This document discusses using the Enterprise Manager Command Line Interface (EM CLI) to administer Oracle databases. It provides an overview of the EM CLI and important commands, such as getting job information, executing SQL, managing targets, and submitting procedure scripts. The EM CLI allows administrators to simplify management tasks across multiple databases through scripting and automation.
A technical overview of PowerShell. See http://blogs.msdn.com/allandcp/archive/2009/03/11/powershell-to-the-people-the-aftermath.aspx for more background and resources.
This document contains biographical information about Boulos Dib, an independent consultant specializing in software development. It provides details about Dib's early experience with personal computers and programming languages. It also lists upcoming presentations by Dib on LightSwitch and Silverlight at the NYC Code Camp in October 2011. The document concludes with an overview of PowerShell scripting.
This document provides an overview and agenda for a presentation on Windows PowerShell. It introduces PowerShell concepts like the interactive shell, cmdlets, objects, variables, operators, and scripting best practices. It also demonstrates how to work with different object types like WMI, COM, and .NET objects from within PowerShell scripts. The goal is to familiarize attendees with PowerShell scripting and automation capabilities.
This document provides an overview of Windows PowerShell, including:
- What PowerShell is and its benefits over traditional command prompts
- The PowerShell architecture including hosts, runspaces, providers, and the pipeline
- Common PowerShell cmdlets, parameters, and how to get help
- Working with PowerShell objects, formatting output, and using providers
- Basic PowerShell scripting concepts like variables, arrays, and conditional logic
- Install Python 2.5 or 2.6 and SQLAlchemy 0.5 using easy_install
- Michael Bayer created SQLAlchemy and is a software architect in New York City
- SQLAlchemy allows modeling database queries and relationships between objects in a more Pythonic way compared to raw SQL
This document provides an overview of a PowerShell Basics training session. It discusses the curriculum, which will cover topics like the basics of PowerShell, cmdlets, piping, and scripting over 4 days. It highlights why PowerShell is useful for system administrators by providing a simplified syntax and being more secure than VBScript. PowerShell allows familiar commands and integrates with Microsoft products like Windows, Exchange, and SQL Server.
Introduction to SQLAlchemy and Alembic MigrationsJason Myers
In this talk, we'll examine how to use SQLAlchemy ORM and Core in both simple queries and query builder type applications. Next, we'll explore Alembic database migrations and how we can use them to handle database changes.
SQLAlchemy is a popular database framework that provides an ORM and a schema centric query language, and in this talk we will take a look how to get started with the ORM. We'll learn how to establish connections to popular databases such as PostgreSQL and MySQL. Then we will look at how to define our models as user classes including relationships and persist them to the database. Next, we'll cover the how the SQLAlchemy session works with typical create, update, read, and delete operations. We'll wrap up with pointers of where to go next to learn more.
With more and more sites falling victim to data theft, you've probably read the list of things (not) to do to write secure code. But what else should you do to make sure your code and the rest of your web stack is secure ? In this tutorial we'll go through the basic and more advanced techniques of securing your web and database servers, securing your backend PHP code and your frontend javascript code. We'll also look at how you can build code that detects and blocks intrusion attempts and a bunch of other tips and tricks to make sure your customer data stays secure.
The document discusses various common attacks that hackers use such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and session hijacking. It provides examples of each attack and recommendations for how to prevent them, including input validation, output escaping, prepared statements, and other secure coding practices. The document also covers securing the web application stack and using intrusion detection systems like OSSEC, Snort, and Kismet to detect attacks.
This document introduces the Flask micro web framework. It discusses that Flask provides URL routing, request and response objects, template engines and other features for web development. Flask is simple and extensible, using Werkzeug and Jinja2. It does not include an ORM or form validation, but supports extensions. The document provides examples of basic routing, using request objects, templates and the development server. It also discusses using SQLAlchemy, WTForms and common patterns like MVC with Flask projects.
With more and more sites falling victim to data theft, you've probably read the list of things (not) to do to write secure code. But what else should you do to make sure your code and the rest of your web stack is secure ? In this tutorial we'll go through the basic and more advanced techniques of securing your web and database servers, securing your backend PHP code and your frontend javascript code. We'll also look at how you can build code that detects and blocks intrusion attempts and a bunch of other tips and tricks to make sure your customer data stays secure.
This document provides an overview of Flask basics including:
- Setting up a basic Flask application with routes and templates
- Using decorators like @app.route to define routes
- Rendering templates and passing context between routes and templates
- Handling HTTP methods like GET and POST
- Using url_for to generate URLs and Jinja templates
- Testing Flask applications using the pytest framework
This document discusses dependency injection in Spring Framework. It covers setter injection, constructor injection, and method injection using both XML and annotation-based configurations. Setter injection allows injecting dependencies into properties through setter methods. Constructor injection injects dependencies through a class's constructor. Method injection replaces or augments existing methods at runtime. Both setter and constructor injection can be used with XML's <property> and <constructor-arg> tags or with annotations like @Autowired on setter methods or constructors. Method injection replaces or augments methods using the <replaced-method> or <lookup-method> tags in XML.
I present four design patterns that make your development easier and better. Design patterns are a fantastic way to make more readable code, as they make use of common ideas that many developers know and use. These patterns are tried and tested in the enterprise world.
The first one is dependency injection. This covers putting the variables that a class needs to function preferably inside a constructor.
The second one is the factory pattern. A factory moves the responsibility of instantiating an object to a third-party class.
The third one is dependency injection. This allows us to place a class' dependencies at one time, making it easy to come back and see what the class needs to survive.
Finally, we discuss the chain of responsibility. This allows complex operations to be handled by a chain of classes. Each class in the chain determines whether it is capable of handling the request and, if so, it returns the result.
The document provides an overview of new features, changes, deprecations, and removals in PHP 7, as well as how to install PHP 7. Key points covered include:
1. New features such as scalar type hints, return type declarations, the spaceship operator, null coalesce operator, and anonymous classes.
2. Changes like improved performance, uniform variable syntax, semi-reserved keywords, and exceptions being thrown for fatal errors.
3. Deprecated features such as PHP 4 constructors and the salt option for password_hash.
4. Removed features like alternative PHP tags and the date.timezone warning.
5. Installing PHP 7 via packages, compiling from source, or
탑크리에듀교육센터(www.topcredu.co.kr)제공
스프링프레임워크 & 마이바티스(Spring Framework, MyBatis)
18번째 자료입니다. 참고하시어 많은 도움되셨길 바랍니다.
교육 및 수강문의/기타문의사항은 홈페이지(www.topcredu.co.kr)를 통하여 하실 수 있습니다.^^
The document discusses using the Enterprise Manager Command Line Interface (EM CLI) to automate tasks in Oracle Enterprise Manager 12c. It provides an overview of the EM CLI's history and capabilities. It then demonstrates some basic EM CLI commands for checking incidents, retrieving target information, managing agents, creating blackouts, executing commands, and submitting procedural scripts. The presentation aims to introduce administrators to the EM CLI and how it can simplify managing large enterprise environments.
SDC - Programming the CLR in SQL Server 2005.ppt (1.51 MB)webhostingguy
This document provides an overview of programming the Common Language Runtime (CLR) in SQL Server 2005. It discusses how CLR integration works, the different ways to use managed code like C# in SQL Server through stored procedures, functions, triggers and other means. It also covers deployment, monitoring, performance considerations and questions.
Sunil phani's take on windows powershellSunil Phani
This document provides an overview of a Windows PowerShell course. It discusses topics such as why PowerShell is useful, file and folder management with PowerShell, cmdlets, variables and objects, the PowerShell pipeline, formatting output, exporting and importing data, and managing Active Directory with PowerShell. The document also covers more advanced topics like scripting, functions, error handling, and regular expressions in PowerShell scripts.
This webcast will show you how to properly configure and deploy Memcached and Solr on Windows, including all the required Drupal integration. The webcast includes also instructions on proper configuration of your Drupal cron tasks for Solr indexing in conjunction with Windows Task Scheduler.
Monitor Agile PLM Performance
Is your Agile PLM environment starting to slow down or are you looking to monitor its performance? There are a number of tools out there to help with this, including the Java Console that comes with the Java Development Kit (JDK). This blog will provide basic instructions on how to enable the Agile PLM server deployment for remote monitoring.
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012Scott Sutherland
During this presentation attendees will be introduced to lesser known, yet significant vulnerabilities in SQL Server implementations related to common trust relationships, misconfigurations, and weak default settings. The issues that will be covered are often leveraged by attackers to gain unauthorized access to high value systems, applications, and sensitive data. An overview of each issue, common vectors of attack, and manual techniques will be covered. Finally newly created Metasploit modules and TSQL scripts will be demonstrated that help automate the attacks. This presentation will be valuable to penetration testers who are looking for faster ways to gain access to critical data and systems. Additionally, it should be worth while for developers and database administrators who are interested in gaining a better understanding of how to protect their applications and databases from these attacks.
More security blogs by the authors can be found @
https://www.netspi.com/blog/
The document outlines new features in Oracle Solaris 11.1, including enhancements to installation, system configuration, virtualization, security, networking, data management, and the kernel/platform. Over 300 performance and feature enhancements are included. Specific improvements mentioned are parallel zone updates for faster maintenance, zones on shared storage for easy mobility, per-zone file system statistics for monitoring individual zones, and network features like edge virtual bridging and data center bridging.
Using Jenkins in nower days you have to learn all about using Pipelines. This presentation shows how to user Jenkins Pipelines inside Oracle Projects.
The Presentation was held on the DOAG Conference 2019 in nuremberg.
SAP strikes back Your SAP server now counter attacks.Dmitry Iudin
In this presentation, we will demonstrate how attackers can compromise all SAP clients and gain private information from their machines by using the SAP server.
PowerCLI is a PowerShell snap-in that adds VMware vSphere automation capabilities. It provides over 250 cmdlets for common vSphere administration tasks like automating ESXi host deployment and configuration, provisioning and configuring virtual machines, managing vCenter server configuration including folders, permissions and alarms, performing backups and disaster recovery, and generating reports. The presenters demonstrate how to use PowerCLI to automate the setup of a new DR site within an hour, including automating ESXi host installation, configuring vCenter server, provisioning virtual machines, and enabling monitoring and reporting.
Airflow is a workflow management system for authoring, scheduling and monitoring workflows or directed acyclic graphs (DAGs) of tasks. It has features like DAGs to define tasks and their relationships, operators to describe tasks, sensors to monitor external systems, hooks to connect to external APIs and databases, and a user interface for visualizing pipelines and monitoring runs. Airflow uses a variety of executors like SequentialExecutor, CeleryExecutor and MesosExecutor to run tasks on schedulers like Celery or Kubernetes. It provides security features like authentication, authorization and impersonation to manage access.
Watch Re-runs on your SQL Server with RML Utilitiesdpcobb
RML Utilities provide command line tools and interactive reports enabling you to:
Take SQL trace files (captured with SQL Profiler, sp_trace or extended events in SQL 2012+),
Process them into replayable RML files (using readtrace.exe),
Play them back in a different SQL environment (using ostress.exe),
And compare the performance at a granular level (using reporter.exe or custom queries).
The document provides an introduction to performance tuning. It discusses tracing SQL execution to analyze performance issues. Tracing can be done at different levels, and the tkprof utility helps analyze trace files by providing formatted output. Understanding execution plans is also an important part of performance tuning, as it shows the steps and cost of executing a SQL statement.
20201010 - Collabdays 2020 - Sandro Pereira - Power Automates: best practice...Sandro Pereira
In this session, we will do a reflection to your existing Power Automation flow’s and when thru a list of must-have best practices, tips, and tricks that will allow you to build more reliable and effective flows. At the same time, these will allow you to be more productive and document your flow’s from the beginning.
TROOPERS 20 - SQL Server Hacking Tips for Active Directory EnvironmentsScott Sutherland
During this presentation, I’ll cover common ways to target, exploit, and escalate domain privileges through SQL Servers in Active Directory environments. I’ll also share a msbuild.exe project file that can be used as an offensive SQL Client during red team engagements when tools like PowerUpSQL are too overt.
Where there is Active Directory, there are SQL Servers. In dynamic enterprise environments it’s common to see both platforms suffer from misconfigurations that lead to unauthorized system and sensitive data access. During this presentation, I’ll cover common ways to target, exploit, and escalate domain privileges through SQL Servers in Active Directory environments. I’ll also share a msbuild.exe project file that can be used as an offensive SQL Client during red team engagements when tools like PowerUpSQL are too overt.
Ajuste (tuning) del rendimiento de SQL Server 2008Eduardo Castro
En el siguiente webcast http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032438450&Culture=es-AR analizamos las herramientas de desempeño de SQL Server 2008 y cómo utilizarlas.
Saludos,
Ing. Eduardo Castro Martínez, PhD – Microsoft SQL Server MVP
http://mswindowscr.org
http://comunidadwindows.org
Costa Rica
Technorati Tags: SQL Server
LiveJournal Tags: SQL Server
del.icio.us Tags: SQL Server
http://ecastrom.blogspot.com
http://ecastrom.wordpress.com
http://ecastrom.spaces.live.com
http://universosql.blogspot.com
http://todosobresql.blogspot.com
http://todosobresqlserver.wordpress.com
http://mswindowscr.org/blogs/sql/default.aspx
http://citicr.org/blogs/noticias/default.aspx
http://sqlserverpedia.blogspot.com/
Les comparto la presentación utilizada en la charla sobre optimización de desempeño de SQL Server.
Saludos,
Eduardo Castro Martinez
http://ecastrom.blogspot.com
http://comunidadwindows.org
This document discusses Megam's cloud management platform. It provides an overview of cloud orchestration and Megam's platform for rapid application deployment, automation, and multi-cloud support. The platform uses a RESTful API-driven architecture with components like an API gateway server, scheduler, and Gulpd agent to manage applications and services across clouds. It also demonstrates launching applications and services on Megam's platform.
Similar to The enterprise manager command line interface2 (20)
This are my keynote slides from SQL Saturday Oregon 2023 on AI and the Intersection of AI, Machine Learning and Economnic Challenges as a Technical Specialist
This document discusses migrating high IO SQL Server workloads to Azure. It begins by explaining that every company has at least one "whale" workload that requires high CPU, memory and IO. These whales can be challenging to move to the cloud. The document then provides tips on determining if a workload's issue is truly high IO or caused by another factor. It discusses various wait events that may indicate IO problems and tools for monitoring IO performance. Finally, it covers some considerations for IO in the cloud.
This document provides an overview of options for running Oracle solutions on Microsoft Azure infrastructure as a service (IaaS). It discusses architectural considerations for high availability, disaster recovery, storage, licensing, and migrating workloads from Oracle Exadata. Key points covered include using Oracle Data Guard for replication and failover, storage options like Azure NetApp Files that can support Exadata workloads, and identifying databases that are not dependent on Exadata features for lift and shift to Azure IaaS. The document aims to help customers understand how to optimize their use of Oracle solutions when deploying to Azure.
This document provides guidance and best practices for migrating database workloads to infrastructure as a service (IaaS) in Microsoft Azure. It discusses choosing the appropriate virtual machine series and storage options to meet performance needs. The document emphasizes migrating the workload, not the hardware, and using cloud services to simplify management like automated patching and backup snapshots. It also recommends bringing existing monitoring and management tools to the cloud when possible rather than replacing them. The key takeaways are to understand the workload demands, choose optimal IaaS configurations, leverage cloud-enabled tools, and involve database experts when issues arise to address the root cause rather than just adding resources.
This document discusses strategies for managing ADHD as an adult. It begins by describing the three main types of ADHD - inattentive, hyperactive-impulsive, and combined. It then lists some of the biggest challenges of ADHD like executive dysfunction, disorganization, lack of attention, procrastination, and internal preoccupation. The document provides tips and strategies for overcoming each challenge through organization, scheduling, list-making, breaking large tasks into small ones, and using technology tools. It emphasizes finding accommodations that work for the individual and their specific ADHD presentation and challenges.
This document provides guidance and best practices for using Infrastructure as a Service (IaaS) on Microsoft Azure for database workloads. It discusses key differences between IaaS, Platform as a Service (PaaS), and Software as a Service (SaaS). The document also covers Azure-specific concepts like virtual machine series, availability zones, storage accounts, and redundancy options to help architects design cloud infrastructures that meet business requirements. Specialized configurations like constrained VMs and ultra disks are also presented along with strategies for ensuring high performance and availability of database workloads on Azure IaaS.
Kellyn Gorman shares her experience living with ADHD and strategies for turning it into a positive. She discusses how ADHD impacted her childhood and how it still presents challenges as an adult. However, with the right tools and understanding of her needs, she is able to find success. She provides tips for organizing, prioritizing tasks, managing distractions, and accessing support. The key is learning about ADHD and how to structure one's environment and routine to play to one's strengths rather than fighting against the condition.
Migrating Oracle workloads to Azure requires understanding the workload and hardware requirements. It is important to analyze the workload using the Automatic Workload Repository (AWR) report to accurately size infrastructure needs. The right virtual machine series and storage options must be selected to meet the identified input/output and capacity needs. Rather than moving existing hardware, the focus should be migrating the Oracle workload to take advantage of cloud capabilities while ensuring performance and high availability.
This document discusses overcoming silos when implementing DevOps for a new product at a company. The teams involved were dispersed globally and siloed in their tools and processes. Challenges included isolating workload sizes, choosing a Linux image, and team ownership issues. The solution involved aligning teams, automating deployment with Bash scripts called by Terraform and Azure DevOps, and evolving the automation. This improved communication, decreased teams from 120 people to 7, and increased deployments and profits for the successful project.
This document discusses best practices for migrating database workloads to Azure Infrastructure as a Service (IaaS). Some key points include:
- Choosing the appropriate VM series like E or M series optimized for database workloads.
- Using availability zones and geo-redundant storage for high availability and disaster recovery.
- Sizing storage correctly based on the database's input/output needs and using premium SSDs where needed.
- Migrating existing monitoring and management tools to the cloud to provide familiarity and automating tasks like backups, patching, and problem resolution.
This document provides an overview of how to successfully migrate Oracle workloads to Microsoft Azure. It begins with an introduction of the presenter and their experience. It then discusses why customers might want to migrate to the cloud and the different Azure database options available. The bulk of the document outlines the key steps in planning and executing an Oracle workload migration to Azure, including sizing, deployment, monitoring, backup strategies, and ensuring high availability. It emphasizes adapting architectures for the cloud rather than directly porting on-premises systems. The document concludes with recommendations around automation, education resources, and references for Oracle-Azure configurations.
This document discusses the future of data and the Azure data ecosystem. It highlights that by 2025 there will be 175 zettabytes of data in the world and the average person will have over 5,000 digital interactions per day. It promotes Azure services like Power BI, Azure Synapse Analytics, Azure Data Factory and Azure Machine Learning for extracting value from data through analytics, visualization and machine learning. The document provides overviews of key Azure data and analytics services and how they fit together in an end-to-end data platform for business intelligence, artificial intelligence and continuous intelligence applications.
This is the second session of the learning pathway at PASS Summit 2019, which is still a stand alone session to teach you how to write proper Linux BASH scripts
This document discusses techniques for optimizing Power BI performance. It recommends tracing queries using DAX Studio to identify slow queries and refresh times. Tracing tools like SQL Profiler and log files can provide insights into issues occurring in the data sources, Power BI layer, and across the network. Focusing on optimization by addressing wait times through a scientific process can help resolve long-term performance problems.
The document provides tips and tricks for scripting success on Linux. It begins with introducing the speaker and emphasizing that the session will focus on best practices for those already familiar with BASH scripting. It then details various tips across multiple areas: setting the shell and environment variables, adding headers and comments to scripts, validating input, implementing error handling and debugging, leveraging utilities like CRON for scheduling, and ensuring scripts continue running across sessions. The tips are meant to help authors write more readable, maintainable, and reliable scripts.
This document discusses connecting Oracle Analytics Cloud (OAC) Essbase data to Microsoft Power BI. It provides an overview of Power BI and OAC, describes various methods for connecting the two including using a REST API and exporting data to Excel or CSV files, and demonstrates some visualization capabilities in Power BI including trends over time. Key lessons learned are that data can be accessed across tools through various connections, analytics concepts are often similar between tools, and while partnerships exist between Microsoft and Oracle, integration between specific products like Power BI and OAC is still limited.
Mentors provide guidance and support, while sponsors use their influence to advocate for and promote a protege's career. Obtaining both mentors and sponsors is important for advancing in one's field and overcoming biases, yet women often have fewer sponsors than men. The document outlines strategies for how women can find and work with sponsors, and how men can act as allies in supporting women. Developing representation of women in technology fields through mentorship and sponsorship can help initiatives become self-sustaining over time.
DevOps and Decoys How to Build a Successful Microsoft DevOps Including the Data
The enterprise manager command line interface2
2. Kellyn Pot’Vin,
Westminster, Colorado
Oracle ACE, Sr. Technical Specialist at Enkitec
Finishing up EM12c book and starting EM CLI
book
Specialize in performance and management
of large enterprise environments.
Board of directors for RMOUG, Director of
Training Days 2013, KSCOPE DB Track Lead
2013
Blog: DBAKevlar.com
Twitter: @DBAKevlar
3. What to Include?
What to Exclude?
What are the most important areas of
the EM CLI?
What commands are best covered to
create the best educational introduction
to the topic?
4. Enterprise Manager Command Line
Interface History
How EM12c has changed level of
knowledge requirements for the
administrator
The Command Line Interface Basics
Enterprise Manager commands
EM CLI Procedure Scripting
5. Introduced in Oracle 9i with very limited
use.
Access to EM functionality from text
based consoles.
Ability to incorporate scripts, including
SQL*Plus, Perl, Shell, Python, etc.
Fully integrated as part of the EM
environment, including same security.
Ability to simplify multi-target tasks
through command line interface.
6. Create Jobs, schedule jobs, delete jobs
Administer groups, members, targets
Administer users and credentials.
Upload patches, delete patches-create
patch plans.
Execute host and sql commands.
Get information about all targets,
monitoring.
Over 30 verb “groups” and 250 commands
that I have documented “so far”.
7. EM CLI Login- Online or Offline?
“Verbs” grant the administrator initial
commands for the interface.
May Require one or more arguments.
Can utilize a argument file, aka
properties file.
Syntax often changes with version of
Enterprise Manager.
emcli help <verb>
8. The Command Line must be logged into
for the first time before commands will
be accepted, (login dependent upon
EM security time out feature or
connection mode.)
emcli login –username=<username>
Syncronize the EMCLI with the OMS:
emcli sync
9. Check connection mode, if complete,
then offline the EM CLI
emcli get_connection_mode
emcli set_connection_mode -mode="offline“
emcli get_jobs
Set back to online mode if wanting to proceed.
11. Redirection example of output, (similar to
Unix):
emcli get_procedure_xml –
procedure=“PROC_GUID” >
test_proc.xml
12. get_resolution_states - Incident
Information
stop/start_agent - Manage Agents
create/stop_blackout - Manage Blackouts
clone_database_home - Clone home
execute_sql - Execute SQL
get_jobs - Get a list of jobs
clear_stateless_alerts - Clears stateless
alerts
Argfile: File of verbs to execute from the
emcli.
13. EM CLI for EM12c support
› Checking Incidents
› Retrieve Targets Monitored
› Retrieve Agent Properties
› Agent Deployment
› Platform support
› Creating/Stopping Blackouts
› Executing Host Commands
20. Save off Templates
Inventory Existing Jobs
Create secure credentials for targets
Create administrator groups to ease
administration.
Reuse templates, post creating first one,
easy updates!
21. emcli create_blackout -name="Linux
Patch 120612" -reason="Needs to be
Done" -
add_targets="emrep12:oracle_databa
se" -schedule="duration::60“
How fast could you blackout entire
environment for maintenance window with
this scripted?
22. Simply state the name of the blackout and
the agent will issue a stop to the OMS:
emcli stop_blackout
-name="Linux Patch 120612“
How quickly could you end a blackout of
environment post maintenance?
25. Simplify management of large number of
targets with simple script vs. multiple
steps through EM12c console.
This simplicity includes creating,
managing, editing and purging of jobs
and patching job tasks.
Retain EM12c security and single console
monitoring if required.
26. Need to verify job information
emcli get_jobs
28. Assumption is that patches are
downloaded via EM12c.
Process:
› Verify Patch Available.
› Create Patch Plan
› Schedule Patches in Patch Plan
› Deploy Patch Plan
29. list_aru_languages -- List ARU Language
information.
list_aru_platforms -- List ARU platform
information.
list_aru_products -- List ARU Product
information.
list_aru_releases -- List ARU Release
information.
list_patch_plans -- List existing Patch Plans.
search_patches -- Search patches from
ARU site or Software
31. Multi-step, multi-tasked or chained
scripting through the EM CLI.
Ability to execute SQL, Perl, OS
Commands from one procedure.
Ability to use properties file to simplify
work and reuse with other procedures.
EM Console access through Job Activity
Interface.
34. Create a template to use for your new
properties file, sourced from a procedure
definition.
Fill in all pertinent information for the
target lists.
Submit the procedure, using the
properties file as part or whole of the
entry at the command line.
Verify all was successful.
36. Using the GUID, (or the procedure
<NAME>, we can then generate a
properties file template:
emcli describe_procedure_input –
procedure=
BFC71D3485629B93E04014AC08001B7D >
dbreplay_tst.properties
$> Verifying parameters…
$>
37. Edit the new template properties file and
add the new values for the following:
$ vi dbreplay_tst.properties
Source and Reference Host Data
Agent Info
Oracle Home
Credentials