The document summarizes updating the cell nodes of an Exadata system from image version 11.2.3.3.0 to 11.2.3.3.1. It describes downloading and running the patchmgr tool which automates the process, including stopping services, applying patches and rpms, rebooting cells, and verifying the new image version. The process took approximately 2 hours to complete across 3 cell nodes.
The document summarizes steps taken to update the database (db) nodes on an Exadata system from software version 11.2.3.2.1 to 11.2.3.3.0 using the dbnodeupdate.sh utility. It provides details of prerequisites, running the utility in update mode with the -u flag and specified media source, and validations performed during the process including dependency checks. The summary includes checking for known issues, collecting diagnostics, and noting next steps after upgrade completion.
The more components a system has, the more challenging its maintenance becomes. Oracle Exadata marries storage with computation through a fast, reliable network, and patching all of these seems daunting. Many companies seem to struggle with it, with some even avoiding it altogether by keeping it “pending.” This session presents tested, applied, and working tips to make the Oracle Exadata patching experience smooth as silk, like vacationing in Hawaii.
Tuned is a tool that dynamically tunes Linux system settings for optimal performance based on usage profiles. It was created to allow systems to be tuned for peak performance during high workload times while saving power during idle periods. Tuned includes several predefined profiles that adjust settings for common use cases like high throughput, low latency, or power saving. New in Red Hat Enterprise Linux 7, Tuned is installed by default and will automatically select an initial profile based on system type. It also includes additional tuning capabilities and monitoring plugins for even more dynamic optimization of subsystems.
The goal of this test plan is to test SPECTRE and MELTDOWN performance impact on Intel CPU. We will run CPU intensive workloads in Virtual Machine(s) running on non-patched and patched ESXi host and observe performance impact.
We will test impact on network, storage and memory performance because these I/O intensive workloads requires CPU caching which is impacted by vulnerabilities remediation.
Qualification of performance is very specific and hard subject. The performance impact varies across different hardware and software configurations. However, performed tests are very well described in this document so the reader can understand all conditions of the test and observed results. The reader can also perform tests on his specific hardware and software configurations.
This is the document which explain the step by step procedure to upgrade PowerVC from 1.3.0.2 to 1.3.2.0. I've added useful information in the documents.
Introduction to Novell ZENworks Configuration Management TroubleshootingNovell
This document provides an introduction and overview of Novell ZENworks Configuration Management troubleshooting. It discusses troubleshooting agents, including checking agent services, communication, cache, and using the ZENworks Administration Command (ZAC). It also covers troubleshooting servers, including checking server services, communication, and logs. Finally, it discusses ZENworks and database management, including the different database types, ZMAN usage, and system update processes.
This document provides an overview of Exadata patching. It discusses that patching has improved over time. Oracle will patch Exadata systems for customers with support contracts. Exadata patches are applied using patchmgr and involve pushing new OS images to storage cells which reboot multiple times. Database servers are patched using yum. Quarterly database patches contain RDBMS, CRS, and Diskmon patches applied together using opatch. It is important to test patches in non-production first and have a patching plan.
Raul Leite discusses several key NFV concepts and bottlenecks including:
1) NFV architecture which aims for independent hardware, automatic network operation, and flexible application development.
2) Common NFV bottlenecks like packet loss, hypervisor overhead, and low throughput due to CPU and resource allocation issues.
3) Techniques to optimize NFV performance such as SR-IOV, PCI passthrough, hugepages, CPU pinning, and DPDK. SR-IOV and PCI passthrough provide direct access to network hardware while hugepages, pinning and DPDK improve CPU performance.
The document summarizes steps taken to update the database (db) nodes on an Exadata system from software version 11.2.3.2.1 to 11.2.3.3.0 using the dbnodeupdate.sh utility. It provides details of prerequisites, running the utility in update mode with the -u flag and specified media source, and validations performed during the process including dependency checks. The summary includes checking for known issues, collecting diagnostics, and noting next steps after upgrade completion.
The more components a system has, the more challenging its maintenance becomes. Oracle Exadata marries storage with computation through a fast, reliable network, and patching all of these seems daunting. Many companies seem to struggle with it, with some even avoiding it altogether by keeping it “pending.” This session presents tested, applied, and working tips to make the Oracle Exadata patching experience smooth as silk, like vacationing in Hawaii.
Tuned is a tool that dynamically tunes Linux system settings for optimal performance based on usage profiles. It was created to allow systems to be tuned for peak performance during high workload times while saving power during idle periods. Tuned includes several predefined profiles that adjust settings for common use cases like high throughput, low latency, or power saving. New in Red Hat Enterprise Linux 7, Tuned is installed by default and will automatically select an initial profile based on system type. It also includes additional tuning capabilities and monitoring plugins for even more dynamic optimization of subsystems.
The goal of this test plan is to test SPECTRE and MELTDOWN performance impact on Intel CPU. We will run CPU intensive workloads in Virtual Machine(s) running on non-patched and patched ESXi host and observe performance impact.
We will test impact on network, storage and memory performance because these I/O intensive workloads requires CPU caching which is impacted by vulnerabilities remediation.
Qualification of performance is very specific and hard subject. The performance impact varies across different hardware and software configurations. However, performed tests are very well described in this document so the reader can understand all conditions of the test and observed results. The reader can also perform tests on his specific hardware and software configurations.
This is the document which explain the step by step procedure to upgrade PowerVC from 1.3.0.2 to 1.3.2.0. I've added useful information in the documents.
Introduction to Novell ZENworks Configuration Management TroubleshootingNovell
This document provides an introduction and overview of Novell ZENworks Configuration Management troubleshooting. It discusses troubleshooting agents, including checking agent services, communication, cache, and using the ZENworks Administration Command (ZAC). It also covers troubleshooting servers, including checking server services, communication, and logs. Finally, it discusses ZENworks and database management, including the different database types, ZMAN usage, and system update processes.
This document provides an overview of Exadata patching. It discusses that patching has improved over time. Oracle will patch Exadata systems for customers with support contracts. Exadata patches are applied using patchmgr and involve pushing new OS images to storage cells which reboot multiple times. Database servers are patched using yum. Quarterly database patches contain RDBMS, CRS, and Diskmon patches applied together using opatch. It is important to test patches in non-production first and have a patching plan.
Raul Leite discusses several key NFV concepts and bottlenecks including:
1) NFV architecture which aims for independent hardware, automatic network operation, and flexible application development.
2) Common NFV bottlenecks like packet loss, hypervisor overhead, and low throughput due to CPU and resource allocation issues.
3) Techniques to optimize NFV performance such as SR-IOV, PCI passthrough, hugepages, CPU pinning, and DPDK. SR-IOV and PCI passthrough provide direct access to network hardware while hugepages, pinning and DPDK improve CPU performance.
This document provides an introduction to kdump and kernel crash dump analysis. It discusses kexec, which allows fast rebooting by loading a new kernel from an already running kernel. Kdump uses kexec to boot a capture kernel to analyze the state of a crashed production kernel and capture a vmcore dump file. The document outlines how to configure kdump by reserving memory, setting the dump target, enabling the kdump service, and testing a crash. Kernel crash dumps can be analyzed using the crash utility to help debug issues.
How to assign unowned disk in the netapp cluster 8.3 Saroj Sahu
Here it has been described how to assign the disk which is unowned to the node in the netapp cluster mode 8.3 and how to enable the disk assign option shelf level and stack level
Building “old” Windows drivers (XP, Vista, 2003 and 2008) with Visual Studio ...Yan Vugenfirer
This document provides steps for building "old" Windows drivers (for XP, Vista, 2003, and 2008) using Visual Studio 2013. It discusses maintaining a single code base across OS versions and using C++11 features of VS2013. The basic steps are to use the VS2013 compiler but include files and libraries from a legacy DDK, adjust preprocessor definitions and linker options for the target OS, and modify packaging for KMDF drivers.
Microsoft Hardware Certification Kit (HCK) setupYan Vugenfirer
The document discusses setting up the Windows Hardware Certification Kit (HCK) which is used to certify devices and sign their binaries. It describes preparing a server ("HCK Studio") and at least one client machine by setting static IPs, disabling firewalls and updates, and renaming them. The HCK Studio is installed on the server along with client software on other machines. Tests are then configured, selected devices tested, and results exported for certification. Running tests may require manual steps and specialized configurations. Additional utilities exist for automated and virtualized testing.
ARM Linux Booting Process
One must be wondering How this Embedded Devices come to life? What goes into this devices that will tune to users Commands. We are going to explain about Embedded Arm based devices in general as The ARM architecture is a widely used 32-bit RISC processor architecture. In fact, the ARM family accounts for about 75% of all 32-bit CPUs, and about 90% of all embedded 32-bit CPUs.
Kdump and the kernel crash dump analysisBuland Singh
Kdump is a kernel crash dumping mechanism that uses kexec to load a separate crash kernel to capture a kernel memory dump (vmcore file) when the primary kernel crashes. It can be configured to dump the vmcore file to local storage or over the network. Testing involves triggering a kernel panic using SysRq keys which causes the crash kernel to load and dump diagnostic information to the configured target path for analysis.
QEMU Development and Testing Automation Using MS HCK - Anton Nayshtut and Yan...Yan Vugenfirer
Windows Hardware Certification Kit (HCK) is a set of tools, processes, and tests for certifying HW devices, device drivers and systems. Being a great test environment for QEMU devices, Windows Guest device drivers and related Host subsystems, it's still frightening due to deployment complexity. We'll share a way to deploy HCK setup(s) on top of QEMU VMs in just a few minutes.
Backup workflow for SMHV on windows 2008R2 HYPER-VAshwin Pawar
SnapManager for Hyper-V (SMHV) leverages NetApp's Snapshot technology to create backups of virtual machines hosted on Windows 2008 R2 Hyper-V servers. These backups capture point-in-time images of the VMs stored locally on the NetApp storage. The document describes the backup workflow in three levels - high level, low level, and raw, detailing the sequence of actions taken by SMHV, Hyper-V, and the NetApp storage system to back up the VMs using Snapshot technology in a consistent manner.
This document provides information about running NDISTest, including:
1) How to run NDISTest in standalone mode by opening the NDISTest.Net directory and running NDISTest.exe with administrator privileges.
2) How to run the NDISTest server by choosing "Server" from the file menu, selecting the message and support devices, and clicking "start".
3) How to run the NDISTest client by choosing "Client" from the file menu, selecting the test, message, and support devices, and clicking "start" to run selected tests.
The document discusses analyzing Linux kernel crash dumps. It covers various ways to gather crash data like serial console, netconsole, kmsg dumpers, Kdump, and Pstore. It then discusses analyzing the crashed kernel using tools like ksymoops, crash utility, and examining the backtrace, kernel logs, processes, and file descriptors. The document provides examples of gathering data from Pstore and using commands like bt, log, and ps with the crash utility to extract information from a crash dump.
When your whole system is unresponsive, how to investigate on this failure ?
We'll see how to get a memory dump for offline analysis with kdump system.
Then how to analyze it with crash utility.
And finally, how to use crash on a running system to modify the kernel memory (at your own risks !)
The document provides an overview of kernel crash dump analysis including:
- The tools and data required such as the crash utility, kernel symbol files, vmcore files
- How to install and use these components
- Basic crash commands to analyze system, memory, storage, and network subsystems
- How to dynamically load crash extension modules to add custom commands
How to shutdown and power up of the netapp cluster mode storage systemSaroj Sahu
This slide will guide you how to shutdown and power up of the Netapp cluster mode storage system in command mode. (It will depict you environmental shutdown process (SAN environment in a DataCenter)
Upgrading MySQL databases do not come without risk. There is no guarantee that no problems will happen if you move to a new major MySQL version.
Should we just upgrade and rollback immediately if problems occur? But what if these problems only happen a few days after migrating to this new version?
You might have a database environment that is risk-adverse, where you really have to be sure that this new MySQL version will handle the workload properly.
Examples:
- Both MySQL 5.6 and 5.7 have a lot of changes in the MySQL Optimizer. It is expected that this improves performance of my queries, but is it really the case? What if there is a performance regression? How will this affect my database performance?
- Also, there are a lot of incompatible changes which are documented in the release notes, how do I know if I'm affected by this in my workload? It's a lot to read..
- Can I go immediately from MySQL 5.5 to 5.7 and skip MySQL 5.6 even though the MySQL documentation states that this is not supported?
- Many companies have staging environments, but is there a QA team and do they really test all functionality, under a similar workload?
This presentation will show you a process, using open source tools, of these types of migrations with a focus on assessing risk and fixing any problems you might run into prior to the migration.
This process can then be used for various changes:
- MySQL upgrades for major version upgrades
- Switching storage engines
- Changing hardware architecture
Additionally, we will describe ways to do the actual migration and rollback with the least amount of downtime.
CTX138217 - IntelliCache Reduction in IOPS: XenDesktop 5.6 FP1 on XenServer 6.1 - Citrix Knowledge Center http://ow.ly/o3Ma4
The purpose of this document is to provide testing results based on MCS-delivered streamed virtual desktops leveraging IntelliCache
This document provides steps to apply the 10.2.0.5 patch set to a 2-node Oracle RAC database on Linux x86_64. It involves upgrading Clusterware, ASM, and the database homes. Key steps include backing up components, stopping services, running root scripts, and verifying versions after upgrade. Issues encountered like file handle limits are also addressed.
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiThe Linux Foundation
As CPU integrates more cores, server will have more and more cores. It requires hypervisor to have good scalability. This talk will introduce our analysis on many core scalability of Xen, and share some findings and lessons.
Vbox virtual box在oracle linux 5 - shoug 梁洪响maclean liu
The document describes setting up an Oracle 11g Release 2 RAC environment using VirtualBox virtual machines on Oracle Linux 5.7. It outlines planning the RAC logical architecture and installation requirements. It then details steps to create two virtual machines, install Oracle Linux on them, configure user accounts and directories for the Grid and Oracle software installations, and prepare the systems for the Oracle software installations.
This document provides an overview of topics covered in a biology course, including:
- The components of a balanced diet and how exercise affects health.
- How pathogens make us ill and how the body protects against them.
- The development and testing of medical drugs, and issues around drug dependence.
- Genetic variation, inheritance, and different types of reproduction.
- Evolution by natural selection and genetic variation over generations.
- Ecological concepts like food chains, nutrient cycling, and indicator species.
Students are to put their name on a poster sheet, answer a math question by showing all work, images, and words on the poster, and present their answer to the class. Their poster will be marked based on the clarity of writing and representation of math concepts with all work shown, the accuracy of math work, and correct use of math terms in the presentation.
This document provides an introduction to kdump and kernel crash dump analysis. It discusses kexec, which allows fast rebooting by loading a new kernel from an already running kernel. Kdump uses kexec to boot a capture kernel to analyze the state of a crashed production kernel and capture a vmcore dump file. The document outlines how to configure kdump by reserving memory, setting the dump target, enabling the kdump service, and testing a crash. Kernel crash dumps can be analyzed using the crash utility to help debug issues.
How to assign unowned disk in the netapp cluster 8.3 Saroj Sahu
Here it has been described how to assign the disk which is unowned to the node in the netapp cluster mode 8.3 and how to enable the disk assign option shelf level and stack level
Building “old” Windows drivers (XP, Vista, 2003 and 2008) with Visual Studio ...Yan Vugenfirer
This document provides steps for building "old" Windows drivers (for XP, Vista, 2003, and 2008) using Visual Studio 2013. It discusses maintaining a single code base across OS versions and using C++11 features of VS2013. The basic steps are to use the VS2013 compiler but include files and libraries from a legacy DDK, adjust preprocessor definitions and linker options for the target OS, and modify packaging for KMDF drivers.
Microsoft Hardware Certification Kit (HCK) setupYan Vugenfirer
The document discusses setting up the Windows Hardware Certification Kit (HCK) which is used to certify devices and sign their binaries. It describes preparing a server ("HCK Studio") and at least one client machine by setting static IPs, disabling firewalls and updates, and renaming them. The HCK Studio is installed on the server along with client software on other machines. Tests are then configured, selected devices tested, and results exported for certification. Running tests may require manual steps and specialized configurations. Additional utilities exist for automated and virtualized testing.
ARM Linux Booting Process
One must be wondering How this Embedded Devices come to life? What goes into this devices that will tune to users Commands. We are going to explain about Embedded Arm based devices in general as The ARM architecture is a widely used 32-bit RISC processor architecture. In fact, the ARM family accounts for about 75% of all 32-bit CPUs, and about 90% of all embedded 32-bit CPUs.
Kdump and the kernel crash dump analysisBuland Singh
Kdump is a kernel crash dumping mechanism that uses kexec to load a separate crash kernel to capture a kernel memory dump (vmcore file) when the primary kernel crashes. It can be configured to dump the vmcore file to local storage or over the network. Testing involves triggering a kernel panic using SysRq keys which causes the crash kernel to load and dump diagnostic information to the configured target path for analysis.
QEMU Development and Testing Automation Using MS HCK - Anton Nayshtut and Yan...Yan Vugenfirer
Windows Hardware Certification Kit (HCK) is a set of tools, processes, and tests for certifying HW devices, device drivers and systems. Being a great test environment for QEMU devices, Windows Guest device drivers and related Host subsystems, it's still frightening due to deployment complexity. We'll share a way to deploy HCK setup(s) on top of QEMU VMs in just a few minutes.
Backup workflow for SMHV on windows 2008R2 HYPER-VAshwin Pawar
SnapManager for Hyper-V (SMHV) leverages NetApp's Snapshot technology to create backups of virtual machines hosted on Windows 2008 R2 Hyper-V servers. These backups capture point-in-time images of the VMs stored locally on the NetApp storage. The document describes the backup workflow in three levels - high level, low level, and raw, detailing the sequence of actions taken by SMHV, Hyper-V, and the NetApp storage system to back up the VMs using Snapshot technology in a consistent manner.
This document provides information about running NDISTest, including:
1) How to run NDISTest in standalone mode by opening the NDISTest.Net directory and running NDISTest.exe with administrator privileges.
2) How to run the NDISTest server by choosing "Server" from the file menu, selecting the message and support devices, and clicking "start".
3) How to run the NDISTest client by choosing "Client" from the file menu, selecting the test, message, and support devices, and clicking "start" to run selected tests.
The document discusses analyzing Linux kernel crash dumps. It covers various ways to gather crash data like serial console, netconsole, kmsg dumpers, Kdump, and Pstore. It then discusses analyzing the crashed kernel using tools like ksymoops, crash utility, and examining the backtrace, kernel logs, processes, and file descriptors. The document provides examples of gathering data from Pstore and using commands like bt, log, and ps with the crash utility to extract information from a crash dump.
When your whole system is unresponsive, how to investigate on this failure ?
We'll see how to get a memory dump for offline analysis with kdump system.
Then how to analyze it with crash utility.
And finally, how to use crash on a running system to modify the kernel memory (at your own risks !)
The document provides an overview of kernel crash dump analysis including:
- The tools and data required such as the crash utility, kernel symbol files, vmcore files
- How to install and use these components
- Basic crash commands to analyze system, memory, storage, and network subsystems
- How to dynamically load crash extension modules to add custom commands
How to shutdown and power up of the netapp cluster mode storage systemSaroj Sahu
This slide will guide you how to shutdown and power up of the Netapp cluster mode storage system in command mode. (It will depict you environmental shutdown process (SAN environment in a DataCenter)
Upgrading MySQL databases do not come without risk. There is no guarantee that no problems will happen if you move to a new major MySQL version.
Should we just upgrade and rollback immediately if problems occur? But what if these problems only happen a few days after migrating to this new version?
You might have a database environment that is risk-adverse, where you really have to be sure that this new MySQL version will handle the workload properly.
Examples:
- Both MySQL 5.6 and 5.7 have a lot of changes in the MySQL Optimizer. It is expected that this improves performance of my queries, but is it really the case? What if there is a performance regression? How will this affect my database performance?
- Also, there are a lot of incompatible changes which are documented in the release notes, how do I know if I'm affected by this in my workload? It's a lot to read..
- Can I go immediately from MySQL 5.5 to 5.7 and skip MySQL 5.6 even though the MySQL documentation states that this is not supported?
- Many companies have staging environments, but is there a QA team and do they really test all functionality, under a similar workload?
This presentation will show you a process, using open source tools, of these types of migrations with a focus on assessing risk and fixing any problems you might run into prior to the migration.
This process can then be used for various changes:
- MySQL upgrades for major version upgrades
- Switching storage engines
- Changing hardware architecture
Additionally, we will describe ways to do the actual migration and rollback with the least amount of downtime.
CTX138217 - IntelliCache Reduction in IOPS: XenDesktop 5.6 FP1 on XenServer 6.1 - Citrix Knowledge Center http://ow.ly/o3Ma4
The purpose of this document is to provide testing results based on MCS-delivered streamed virtual desktops leveraging IntelliCache
This document provides steps to apply the 10.2.0.5 patch set to a 2-node Oracle RAC database on Linux x86_64. It involves upgrading Clusterware, ASM, and the database homes. Key steps include backing up components, stopping services, running root scripts, and verifying versions after upgrade. Issues encountered like file handle limits are also addressed.
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiThe Linux Foundation
As CPU integrates more cores, server will have more and more cores. It requires hypervisor to have good scalability. This talk will introduce our analysis on many core scalability of Xen, and share some findings and lessons.
Vbox virtual box在oracle linux 5 - shoug 梁洪响maclean liu
The document describes setting up an Oracle 11g Release 2 RAC environment using VirtualBox virtual machines on Oracle Linux 5.7. It outlines planning the RAC logical architecture and installation requirements. It then details steps to create two virtual machines, install Oracle Linux on them, configure user accounts and directories for the Grid and Oracle software installations, and prepare the systems for the Oracle software installations.
This document provides an overview of topics covered in a biology course, including:
- The components of a balanced diet and how exercise affects health.
- How pathogens make us ill and how the body protects against them.
- The development and testing of medical drugs, and issues around drug dependence.
- Genetic variation, inheritance, and different types of reproduction.
- Evolution by natural selection and genetic variation over generations.
- Ecological concepts like food chains, nutrient cycling, and indicator species.
Students are to put their name on a poster sheet, answer a math question by showing all work, images, and words on the poster, and present their answer to the class. Their poster will be marked based on the clarity of writing and representation of math concepts with all work shown, the accuracy of math work, and correct use of math terms in the presentation.
The document discusses the key characteristics of living organisms, including respiration, irritability/sensitivity, nutrition, growth, excretion, and reproduction. It provides details on each characteristic, such as how respiration uses oxygen and nutrients to release energy, irritability allows organisms to detect environmental changes, and nutrition requires taking in food for energy and growth. Reproduction ensures organisms can produce new individuals through sexual or asexual means. The document aims to list and describe the defining traits that distinguish living things.
This document contains vocabulary and grammar lessons related to money, modal verbs, and making adjectives negative. It includes words like cash, check, earns, afford, wasting, and change. For modal verbs, it discusses must, should, can't, might, and may. Examples are provided to illustrate usage of these terms in sentences. The final section covers how to make adjectives negative by adding prefixes like un- or dis-.
This document provides notes on AQA GCSE Biology for Unit 2. It covers several topics:
- Cells and cell structures, including the structures and functions of plant, animal, yeast and bacterial cells.
- Tissues, organs and organ systems, explaining how cells differentiate and organize into tissues, organs, and systems to carry out functions.
- Photosynthesis, outlining the process by which plants use light energy to produce glucose from carbon dioxide and water.
- Organisms and their environment, discussing physical factors that affect organisms and methods to collect quantitative data on populations and distributions.
- Proteins, explaining their structures and functions, including as enzymes, hormones, antibodies, and structural components.
OCR GCSE Biology B1 Gateway - concept maps and summariesdhmcmillan
This document discusses genetic variation and its causes. It explains that genetic variation is caused by gamete formation which results in male and female sex cells containing only 23 chromosomes that are all different. It also notes that fertilization, when the gametes from male and female combine randomly, leads to the 46 chromosomes of a new baby being formed randomly. Additionally, it states that mutations from spontaneous incorrect DNA division or environmental factors can cause genetic variation.
This document provides a summary of key concepts about DNA and genetics covered in a B2 science revision presentation. It defines DNA as located in the nucleus of plant and animal cells and in plasmid DNA of bacterial cells. Genes are sections of chromosomes that code for specific proteins. DNA has a double helix structure. The document also reviews DNA nucleotides, chromosomes, proteins, magnification, resolution, genetic engineering, enucleation, transcription, translation, mRNA, ribosomes, and polypeptides.
I am a GCSE Student and I have made a revision PowerPoint for Module B1 in Biology. This PowerPoint is helpful for your Science Exams for the Biology Unit/Section even if you don't do OCR Gateway as your exam board, you may do Edexcel or AQA or OCR 21st Century.
I have made this PowerPoint by following the Syllabus and Specification. My School does the OCR Gateway Science Specification B Course. I am an A*Student, so everything in the PowerPoint is up to an A/A* Standard - Higher Tier.
This PowerPoint is for Double Science which have four modules as shown below
B1, B2, B3, B4
C1, C2, C3, C4
P1, P2, P3, P4
I will be uploading more powerpoints for Modules 2-3 in Biology, and Modules 1-4 for Chemistry and Physics
Good luck and Happy Revising
This document provides information about GCSE Geography revision on dynamic planet topics. It includes case studies on volcanoes like Mt St Helens and Nyiragongo, as well as earthquakes in Kobe, Japan and Sichuan, China. There are exam focus questions on plate tectonics, hazards and management. Additional sections cover climate change in the past and future, threats to biomes, and conservation efforts. Review materials include theory, graphs to interpret, and guidance on key topics to know for the exam.
(1) The document provides information on biology revision cards covering topics such as classification, kingdoms, adaptation, thermoregulation, drugs, and pathogens.
(2) It discusses the five kingdoms and characteristics of each, as well as classification hierarchies from phylum down to species. Principles of Darwin's theory of evolution are also summarized.
(3) Thermoregulation in humans and plants is explained, covering processes like vasodilation, hypothalamus function, and plant hormones. Impacts of drugs like cigarettes and alcohol are also outlined.
Recommended for Core science students studying B1. NB: Only for the AQA exam board. For notes, look below:
B1.1 - Keeping Healthy: http://www.docbrown.info/page20/AQAscibio11.htm
B1.2 - Nerves and Hormones: http://www.docbrown.info/page20/AQAscibio12.htm
B1.3 - The use and abuse of drugs: http://www.docbrown.info/page20/AQAscibio13.htm
B1.4 - Interdependence and adaptation: http://www.docbrown.info/page20/AQAscibio14.htm
B1.5 - Energy and biomass in Food Chains: http://www.docbrown.info/page20/AQAscibio13.htm
B1.6 - Waste materials from plants and animals: http://www.docbrown.info/page20/AQAscibio16.htm
B1.7 - Genetic variation and its controls: http://www.docbrown.info/page20/AQAscibio17.htm
B1.8 - Evolution: http://www.docbrown.info/page20/AQAscibio18.htm
The document discusses strategies for teaching math to students with learning difficulties. It outlines the National Council of Teachers of Mathematics' goals of helping students become problem solvers, value and reason with math, and communicate mathematically. Challenges for students with learning disabilities in math include issues with attention, memory, organization and processing. Suggested teaching strategies include using manipulatives, the concrete-representational-abstract approach, the S.T.A.R. method, metacognitive strategies, direct instruction and corrective feedback.
A combination of a balanced diet and regular exercise is needed to help keep the body healthy and defend against infectious diseases. Our bodies have multiple lines of defense against pathogens like bacteria and viruses, including physical barriers, chemicals, white blood cells, and immunity through vaccination or previous exposure. However, some bacteria are developing resistance to antibiotics, so they should now only be used to treat serious infections.
This document provides guidance on completing the writing section of an English exam, which consists of two non-fiction writing tasks worth 16 and 24 marks respectively. It outlines the timing, structure, and content of the tasks, and offers tips for planning, developing ideas, using language effectively, and structuring writing to achieve a high grade. Key points include spending 25 minutes on the shorter task and 35 minutes on the longer one, aiming for 3-4 paragraphs on the first and 5-6 on the second. Advice is given on creating topic sentences, linking paragraphs, openings, endings, using similes, metaphors, emotive language and statistics.
The document provides a summary of the plot of Shakespeare's Macbeth in 5 acts. It describes Macbeth saving Scotland from invaders in the first act and meeting the witches who prophesize he will become king. In the following acts, Macbeth murders King Duncan and Banquo to fulfill the prophecies. Macbeth becomes increasingly paranoid and has Macduff's family killed. In the final act, Macbeth is killed by Macduff and Malcolm becomes the new King of Scotland. The document also lists some themes and main characters of the play.
Macbeth is one of Shakespeare's great tragedies based on Holinshed's Chronicles. It tells the story of the ambitious Macbeth and Lady Macbeth who murder King Duncan so that Macbeth can become king. However, Macbeth's reign is troubled as he commits more murders to protect his power from threats, going against the witches' prophecies. In the end, the rightful heir Malcolm, with Macduff, defeat Macbeth with the help of Birnam Wood camouflaging their soldiers, fulfilling the prophecy of Macbeth's downfall.
The document provides an overview of topics related to physics including infrared radiation, kinetic theory, energy transfer through heating, heating and insulating buildings, energy transfers and efficiency, transferring electrical energy, generating electricity, the national grid, waves, sound, and reflection. It includes definitions, explanations, diagrams, and example exam questions for each topic.
This document covers several topics in biology including diet and exercise, pathogens, white blood cells, sense organs, the central nervous system, plant and animal hormones, testing medicines, adaptations, competition, environmental indicators, and genetic concepts like genes, chromosomes, DNA, variation, sexual and asexual reproduction, cloning, and genetic engineering. It provides information on these topics in a structured format with headings and subheadings.
This document provides an overview of assignments and activities for studying William Shakespeare's play Macbeth in a classroom setting. Students will read the play, watch a movie adaptation, discuss themes and symbols, complete character analyses, and take quizzes. They are introduced to some of the play's most famous lines and asked to consider why it and Shakespeare's works are still studied today. The document also includes introductory materials about the play's historical context, characters, and scenes.
OSDC 2017 - Werner Fischer - Linux performance profiling and monitoringNETWAYS
Nowadays system administrators have great choices when it comes down to Linux performance profiling and monitoring. The challenge is to pick the appropriate tools and interpret their results correctly.
This talk is a chance to take a tour through various performance profiling and benchmarking tools, focusing on their benefit for every sysadmin.
More than 25 different tools are presented. Ranging from well known tools like strace, iostat, tcpdump or vmstat to new features like Linux tracepoints or perf_events. You will also learn which tools can be monitored by Icinga and which monitoring plugins are already available for that.
At the end the goal is to gather reference points to look at, whenever you are faced with performance problems.
Take the chance to close your knowledge gaps and learn how to get the most out of your system.
The document provides instructions for initializing and reloading a router and switch in a lab network topology. It describes attaching devices, powering on, erasing startup configurations, reloading devices to remove old configurations from memory, and bypassing initial configuration dialogs. The purpose is to ensure the devices have no existing configurations before configuring the lab network.
OSMC 2015: Linux Performance Profiling and Monitoring by Werner FischerNETWAYS
Nowadays system administrators have great choices when it comes down to Linux performance profiling and monitoring. The challenge is to pick the appropriate tools and interpret their results correctly.
This talk is a chance to take a tour through various performance profiling and benchmarking tools, focusing on their benefit for every sysadmin.
More than 25 different tools are presented. Ranging from well known tools like strace, iostat, tcpdump or vmstat to new features like Linux tracepoints or perf_events. You will also learn which tools can be monitored by Icinga and which monitoring plugins are already available for that.
At the end the goal is to gather reference points to look at, whenever you are faced with performance problems.
Take the chance to close your knowledge gaps and learn how to get the most out of your system.
OSMC 2015 | Linux Performance Profiling and Monitoring by Werner FischerNETWAYS
The document discusses various Linux tools for profiling and monitoring system performance and resources. It provides examples of using mpstat to monitor CPU usage, vmstat to view memory and I/O statistics, and pidstat to analyze resource usage of specific processes. It also covers using iostat to monitor I/O subsystem performance and device utilization. The document aims to help understand how to use these tools to collect statistics and identify potential performance bottlenecks.
The root cause was a process getting a DLM EX lock on an inode and then trying to get a DLM PR lock on the same inode, causing a deadlock. Kernel patches were identified to avoid recursive locking and fix the deadlock. The patches were tested, added to the SUSE kernel source repository, and a PTF rpm was created and tested by the customer to resolve the issue.
Introducing Scylla Manager: Cluster Management and Task AutomationScyllaDB
By centralizing cluster administration and automating recurring tasks, Scylla Manager brings greater predictability and control to Scylla-based environments.
In this webinar, you will learn about Scylla Manager’s recurrent repair capabilities, including why recurrent repair is critical for Scylla production cluster administration, and why keeping it manual results in errors and suboptimal performance.
We will present a demo of how to set up and run recurrent and ad-hoc repairs on a Scylla cluster, and give you a sneak peek of the Scylla Manager roadmap, which includes cluster management, rolling upgrades, and integrated monitoring.
ThruPut Manager AE+: Automation for Production Control and Capacity ManagementCA Technologies
Nancy DiFilippo shares MVS Solutions' experiences with Automation, and how their customers are using ThruPut Manager AE+ to automate work load management, capacity management and production control. This presentation shows how AE+ extends all the functionality of ThruPut Manager AE to CA 7 workloads.
For more information on Mainframe solutions from CA Technologies, please visit: http://bit.ly/1wbiPkl
Как понять, что происходит на сервере? / Александр Крижановский (NatSys Lab.,...Ontico
Запускаем сервер (БД, Web-сервер или что-то свое собственное) и не получаем желаемый RPS. Запускаем top и видим, что 100% выедается CPU. Что дальше, на что расходуется процессорное время? Можно ли подкрутить какие-то ручки, чтобы улучшить производительность? А если параметр CPU не высокий, то куда смотреть дальше?
Мы рассмотрим несколько сценариев проблем производительности, рассмотрим доступные инструменты анализа производительности и разберемся в методологии оптимизации производительности Linux, ответим на вопрос за какие ручки и как крутить.
OSDC 2015: Georg Schönberger | Linux Performance Profiling and MonitoringNETWAYS
Nowadays system administrators have great choices when it comes down to performance profiling and monitoring. The challenge is to pick the ppropriate tool and interpret their results correctly.
This talk is a chance to take a tour through various performance profiling and benchmarking tools, focusing on their benefit for every sysadmin. The topics will range from simple application profiling over sysstat utilities to low-level tracing methods. Besides traditional Linux methods a short glance at MySQL and Linux containers will be taken, too, as they are widely spread technologies.
At the end the goal is to gather reference points to look at, if you are faced with performance problems. Take the chance to close your knowledge gaps and learn how to get the most out of your system.
Ganeti is a robust cluster virtualization management software tool. It’s built on top of existing virtualization technologies such as Xen and KVM and other Open Source software. Its integration with various technologies such as DRBD and LVM results in a cheaper High Availability infrastructure and linear scaling.
This hands-on tutorial will cover a basic overview of Ganeti, the step-by-step install & setup of a single-node and multi-node Ganeti cluster, operating the cluster, and some best practices of Ganeti.
If attendees want to participate in the optional hands-on portions of the tutorial, there will be virtual machine images available online and at the tutorial itself. We’ll be using VirtualBox and Vagrant to deploy Ganeti on two to three Ubuntu nodes.
The document provides steps to upgrade the IOS image and field programmable device (FPD) images on a Cisco 7206 router. The steps include deleting old image files, copying new IOS and FPD images via TFTP, verifying the image checksums, setting the boot configuration to use the new IOS image, and rebooting the router to complete the upgrade. Checks are also provided to confirm the VSA card and other modules are functioning after the upgrade.
HKG18-TR14 - Postmortem Debugging with CoresightLinaro
Session ID: HKG18-TR14
Session Name: HKG18-TR14 - Postmortem Debugging with Coresight
Speaker: Leo Yan
Track: Training
★ Session Summary ★
For most cases we can easily debug with kernel's oops dumping info, but sometimes we need to know more information for program execution flow before the issue happens. So we can rely on two tracing methods to reproduce the program execution flow, one method is using software tracing which is kernel's pstore method; another method is to rely on Coresight hardware tracing, this method also can avoid extra workload introduced by tracing itself. Coresight has provided two mechanisms for Postmortem debugging, one method is Coresight CPU debug module so we can extract CPU program counter info, this is quite straightforward to debug CPU lockup issue; Another is Coresight panic kdump, we connect kernel kdump mechanism to extract Coresight tracing data so we can reproduce the last execution flow before panic (even hang issue with some tweaking in kernel). This session wants to go through these topics and demonstrate the debugging tools on 96boards Hikey in 25 minutes session.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/hkg18/hkg18-tr14/
Presentation: http://connect.linaro.org.s3.amazonaws.com/hkg18/presentations/hkg18-tr14.pdf
Video: http://connect.linaro.org.s3.amazonaws.com/hkg18/videos/hkg18-tr14.mp4
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2018 (HKG18)
19-23 March 2018
Regal Airport Hotel Hong Kong
---------------------------------------------------
Keyword: Training
'http://www.linaro.org'
'http://connect.linaro.org'
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
Advanced percona xtra db cluster in a nutshell... la suite plsc2016Frederic Descamps
This is a tutorial I gave with my colleague Kenny Gryp at Percona Live 2016 in Santa Clara
Percona XtraDB Cluster is a high availability and high scalability solution for MySQL clustering. Percona XtraDB Cluster integrates Percona Server with the Galera synchronous replication library in a single product package, which enables you to create a cost-effective MySQL cluster.
For three years at Percona Live, we've introduced people to this technology... but what's next? This tutorial continues your education, and targets users that already have experience with Percona XtraDB Cluster and want to go further.
This tutorial will cover the following topics:
- Bootstrapping in details
- certification errors, understanding and preventing them
- Replication failures, how to deal with them
- Secrets of Galera Cache
- Mastering flow control
- Understanding and verifying replication throughput
- How to use WAN replication
- Implications of consistent reads
- Backups
- Load balancers and proxy protocol
This document provides an overview of Linux performance monitoring tools including mpstat, top, htop, vmstat, iostat, free, strace, and tcpdump. It discusses what each tool measures and how to use it to observe system performance and diagnose issues. The tools presented provide visibility into CPU usage, memory usage, disk I/O, network traffic, and system call activity which are essential for understanding workload performance on Linux systems.
Talk by Brendan Gregg for USENIX LISA 2019: Linux Systems Performance. Abstract: "
Systems performance is an effective discipline for performance analysis and tuning, and can help you find performance wins for your applications and the kernel. However, most of us are not performance or kernel engineers, and have limited time to study this topic. This talk summarizes the topic for everyone, touring six important areas of Linux systems performance: observability tools, methodologies, benchmarking, profiling, tracing, and tuning. Included are recipes for Linux performance analysis and tuning (using vmstat, mpstat, iostat, etc), overviews of complex areas including profiling (perf_events) and tracing (Ftrace, bcc/BPF, and bpftrace/BPF), and much advice about what is and isn't important to learn. This talk is aimed at everyone: developers, operations, sysadmins, etc, and in any environment running Linux, bare metal or the cloud."
This document discusses the crash reporting mechanism in Tizen. It describes the crash client, which handles crash signals and generates crash reports. It covers Samsung's crash-work-sdk and Intel's corewatcher crash clients. It also discusses the crash server that receives reports and the CrashDB web interface. Finally, it mentions crash reason location algorithms.
Advanced Percona XtraDB Cluster in a nutshell... la suiteKenny Gryp
This document provides a hands-on tutorial for advanced Percona XtraDB Cluster users. It discusses setting up a 3 node PXC cluster environment in VirtualBox and bootstrapping the initial cluster. It then covers topics like avoiding state snapshot transfers when restarting MySQL, recovering from clean and unclean shutdowns, and reproducing and diagnosing different types of conflicts through examples.
Forti gate troubleshooting_guide_v0.10Phong Nguyễn
The document provides troubleshooting guidance for FortiGate devices. It begins with requirements for opening support tickets, such as clearly describing the problem and network configuration. It then gives initial troubleshooting steps for issues like IPsec VPNs, high availability (HA), and traffic blocking. Debugging commands are suggested to gather key information for issues with interfaces, anti-spam, web filtering, and the FortiAnalyzer Security Appliance Extension (FSAE).
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Exadata cell update
1. Exadata
Cell Storage update
X2-2 quarter rack
image version from 11.2.3.3.0 to 11.2.3.3.1
Infrastructure & Governance
Date : 2015. 1.30
작성자 : 김 종 인
2. ■ Cell node update
- patchmgr 란? ( = DB node 의 dbnodeupdate.sh)
exadata 의 cell node 의 new release 를 적용하기 위한 모든 수동작업을 대체하고 작업전check 및 적
용과정을 자동으로 수행해주는 기능을 한다.
cell node image version / Infiniband Firmware 를 최신으로 Update 한다.
- patchmgr 버전 (별도로 다운받을 경우 11.2.3.x 와 12.1.x 버전용 따로 존재하므로 확인후 다운받아
야 한다. 문서 888828.1 항상확인)
- 2015년 1월 29일 기준 최신버전
11.2.3.3.1 - Patch 19166601 - Storage server and InfiniBand switch software
12.1.2.1.0 - Patch 17885582 - Storage server and InfiniBand switch software
Patch 19681939 - Exadata 12.1.1.1.1 patchmgr plug-ins
해당 패치압축을 풀면 patchmgr 가 내장되어 있음.
- 작업후 Linux Kernel version Updata 됨
Image 11.2.3.3.0 ☞ 2.6.39-400.126.1 (RHEL 5.9)
Image 11.2.3.3.1 ☞ 2.6.39-400.128.17 (RHEL 5.10)
Image 12.1.2.1.0 ☞ 2.6.39-400.243.1 (RHEL 6.6)
3. ■ Cell node update
작업순서
1. cell 의 ip 정보등 확인 작업
[EXA1]root@exa1:/root# dcli -g cell_group -l root /opt/oracle.cellos/ipconf -verify
gtceladm01: Verifying of Exadata configuration file /opt/oracle.cellos/cell.conf
gtceladm01: Done. Configuration file /opt/oracle.cellos/cell.conf passed all verification checks
gtceladm02: Verifying of Exadata configuration file /opt/oracle.cellos/cell.conf
gtceladm02: Done. Configuration file /opt/oracle.cellos/cell.conf passed all verification checks
gtceladm03: Verifying of Exadata configuration file /opt/oracle.cellos/cell.conf
gtceladm03: Done. Configuration file /opt/oracle.cellos/cell.conf passed all verification checks
2. 해당 Patch 다운로드 후 압축해제
-[EXA1]root@exa1:/root# unzip p19166601_112331_Linux-x86-64.zip
-Archive: p19166601_112331_Linux-x86-64.zip
- creating: patch_11.2.3.3.1.140708/
- inflating: patch_11.2.3.3.1.140708/sundcs_36p_repository_2.1.3_4.pkg
- inflating: patch_11.2.3.3.1.140708/upgradeIBSwitch.sh
- creating: patch_11.2.3.3.1.140708/linux.db.rpms/
- inflating: patch_11.2.3.3.1.140708/linux.db.rpms/perl-XML-Parser-2.34-6.1.2.2.1.x86_64.rpm
- creating: patch_11.2.3.3.1.140708/plugins/
- inflating: patch_11.2.3.3.1.140708/plugins/010-check_17854520.sh
....................
5. ■ Cell node update
작업순서
8. [EXA1]root@exa1:/root/patch_11.2.3.3.1.140708# ./patchmgr -cells /root/cell_group -patch -
ignore_alerts
(마찬가지로 -ignore_alerts 옵션없이 진행할 경우 Cell alert 등으로 인해 Fail 됨)
pre-reboot 절차에 45분 소요된다고 표시가 됨. (실제론 10분정도 소요)
2015-01-20 13:58:26 +0900 Wait for patch pre-reboot procedures
||||| Minutes left 045///// Minutes left 045----- Minutes left 045 Minutes left 045||||| Minutes
left 045||||| Minutes left 045///// Minutes left 045----- Minutes left 045 Minutes left 045|||||
Minutes left 045||||| Minutes left 045///// Minutes left 045----- Minutes left 045 Minutes
left 045||||| Minutes left 045||||| Minutes left 045///// Minutes left 045----- Minutes left
045 Minutes left 045||||| Minutes left 045||||| Minu
2015-01-29 16:15:20 +0900 2 of 5 :SUCCESS: DONE: Waiting to finish pre-reboot patch actions.
2015-01-29 16:15:20 +0900 :Working: DO: Execute plugin check for Patching ...
2015-01-29 16:15:21 +0900 :SUCCESS: DONE: Execute plugin check for Patching.
2015-01-29 16:15:21 +0900 3 of 5 :Working: DO: Finalize patch on cells. Cells will reboot. Up to 5
minutes ...
2015-01-29 16:15:43 +0900 3 of 5 :SUCCESS: DONE: Finalize patch on cells.
6. ■ Cell node update
작업순서
pre-reboot 절차가 끝나면 120분 소요메세지와 함께 작업진행됨 (시간은 예측치이기 때문에 해당경우
의 실제 작업은 78분 남기고 종료되었음)
2015-01-29 16:15:43 +0900 4 of 5 :Working: DO: Wait for cells to reboot and come online. Up to 120 minutes ...
2015-01-29 16:16:43 +0900 Wait for patch finalization and reboot
||||| 2015-01-29 16:16:45 +0900 Minutes left 120///// 2015-01-29 16:16:45 +0900 Minutes left 120----- 2015-01-29 16:16:45 +0900 Minutes
left 120 2015-01-29 16:16:45 +0900 Minutes left 120||||| 2015-01-29 16:16:45 +0900 Minutes left 120||||| 2015-01-29 16:16:45
+0900 Minutes left 120///// 2015-01-29 16:16:45 +0900 Minutes left 120----- 2015-01-29 16:16:45 +0900 Minutes left 120 2015-
01-29 16:16:45 +0900 Minutes left 120||||| 2015-01-29 16:16:45 +0900 Minutes ft
……………………………………………………………………………………..
078///// 2015-01-29 17:12:14 +0900 Minutes left 078----- 2015-01-29 17:12:14 +0900 Minutes left 078 2015-01-29 17:12:14
+0900 Minutes left 078||||| 2015-01-29 17:12:14 +0900 Minutes left 078||||| 2015-01-29 17:12:14 +0900 Minutes left 078///// 2015-01-29
17:12:14 +0900 Minutes left 078----- 2015-01-29 17:12:14 +0900 Minutes left 078 2015-01-29 17:12:14 +0900 Minutes left 078|||||
2015-01-29 17:12:14 +0900 Minutes left 078
2015-01-29 17:13:20 +0900 4 of 5 :SUCCESS: DONE: Wait for cells to reboot and come online.
2015-01-29 17:13:20 +0900 5 of 5 :Working: DO: Check the state of patch on cells. Up to 5 minutes ...
2015-01-29 17:14:02 +0900 5 of 5 :SUCCESS: DONE: Check the state of patch on cells.
2015-01-29 17:14:02 +0900 :Working: DO: Execute plugin check for Post Patch ...
2015-01-29 17:14:03 +0900 :SUCCESS: DONE: Execute plugin check for Post Patch.
9. Cell Rebooting 후 상태 확인 (service celld status)
10. [EXA1]root@exa1:/root# crsctl start crs
7. ■ Cell node update
작업순서
[EXA1]root@exa1:/root/patch_11.2.3.3.1.140708# dcli -g /root/cell_group -l root imageinfo
gtceladm01:
gtceladm01: Kernel version: 2.6.39-400.128.17.el5uek #1 SMP Tue May 27 13:20:24 PDT 2014 x86_64
gtceladm01: Cell version: OSS_11.2.3.3.1_LINUX.X64_140708
gtceladm01: Cell rpm version: cell-11.2.3.3.1_LINUX.X64_140708-1
gtceladm01:
gtceladm01: Active image version: 11.2.3.3.1.140708
gtceladm01: Active image activated: 2015-01-20 15:00:37 +0900
gtceladm01: Active image status: success
gtceladm01: Active system partition on device: /dev/md6
gtceladm01: Active software partition on device: /dev/md8
gtceladm01:
gtceladm01: In partition rollback: Impossible
gtceladm01:
gtceladm01: Cell boot usb partition: /dev/sdm1
gtceladm01: Cell boot usb version: 11.2.3.3.1.140708
gtceladm01:
gtceladm01: Inactive image version: 11.2.3.3.0.131014.1
gtceladm01: Inactive image activated: 2015-01-06 17:03:56 +0900
gtceladm01: Inactive image status: success
gtceladm01: Inactive system partition on device: /dev/md5
gtceladm01: Inactive software partition on device: /dev/md7
gtceladm01:
gtceladm01: Boot area has rollback archive for the version: 11.2.3.3.0.131014.1
gtceladm01: Rollback to the inactive partitions: Possible
8. ■ Cell node update
작업순서
[EXA1]root@exa1:/root/patch_11.2.3.3.1.140708# dcli -g /root/cell_group -l root imagehistory
gtceladm01: Version : 11.2.3.3.0.131014.1
gtceladm01: Image activation date : 2015-01-06 17:03:56 +0900
gtceladm01: Imaging mode : fresh
gtceladm01: Imaging status : success
gtceladm01:
gtceladm01: Version : 11.2.3.3.1.140708
gtceladm01: Image activation date : 2015-01-20 15:00:37 +0900
gtceladm01: Imaging mode : out of partition upgrade
gtceladm01: Imaging status : success
gtceladm01:
gtceladm02: Version : 11.2.3.3.0.131014.1
gtceladm02: Image activation date : 2015-01-06 17:53:13 +0900
gtceladm02: Imaging mode : fresh
gtceladm02: Imaging status : success
gtceladm02:
gtceladm02: Version : 11.2.3.3.1.140708
gtceladm02: Image activation date : 2015-01-20 14:42:04 +0900
gtceladm02: Imaging mode : out of partition upgrade
gtceladm02: Imaging status : success
gtceladm02:
gtceladm03: Version : 11.2.3.3.0.131014.1
gtceladm03: Image activation date : 2015-01-06 16:57:02 +0900
gtceladm03: Imaging mode : fresh
gtceladm03: Imaging status : success
gtceladm03:
gtceladm03: Version : 11.2.3.3.1.140708
gtceladm03: Image activation date : 2015-01-20 14:42:37 +0900
gtceladm03: Imaging mode : out of partition upgrade
gtceladm03: Imaging status : success
9. ■ Cell node update
작업 유의사항
- 작업로그는 아래의 로그를 tail -f 로 열어서 확인 (vi 등 wrte 작업 절대금지)
tail -f /u01/patch_12.1.2.1.0.141206.1/patchmgr.stdout
각 노드별로 성공적으로 진행되었음을 확인 할수 있음
gtceladm03: _EXIT_PASS_Cell gtceladm03 172.16.40.103 2015-01-20 14:44:08 +0900: Found: 11.2.3.3.1.140708 state success Expected:
11.2.3.3.1.140708 state success.
2015-01-20 15:02:04 +0900 ++++++++++++++++++ Logs so far end ++++++++++
2015-01-20 15:02:04 +0900 5 of 5 :SUCCESS: DONE: Check the state of patch on cells.
2015-01-20 15:02:04 +0900 :Working: DO: Execute plugin check for Post Patch ...
2015-01-20 15:02:04 +0900 ++++++++++++++++++ Logs so far begin ++++++++++
2015-01-20 15:02:05 +0900 ++++++++++++++++++ Logs so far end ++++++++++
2015-01-20 15:02:05 +0900 :SUCCESS: DONE: Execute plugin check for Post Patch.
================PatchMgr run ended 2015-01-20 15:02:05 +0900 ===========
patch 시작시 표시되는 Warning 메시지 반드시 준수
********************************************************************************
NOTE Cells will reboot during the patch or rollback process.
NOTE For non-rolling patch or rollback, ensure all ASM instances using
NOTE the cells are shut down for the duration of the patch or rollback.
NOTE For rolling patch or rollback, ensure all ASM instances using
NOTE the cells are up for the duration of the patch or rollback.
WARNING Do not start more than one instance of patchmgr.
WARNING Do not interrupt the patchmgr session.
WARNING Do not alter state of ASM instances during patch or rollback.
WARNING Do not resize the screen. It may disturb the screen layout.
WARNING Do not reboot cells or alter cell services during patch or rollback.
WARNING Do not open log files in editor in write mode or try to alter them.
NOTE All time estimates are approximate.
NOTE You may interrupt this patchmgr run in next 60 seconds with CONTROL-c.
********************************************************************************
10. ■ Cell node update
작업 유의사항
- patchmgr -h
[EXA1]root@exa1:/u01/patch_12.1.2.1.0.141206.1# ./patchmgr -h
Usage:
./patchmgr -cells cell_host_file
[-patch_check_prereq | -rollback_check_prereq [-rolling] [-ignore_alerts]]
[-patch | -rollback [-rolling] [-ignore_alerts]]
[-cleanup]
./patchmgr -ibswitches [ibswitch_list_file]
<-upgrade | -downgrade> [-ibswitch_precheck] [-force]]
./patchmgr -h
OPTIONS
-h
Displays this screen
Cell patching and rollback
The following options are supported for cell patching and(or) rollback:
-cells cell_list_file
Specifies the name of the cell list file. The file contains one
cell hostname or ip per line. The cell patching will fail if the
list file is not specified.
-cleanup
Cleanup mode. Cleans up all patch files and temporary content on all
cells. Before cleaning up, collects logs and information for problem
diagnostics and analysis. Cleaning up patch files can be done manually
if patch fails by removing directory /root/_cellupd_dpullec_ on each cell.
-ignore_alerts
Ignore any active hardware alerts on the Exadata cell and proceed
with the patching.
-patch
Applys the patch, including firmware updates, wherever possible
(BIOS,
Disk Controller and if possible disk drives) to all cells in the cell
list file.
-patch_check_prereq
Runs prerequisite check on all the cells to determine if the patch
can be applied to the cells.
-rollback
Rolls back the patch.
-rollback_check_prereq
Runs prerequisite check on all the cells to determin if the cells
can be rolled back for this specific patch.
-rolling
Applies the patch or executes the rollback in rolling fashion, one
cell at a time.
Environment variable EXA_PATCH_ACTIVATE_TIMEOUT_SECONDS
controls the timeout value waiting for the grid disks to be
activated.
The default is set to 36000 (10 hours).
11. ■ Cell node update
작업 유의사항
- patchmgr -h
-smtp_from "addr"
The address patchmgr notification sent from.
sendmail daemon must be started to send email notification.
-smtp_to "addr1 addr2 addr3 ..."
The address(es) patchmgr notification sent to.
sendmail daemon must be started to send email notification.
-smtp_set_envelope_sender
Use the same from address in Return-Path: mail header.
Infiniband switch upgrade and downgrade
The following options are supported for infiniband switch upgrade and(or)
downgrade:
-ibswitches [ibswitch_list_file]
Specifies the name of the InfiniBand switch list file. The file has one
switch hostname or ip per line. If no filename is provided, then it
runs the command on all InfiniBand switches discovered from this host
by running ibswitches command.
-downgrade
Downgrade the InfiniBand switches in the list file to 2.1.3-4
-force
Specifies to proceed with the upgrade or downgrade even on non-critical
failures.
-ibswitch_precheck
Runs the pre-update validation checks on the InfiniBand switches in the
list file.
-upgrade
Upgrade the InfiniBand switches in the list file to 2.1.5-1