This is a quick example of Log Miner implementation.Log Miner is a powerful tool and all DBA's should know and master it.Attached a summary of the first steps for mining archived logs or online redo logs
Kerberos and Sentry help us defining access privileges for a
limited set of object living on HDFS
We can extend the control by using access...
Whenever we run a BDA upgrade we see as one of the prerequisites
checks, to have the httpd service up and running on the first node
It may happen that when trying to reach the Exadata machine
using the management network, the data center switch that connects