search
HomeDatabaseMysql Tutorial基于Linux平台的Oracle RAC 10g集群教程:添加节点所需要的步骤

在多数业务中,基于Linux平台Oracle 真正应用集群 (RAC) 配置的主要业务要求是整个系统中数据库层的可伸缩性 mdash; 这样,当用

在多数业务中,基于Linux平台Oracle 真正应用集群 (RAC) 配置的主要业务要求是整个系统中数据库层的可伸缩性 — 这样,当用户数增加时,可将额外实例添加到该集群来分发该负载。

在 Oracle RAC 10g 中,这个特定的功能已经变得更加容易。当节点/实例变成可用状态后,Oracle 即可通过必需的几个设置步骤来包含这个即插即用功能。

在本文中,我将讨论将节点添加到现有 Oracle RAC 10g 第 2 版集群所需的步骤。

当前环境

    出于演示目的,我们这里的环境是一个四节点的 Rd Hat Linux 集群。该任务是添加一个附加节点,从而使它成为一个五节点集群。

数据库名

节点编号

数据库版本

实例编号

操作系统内核版本

文件系统

集群管理器

SSKYDB

四个节点 — oradb1、oradb2、oradb3 和 oradb4

10.2.0.1

四个实例 — SSKY1、SSKY2、SSKY3 和 SSKY4

Red Hat Enterprise Linux AS 3
Linux sumsky.net 2.4.21-32.ELsmp

OCFS 1.0 和 ASM

Oracle 集群件

该过程将通过以下 7 个步骤实现:

  • 考虑依赖性和前提条件
  • 配置网络组件
  • 安装 Oracle 集群件
  • 配置 Oracle 集群件
  • 安装 Oracle 软件
  • 添加新实例(一个或多个)
  • 执行日常管理任务

  • 第 1 步:考虑依赖性和前提条件

        任何软件安装或升级的第一个主要步骤都是确保系统的完整备份可用,包括操作系统和数据文件。下一步是验证系统要求、操作系统版本和所有应用程序补丁级别。

        新节点应该具有与现有节点相同的操作系统版本,包括 Oracle 所需的所有补丁。在这个示例中,由于驻留在节点 1 到 4 上的操作系统是 Red Hat Enterprise Linux 3,,因此新节点也应该具有该版本。此外,为了维持当前命名惯例,应该将新节点称为 oradb5。

    除了基本的操作系统外,还应该安装 Oracle 需要的以下程序包:

    [root@oradb5 root]# rpm -qa | grep -i gcccompat-gcc-c++-7.3-2.96.128compat-gcc-7.3-2.96.128libgcc-3.2.3-42gcc-3.2.3-42[root@oradb5 root]# rpm -qa | grep -i openmotifopenmotif-2.2.3-3.RHEL3openmotif21-2.1.30-8[root@oradb5 root]# rpm -qa | grep -i glibcglibc-2.3.3-74glibc-utils-2.3.3-74glibc-kernheaders-2.4-8.34.1glibc-common-2.3.3-74glibc-headers-2.3.3-74glibc-devel-2.3.3-74[root@oradb5 root]# rpm -qa | grep -i compatcompat-libstdc++-7.3-2.96.128compat-gcc-c++-7.3-2.96.128compat-gcc-7.3-2.96.128compat-db-4.0.14-5compat-libstdc++-devel-7.3-2.96.128[root@oradb5 root]#

    使用以下值更新内核参数。

    kernel.core_uses_pid = 1kernel.hostname = oradb5.sumsky.netkernel.domainname = sumsky.netkernel.shmall = 2097152#kernel.shmmax = 536870912kernel.shmmax = 2147483648kernel.shmmni = 4096kernel.shmseg = 4096kernel.sem = 250 32000 100 150kernel.msgmnl = 2878kernel.msgmnb = 65535fs.file-max = 65536net.ipv4.ip_local_port_range = 1024 65000net.core.rmem_default = 262144net.core.wmem_default = 262144net.core.rmem_max = 262144net.core.wmem_max = 262144

    将下列参数添加到 /etc/security/limits.conf。

    oracle soft nproc 2047 oracle hard nproc 16384 oracle soft nofile 1024 oracle hard nofile 65536

    将设备添加到 /etc/fstab — 将设备定义从现有节点之一复制到 oradb5。

    [root@oradb5 root]$ more /etc/fstabLABEL=/ / ext3 defaults 1 1none /dev/pts devpts gid=5,mode=620 0 0none /proc proc defaults 0 0none /dev/shm tmpfs defaults 0 0/dev/sda2 swap swap defaults 0 0/dev/cdrom /mnt/cdrom udf,iso9660 noauto,owner,kudzu,ro 0 0/dev/fd0 /mnt/floppy auto noauto,owner,kudzu 0 0/dev/sdb5 /u01 ocfs _netdev 0 0/dev/sdb6 /u02 ocfs _netdev 0 0/dev/sdb7 /u03 ocfs _netdev 0 0/dev/sdb8 /u04 ocfs _netdev 0 0/dev/sdb9 /u05 ocfs _netdev 0 0/dev/sdb10 /u06 ocfs _netdev 0 0/dev/sdb14 /u14 ocfs _netdev 0 0

    linux

    Statement
    The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
    What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

    MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

    Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

    ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

    What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

    MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

    MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

    Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

    MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

    Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

    MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

    MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

    MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

    ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

    MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

    ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

    See all articles

    Hot AI Tools

    Undresser.AI Undress

    Undresser.AI Undress

    AI-powered app for creating realistic nude photos

    AI Clothes Remover

    AI Clothes Remover

    Online AI tool for removing clothes from photos.

    Undress AI Tool

    Undress AI Tool

    Undress images for free

    Clothoff.io

    Clothoff.io

    AI clothes remover

    Video Face Swap

    Video Face Swap

    Swap faces in any video effortlessly with our completely free AI face swap tool!

    Hot Article

    Hot Tools

    SublimeText3 Linux new version

    SublimeText3 Linux new version

    SublimeText3 Linux latest version

    SecLists

    SecLists

    SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

    ZendStudio 13.5.1 Mac

    ZendStudio 13.5.1 Mac

    Powerful PHP integrated development environment

    DVWA

    DVWA

    Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

    Notepad++7.3.1

    Notepad++7.3.1

    Easy-to-use and free code editor