Deliver the new addition VCenter

I have a new VCenter to add to vRealize 6.2.1. I add the endpoint with success, I create a new group of fabric, but I do not see any cluster managed by the Vcenter.

The service account has full administrator on the Vcenter rights, I tried another account (also with rights)

I waited several days in the case of an out of stock

Another something thing to note is that I have old heap still present in the vRealize that have been deleted a long time ago in existing VCenters, I have still two clusters reported for one who has been renamed, the one with the old name and one with the new name.

Inventory of the Temapltes seems to work very well on existing Vcenters.

Any ideas?

Just to understand where you are at. You have 1 end point of vCenter already created using the proxy agent that you originally installed. Is the name on the vCenter agent proxy? Then, you need to add an another vCenter. It's one of so that you do not see the inventory. So, you have installed another proxy agent and called it... vCenter2? When initial installed did you do a distributed installation or the installation of the components of the IAAS?

vRA will not get rid of the clusters, he saw even if they are deleted or renamed. Take a look at this KB deletion of an endpoint in vRealize Automation fails with the error: this endpoint is used by the compute resources # and # storage paths and cannot delete a procedure to remove inactive hosts of vRA.

Tags: VMware

Similar Questions

  • Migrate to the new server vCenter hw

    I make plans to migrate all my my old hardware of server vCenter ESX hosts to a new (and much faster). Both vCenter servers are version 4. To delete a my old vCenter ESX host, I need to put it in maintenance mode. Maintenance mode means turn it off or by moving my VMs to other hosts.

    Is there a way to move my ESX hosts to the new server vCenter without voltage VM?

    Hi bjornl,

    If you need to keep the virtual machines running on the host computers, while removing a cluster host, data center or same vCenter, and then select the option 'Disconnect' first. The host shows as grayed out and disconnected. Once in this state you can 'remove' the host of your first vCenter.

    Create your new data center and then "Add host" Cluster in the new. Everything will be powered on your virtual machines.

    The only issues I've had with this is if the original or the new cluster using vMotion improve compatibility (EVC). This aspect must correspond to both ends. Once you do this, it works fine.

    Hope this helps,

    Dan

  • Deliver the new DVD player.

    After you have installed a replacement from dell DVD player in my Office Dimension 4700 running XP PRO, the system shows the old drive with description of the DVD-RAM drive (D :). Drive D: is the name for the original DVD drive, which is fine. However, the system now displays a new disk, disk removable (f). This drive F: actually does not exist. How can I remove it. Any help is appreciated with gratitude. Thanks in advance.

    Dave

    Ok.

    I don't see that attaching your Kodak 50 in one has any merit of diagnosis.

    You have not said what happens if you insert a memory card in the HP.

    Internet research indicates that the Dell 942 also has a card reader location. That do my previous test and see what happens.

  • Point at the new vcenter SRM

    Here's a little history.  We have tried to update our existing 5.5 vCenter server, however we met a ton of SSO issues and could not go beyond the SSO 5.5 upgrade.  VMware offers a new server vCenter.  OK, so we did it, however I must now get pointed to this new server vCenter SRM.  This new vCenter Server uses the existing DB vCenter.  We have a separate server (5.1) SRM and SRM SQL server.

    My question is, can I point my existing to the new server vCenter SRM Server AND update to 5.5?

    I just wanted to update this in case someone else still has the same problem.  Contacted support VMware SRM.

    They have referenced this KB http://kb.vmware.com/kb/2008033 - but they know that I don't "try this at home" without their help.  Their solution worked great however.

  • Why music library is not synchronized with the new ipod touch

    My i tunes library is composed of store purchases (I tunes and Amazon) as well as the songs downloaded from the cd and vinyl. I have access through desktop using Windows Vista.I used an i pod nano, who held the full library and sync had to include the new additions when I linked to the computer. I recently bought an i pod touch (iOS 9.3.3) but when I sync it, whatever he gains access to shopping via i tunes store.  I want to access the complete library if anyone can help me please?

    Your iPod with iOS 9.3.x requires iTunes 12.3 and requiring a Win 7 and later versions.

    It seems that you have iTunes music purchases, since you can re-download those directly from the iTunes Store

  • New VM vCenter and need to connect to a host ESX1 4.1.

    Hi all

    I'm in a difficult situation not in my enterprize environment, but someho I am very confused after a few hours by train.

    Currently I have an ESXi host 4.1 with some virtual machines on it. One of these virtual machines is the vCenter server that had been upgraded to version 5.1 a few months ago. The vCenter Server runs on a virtual Windows Server 2003 64-bit machine.

    Two days ago, I decided to upgrade the vCenter 5.1 to 5.5, but unfortunately the version 5.5 does not work on a Win 2003 server. So I installed a new virtual machine with Windows server 2008 R2 and the plan is either to migrate the new everything from the former vCenter, or simply connect to the new server vCenter with the host (I have not run any complicated environment, I have only 5-6 virtual machines and the only thing that I would need the former vcenter is a few shots but I don't like if I don't get them).

    First, I installed the new vCenter (5.5) and I connected to the host. I logged in as [email protected] , and I could see the server vCenter there. I've added my account domain in the Administrators group and the VCOAdministrators group, but when I connect with my domain account that I do not see any server of vCeter it.

    Now, what I want to ask you is: you have read above I want to do. What would you do if you were me?

    Thank you for all your answers.

    Sign in using the account [email protected] and check the permissions on the server vCenter Server object in the inventory. Make sure that the required domain user (or better yet a domain group) has the appropriate permissions to the object and the objects below it.

    Adding an account to the Administrators group internal grant permissions required to manage the server vCenter Server itself, but does not apply to the inventory.

    André

  • Questions VC... Add the host to the new CR?

    If I have problems with my VC server. It does not start for some reason, so I'm building a new. The question I have, is if my 6 ESXi hosts were connected to this VC how would I so that they know the new Victoria Cross? I know that the right way to add hosts to a new Victoria Cross would be to disconnect and then remove them from the existing VC. Any thoughts?

    Thank you.

    If you cannot disconnect and remove the hosts of the other environment, simply ' add host' in the new.  You will receive a message saying something to the effect of «Eastern host is managed by a different vCenter...» Once you add the new host vCenter inventory, you'll be fine.

  • Deliver the addition of new set of switches stacked as an extension to the network in another data center building

    Hello

    I was wondering if someone can help me, I am a humble sysadmin with no real network admin training.

    I have the following Setup to work in a rack in our data center.

    2 x Dell Sonicwall NSA2400
    2 x stacked switches Dell Powerconnect N5524

    A Sonicwall is connected to each switch (active-passive)

    Every Dell server has 2 x nics in servile failover mode, one of each network card connected to each switch

    This is done to allow a full redundancy for network, cable, switches and Firewall interface cards. It works well.

    The above mentioned rack is now full and we ordered a new rack that is in a different datacenter of construction on the same site. We decided to buy another set of stacked switches and _extend_ (no battery) these via optical SPF on the rack on the other.

    The idea is that we still have the switch fault tolerance but link to two grids through 10 GB. The new switches are 2 x Dell Powerconnect N2048 and have been implemented stacked with any connected devices.

    I have implemented SPF ports on both switches to be a junction ports and connected the two sets of switches, unfortunately our site went offline, our alert went ballistic and no servers could not talk to each other!

    Quickly, I unplugged the new switches and after a worrisome 10 alerts deleted seconds and the site is back online.

    I don't know why this has happened and reflected on the STP parameters that my googleing seem well. I don't know I'm missing something basic.

    I'll post a framework and a diagram in a follow-up post

    Which is no doubt tree covering the shot weight. It is a good idea to assign lower priority to the main switch. Generally, your root switch will be the one that plugs into the firewall. Definition of priority on the main switch to 4096, it will make the root switch. So as you work your way through different layers of the network, increase the priority. Access layer switches can be left by default.

    I would also check the physical connections for loops. In situations where you have multiple connections switch, make sure that these ports are configured in a SHIFT.

    Keep us informed.

  • My iPhone 6 installed 10.0.2 stops when it gets to 40% of autonomy.  In addition, it seems to pass power WAY to fast with the new software.  Does anyone else have this problem?

    My iPhone 6 installed 10.0.2 stops when it gets to 40% of autonomy.  In addition, it seems to pass power WAY to fast with the new software.  Does anyone else have this problem?

    Hello brooksm549,
    Thank you for using communities of Apple Support.

    I got your message which, since updating your iPhone 6 to iOS 10.0.2 your iPhone stops when it is 40% and the power to empty very quickly. I understand your concern with the iPhone turn off and drains the battery. I recommend you to review the use of the battery to see what app contributes more to the battery drain. The following article will provide you with steps on how to check the use of the battery:

    On the use of the battery on your iPhone, iPad and iPod touch

    When you know about the soft uses more battery, you can change your settings in order to optimize the battery life:

    Maximize the life of the battery and battery life

    Best regards.

  • When I run mozilla or open a link in a new window but I get the page you want to load an additional page of the new tab opens with it, the difficulty?

    When I launch mozilla or open a link in a new window I get the page you want to load but an additional page of the new tab opens with her. I tried to change my homepage to different things (new tab, firefox home, see the blank page) but I always get a new additional tab to open. How can I get only one page to open it?

    Hello

    The reset Firefox feature can solve a lot of problems in restaurant Firefox to its factory default condition while saving your vital information.

    Note: This will make you lose all the Extensions and preferences.

    • Sites Web open is not recorded in less than 25 versions of Firefox.

    To reset Firefox, perform the following steps:

    For Firefox versions prior to 29,0:

    1. Go to Firefox > help > troubleshooting information.
    2. Click on the "Reset Firefox" line

      button.

    3. Firefox will close and reset. After Firefox is finished, it will display a window with the imported information. Click Finish.
    4. Firefox opens with all the default settings applied.

    For Firefox 29,0 and above:

    1. Click the menu button

      click Help

      and select troubleshooting information.

    Now, should open a new tab containing your troubleshooting information.

    1. At the top right of the page, you should see a button that says "Reset Firefox"

      . Click on it.

    2. Firefox will close and reset. After Firefox is finished, it will display a window with the imported information. Click Finish.
    3. Firefox opens with all the default settings applied.

    Information can be found in the article Firefox Refresh - reset the settings and Add-ons .

    This solve your problems? Please report to us!

    Thank you.

  • When I open a new window, an additional blank tab opens in the new window.

    The problem started when I reset my new page.
    Because the two legs were open, she defined the second tab in the home page.
    When I noticed this, I reset (choice between bookmarks) with a single tab.
    Unfortunately, it continues to open two tabs, whenever a new window is opened, either when starting Firefox or by a link.
    Pressing 'Home' don't open a new tab.

    One of your FAQs advised removing the characters of pipe in the home page layout, but this does not apply in this case.

    Can you help me?

    Thank you

    Select this option.

    You can drag a single tab on the Home button to set this tab as homepage.

    The extension of MySearchDial has been reported to cause problems with opening of new additional tab.

    Start Firefox in Safe Mode to check if one of the extensions (Firefox/tools > Modules > Extensions) or if hardware acceleration is the cause of the problem (switch to the DEFAULT theme: Firefox/tools > Modules > appearance).

    • Do NOT click on the reset button on the startup window Mode without failure.
  • the new firefox open my home page in addition to the start page of firefox, everytime I open firefox. How can I stop this and make sure ONLY my home page shows?

    the new firefox open my home page in addition to the start page of firefox, everytime I open firefox. How can I stop this and make sure ONLY my home page shows?

    Delete the USER. JS file if there is (some plug-ins create in addition to prefs.js).

  • Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • How to use transfer windows for xp to xp. When I plug usb computers are delivered to the top with the same screen and when I try to use the transfer to the new computer, it just said information gathering and sits for hours

    How to use transfer windows for xp to xp.  When I plug usb computers are delivered to the top with the same screen and when I try to use the transfer to the new computer, it just said information gathering and sits for hours

    Hello, welcome.

    The process is automatic and the maximum transfer rate should be about 20 GB/HR. If the process crashes during that long of a time, it's probably because of something internal rather something you're doing wrong.
    For reference purposes, I included this link. It goes into the details of the migration from XP to Vista (and the basic steps you follow). The instructions are for migrating to Vista via the network, but you can easily follow the steps and choose a different option for your specific installation.
    For both machines, I recommend you to prepare for the transfer using the following procedure:
    1. click on START > run
    2 type "msconfig" (without the quotes) and press enter
    3. go to the "Startup" tab and uncheck all the entries displayed
    4. click on 'Apply' at the bottom right
    DO NOT RESTART YOUR COMPUTER AGAIN
    5. click on START > run
    6. Type "cmd" (without the quotes). Right-click on the result at the top of the menu START and select 'run as administrator '.
    7. type chkdsk /r and press enter
    8 allow the system to attempt disassembly of the volume
    9. allow the system to plan restarting
    10. restart your computer
    11 let checkdisk analyze the file system on your hard drive
    12. Once completed, perform the same steps on the other machine
    13. Once completed, repeat the transfer

    Let us know what happens
    Thank you!

    Ryan Thieman
    Microsoft Answers Support Engineer
    Visit our Microsoft answers feedback Forum and let us know what you think.

  • the new 12.1 feature creates an Index using Advanced Compression of Index - what is requires an additional license

    I see in one of the new features that you can create an index by using the index advanced compression... not him come with the oracle enterprise database, or you must buy an additional OPTION to use?

    All options are approved separately from the point of view of license Yes you have permission to use this feature.

    It will be useful.

Maybe you are looking for