Fact Eve DataGuard between (Source site) 11.2.0.3.0 and (target site) 11.2.0.4.0 taken in charge?

Hello gurus

Fact Eve DataGuard between (Source site) 11.2.0.3.0 and (target site) 11.2.0.4.0 taken in charge?

My environment:

Site source OS: RHEL 5.6 Database: v11.2.0.3.0

Target site OS: RHEL 7.1 Database: v11.2.0.4.0

The database size is 100 GB

What about

Hitgon

As I mentioned, again the DG transport and apply the will to work in mixed versions. But it is not supported by Oracle for longer period. When I say not supported which means lets say if you hit any bugs in mixed environment associated with DG, then you can't get a support to connect to a new bug... etc... However, mixed versions are supported bby Oralce for 30 days. This is because any time the migration/upgrade that you can keep primary and standby in different versions.

For more details refer,

1.

search for lines,

The maximum length supported for different database software house between primary and Nightlight is 31 days.

Insurance of Patch Oracle - Data Guard standby-first Patch applied (Doc ID 1265700.1)

2. with regard to Cloud Control Support.

SUBJECT: Set up and manage Oracle DataGuard, using Oracle Enterprise Manager Cloud control 12 c

search for "the obligation for the Oracle software is stricter. The Oracle software must be the same version - including the release of the patches Oracle group. »

Set up and manage to Oracle Data Guard with Oracle Enterprise Manager Cloud control 12 c

Tags: Database

Similar Questions

  • Unable to pass traffic between ASA Site to Site VPN Tunnel

    Hello

    I have problems passing traffic between two ASA firewall. The VPN tunnel is up with a dynamic IP and static IP address. I have attached a diagram of the VPN connection. I'm not sure where the problem lies and what to check next. I think I have all the roads and in the access lists are needed.

    I've also attached the ASA5505 config and the ASA5510.

    This is the first time that I've set up a VPN connection any guidance would be greatly appreciated.

    Thank you

    Adam

    Hello

    Regarding your opinion of configuration Remote Site ASA that you have not added the internal networks of the Central Site VPN L2L configurations at all so the traffic does not pass through the VPN.

     access-list outside_1_cryptomap extended permit ip 10.1.1.0 255.255.255.128 10.182.226.0 255.255.*.* access-list exempt extended permit ip 10.1.1.0 255.255.255.128 10.182.226.0 255.255.*.* access-list exempt extended permit ip 10.1.1.0 255.255.255.128 10.182.0.0 255.255.*.* access-list exempt extended permit ip 10.1.1.0 255.255.255.128 192.168.170.0 255.255.*.* access-list exempt extended permit ip 10.1.1.0 255.255.255.128 192.168.172.0 255.255.*.* access-list exempt extended permit ip 10.1.1.0 255.255.255.128 140.15.0.0 255.255.*.* 

    Take a look at ACL configurations above. The 'exempt' ACL is used in configurations NAT0 and tells the ASA what traffic of exempting from NAT. "outside_1_cryptomap" ACL is used to tell the traffic between the subnets should be using the L2L VPN connection.

    So in short on the Remote Site ASA these ACLs should be identical. Make additions to the LIST of VPN L2L, then try again.

    I would also like to point out that to ensure that the Central ASAs L2L VPN ACL Site contains the same networks. The ACL on the Central Site will, of course, its internal subnets as the source and the site LAN remote destination.

    THW out of ' crypto ipsec to show his " shows you that only the SA between binding Site Central network and the Remote Site LAN was established. Others have not formed as the configuration is lacking at LEAST on the Remote Site ASA. Can also be the Central Site.

    -Jouni

  • Routing between remote sites

    My question is on remote sites and routing for vSphere. I have two geographically separated sites connected by a fiber 80Mbit connection. Each site has it of own SAN, SAN switches dedicated and will have its own guests. I use vSphere 5 Standard.

    I created my first site and everything works fine. At the beginning I put in place all hosts that I have on the first site to make sure everything was working correctly. Now, I'm ready to spend half of the guests at my second site.

    I want to manage two sites from my server from vSphere existing on the first site.

    What is the best way to set up my second site? Inbetween the websites traffic *is* routed, so I know that limits my options. I went into this project knowing that the link between my sites 80Mbit was not good enough for vMotion.

    I used to Paul Kelly (thanks!) suggestions to set up my sites, they look like:

    http://3.BP.blogspot.com/-3z1mWR6wSkc/TopCRUzgSsI/AAAAAAAAAEU/gnLZoExAWRc/S1600/vSphere+5+-+6+NIC+IsolatedStorage+and+NoFT+design+v1.0.jpg

    What is my best option here? My original CD thought I want to road traffic for network management only (VLAN 10 on the diagram) between my sites. Is that all that is needed for the server vCenter on my first site to see my second site? With this configuration I would be able to vMotion between hosts located on my second site? is there no other angle miss me here?

    On a separate note - this time I have a Datacenter with a group inside (for my first site). My second site is a second group, or a whole new data center? I've read some threads on the forum and some people say to keep a data center, unless you have naming problems. Of course, the fact that you can cluster inbetween vMotion and not data centers isn't really make a difference in my scenario.


    Welcome to the community - as long as your vCenter server is able to reach the management port on the ESXi hosts in the second, you'll be able to manage hosts with the single instance. I agree that you should route traffic in all of the privatelkink between the sites - management

    In doing so the single instance of vCenetr that you can manage ESSXi host computers at each site and be able to trigger vmotion on each site.

  • accidentally deleted logfiles Eve on the main site

    Hello

    on the main site the standby redo log groups 4, 5 and 6 were deleted accidentily:

    ALTER DATABASE, DROP LOGFILE GROUP 4
    Deleted Oracle managed file /opt/oracle/oradata/DB/archfiles/flashback/DB/onlinelog/o1_mf_4_77jcr8bz_.log
    ALTER DATABASE, DROP LOGFILE GROUP 5
    Deleted Oracle managed file /opt/oracle/oradata/DB/archfiles/flashback/DB/onlinelog/o1_mf_5_77jcrd9w_.log
    ALTER DATABASE, DROP LOGFILE GROUP 6
    Deleted Oracle managed file /opt/oracle/oradata/DB/archfiles/flashback/DB/onlinelog/o1_mf_6_77jcrjgt_.log

    It is a standby Redo Logs and no online Redo Logs!

    However, the last group of standby Redo Log on the main site is still available:

    Select the type, Member of v$ logfile where type = "STANDBY" (main site):
    GROUP # TYPE MEMBER
    ---------------------------------------------------------------------------------------------------------------------------------------------
    7 /opt/oracle/oradata/SELLPROD/archfiles/flashback/DB/onlinelog/o1_mf_7_77jcrmm7_.log EVE

    Select Group #, type, Member of v$ logfile where type = "STANDBY" (backup site):
    GROUP # TYPE MEMBER
    ---------------------------------------------------------------------------------------------------------------------------------------------
    4 /opt/oracle/oradata/DB/otherfiles/redo_a/stbyDB_srl0.f EVE
    5 /opt/oracle/oradata/DB/otherfiles/redo_a/stbyDB_srl1.f EVE
    6 /opt/oracle/oradata/DB/otherfiles/redo_a/stbyDB_srl2.f EVE
    7 /opt/oracle/oradata/DB/otherfiles/redo_a/stbyDB_srl3.f EVE

    DataGuard environment is set up in the maximum performance - so no errors are occurring.
    Newspapers waiting for Redo on the main site are created with OMF naming conventions.

    The question now is:
    -It would be OK just create 3 new groups of newspaper waiting for redo (Group # 4, 5 and 6) on the main site or which would cause
    some problems?
    I would use the statement ALTER DATABASE add STANDBY LOGFILE GROUP 4 m SIZE. Which would create fa OMF file?

    Thanks for any help
    Rgds
    JH

    The question now is:
    -It would be OK just create 3 new groups of newspaper waiting for redo (Group # 4, 5 and 6) on the main site or which would cause
    some problems?

    Standby Redo Logs would not be on the main database until you perform a failover operation. So, I would say, you can create 3 groups of newspaper waiting to roll forward the primary database.

    I would use the statement ALTER DATABASE add STANDBY LOGFILE GROUP 4 m SIZE. Which would create fa OMF file?

    The files are on OMF. So your above command would work perfectly.

  • In fact, I have a free site (unpublished). Is it possible to add a second (current) free site?

    With the help of BC is great to share the States of development with my clients. In fact, I use the free site of BC, that i've got that I opened my BC account.

    Now, I noticed that it is possible to get several free sites (unpublished). See pricing and billing FAQ | Adobe Business Catalyst . ""Partner such as a free, Standard or Premium, you can create test sites as you wish.".

    Indeed it would be great, BC., I'm already working on a second draft of Muse, I would see a BC to share with clients.

    If possible, please tell me how it works.

    Thank you.

    See you soon

    Anna

    In Muse, select the arrow next to the button publish on the upper right. Then, select Business Catalyst in the drop-down list.  Enter a name for the site in the Site name field. It takes by default to create a new site, but you can check that by clicking on Options in the same window.  Finish by clicking on OK and it will publish the site on BC and takes you to an overview of the site.

  • Replication between two sites with essential Kit more

    Hi all

    can anyone confirm that the following scenario is possible?

    A basic Kit Plus - replication - another essential Kit Plus
    3 Hosts                                                                      Other 3 Hosts

    In other words: is it possible to replicate virtual machines between two sites, each managed by a single essential Kit Plus (outside the bounds of the CV)?

    I'm sure that is correct, but I want to be sure.

    Thank you guys!

    Alex

    Yes, you can use replication between vCenters thus vSphere. To do that you would like to devices VR is deployed to each vCenter and then connect them. How to do this is described in the VR installation and config and administrative documents.

    BTW, my name is GS.

    See you soon!

  • will be failover testing with success when the network between the site of protect and recover is broken

    Hi friends,

    When the network between the site of protect and recover is broken, will be the successful test SRM failover?

    Thank you.

    Hello

    There was a theme with exactly the same question, but I'm not.

    IIRC, the answer was: it depends on storage / Some SRA. of them need connectivity.

    Michael.

  • Adobe gives us a creative license does include open source sites?

    Hi, this question is bugging me. I know that adboe gives the end user a creative license. I was wondering how this license. If someone has created a site in dreamweaver and perhaps even used some flash for an open source site Web would be violating the EULA? I know that the EULA DW says something about trade secrets that they fail to explain what that means. I could use as much information as possible! Thank you.

    Not to worry. Everything that you develop in Dremaweaver can be sold to another party, including Flash, Spry, HTML, CSS, PHP, or ColdFusion contained. When Adobe makes its money's tools. That's why the code Flash and Ajax/senior were open original, to avoid all these problems. There he hop if you develop something with their tools you provide to someone else, someone else may be encouraged to buy and use their tools accordingly.

    It is a really simplistic explanation, but you get the drift.

    Lawrence * Adobe Community Expert *.
    www.Cartweaver.com
    All Shopping Cart Application for
    Dreamweaver, available in ASP, PHP and CF

  • The installed product does not match the installation source (S). Until a matching source is provided or the installed product and source are synchronized... Cannot perform this action.

    Hello

    I'm not able to uninstall Skype on my laptop which is having windows 7 OS.
    It gives below error.
    The installed product does not match the installation source (S). Until a matching source is provided or the installed product and source are synchronized... Cannot perform this action.
    He appreciates if there is someone to support for this issue.
    Thank you
    Sandesh

    Hi Bader,

    Thanks for the kind reply. In fact before checking your response, I checked in my system there was the .msi from the Skype software installation file was missing. so I installed the same version installation file and then uninstalled the software.
    And I have installed the latest version of the Skype software.
    Thank you
    Sandesh
  • AD, used as a trusted source and target system

    Hello

    I have a requirement to use AD as a trusted source and the target system the zero days and 1 for a transitional period.  We have 18 applications to integrate with OAM for SSO.  Currently, the authentication and authorization of these applications are made via AD.  However, the client wants to move to the use of LDAP in goal SSO.  The first phase includes 3 apps on the 18 apps.

    Day zero, I use AD as a source of confidence to push users to IOM.  Then, I run AD as a target system to link the user to their existing AD accounts.  Their ad groups will also be reconciled by IOM.

    Because there will be a transition period and the customer would not have to change the process of assistance to creating accounts AD (for internal and external users), they asked that we continue to allow accounts AD to reconcile with IOM in the trusted source and target system.

    I have not used AD connector as a reliable source.  I intend to source AD done trust reconciliation to run first, then the task of reconciliation system AD target to run then.  It's the same AD connector.

    This can work as long as the customer wishes until they want to spend to IOM for the creation of the user and accounts AD commissioning through the access policy.

    Is this sound ok you?  There is a "witch hunt" I didn't think?

    Thank you

    Khanh

    Yes, you can run the recon trust first and get all the identity created by IOM.

    Later, you can run the Scheduler for recon target for linking AD accounts with user profile of IOM.

    Note: There is a field in AD IT resource in need of update if you want to switch between the target and recon trust.

    Research of configuration:

    This parameter contains the name of the lookup definition that stores configuration information used during the reconciliation and commissioning.

    If you have set your target system as a resource target, then enter Lookup.Configuration.ActiveDirectory.

    If you have set your target system as a reliable source, then enter Lookup.Configuration.ActiveDirectory.Trusted.

    Default value: Lookup.Configuration.ActiveDirectory

    ~ J

  • difference between the incremental update of the IKM oracle and incremental update IKM oracle (PL - SQL)

    Hello

    What is the difference between the incremental update of the IKM oracle and updated incremental IKM oracle (PL - SQL) and incremental update IKM oracle (line by line).

    Thank you

    Papai

    The only difference is that the second using plsql for incremental update. He also to manage clob issues well enough.

    If you need to know more you can read the description of each KM section.

    Incremental update IKM Oracle (PL-SQL)

    -------

    Description:

    -Knowledge integration module

    -Integrates data into an Oracle table from target in incremental update mode using PL/SQL.

    -Non-existent rows are inserted. already existing lines are updated.

    -Data can be controlled. Data invalid are isolated in the error Table and can be recycled.

    -This KM uses PL/SQL to perform the inserts and updates until and blob columns are supported. Please see the restrictions.

    -When you use this module with a source table logged, it is possible to synchronize the deletions.

    Restrictions:

    -When working with the logged data, if the "synchronize destruction of the newspaper" are executed, the lines deleted on the target are engaged

    -The data are updated even if not changed (upgrade from any (e)

    -The number of lines (number of inserts/changes) is not available because the transactions are performed using PL/SQL

    -Comparison of the data is performed using the key to update defined in the interface. It must be set.

    -L'option TRUNCATE does not work if the target table is referenced by another table (foreign key)

    -Options FLOW_CONTROL, and STATIC_CONTROL call the Module knowledge check to isolate invalid data (if no CKM is defined, an error occurs). These two options should be set to NO in the case where an integration Interface meets a TEMPORARY target data store.

    -L' FLOW_TABLE_OPTION option is set by default to NOLOGGING. Set it to a space if the interface is running on an Oracle 7 database

    -Deletions are committed regardless of the VALIDATION option

    Incremental update of the IKM Oracle

    -------------

    DESCRIPTION:

    -Integrates data into an Oracle table from target in incremental update mode.

    -Non-existent rows are inserted. already existing lines are updated.

    -Data can be controlled. Data invalid are isolated in the error Table and can be recycled.

    -When you use this module with a source table logged, it is possible to synchronize the deletions.

    REQUIREMENTS:

    -The update key defined in the interface is required.

    RESTRICTIONS:

    -When working with the logged data, if the "synchronize destruction of the newspaper" are executed, the lines deleted on the target are engaged

    -L'option TRUNCATE does not work if the target table is referenced by another table (foreign key)

    -Options FLOW_CONTROL, and STATIC_CONTROL call the Module knowledge check to isolate invalid data (if no CKM is defined, an error occurs).

    These two options should be set to NO in the case where an integration Interface meets a TEMPORARY target data store.

    -L' FLOW_TABLE_OPTION option is set by default to NOLOGGING. Set it to a space if the interface is running on an Oracle 7 database

    -Deletions are committed regardless of the VALIDATION option

    -L' ANALYZE_TARGET option will allow to assess correct statistics only if the VALIDATION is set to Yes. Otherwise, the IKM gather statistics based on old data.

    -Default UPDATE option is TRUE, which means by default it is assumed that there is at least one column nonkey specified in a target data store.

  • What is the difference between Cold Fusion version 11 Cold Fusion Standard and version 11, academic, please?

    Could someone explain the key technical differences between Cold Fusion version 11 Cold Fusion Standard and 11, academic version please?

    I have searched the Adobe site, but can't find an answer

    Would like to have an answer.

    Have a great day!

    Kind regards

    Hello

    Please take a look here: http://www.adobe.com/products/coldfusion-standard/faq.html > and see > 'Education customers can always buy a copy of ColdFusion 11 for education?' > Yes. 11 of ColdFusion for education is available for purchase. The paid version of ColdFusion for education 11 has not the restriction that it must be used only for learning purposes.

    Is this what you need?

    Hans-Günter

  • Difference between the Port ID of the load balancer and MAC?

    There are three strategies for load balancing in 4.0 (one more now in 4.1):

    Function hash IP route

    Route based on the originating Virtual Port ID

    Route in function interference source to the MAC

    I think that I understand perfectly the "IP hash" and how it relates to switches, but what really is the difference between 'source MAC' and 'Port ID'?

    They seems both to do something very similar, which is attached a VM to a physical network card. Why someone should choose the CBC MAC and why the Port-ID? Is there a difference in the way that traffic will extend that could be interesting, when you do a design?

    Hello.

    To simplify, to really all boils down to the formula used to distribute traffic natachasery.

    "Discover Ken Cline" [the great vSwitch debate - part 3 | http://kensvirtualreality.wordpress.com/2009/04/05/The-Great-vswitch-Debate%E2%80%93part-3/] "for many more details on each option works.

    Good luck!

  • The difference between files Raw in 12 or 14 bit and PS 16 bit - is there a practical consequence?

    I read that my Olympus Raw is 12 bit color (ORF) and my Canon is 14 bits (CR2). But in Photoshop, retouching to 16 is covered mostly in literature I've seen, and PS also has 8 or 32.    Is there a practical importance or drawback to the divergence between the 12 or 14 on one side and 16 (or 8 or 32) on the other?   This means anything really, for the average user of PS, I guess I'll become as I work at home a little more?  Is there anything else I should be aware of and adjust for?

    It's a matter of ni-ni-peut-etre-peut-etre typical. The short version is that the RAW data are far from perfectly linear and may contain a large amount of data, which in fact do not contribute to visible pixels, because the human eye can not see these lines. This is why you need to "develop" in the first place. Since you already reject the evidence for other data and remap value ranges, the output has a much lower effective loyalty. Not a limitation remaining loyalty, you work more bit depth of models such as 16bpc or 32bpc, which may contain these ranges of values, but not necessarily use the theoretical full spectrum to offer these ranges of colors. When it becomes really relevant is all successive treatment - due to greater mathematical precision, higher bit depths are less susceptible to unintentional dithering or other artifacts due to premature quantization of the values. ultimately however, it becomes very much a question of what you plan to use the exit for. If your, say, 5000 x 3000 px RAW image ends up as a web of 640 x 480 graphic, there is little or no harm to work in 8bpc, since obviously all the web usually uses 8-bit images...

    Mylenium

  • Difference between ' target / "and"target SYS/change_on_install@PROD ".

    Hi all

    Please let me know the difference between the two commands to rman

    rman/rman@CATALOG target $ rman catalog.

    and

    $ rman catalog rman/rman@CATALOG target SYS/change_on_install@PROD

    and

    rman target $ /.

    and

    target of $ rman nocatalog /.

    It comes to the recovery Site and the commands work properly.

    Thanks in advance.

    Kind regards
    Bikram

    Published by: user11977214 on June 15, 2010 23:53

    Could you please specify what's that I use
    $ rman auxiliary sys/change_on_install@PROD

    then it will directly connect to the auxiliary or the database target (i.e. PROD) this means that it will bypass the catalog database and will use the target database control file.

    It will bypass the catalogue (nocatalog option uses) and connects to the auxiliary database. Auxiliary database is used to create a clone or standby database

Maybe you are looking for

  • Cannot print after loading of 9.01

    "I installed Firefox 9.01, everything is OK for a day, the reboot after and I try to print I get an error YEAR UNKNOWN ERROR OCCERED ABOUT IMPRESSION" with a white screen

  • Satellite A200 - white screen with 3 beeps

    Hello My Toshiba Satellite A200 was recently gives me a white screen with 3 beeps at every start. I took it to my friend for repair and they told me that I had to take the battery out and put it so that it starts. It worked for him, but not me. I cal

  • Photo Viewer

    This question relates to the photo viewer.  How to make all the thumbnails be actual photos and not the same chosen window pic?

  • USB copy to reinstall the program

    I did a factory reset on my laptop. Before I did it, I back up all data and program on a USB key. But I find copy back the program from USB after resetting the program (Microsoft Works) then run. I have reinstall using the disc to install., but the D

  • Small problem that appears when I crop an image!

    So that's my problem. Every time I have crop and make a circle mask in an image this bug on the right presents itself... I tried several times with other photos and I even make the video but keep appearing that thing in the picture... Someone knows h