How do I narrow my search results?
After you submit your search query:
- On the Refine Search results page, select one or more categories of products or services from the left sidebar.
- Then for a category with search results, click Select to choose your product and release filters, and then click OK.
For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"
How do I find the documentation for my product or service?
From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:
- Click the Find a product tab and search for your product or service.
- Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
- Apple Safari: Version 6
- Google Chrome: Version 29 and later
- Mozilla Firefox: Version 24 and later
- Microsoft Internet Explorer: Version 9 and later
Private Bytes → Description Private Bytes calculates the total number of bytes allocated by the process that cannot
Private Oracle Database MIB → The private Oracle Database MIB contains additional RDBMS statistics that are specific to the … Oracle database architecture. Like the public RDBMS MIB, the private Oracle Database MIB derives most of … configuration file. The private Oracle Database MIB is platform-independent. Thus, one Oracle Server MIB
Other Oracle Private MIBs → In addition to the private database MIB, Oracle has defined private MIBs for the following products
VPN Connections Between the Enterprise Manager Client and Management Server → As previously discussed, VPNs that comply with IPSEC standards allow the secure transfer of information over the internet: Remote clients can connect to a secure server with minimum configuration and maximum security. It is also possible to use VPNs in conjunction with firewalls. The following example shows a VPN environment with the Enterprise Manager Console and the Management Server on opposite
To enable network communication between the Enterprise Manager Console and Management Server, several → network ports must be opened in the firewall to allow TCP traffic. The port range of 7771-7777 covers all these. If the Console is running in a browser, then the firewall needs to allow HTTP traffic over port 3339 from the Enterprise Manager Website HTTP server to any browser client. Functional assignments for these ports are shown in the following table.
VPN Connections Between the Management Server and Intelligent Agents → Some VPN providers may allow server processes on different nodes to communicate. In these configurations, it is possible to deploy the Management Server on one VPN-enabled node and the Agent on another VPN-enabled node. The same principles as described in the previous section apply. It is important to note that communication between the Management Server node and Agent node is bi-directional, so each
Virtual Private Network Configuration for Enterprise Manager → Virtual Private Networks (VPNs) allow remote employees to connect in a secure fashion to a … private link. Figure B-3 Virtual Private Network Text description of the illustration virprivn.gif In … (IP) communications. It specifies standardized ways for securing private information transmitted over
Table B-2 Port Usage Port Number Usage 1748, 1754 Management Server communicating with the Agent to → discover new targets. 7772 Agent communicating with the Management Server. 7773 Agent communicating with the Management Server via SSL. No special setup and configuration is required for the Management Server or Intelligent Agents in this situation. If the Management Server and administered database (or other managed target) are separated by a firewall, then the Management Server acts as a proxy for
Firewall Communication for Enterprise Manager → Firewalls protect a company's IT infrastructure by providing the ability to restrict network traffic by examining each network packet and determining the appropriate course of action. Firewall configuration typically involves restricting the ports that are available to one side of the firewall, for example the Internet. It can also be set up to restrict the type of traffic that can pass through a
Firewalls and Network Address Translation (NAT) → Some firewalls use a feature called Network Address Translation (NAT). This feature masks the true IP address of a client by translating it to a different IP address. Packets sent from a remote client to a server through the firewall will be known to the server by this translated address. As the client and server communicate, the NAT software handles the mapping of the true IP address to its translated
Performance Manager, Capacity Planner, and Firewalls → The Performance Manager or Capacity Planner applications can be launched separately in order to connect directly to the Intelligent Agent (which incorporates the data collection services) on a target node. If a firewall separates Performance Manager and the Agent, or Capacity Planner and the Agent, then the firewall needs to be configured as follows: Port 1808 over TCP: Used for communication between
Table B-1 Port Usage Port Number Usage 3339 Communication between the Enterprise Manger HTTP server → and the Enterprise Manager browser client. 7771, 7773, 7776 Communication between the Enterprise Manager Console and the Management Server. 7774 Communication between the Oracle Applications Manager and the Management Server. 7775, 7777 Communication between the paging server and the Management Server. Special configuration is not required for either the Console or the Management Server in this case.
Running the Console in Standalone Mode → If the Enterprise Manager Console is launched in Standalone mode, the Console connects directly to a managed target (e.g. database) in the traditional client-server mode, using SQL*Net to communicate. If a firewall separates the Console and its target, several options are available. These include: Use VPN software on the Enterprise Manager Console node and target node. In this case, the setup will
B Firewalls and Virtual Private Networks → This appendix discusses how to configure firewall and virtual private networks (VPNs) to allow … following topics: Firewall Communication for Enterprise Manager Virtual Private Network Configuration for
Firewall Between the Console and Management Server → In this configuration, the Enterprise Manager Console and Management Server are separated by a firewall. Figure B-1 Console and Management Server on Opposite Sides of a Firewall Text description of the illustration firewala.gif
Firewall Between the Management Server and Agent(s) on Monitored Nodes → In this configuration, the Intelligent Agent that runs on the managed node and the Management Server are on opposite sides of the firewall, as shown in the following illustration. Figure B-2 Firewall Between the Management Server and Agent Text description of the illustration firewalb.gif To enable network communication between the Management Server and Intelligent Agents on managed targets, several
Private and Public Rollback Segments → acquire either private or public rollback segments at startup and use them exclusively. The exception to … private rollback segments for each instance in Real Application Clusters, and that you use the same … rollback segment identifiers each time you startup a particular instance. For private rollback
Unicode 3.1 Private Use Area → Unicode 3.1 reserves the range E000-F8FF for the Private Use Area (PUA). The PUA is intended for … private use character definition by end users or vendors. User-defined characters can be converted
Public and Private Rollback Segments → Public and private rollback segments provide the same level of performance. However, private … performance. Therefore, use private rollback segments to improve performance. Public rollback segments form a … the heavier processing demands. By default, a rollback segment is private and is used by the instance
Are All SQLLIB Functions Private? → No. There are some SQLLIB functions that you can call to get information about your program, or its data. The SQLLIB public functions are shown here: SQLLIB Public Functions Description SQLSQLDAAlloc() Used to allocate a SQL descriptor array (SQLDA) for dynamic SQL Method 4. See "How is the SQLDA Referenced?". SQLCDAFromResultSetCursor() Used to convert a Pro*C/C++ cursor variable to an OCI cursor