Experience: is what you get soon after you need it.

Experience: is what you get soon after you need it.



My Cloud Certifications:

Certified Kubernetes Administrator (CKA)

Cloud Certified Security Professional (ISC2)

CyberSecurity Certified Professional (ISC2)

AWS Certified Solutions Architect Associate

Azure Certified Architect Expert

Azure Certified Architect

Azure Certified Administrator

Oracle Cloud Infrastructure 2018 Certified Architect Associate.

Oracle Cloud Infrastructure Classic 2018 Certified Architect Associate.

Oracle Database Cloud Administrator Certified Professional.

Oracle Database Cloud Service Operations Certified Associate.

Search This Blog

Tuesday, April 1, 2014

OID Get ORASSO password

Obtaining the Single Sign-On Schema Password



$ORACLE_HOME/bin/ldapsearch -h oidhostname -p portnumber -D "cn=orcladmin" -w orcladminpwd -b "orclReferenceName=, cn=IAS Infrastructure  Databases, cn=ias, cn=products, cn=oracleContext" -s sub "orclResourceName=ORASSO" orclpasswordattribute


Ex:-

$ORACLE_HOME/bin/ldapsearch -h oidhost01 -p 389 -D "cn=orcladmin" -w mypass -b "orclReferenceName=OIDDB, cn=IAS Infrastructure  Databases, cn=ias, cn=products, cn=oracleContext" -s sub "orclResourceName=ORASSO" orclpasswordattribute

Result:-
OrclResourceName=ORASSO,orclReferenceName=OIDDB,cn=IAS Infrastructure Databases,cn=IAS,cn=Products,cn=OracleContext
orclpasswordattribute=PASSWORDHERE


Reference:-
========
http://docs.oracle.com/cd/B14099_19/idmanage.1012/b14078/schema.htm

Saturday, February 1, 2014

Enable FND Debug and get data from FND_LOG_MESSAGES table

Enable FND Debug and get log information from FND_LOG_MESSAGES table:

 

If the size of FND_LOG_MESSAGES table is too big? then

Considering running the concurrent request:  “Purge Debug Log and System Alerts”. 

 

 Enable Debug mode:-

=================

1)Log into system admin responsibility and set the following profile options
FND: Debug Log Enabled - Yes
FND: Debug Log Level - Statement  (Consider other options from the drop down if needed)
FND: Debug Log Module - %

 2)Capture the Max sequence number
 SELECT MAX(log_sequence)  b4seq# FROM fnd_log_messages;


 3)Try to reproduce the issue with above user for which FND profile options are set.

4)Capture the Max sequence number again:
SELECT MAX(log_sequence) afterseq# FROM fnd_log_messages;


5)Run following select to get the log messages
SELECT LOG_SEQUENCE, MESSAGE_TEXT, USER_ID FROM fnd_log_messages WHERE
log_sequence > b4seq# -1 and b4seq# 

Wednesday, January 8, 2014

ORA-27054: NFS file system where the file is created or resides is not mounted with correct options ORA-27054 ORA-01580



RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03009: failure of backup command on ORA_DISK_1 channel at 01/08/2014 18:02:28
ORA-01580: error creating control backup file /export/u0/DBS/dbs/snapcf_DBSP1.f
ORA-27054: NFS file system where the file is created or resides is not mounted with correct options
Additional information: 3
Additional information: 1


The workaround recommended is to use the Event 10298.
sql> alter system set events '10298 trace name context forever, level 32';

 

 

Friday, December 27, 2013

11i/R12 query FND_NODES

    set lines 200
    col host_name for a11
    col node_name for a11
    col database for a10
    col concmgr for a9
    col forms for a7
    col webserver for a11
    col admin for a7
    select
    NODE_NAME,
    decode(STATUS,'Y','ACTIVE','INACTIVE') Status,
    decode(SUPPORT_CP,'Y', 'YES','NO') ConcMgr,
    decode(SUPPORT_FORMS,'Y','YES', 'NO') Forms,
    decode(SUPPORT_WEB,'Y','YES', 'NO') WebServer,
    decode(SUPPORT_ADMIN, 'Y','YES', 'NO') Admin,
    decode(SUPPORT_DB, 'Y','YES', 'NO') Database
    from fnd_nodes
    where node_name != 'AUTHENTICATION' order by NODE_NAME;

Saturday, April 27, 2013

Kill all the O.S process of a particular user | kill -9

Want to kill all the O.S process that are running under particular user.

UNIX$ ps -aef  | grep -i shaik | awk '{print $2}' | sed 's/^/kill -9 /' > 1.txt
UNIX$./1.txt