search
HomeDatabaseMysql Tutorial【翻译自mos文章】修改被DBControl监控的db(10gand11g)中dbsnm

修改被 DB Control 监控的db (10g and 11g)中 dbsnmp密码的方法 参考原文: How to Change DBSNMP Password in Database 10g and 11g Monitored by DB Control (Doc ID 259387.1) 适用于: Enterprise Manager for Oracle Database - Version 10.1.0.4 to

修改被 DB Control 监控的db (10g and 11g)中 dbsnmp密码的方法

参考原文:
How to Change DBSNMP Password in Database 10g and 11g Monitored by DB Control (Doc ID 259387.1)

适用于:
Enterprise Manager for Oracle Database - Version 10.1.0.4 to 11.2.0.3 [Release 10.1 to 11.2]
Information in this document applies to any platform.

目的:
当10g 和 11g的 db被DB Control 监控时, 修改 该db中的dbsnmp用户密码的方法。
ATTENTION: Enterprise Manager 10g is now in extended support. Oracle strongly recommends that you upgrade your environment to either Enterprise Manager 11g or 12c, both of which are still in premier Support.

范围:
所有使用db control 来监控他们的10g or 11g db 的数据库管理员

细节:
修改dbsnmp密码时,你必须严格遵守下面的步骤,否则 管理你的db的 10g or 11g DB Control 会运行异常。

注意: 对于安装在Windows 2008 / Vista上的 DB Control Release 10.2.0.3 以及更高版本,emctl命令可能会失败,报错为 "Permission Denied".
请参考下面的文章来解决此报错:
Document 1164293.1 - Executing Any EMCTL Command on Windows 2008 / Vista Returns "Permission denied" Error

1.stop the standalone dbconsole

On Unix - DB Control Release up to 11.1.x
$ export ORACLE_SID=
$ emctl stop dbconsole

On Unix - DB Control Release 11.2.x and higher
$ export ORACLE_SID=
$ export ORACLE_UNQNAME=
$ emctl stop dbconsole

On Windows - DB Control Release up to 11.1.x
Stop the Windows Service OracleDBConsole
Or
Open a DOS Command Window and type
C> set ORACLE_SID=
C> set ORACLE_HOME=
C> cd %ORACLE_HOME%/bin
C> emctl stop dbconsole

On Windows - DB Control Release 11.2.x and higher
Stop the Windows Service OracleDBConsole
Or
Open a DOS Command Window and type
C> set ORACLE_SID=
C> set ORACLE_UNQNAME=
C> set ORACLE_HOME=
C> cd %ORACLE_HOME%/bin
C> emctl stop dbconsole

2. 检查DB Control 已经被停止
On Unix
$ emctl status dbconsole

On Windows
Check the status of the Windows Service OracleDBConsole
Or
Open a DOS Command Window, cd to the database $ORACLE_HOME\bin and type
C> emctl status dbconsole

3.以dba权限登陆sqlplus,执行如下语句:--->登陆进去的这个db是受监控端的db。
SQL> alter user dbsnmp identified by ;

4.确认新密码能连接:
SQL> connect dbsnmp/[@database_alias]

5.到$ORACLE_HOME/host_sid/sysman/emd目录下----->本步骤应该是在 standalone dbconsole主机上操作吧?
5.1 将targets.xml文件复制为targets.xml.orig
5.2 用文本编辑器编辑targets.xml文件
5.2.1 找下面的行:

5.2.2 用新密码替换掉加密后的值
5.3.3 用FALSE替换掉TRUE
5.3 重启standalone dbconsole

On Unix - DB Control Release up to 11.1.x
$ export ORACLE_SID=
$ emctl start dbconsole


On Unix - DB Control Release 11.2.x and higher
$ export ORACLE_SID=
$ export ORACLE_UNQNAME=
$ emctl start dbconsole


On Windows - DB Control Release up to 11.1.x
Start the Windows Service OracleDBConsole
Or
Open a DOS Command Window and type
C> set ORACLE_SID=
C> set ORACLE_HOME=
C> cd %ORACLE_HOME%/bin
C> emctl start dbconsole


On Windows - DB Control Release 11.2.x and higher
Start the Windows Service OracleDBConsole
Or
Open a DOS Command Window and type
C> set ORACLE_SID=
C> set ORACLE_UNQNAME=
C> set ORACLE_HOME=
C> cd %ORACLE_HOME%/bin
C> emctl start dbconsole

5.4 确认密码已经被加密
查看targets.xml
搜索:
检查 密码value 已经被加密
检查ENCRYPTED 的value 是TRUE

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What are the differences in syntax between MySQL and other SQL dialects?What are the differences in syntax between MySQL and other SQL dialects?Apr 27, 2025 am 12:26 AM

MySQLdiffersfromotherSQLdialectsinsyntaxforLIMIT,auto-increment,stringcomparison,subqueries,andperformanceanalysis.1)MySQLusesLIMIT,whileSQLServerusesTOPandOracleusesROWNUM.2)MySQL'sAUTO_INCREMENTcontrastswithPostgreSQL'sSERIALandOracle'ssequenceandt

What is MySQL partitioning?What is MySQL partitioning?Apr 27, 2025 am 12:23 AM

MySQL partitioning improves performance and simplifies maintenance. 1) Divide large tables into small pieces by specific criteria (such as date ranges), 2) physically divide data into independent files, 3) MySQL can focus on related partitions when querying, 4) Query optimizer can skip unrelated partitions, 5) Choosing the right partition strategy and maintaining it regularly is key.

How do you grant and revoke privileges in MySQL?How do you grant and revoke privileges in MySQL?Apr 27, 2025 am 12:21 AM

How to grant and revoke permissions in MySQL? 1. Use the GRANT statement to grant permissions, such as GRANTALLPRIVILEGESONdatabase_name.TO'username'@'host'; 2. Use the REVOKE statement to revoke permissions, such as REVOKEALLPRIVILEGESONdatabase_name.FROM'username'@'host' to ensure timely communication of permission changes.

Explain the differences between InnoDB and MyISAM storage engines.Explain the differences between InnoDB and MyISAM storage engines.Apr 27, 2025 am 12:20 AM

InnoDB is suitable for applications that require transaction support and high concurrency, while MyISAM is suitable for applications that require more reads and less writes. 1.InnoDB supports transaction and bank-level locks, suitable for e-commerce and banking systems. 2.MyISAM provides fast read and indexing, suitable for blogging and content management systems.

What are the different types of JOINs in MySQL?What are the different types of JOINs in MySQL?Apr 27, 2025 am 12:13 AM

There are four main JOIN types in MySQL: INNERJOIN, LEFTJOIN, RIGHTJOIN and FULLOUTERJOIN. 1.INNERJOIN returns all rows in the two tables that meet the JOIN conditions. 2.LEFTJOIN returns all rows in the left table, even if there are no matching rows in the right table. 3. RIGHTJOIN is contrary to LEFTJOIN and returns all rows in the right table. 4.FULLOUTERJOIN returns all rows in the two tables that meet or do not meet JOIN conditions.

What are the different storage engines available in MySQL?What are the different storage engines available in MySQL?Apr 26, 2025 am 12:27 AM

MySQLoffersvariousstorageengines,eachsuitedfordifferentusecases:1)InnoDBisidealforapplicationsneedingACIDcomplianceandhighconcurrency,supportingtransactionsandforeignkeys.2)MyISAMisbestforread-heavyworkloads,lackingtransactionsupport.3)Memoryengineis

What are some common security vulnerabilities in MySQL?What are some common security vulnerabilities in MySQL?Apr 26, 2025 am 12:27 AM

Common security vulnerabilities in MySQL include SQL injection, weak passwords, improper permission configuration, and unupdated software. 1. SQL injection can be prevented by using preprocessing statements. 2. Weak passwords can be avoided by forcibly using strong password strategies. 3. Improper permission configuration can be resolved through regular review and adjustment of user permissions. 4. Unupdated software can be patched by regularly checking and updating the MySQL version.

How can you identify slow queries in MySQL?How can you identify slow queries in MySQL?Apr 26, 2025 am 12:15 AM

Identifying slow queries in MySQL can be achieved by enabling slow query logs and setting thresholds. 1. Enable slow query logs and set thresholds. 2. View and analyze slow query log files, and use tools such as mysqldumpslow or pt-query-digest for in-depth analysis. 3. Optimizing slow queries can be achieved through index optimization, query rewriting and avoiding the use of SELECT*.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use