一 什么是SMON进程 The systemmonitor performs recovery when a failed instance starts up again. In an OracleReal Application Clusters database, the SMON process of one instance canperform instance recovery for other instances that have faile
一 什么是SMON进程
The systemmonitor performs recovery when a failed instance starts up again. In an OracleReal Application Clusters database, the SMON process of one instance canperform instance recovery for other instances that have failed. SMON alsocleans up temporary segments that are no longer in use and recovers deadtransactions skipped during system failure and instance recovery because offile-read or offline errors. These transactions are eventually recovered bySMON when the tablespace or file is brought back online.
作用:
实例恢复
前滚所有重做日志中的改变
打开数据库为了用户能访问
回滚没有提交的事务
接合自由的空间(Coalesce every three secons)
释放临时表空间(Deal Located)
二 操作示例
SQL> startup force; ORACLE instance started. Total System Global Area 838860800 bytes Fixed Size 1222192 bytes Variable Size 775948752 bytes Database Buffers 58720256 bytes Redo Buffers 2969600 bytes Database mounted. Database opened. SQL> startup force mount; ORACLE instance started. Total System Global Area 838860800 bytes Fixed Size 1222192 bytes Variable Size 775948752 bytes Database Buffers 58720256 bytes Redo Buffers 2969600 bytes Database mounted. --出现此问题:关闭数据库,然后重启 SQL> alter database archivelog; alter database archivelog * ERROR at line 1: ORA-00265: instance recovery required, cannot set ARCHIVELOG mode SQL> shutdown immediate; ORA-01109: database not open Database dismounted. ORACLE instance shut down. SQL> startup; ORACLE instance started. Total System Global Area 838860800 bytes Fixed Size 1222192 bytes Variable Size 775948752 bytes Database Buffers 58720256 bytes Redo Buffers 2969600 bytes Database mounted. Database opened. SQL> shutdown mount; SP2-0717: illegal SHUTDOWN option SQL> shutdown immediate; Database closed. Database dismounted. ORACLE instance shut down. SQL> startup mount; ORACLE instance started. Total System Global Area 838860800 bytes Fixed Size 1222192 bytes Variable Size 775948752 bytes Database Buffers 58720256 bytes Redo Buffers 2969600 bytes Database mounted. SQL> alter database noarchivelog; Database altered. SQL> alter database open; Database altered.
三 总结
1. SMON:系统监控进程,静态注册监听
2.SMON作用:实例恢复、接合自由的空间(Coalesceevery three secons)、
释放临时表空间(Deal Located)
<span><span>我的邮箱</span></span><span>:</span>wgbno27@163.com <span> <span>新浪微博</span></span><span>:</span>@Wentasy27 <span>微信公众平台</span>:JustOracle(微信号:justoracle) <span>IT交流群</span>:336882565(加群时验证 From CSDN XXX) <span>Oracle交流讨论组</span>:https://groups.google.com/d/forum/justoracle <span><strong>By Larry Wen</strong></span>
![]() |
![]() ![]() |
@Wentasy |

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQloffersechar, Varchar, text, Anddenumforstringdata.usecharforfixed-Lengthstrings, VarcharerForvariable-Length, text forlarger text, AndenumforenforcingdataAntegritywithaetofvalues.

Optimizing MySQLBLOB requests can be done through the following strategies: 1. Reduce the frequency of BLOB query, use independent requests or delay loading; 2. Select the appropriate BLOB type (such as TINYBLOB); 3. Separate the BLOB data into separate tables; 4. Compress the BLOB data at the application layer; 5. Index the BLOB metadata. These methods can effectively improve performance by combining monitoring, caching and data sharding in actual applications.

Mastering the method of adding MySQL users is crucial for database administrators and developers because it ensures the security and access control of the database. 1) Create a new user using the CREATEUSER command, 2) Assign permissions through the GRANT command, 3) Use FLUSHPRIVILEGES to ensure permissions take effect, 4) Regularly audit and clean user accounts to maintain performance and security.

ChooseCHARforfixed-lengthdata,VARCHARforvariable-lengthdata,andTEXTforlargetextfields.1)CHARisefficientforconsistent-lengthdatalikecodes.2)VARCHARsuitsvariable-lengthdatalikenames,balancingflexibilityandperformance.3)TEXTisidealforlargetextslikeartic

Best practices for handling string data types and indexes in MySQL include: 1) Selecting the appropriate string type, such as CHAR for fixed length, VARCHAR for variable length, and TEXT for large text; 2) Be cautious in indexing, avoid over-indexing, and create indexes for common queries; 3) Use prefix indexes and full-text indexes to optimize long string searches; 4) Regularly monitor and optimize indexes to keep indexes small and efficient. Through these methods, we can balance read and write performance and improve database efficiency.

ToaddauserremotelytoMySQL,followthesesteps:1)ConnecttoMySQLasroot,2)Createanewuserwithremoteaccess,3)Grantnecessaryprivileges,and4)Flushprivileges.BecautiousofsecurityrisksbylimitingprivilegesandaccesstospecificIPs,ensuringstrongpasswords,andmonitori


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Atom editor mac version download
The most popular open source editor

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.
