Sponsored Content
Full Discussion: swap management with oracle
Operating Systems Solaris swap management with oracle Post 302218318 by itik on Friday 25th of July 2008 01:04:13 AM
Old 07-25-2008
swap management with oracle

Hi All,

How do I manage swap memory of solaris 8-9-10 with oracle application? Is it separate management with system and application?

Any idea or links will do or books recommendation.

Thanks in advance.
 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Oracle cluster management

Can anyone suggest tools to help in managing Oracle across a ServiceGuard cluster? This would be on HP-UX v2 on Integrity servers. Veritas clustering is NOT be used. I am interested in tools to assist in installation and maintenance of a database and the Oracle kernel across multiple nodes. ... (3 Replies)
Discussion started by: KEnglander
3 Replies

2. Solaris

Swap config - Mirror swap or not?

Hello and thanks in advance. I have a Sun box with raid 1 on the O/S disks using solaris svm. I want to unmirror my swap partition, and add the slice on the second disk as an additional swap device. This would give me twice as much swap space. I have been warned not to do this by some... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies

3. Red Hat

swap not defined as swap

free -m : 1023 total swap space created default partition /dev/sdb1 50M using fdisk. i did write the changes. #mkswap /dev/sdb1 #swapon /dev/sdb1 free -m : 1078 total swap space this shows that the swap is on Question : i did not change the type LINUX SWAP (82) in fdisk. so why is... (5 Replies)
Discussion started by: dplinux
5 Replies

4. HP-UX

Swap device file and swap sapce

Hi I have an integrity machine rx7620 and rx8640 running hp-ux 11.31. I'm planning to fine tune the system: - I would like to know when does the memory swap space spill over to the device swap space? - And how much % of memory swap utilization should be specified (swap space device... (6 Replies)
Discussion started by: lamoul
6 Replies

5. Solaris

Explain the output of swap -s and swap -l

Hi Solaris Folks :), I need to calculate the swap usage on solaris server, please let me understand the output of below swap -s and swap -l commands. $swap -s total: 1774912k bytes allocated + 240616k reserved = 2015528k used, 14542512k available $swap -l swapfile dev swaplo... (6 Replies)
Discussion started by: seenuvasan1985
6 Replies

6. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
smf_security(5) 					Standards, Environments, and Macros					   smf_security(5)

NAME
smf_security - service management facility security behavior DESCRIPTION
The configuration subsystem for the service management facility, smf(5), requires privilege to modify the configuration of a service. Priv- ileges are granted to a user by associating the authorizations described below to the user through user_attr(4) and prof_attr(4). See rbac(5). The following authorization is used to manipulate services and service instances. solaris.smf.modify Authorized to add, delete, or modify services, service instances, or their properties. Property Group Authorizations The smf(5) configuration subsystem associates properties with each service and service instance. Related properties are grouped. Groups may represent an execution method, credential information, application data, or restarter state. The ability to create or modify property groups can cause smf(5) components to perform actions that may require operating system privilege. Accordingly, the framework requires appropriate authorization to manipulate property groups. Each property group has a type corresponding to its purpose. The core property group types are method, dependency, application, and frame- work. Additional property group types can be introduced, provided they conform to the extended naming convention in smf(5). The following basic authorizations, however, apply only to the core property group types: solaris.smf.modify.method Authorized to change values or create, delete, or modify a property group of type method. solaris.smf.modify.dependency Authorized to change values or create, delete, or modify a property group of type dependency. solaris.smf.modify.application Authorized to change values or create, delete, or modify a property group of type application. solaris.smf.modify.framework Authorized to change values or create, delete, or modify a property group of type framework. solaris.smf.modify Authorized to add, delete, or modify services, service instances, or their properties. Property group-specific authorization can be specified by properties contained in the property group. modify_authorization Authorizations allow the addition, deletion, or modification of properties within the property group. value_authorization Authorizations allow changing the values of any property of the property group except modify_authorization. The above authorization properties are only used if they have type astring. If an instance property group does not have one of the proper- ties, but the instance's service has a property group of the same name with the property, its values are used. Service Action Authorization Certain actions on service instances may result in service interruption or deactivation. These actions require an authorization to ensure that any denial of service is a deliberate administrative action. Such actions include a request for execution of the refresh or restart methods, or placement of a service instance in the maintenance or other non-operational state. The following authorization allows such actions to be requested: solaris.smf.manage Authorized to request restart, refresh, or other state modification of any service instance. In addition, the general/action_authorization property can specify additional authorizations that permit service actions to be requested for that service instance. The solaris.smf.manage authorization is required to modify this property. Defined Rights Profiles Two rights profiles are included that offer grouped authorizations for manipulating typical smf(5) operations. Service Management A service manager can manipulate any service in the repository in any way. It corresponds to the solaris.smf.manage and solaris.smf.modify authorizations. The service management profile is the minimum required to use the pkgadd(1M) or pkgrm(1M) commands to add or remove software packages that contain an inventory of services in its service manifest. Service Operator A service operator has the ability to enable or disable any service instance on the system, as well as request that its restart or refresh method be executed. It corresponds to the solaris.smf.manage and solaris.smf.modify.framework authorizations. Sites can define additional rights profiles customized to their needs. Remote Repository Modification Remote repository servers may deny modification attempts due to additional privilege checks. See NOTES. SEE ALSO
auths(1), profiles(1), pkgadd(1M), pkgrm(1M), prof_attr(4), user_attr(4), rbac(5), smf(5) NOTES
The present version of smf(5) does not support remote repositories. SunOS 5.10 2 Dec 04 smf_security(5)
All times are GMT -4. The time now is 04:53 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy