Oracle security 08-oracle network securityZhaoyang Wang
The document discusses securing Oracle Network services. It provides checklists and procedures for securing clients, the network, and the listener. It recommends configuring clients and browsers with authentication and encryption. It also recommends restricting network access through firewalls and IP address validation. For the listener, it suggests restricting privileges, password protecting administration, and monitoring logs to analyze activity and potential attacks. The goal is to describe how to securely administer the network and listener to restrict access and analyze logs for security.
Oracle security 02-administering user securityZhaoyang Wang
This document discusses administering user security in an Oracle database. It covers how to create and manage database user accounts, including authenticating users and assigning privileges. It also covers creating and managing roles to simplify privilege management, and creating profiles to implement password security and control resource usage. Profiles allow enforcing standards for password complexity, aging, locking accounts, and limiting resource consumption. The document stresses applying the principle of least privilege and separating administrative duties for security.
This document provides a comprehensive overview of the H3C Cloud CMP (Cloud Management Platform), focusing on its capabilities for managing multi-cloud environments. It includes detailed explanations of the platform's features, architecture, and use cases, highlighting how it simplifies cloud resource management, enhances operational efficiency, and ensures seamless integration across private and public cloud infrastructures.
This document provides a comprehensive overview of the H3C Cloud CMP (Cloud Management Platform), focusing on its capabilities for managing multi-cloud environments. It includes detailed explanations of the platform's features, architecture, and use cases, highlighting how it simplifies cloud resource management, enhances operational efficiency, and ensures seamless integration across private and public cloud infrastructures.
MySQL 5.7 includes several new features that improve performance, replication, and high availability. Key features include performance improvements from the performance schema and optimizer enhancements, replication improvements like multi-source replication and transaction-based parallel replication, and InnoDB improvements such as online operations and general tablespaces.
SQL Tuning02-Intorduction to the CBO OptimizerZhaoyang Wang
This document provides an introduction to the Cost-Based Oracle Optimizer (CBO). It describes the main components of the CBO including the estimator, plan generator, and OPTIMIZER_MODE. It also discusses important CBO concepts like selectivity, cardinality, cost and how they are estimated. The document provides examples of how to view CBO statistics and use 10053 tracing to analyze plans.
SQL Tuning04-Interpreting Execution PlansZhaoyang Wang
This document discusses various methods for interpreting SQL execution plans in Oracle databases, including using the PLAN_TABLE, views like V$SQL_PLAN, and tools like DBMS_XPLAN and AUTOTRACE. It also covers gathering plan statistics and interpretation from sources like the Automatic Workload Repository (AWR).
SQL Tuning01-Introduction to SQL TuningZhaoyang Wang
This document provides an introduction to SQL tuning. It discusses common causes of poor SQL performance such as stale statistics, missing indexes, and suboptimal execution plans. It then describes Oracle tools that can be used for SQL tuning such as the Automatic Database Diagnostic Monitor and SQL Tuning Advisor. Various SQL performance metrics are covered like wait time and how it relates to CPU and I/O times. Common SQL performance problems are also listed like parsing issues, full table scans, and redo log configuration errors. Finally, techniques for SQL tuning are discussed such as query rewrites, materialized views, and cursor sharing.
This document provides an overview of MySQL full-text search capabilities. It discusses the three types of full-text searches supported: natural language, boolean, and query expansion searches. It also covers stopwords, relevance ranking calculations, and techniques for fine-tuning full-text search performance such as configuring minimum/maximum word lengths and optimizing indexes. The document concludes with some restrictions and best practices for MySQL full-text search.
The document summarizes the key data structures used to organize data in InnoDB:
- InnoDB stores data in tablespaces which consist of data files. A tablespace header tracks free/used extents within these files.
- Data files contain fixed-size pages which are organized into extents of 1MB each. Page headers identify page types like interior, leaf, etc.
- File segments allocate ranges of pages to index trees. The root node of each index references two segment headers to allocate leaf/non-leaf pages separately.
MYSQLCLONE is a free and simple tool used to clone MySQL databases from one server to another. It can transfer the entire database including data, schemas, stored procedures, functions and events. The tool connects to the source and destination databases using connection parameters and then transfers the database objects and data in either LOAD or INSERT mode. Quick usage examples are provided to demonstrate transferring the full database, schema objects only, and row data in INSERT mode.