Question related to the execution of the query by using the links to the DB

Hi all

I have a source and target database. Both are 11.2.0.3.

I have a query that is running on the source database and load data into the target database.

I created synonyms in the target for all of the tables referenced in the query, remaining at the source.

I run the query in the target using synonyms that I created. I see that the entire query became transferred to the source database and executed. The execution plan of the source was exactly the same as the way in which we could, if the query has been run directly there.

No problems so far.

Now, I have a database from different sources. Version 11.2.0.4.

When I try to mimic the same behavior using this data source, the complete query will NOT be transferred to the source. He made on the source (remote site) full table scans, transfer of data to the target (local site) and then by performing sort operations & the index range scans (min/max) on the target.

In both cases, all of the tables referenced in the query are accessible through the link in the DB.

Please let me know if there is no setting of database / everything which could control how or where a query with all accessible by link DB tables are optimized and executed? Ideally, I want the entire query to be transferred to the remote and executed site.

I can provide more details if necessary.

Thanks in advance.

Thank you sol.beach. Queries I tried both sources are in fact different. I failed to mention that.

@John,

We did recommend the creation of a view of the source, which is synonym on target and run the query. The client was not ready to create any object on the source system and so to test this workaround solution.

********************************************

After some time, I realized that there is a hardcoded as SYSDATE column. Whenever I took it / I did as null, because the entire query is getting transferred to the source DB.

"I changed 'SYSDATE column-name' to ' col_name (select SYSDATE from dual@remote_db_link). But this also seems to stop the query to be sent to the remote db as a whole.

Try to work around this problem, but any ideas are much appreciated.

Tags: Database

Similar Questions

  • Question related to the JSTL attributes

    Hello

    I am new to JSP and JSTL and needed to define the var attribute < C:SET / > tag to some time of execution attribute value but var does not support the rtexpr. Is there a reason why var and scope of the JSTL attribute do not appear to accept the value of rtexpr? Also if anyonce can suggest the solution so it would be great.

    Thank you
    Niraj Rouault

    Hi Andrew,

    I believe that by means of "rtexpr" expression of the run time. From my understanding of your question, you have a variable in JSP to assign a value to an expression that must be evaluated at run time. In this case, EL can be used. Please see the link below:

    http://docs.Oracle.com/javaee/5/tutorial/doc/bnahq.html

    Also note that you phrase your question thoroughly rather than use the abbreviated expression. This would help to get a quick and accurate response.

    Kind regards
    Amit

  • Question related to the entrance with pci 6221 and SCC 68 analog

    I use 6221 PCI and SCC 68 analog read of voltage between the terminals of the drain and the source of a transistor. The drain is at 0 Volt and source is connected to 5 volts via a 100 k resistor. The transistor is used as a follower of the source, and therefore the output is measured at the source of the Terminal. When I measure the voltage by using oscilloscope, I see clearly the change of output as a result of change of voltage of the door. But, when I try to acquire the same by using labview, I see nothing. I tried to change the signal to the CSR, NRSE, but nothing works. Seems to be that something related to differences in impedance. Can you please advice me on this issue? Thanks in advance

    Hi rsd111,

    I understand that you measure a circuit similar to this ( http://en.wikipedia.org/wiki/Common_drain)

    I also get that you use an external power supply with GND connected to the Drain and - 5V connected to the Source with a 100 k resistor.

    You should be able to measure the tension between D and S setup a differential measurement and connection Ai0 + D and Ai0 - s, in fact you can youse Ain you prefer.

    You should be able to do the same measure also at configuration NRSE linking Ai0 AiSense at the Source and drain.

    The Board's input impedance is greater than 10GOhm, it must behave as the oscilloscope in pairing mode high-impedance DC.

    6221 specifications: http://digital.ni.com/manuals.nsf/websearch/8117DF4C5A29C95C862573020061023B

    Nice day.

  • Question related to the Xbox; Impossible to get Xbox live or to connect to the internet

    I've had my Xbox 360 for 4 years now and have recently decided to use it. I put in place when I was first, and for some reason any, I put the setting of family on it, I asked my parents if they did but they said no, so I thought I could have done myself but I don't remember the password or my security question and now I can not their and I can't get Xbox live or connect to the internet. I looked on the internet means that I could reset the Xbox or the parameters of the family, but they include all something on your hard drive but I don't have a hard drive, I also saw that if you put your age as 18 years as the family settings are enabled and you can find your access code in the settings , but I don't know where to find it. I would be grateful to anyone who helps to solve this problem.

    Try Xbox support:
    http://support.Xbox.com/en-us/

  • Question related to the spam/hoax calls

    I frequently receive phone calls from an Asian voice claiming to be Microsoft support widows. He claims to have detected the virus and all kinds of horrible things on my computer. It will ask then as I turn my computer on and wait until the home screen is visible. It then asks me to press some buttons, which, out of suspicion, I refuse to do. I'm wrong. And if so, what might happen.

    Thank you in anticipation

    Bill

    Original title: am I paranoid

    Wednesday, January 21, 2015 16:17:35 + 0000, WilliamHolland1947 wrote:

    I frequently receive phone calls from an Asian voice claiming to be Microsoft support widows. He claims to have detected the virus and all kinds of horrible things on my computer. It will ask then as I turn my computer on and wait until the home screen is visible. It then asks me to press some buttons, which, out of suspicion, I refuse to do. I'm wrong. And if so, what might happen.

    Yes, you are right.

    It was a scam and with all the names and phone numbers, one who has
    become very frequent lately. See
    http://www.troyhunt.com/2012/08/virus-scams-social-engineering-victims.html
    and
    http://www.howtogeek.com/176605/tell-your-relatives-no-Microsoft-wont-call-you-about-your-computer/
    and
    http://www.howtogeek.com/180514/the-%E2%80%9ctech-support%E2%80%9D-scammers-called-Htg-so-we-had-fun-with-them/

    In addition to their money get on your part to do anything of any value,
    If you leave them in your computer, who knows what they were doing or where
    What confidential information they stole.

    So if you have done so, I highly recommend that you do both of the following
    immediately:

    1 do a clean reinstall of Windows.

    2. after reinstallation of Windows, change all your passwords.
    especially the banks or other
    financial sites.

  • Question related to the internet connection

    Hello

    MY NAME IS SANDY I'M SORRY THE BIG LETTERS I CAN SEE THEM BETTER. I HAVE A PROBLEM THAT NOTICING IN THE BAR DOWNSTAIRS, THE PIC OF MY INTERNET CONNECTION HAS AN X, BUT I'M ACTUALLY OK AND ABLE TO CONNECT TO THE NET. MY CONCERN IS THAT IT DOES NOT CONNECT TO MY NETWORK BUT HAS NEIGHBORS. HELP I'M WORRIED THAT MY PERSONAL INFORMATION MAY BE COMPROMISED. CAN SOMEONE HELP ME THROUGH AN EMAIL WITH HOW TO CONNECT TO MY OWN NETWORK. I THINK THAT I ASK THIS CORRECTLLY. IM HAS NO KNOWLEDGE OF REAL PUTER PERSON LIMITED BUT EAGER TO LEARN. I APPRECIATE NAY HELP AND THANK YOU IN ADVANCE.

    HANDYSANDY

    Sorry, what you ask is not possible via a forum because the person who assists you must have detailed information about your system that would be very difficult for a novice. Here are a few options for you to consider:

    -Ask a computer-savvy friend to help you.

    -Ask your service provider to help you. There will probably be a load.

    -Give a defendant remote access to your PC.

    The third option requires a difficult decision: How can you trust this meeting? Unfortunately I can't answer this question for you.

  • Two questions relating to the signature using restricted code API: s

    First question

    I have a library that contains classes that requires the signature in order to use API:s. limited one of the functions in the library uses "persistent storage". My application accesses the library import library module, then instanciates and calls the function that I need.

    Is it enough to have signed library or don't call asking the library must sign too?

    Second question

    Is it possible to configure the simulator so it actually tests that the modules using API: s limits are signed correctly?

    Check the Simulator definition "activate the safety of the device. When this setting is enabled, the Simulator checks would be signatures almost like a true pocket computer. For your application, which should be pretty good. If your module is missing a required signature, the simulated Pocket will complain even as would a normal hand.

  • Memory problems and questions related to the process

    Does this look just for you, because the modified memory does little until after I had computer problems and had to do a factory reset

    The operating system is Windows 7 64-bit edition SP1

    I disabled SuperFetch is told by the way, if this help anyone on this issue.

    Resource monitor

    Windows process

    Services

    Performance

    Hello

    When your computer doesn't have enough memory for all the actions it is trying to perform, Windows and your programs can stop working. To help prevent information loss, Windows will inform you when your computer is low on memory. You can also learn to recognize the signs of low memory and take measures to prevent the problem. Insufficient memory problems occur when your computer is running out of RAM and becomes virtual memory. This can happen when you run more programs that the RAM memory installed on the computer is designed to support. Low-memory problems can also occur when a program free up memory that it needs more. This problem is called memory overuse or a memory leak.

    You can consult the following Microsoft articles and check if it helps.

    Diagnosing memory problems on your computer

    http://Windows.Microsoft.com/en-AU/Windows7/diagnosing-memory-problems-on-your-computer

    Prevention of problems of memory

    http://Windows.Microsoft.com/en-AU/Windows/preventing-low-memory-problems#1TC=Windows-7

    You may receive an "Out of Memory" error message because of the limitation of in Windows Vista or Windows 7 desktop heap

    http://support.Microsoft.com/kb/947246

    Note: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems can occur if you modify the registry incorrectly. Therefore, make sure that you proceed with caution. For added protection, back up the registry before you edit it. Then you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click on the number below to view the article in the Microsoft Knowledge Base: http://windows.microsoft.com/en-US/windows7/Back-up-the-registry

    I hope this helps.

    Please post back with the State of the question and we will be happy to help you further.

  • Question related to the upgrade to Windows 8.1

    I currently have a HP laptop with 4 GB of Ram and 64-bit Windows 7 SR1 running. I'll give this computer to my wife, that his old bridge is going Tango-uniform (UT). I bought a new Lenovo SmartCheck S535 with 6 GB Ram 1 TB of storage. It came with Windows 7 SR1 already on board and he also included disks for Windows 8.1. First of all, I did a set of boot rescue disks and start them on the side.

    But now, I have a question, do I have to transfer my files from HP to Lenovo so that both use Windows 7 SR1? Or. should I go ahead and upgrade the OS and transfer the files.

    I'm sure that happens with a lot of people, there will be a lot of programs that I keep less re - install on the new computer. They are trash who are picked up along the way for those of us who use or service of computers as often we brush our teeth. Oops... maybe it's not such a great comparison, but you get what I mean!

    So, I would be very interested to hear your advice, your success, Yes and even a failure or two, all for the purpose of education.

    Thank you and I look forward to hearing from some of you.

    SteveG

    Original title: which came first - the chicken or the egg? (So to speak!)

    As a system dual boot, the only place where the 2 operating systems interact is the bootstrapper. Windows 8 will take the priority, is somewhat different, as far as it goes, and if you select then Windows 7 system reboots so it can do a little slower. Of course, there will be a loss of disk space but you are then also 2 installs of Office and everything else.

    If you were to go down the possibility to buy a kit Windows 8.1 you avoid the need to do a complete reinstall, because it will improve instead. You also avoid the need to run the upgrade of the store from 8 to 8.1. You must decide if the cost is justified, but in your situation, I would seriously consider that option as well.

    Even if I'm not a big fan of Windows 8 I made the full switch and are accustomed to him, I'm sure you will as well.

  • Question related to the extension of disk C

    Separated from this thread.

    Hey, I want to extend my C drive and have a lot of free space on my D drive, but the problem is my drive C is on disk 1 (TPG) and my D drive is on disc 2 (MBR) and I can't seem to transfer between the two discs... Anyone know if this is possible?

    Hi Stef,

    Thank you for visiting Microsoft Community to ask your question.

    MBR (Master Boot Record) and GPT (GUID Partition Table) are two ways to store the information of partition on a disk. You must convert the MBR to GPT or vice versa, then you would be able to share the space between them.

    For help, please refer to this link.

    Convert a disk from MBR in a GUID partition table disk

    http://TechNet.Microsoft.com/en-us/library/cc738416 (v = WS.10) .aspx

    Hope that the information provided is useful. Do not respond if you need more help.

  • Question related to the bays of transients

    Hello

    I have a memory error loading simple a helloworld applet that uses a transient 256bytes array in the constructor.

    I use a yubikey neo (atr FE: 3B FA 13 00 00 81 31 15 59 75 62 69 6 b 65 79 4th 45 4F A6), JCDK 2.2.2 and the Eclipse plugin. The PAC file is loaded using YPG.

    I can load only one instance of the applet (AA010203040506070809 help for example) correctly, but I get a memory error when I try to load a second copy (for example with the help of BB010203040506070809).

    Error message when loading the applet is: APDU response: 6 to 84.

    I'm sure that this error is due to the presence of an array of transitional: If this line is deleted, I can easily load multiple instance of the applet (the PAC file is only 3kbyte and I can easily load a cap of 30kbyte file).

    I don't understand why the memory error when loading of the applet (and not during execution) since the transient table is allocated in the RAM (as far as I understand).

    Secondly, two tables of 256 bytes doesn't seem much to me, since the yubikey has about 2915 byte memory transient available (depending on JavaCard support test).

    Obviously, I'm missing something but I don't know what.

    Here is the code of the applet (helloworld Sun modified with a line of the constructor):

    {code}

    /*

    * Copyright 2005 Sun Microsystems, Inc. All rights reserved.

    * SUN PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.

    */

    // /*

    Workfile: @(#) HelloWorld.java 1.7

    Version: 1.7

    Date: 01/03/06

    //

    Archive: /Products/Europa/samples/com/sun/javacard/samples/HelloWorld/HelloWorld.java

    Change: 03/01/06 19:01:06

    Original author: Mitch Butler

    // */

    package helloworld;

    Javacard.framework import. *;

    /**

    */

    public class helloworld extends Applet

    {

    Private byte [] echoBytes;

    private final static short LENGTH_ECHO_BYTES = 256;

    Private byte [] transientarray;

    /**

    * Only installation method of this class should create the object of the cmdlet.

    */

    HelloWorld() protected

    {

    echoBytes = new ubyte [LENGTH_ECHO_BYTES];

    transientarray = 256 JCSystem.makeTransientByteArray ((short), JCSystem.CLEAR_ON_RESET); / / Transitional table causes the error of memory when loading the

    Register();

    }

    /**

    * Install this applet.

    @param Baker table that contains the installation settings

    @param bOffset starting in Baker offset

    @param bLength the length in bytes of the data parameter Baker

    */

    Public Shared Sub install (byte [] Baker, short bOffset, bLength bytes)

    {

    new helloworld();

    }

    /**

    * Treats an incoming APDU.

    * @see APDU

    @param apdu incoming APDU

    ISOException @exception with the bytes of response according to ISO 7816-4

    */

    Public Sub process (APDU apdu)

    {

    ubyte buffer [] = apdu.getBuffer ();

    short bytesRead = apdu.setIncomingAndReceive ();

    short echoOffset is 0 (short).;

    While (bytesRead > 0) {}

    Util.arrayCopyNonAtomic (buffer, ISO7816. OFFSET_CDATA, echoBytes, echoOffset, bytesRead);

    echoOffset += bytesRead;

    bytesRead = apdu.receiveBytes (ISO7816. OFFSET_CDATA);

    }

    apdu.setOutgoing ();

    apdu.setOutgoingLength ((short) (echoOffset + 5));

    header of the echo

    apdu.sendBytes ((short) 0, (short) 5);

    the echo data

    apdu.sendBytesLong (echoBytes, (short) 0, echoOffset);

    }

    }

    {code}

    Hello

    I don't see any problems either.

    The limit could come from the yubikey itself, cards may have a limit on the number of instances they allow by the applet. I already saw this, and this info is rarely available until you have problems and ask the provider of card/object.

    It seems not to be the case because "it works" without the transient table.

    There are some things you can try:

    1)

    Very often the buffer APDU itself can be used volatile buffer, without transitional additional.

    2)

    I try to use JCSystem.CLEAR_ON_DESELECT instead of JCSystem.CLEAR_ON_RESET.

    These may not be implemented, or maybe a bug. The difference is that all CLEAR_ON_DESELECT references are "stacked" for each instance, instead of reserve more memory for each instance.

    3)

    Even if you create more than one instance, the PAC file is loaded only once, same as a class in a real JVM, and each instance uses only memory to store references and objects of "instance". However, static fields are (obviously) only stored as a single, shared by all instances.

    It is possible to declare your 'static' transitional object and return only once, as you would for a singleton object, when the reference is found to be "null". This is possible because usually, instance that a cmdlet is alive at a given time, and this memory is a buffer of time anyway, so we don't care if it belongs to the class or instance.

    There is a catch though, as the reference to that object is bound to the class (package) and not to the instance. If this object reference is retained even if you delete all instances (and you will find it again once you re - create another instance). It will be only deleted when you delete the package.

    If this is a problem, the solution is explicitly to count the number of instances created: increment a static field in the constructor and it decrement in uninstall() reminder provided by the AppletEvent of JC 2.2.x interface.

  • question related to the shared pool

    Hi Experts,

    Version of DB - Oracle Database 11g Enterprise Edition Release 11.2.0.1.0

    OS - Windows 7

    (installed on my laptop)

    Just started reading concepts DBA. I had a few questions. Please explain indetail/short ;-).

    (1) can we see the size of the Cache of the library and Cache data dictionary which are internal units of the Shared pool.
    (2) one of the advantages of the package is - when we invoke a single method, oracle loads the whole package into the buffer and for subsequent calls, it will not go to the db files. Here the buffer means library Cache. My understanding is correct.
    (3) I am able to see the two parameters shared_pool_size(value =0), shared_pool_reserved_size (value 15099494) to parameter v$. What is the difference between these two parameters.


    Thank you very much in advance for your help.

    See you soon,.
    Suri ;-)

    Your questions:

    1 Yes, v$ sgastat

    2 Yes, if your terminology is a little loose.

    3. the parameters described here, content

  • Question related to the requirement of since 11.1.1.5 uppercase variable names

    Hello

    I recently upgraded from 11.1.1.3 to 11.1.1.6 version of ODI.

    I had a few problems of running packages that worked on 11.1.1.3. I figured out it was the variable case question.

    I have a lot of procedures in my project, where I'm passing lower cased variable of command on the source of command on the target.

    For example

    Command on the target:

    OdiStartScen-SCEN_NAME = PACKAGE1-SCEN_VERSION =-1 - LOG_LEVEL = #log_level-GLOBAL. V_HOST = #host - GLOBAL. V_PORT = #port

    Command on the source:

    Select the host, port, log_level < % = odiRef.getObjectName ("TABLE") % >


    I tried to use double quotes, it didn't work. Then I wrote all the variables at the top of case (OdiStartScen-SCEN_NAME = PACKAGE1-SCEN_VERSION =-1 - LOG_LEVEL = #LOG_LEVEL-GLOBAL.) V_HOST = #HOST - GLOBAL. V_PORT = #PORT) and it worked.

    Now I have a big project on my hands, with a large number of procedures.

    Is there a solution to automate the process?

    Love, looking for a certain string (log_level, host...) in each of the control of each procedure throughout the project and replace it with the capital letter? Maybe the Jython script?

    It would save me a lot of time. Help, please.

    Thanks for you effort in advance!

    It was a bug (12971227) on 11.1.1.6.0 and there is a patch available to fix the problem. Please apply the patch that contains the fix for the bug 12971227 in your environment.

  • Question related to the INSERT statement

    Imagine this scenario:

    -table_a has 5 000 000 records at time t1

    -table_b is empty at time t1

    -At time t1, I execute the following statement:
              insert into table_b
                select * from table_a;
        
    -L' insert statement ends in time t2

    -Between t1 and t2, say 3 000 new records have been added to the table_a (by OLTP processes).
    Thus, at time t2, table_a has 5 003 000 records.

    My question is, at time t2, the number of records will be in table_b? Will it 5,000,000 or
    5 003 000 or somewhere between these two counts?

    I guess it will be 5,000,000 because that is the number when the insert statement
    has started to run.

    Any comment is appreciated.

    Syed Ullah says:
    Imagine this scenario:

    -table_a has 5 000 000 records at time t1

    -table_b is empty at time t1

    -At time t1, I execute the following statement:

    insert into table_b
    select * from table_a;
    

    -L' insert statement ends in time t2

    -Between t1 and t2, say 3 000 new records have been added to the table_a (by OLTP processes).
    Thus, at time t2, table_a has 5 003 000 records.

    My question is, at time t2, the number of records will be in table_b? Will it 5,000,000 or
    5 003 000 or somewhere between these two counts?

    I guess it will be 5,000,000 because that is the number when the insert statement
    has started to run.

    Any comment is appreciated.

    At time t2, it is possible that the answer is 0. Once the insert operation finishes (can be any time after t1 in your example, possibly before t2, possibly after) and assuming you checked in the same session where you run the insert, you would see 5 000 000. In other sessions you would continue to see 0 up to what the session who made the done insert one COMMIT.

    http://docs.Oracle.com/CD/E11882_01/server.112/e25789/consist.htm#CNCPT121

    Is something that you should read. He described these concepts much better than what you'll probably find in a few posts on the forum.

  • Newbie question relative to the composition of base layer VERY in PSE3

    Sorry, this question is interbreeding - I want to do something super basic, but I can't know, of 40 - odd micro-sous-topics which the PE3 help file lists for layers - unnecessarily, not in any order of workflow - how to do this.

    I have a photo of a person in a room. I also have a picture of a beach.

    I want to cut the man of the 1st photo, stick him on the beach and then be able to manipulate him (him reposition, resize, etc.) without affecting the substance of the beach. A

    I used the magic lasso to select the man of the 1st photo and then copied him, then he glued on the picture of the beach. Problem is doing that I can not slect / manipulate comes from him; It is now merged in the photo of the beach, so no matter what I try to do just the man, now affects the whole new man + the photo of the beach.

    It is hgot to be the only way to do it... can someone take pity on me and give me a beef?

    Well, hover over the Panel layers/pallet and click on the layer with the man (should be the top layer there). Then click on the move tool, which is the first tool in the Toolbox. Then you should be able to grasp man and move him, resize, rotate, etc..

    When you want to stop working on the picture, save it as a PSD or Tiff file to keep the layers so that you can make further changes. JPEG can't have layers so it will definitely be stuck if you use this format.

Maybe you are looking for