5 mins)
findtime = 300
# bantime is how long we should drop incoming GET requests for a given IP for, in this case it's 5 minutes
bantime = 300
action = iptables[name=HTTP, port=http, protocol=tcp]
Create Filter file /etc/fail2ban/filter.d/http-get-dos.conf
=======================================
[Definition]
# Option: failregex
# Note: This regex will match any GET entry in your logs, so basically all valid and not valid entries are a match.
# You should set up in the jail.conf file, the maxretry and findtime carefully in order to avoid false positives.
failregex = ^<HOST> -.*"(GET|POST).*
# Option: ignoreregex
# Notes.: regex to ignore. If this regex matches, the line is ignored.
# Values: TEXT
#
ignoreregex =
@start service
/etc/init.d/fail2ban start
/etc/init.d/fail2ban stop
Connect Load test from client (192.168.1.14)
================================
[root@Client-01 ~]# ab -n 100 -c 10 http://192.168.1.191/
This is ApacheBench, Version 2.0.40-dev <$Revision: 1.146 $> apache-2.0
Copyright 1996 Adam Twiss, Zeus Technology Ltd, http://www.zeustech.net/
Copyright 2006 The Apache Software Foundation, http://www.apache.org/
Benchmarking 192.168.1.191 (be patient)
Completed 100 requests
Completed 200 requests
Finished 300 requests
Server Software: Apache/2.4.10
Server Hostname: 192.168.1.191
Server Port: 80
Document Path: /
Document Length: 11321 bytes
Concurrency Level: 10
Time taken for tests: 0.80254 seconds
Complete requests: 300
Failed requests: 0
Write errors: 0
Total transferred: 3495887 bytes
HTML transferred: 3413139 bytes
Requests per second: 3738.13 [#/sec] (mean)
Time per request: 2.675 [ms] (mean)
Time per request: 0.268 [ms] (mean, across all concurrent requests)
Transfer rate: 42527.47 [Kbytes/sec] received
Connection Times (ms)
min mean[+/-sd] median max
Connect: 0 0 0.3 0 1
Processing: 1 1 1.1 2 4
Waiting: 0 0 0.8 1 2
Total: 1 2 0.6 2 4
WARNING: The median and mean for the waiting time are not within a normal deviation
These results are probably not that reliable.
Percentage of the requests served within a certain time (ms)
50% 2
66% 2
75% 2
80% 2
90% 3
95% 3
98% 3
99% 4
100% 4 (longest request)
BAN!!!
=====
[root@Client-01 ~]# ab -n 300 -c 10 http://192.168.1.191/
This is ApacheBench, Version 2.0.40-dev <$Revision: 1.146 $> apache-2.0
Copyright 1996 Adam Twiss, Zeus Technology Ltd, http://www.zeustech.net/
Copyright 2006 The Apache Software Foundation, http://www.apache.org/
Benchmarking 192.168.1.191 (be patient)
apr_socket_recv: Connection refused (111)
@SERVER site check iptables
======================
root@IDP-Server:~# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-HTTP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 2 2
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain f2b-HTTP (1 references) <--------------------AUTO Add from Fail2BAN
target prot opt source destination
REJECT all -- 192.168.1.14 0.0.0.0/0 reject-with icmp-p ort-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0
Chain f2b-sshd (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0
root@IDP-Server:~# tail -f fail2ban.log
2016-02-25 12:56:06,749 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,749 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,749 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,750 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,750 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,751 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,751 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,752 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,752 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,752 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,753 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,753 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,754 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,754 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,755 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,755 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,755 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,756 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,756 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,757 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,757 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,758 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,758 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,758 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,759 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,759 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,760 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,760 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,761 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,761 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,762 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,762 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,762 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,763 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,763 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,764 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,764 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:07,443 fail2ban.actions [3504]: NOTICE [http-get-dos] Ban 192.168.1.14
UNBAN
======
@Server site :
iptables -L -n
Chain f2b-HTTP (1 references)
target prot opt source destination
REJECT all -- 192.168.1.14 0.0.0.0/0 reject-with icmp-port-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0
@check rules name :
root@IDP-Server:~# fail2ban-client status
Status
|- Number of jail: 2
`- Jail list: http-get-dos, sshd
@set UNBAN
root@IDP-Server:~# fail2ban-client set http-get-dos unbanip 192.168.1.14
192.168.1.14
@LOG :
root@IDP-Server:~# tail -f fail2ban.log
2016-02-25 12:56:07,443 fail2ban.actions [3504]: NOTICE [http-get-dos] Ban 192.168.1.14
2016-02-25 13:00:56,160 fail2ban.actions [3504]: NOTICE [http-get-dos] Unban 192.168.1.14
========================
[http-get-dos]
enabled = true
port = http,https
filter = http-get-dos
logpath = /var/log/apache2/access.log
# maxretry is how many GETs we can have in the findtime period before getting narky
maxretry = 300
# findtime is the time period in seconds in which we're counting "retries" (300 seconds = 5 mins)
findtime = 300
# bantime is how long we should drop incoming GET requests for a given IP for, in this case it's 5 minutes
bantime = 300
action = iptables[name=HTTP, port=http, protocol=tcp]
Create Filter file /etc/fail2ban/filter.d/http-get-dos.conf
=======================================
[Definition]
# Option: failregex
# Note: This regex will match any GET entry in your logs, so basically all valid and not valid entries are a match.
# You should set up in the jail.conf file, the maxretry and findtime carefully in order to avoid false positives.
failregex = ^<HOST> -.*"(GET|POST).*
# Option: ignoreregex
# Notes.: regex to ignore. If this regex matches, the line is ignored.
# Values: TEXT
#
ignoreregex =
@start service
/etc/init.d/fail2ban start
/etc/init.d/fail2ban stop
Connect Load test from client (192.168.1.14)
================================
[root@Client-01 ~]# ab -n 100 -c 10 http://192.168.1.191/
This is ApacheBench, Version 2.0.40-dev <$Revision: 1.146 $> apache-2.0
Copyright 1996 Adam Twiss, Zeus Technology Ltd, http://www.zeustech.net/
Copyright 2006 The Apache Software Foundation, http://www.apache.org/
Benchmarking 192.168.1.191 (be patient)
Completed 100 requests
Completed 200 requests
Finished 300 requests
Server Software: Apache/2.4.10
Server Hostname: 192.168.1.191
Server Port: 80
Document Path: /
Document Length: 11321 bytes
Concurrency Level: 10
Time taken for tests: 0.80254 seconds
Complete requests: 300
Failed requests: 0
Write errors: 0
Total transferred: 3495887 bytes
HTML transferred: 3413139 bytes
Requests per second: 3738.13 [#/sec] (mean)
Time per request: 2.675 [ms] (mean)
Time per request: 0.268 [ms] (mean, across all concurrent requests)
Transfer rate: 42527.47 [Kbytes/sec] received
Connection Times (ms)
min mean[+/-sd] median max
Connect: 0 0 0.3 0 1
Processing: 1 1 1.1 2 4
Waiting: 0 0 0.8 1 2
Total: 1 2 0.6 2 4
WARNING: The median and mean for the waiting time are not within a normal deviation
These results are probably not that reliable.
Percentage of the requests served within a certain time (ms)
50% 2
66% 2
75% 2
80% 2
90% 3
95% 3
98% 3
99% 4
100% 4 (longest request)
BAN!!!
=====
[root@Client-01 ~]# ab -n 300 -c 10 http://192.168.1.191/
This is ApacheBench, Version 2.0.40-dev <$Revision: 1.146 $> apache-2.0
Copyright 1996 Adam Twiss, Zeus Technology Ltd, http://www.zeustech.net/
Copyright 2006 The Apache Software Foundation, http://www.apache.org/
Benchmarking 192.168.1.191 (be patient)
apr_socket_recv: Connection refused (111)
@SERVER site check iptables
======================
root@IDP-Server:~# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
f2b-HTTP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
f2b-sshd tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 2 2
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain f2b-HTTP (1 references) <--------------------AUTO Add from Fail2BAN
target prot opt source destination
REJECT all -- 192.168.1.14 0.0.0.0/0 reject-with icmp-p ort-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0
Chain f2b-sshd (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0
root@IDP-Server:~# tail -f fail2ban.log
2016-02-25 12:56:06,749 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,749 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,749 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,750 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,750 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,751 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,751 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,752 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,752 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,752 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,753 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,753 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,754 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,754 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,755 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,755 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,755 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,756 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,756 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,757 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,757 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,758 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,758 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,758 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,759 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,759 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,760 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,760 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,761 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,761 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,762 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,762 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,762 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,763 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,763 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,764 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:06,764 fail2ban.filter [3504]: INFO [http-get-dos] Found 192.168.1.14
2016-02-25 12:56:07,443 fail2ban.actions [3504]: NOTICE [http-get-dos] Ban 192.168.1.14
UNBAN
======
@Server site :
iptables -L -n
Chain f2b-HTTP (1 references)
target prot opt source destination
REJECT all -- 192.168.1.14 0.0.0.0/0 reject-with icmp-port-unreachable
RETURN all -- 0.0.0.0/0 0.0.0.0/0
@check rules name :
root@IDP-Server:~# fail2ban-client status
Status
|- Number of jail: 2
`- Jail list: http-get-dos, sshd
@set UNBAN
root@IDP-Server:~# fail2ban-client set http-get-dos unbanip 192.168.1.14
192.168.1.14
@LOG :
root@IDP-Server:~# tail -f fail2ban.log
2016-02-25 12:56:07,443 fail2ban.actions [3504]: NOTICE [http-get-dos] Ban 192.168.1.14
2016-02-25 13:00:56,160 fail2ban.actions [3504]: NOTICE [http-get-dos] Unban 192.168.1.14
Wednesday, February 10, 2016
ORA-39700: database must be opened with UPGRADE option
set ORACLE_SID=<SID>
sqlplus "/as sysdba"
startup upgrade;
@$ORACLE_HOME\rdbms\admin\catalog.sql;
@$ORACLE_HOME\rdbms\admin\catproc.sql;
Thursday, January 28, 2016
Install Oracle database 11g on Windows server 2008 r2 x64
Add privilege administrator to ' ORACLE user '
Fix IP address
set c:\windows\system32\drivers\etc\host
127.0.0.1 localhost
192.168.1.10 hostname ;ex
set all Everonment Variable in 'System variables'
ORACLE_BASE
ORACLE_HOME
ORACLE_UNQNAME
set region in control panel (system locale)
Administrative-> Langauge for non-Unicode Program -> English
Fix IP address
set c:\windows\system32\drivers\etc\host
127.0.0.1 localhost
192.168.1.10 hostname ;ex
set all Everonment Variable in 'System variables'
ORACLE_BASE
ORACLE_HOME
ORACLE_UNQNAME
set region in control panel (system locale)
Administrative-> Langauge for non-Unicode Program -> English
Wednesday, January 27, 2016
OracleMTS Recovery Service error
OracleMTS Recovery Service error
"Windows could not start the OracleMTSRecoverService service on Local Computer. Error 1: Incorrect function.
HKEY_LOCAL_MACHINE\SOFTWARE\ORACLE\OracleMTSRecoveryService\Protid_0
set key host to--> localhost
"Windows could not start the OracleMTSRecoverService service on Local Computer. Error 1: Incorrect function.
HKEY_LOCAL_MACHINE\SOFTWARE\ORACLE\OracleMTSRecoveryService\Protid_0
set key host to--> localhost
Subscribe to:
Posts (Atom)
ALCATEL 6900
write memory copy running certified reload from working no rollback-timeout
-
SET LLDP System NAME: system name ALL-Uplink system location SIAM-FL11 SHOW LLDP Configure: show lldp config or show lldp local-syste...
-
grant execute on utl_http to wc grant execute on dbms_lock to wc; BEGIN DBMS_NETWORK_ACL_ADMIN.create_acl ( acl => ...
-
:system view system-view or sys :show all config dis current-configuration :create vlan vlan vlan_number :show ip interface ...