参考文档 (1) SUSE 官方安装文档:Oracle database on SLES11 SP2 (PDF) (2) Oracle Online Book:Database Quick Installation
参考文档
(1) SUSE 官方安装文档:Oracle database on SLES11 SP2 (PDF)
(2) Oracle Online Book:Database Quick Installation Guide for Linux x86-64
免费下载地址在 (说明:此地址不是FTP,直接点击打开,输入用户名与密码)
用户名与密码都是
具体下载目录在 /2013年资料/7月/7日/SUSE11 SP2下Oracle 11g安装指南
-------------------------------------分割线-------------------------------------
1. 安装操作系统
2. 检查软件包
(1) 检查是否缺少需要的软件包
rpm -q binutils \
gcc \
gcc-32bit \
gcc-c++ \
glibc \
glibc-devel \
ksh \
libaio \
libaio-devel \
libstdc++33 \
libstdc++46 \
libstdc++43-devel \
libgcc46 \
libstdc++-devel \
make \
sysstat | grep "not installed"
(2) 挂载第一张操作系统光盘,安装缺少的软件包
mount /dev/scd0 /media
rpm -ivh /media/suse/x86_64/sysstat-8.1.5-7.32.1.x86_64.rpm
3. 创建ORACLE用户
groupadd oinstall
groupadd dba
groupadd oper
useradd -m -g oinstall -G dba,oper oracle
4. 修改Oracle用户资源限额
编辑/etc/security/limits.conf文件,在文件的最后追加如下内容:
oracle soft nproc 2047
oracle hard nproc 16384
oracle soft nofile 1024
oracle hard nofile 65536
oracle soft stack 10240
oracle hard stack 32768
编辑/etc/sysctl.conf文件,在文件最后追加如下内容:
fs.aio-max-nr = 1048576
fs.file-max = 6815744
kernel.shmall = 2097152
kernel.shmmax = 2147483648
kernel.shmmni = 4096
kernel.sem = 250 32000 100 128
net.ipv4.ip_local_port_range = 9000 65500
net.core.rmem_default = 262144
net.core.rmem_max = 4194304
net.core.wmem_default = 262144
net.core.wmem_max = 1048586
输入如下命令使内核配置参数生效
sysctl -p
重启网络使网络配置参数生效
service network restart
输入如下命令使参数在服务器重启后也生效
chkconfig boot.sysctl on
1 软件包检查
在SUSE 11上需要以下的软件包
说明:
在Oracle 11.2.0.2以前,所有的软件包均需安装64位版本和32位版本。
在Oracle 11.2.0.2以后,,除了gcc-32bit以外,其余软件包只需安装64位的版本。
rpm -q binutils \
gcc \
gcc-32bit \
gcc-c++ \
glibc \
glibc-devel \
ksh \
libaio \
libaio-devel \
libstdc++33 \
libstdc++46 \
libstdc++43-devel \
libgcc46 \
libstdc++-devel \
make \
sysstat
2 创建oracle用户
groupadd oinstall
groupadd dba
groupadd oper
useradd -m -g oinstall -G dba,oper oracle
相关阅读:Oracle 11g在SUSE 11上的安装

MySQLdiffersfromotherSQLdialectsinsyntaxforLIMIT,auto-increment,stringcomparison,subqueries,andperformanceanalysis.1)MySQLusesLIMIT,whileSQLServerusesTOPandOracleusesROWNUM.2)MySQL'sAUTO_INCREMENTcontrastswithPostgreSQL'sSERIALandOracle'ssequenceandt

MySQL partitioning improves performance and simplifies maintenance. 1) Divide large tables into small pieces by specific criteria (such as date ranges), 2) physically divide data into independent files, 3) MySQL can focus on related partitions when querying, 4) Query optimizer can skip unrelated partitions, 5) Choosing the right partition strategy and maintaining it regularly is key.

How to grant and revoke permissions in MySQL? 1. Use the GRANT statement to grant permissions, such as GRANTALLPRIVILEGESONdatabase_name.TO'username'@'host'; 2. Use the REVOKE statement to revoke permissions, such as REVOKEALLPRIVILEGESONdatabase_name.FROM'username'@'host' to ensure timely communication of permission changes.

InnoDB is suitable for applications that require transaction support and high concurrency, while MyISAM is suitable for applications that require more reads and less writes. 1.InnoDB supports transaction and bank-level locks, suitable for e-commerce and banking systems. 2.MyISAM provides fast read and indexing, suitable for blogging and content management systems.

There are four main JOIN types in MySQL: INNERJOIN, LEFTJOIN, RIGHTJOIN and FULLOUTERJOIN. 1.INNERJOIN returns all rows in the two tables that meet the JOIN conditions. 2.LEFTJOIN returns all rows in the left table, even if there are no matching rows in the right table. 3. RIGHTJOIN is contrary to LEFTJOIN and returns all rows in the right table. 4.FULLOUTERJOIN returns all rows in the two tables that meet or do not meet JOIN conditions.

MySQLoffersvariousstorageengines,eachsuitedfordifferentusecases:1)InnoDBisidealforapplicationsneedingACIDcomplianceandhighconcurrency,supportingtransactionsandforeignkeys.2)MyISAMisbestforread-heavyworkloads,lackingtransactionsupport.3)Memoryengineis

Common security vulnerabilities in MySQL include SQL injection, weak passwords, improper permission configuration, and unupdated software. 1. SQL injection can be prevented by using preprocessing statements. 2. Weak passwords can be avoided by forcibly using strong password strategies. 3. Improper permission configuration can be resolved through regular review and adjustment of user permissions. 4. Unupdated software can be patched by regularly checking and updating the MySQL version.

Identifying slow queries in MySQL can be achieved by enabling slow query logs and setting thresholds. 1. Enable slow query logs and set thresholds. 2. View and analyze slow query log files, and use tools such as mysqldumpslow or pt-query-digest for in-depth analysis. 3. Optimizing slow queries can be achieved through index optimization, query rewriting and avoiding the use of SELECT*.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
