This document provides queries and explanations to troubleshoot advanced Oracle E-Business Suite topologies, such as DMZ configurations. It begins with the important FND_NODES query, which lists all nodes and their configuration. Understanding the results requires comparing them to a topology diagram. Other queries examine trust levels for nodes and responsibilities, which determine external access. Setting all nodes to external could lock one out, but the queries provide solutions. Overall this provides critical tools and guidance for debugging complex Oracle EBS environments.
This document provides a Bash style guide and coding standard for writing Bash scripts. It outlines best practices for script structure, formatting, commenting, and testing. Key recommendations include limiting line length to 88 characters, using indentation to indicate code blocks, including introductory and section comments, and thoroughly testing scripts for syntax, functionality, and edge cases. The goal is to create scripts that are easy to understand, maintain, and modify.
Converged architecture advantages: Dell PowerEdge FX2s and FC830 servers vs. ...Principled Technologies
Based on our testing with heavy SQL Server 2014 database workloads, the converged architecture solution of a Dell PowerEdge FX2s chassis and FC830 servers delivered 3.8 times the performance of our legacy HP solution. We also found the Dell PowerEdge FX2s and FC830 solution offered 72 lower cost per new order compared to the legacy HP ProLiant DL580 G7 solution. In addition, the PowerEdge FX2s and FC830 solution does not sacrifice traditional hardware redundancy while providing the same highly available database solution in a smaller rack space. If your business runs Microsoft SQL Server 2014, the converged architecture approach with Dell PowerEdge FX2s chassis and FC830 servers powered by Intel could bring a harmonious balance of performance, reliability, and cost efficiency to your data center.
This document provides instructions for setting up printing in Linux using CUPS (Common Unix Printing System). It discusses various printing programs available in Linux and recommends CUPS. CUPS supports the Internet Printing Protocol (IPP) standard, allows managing printers via a web browser, and is compatible with Samba and KDE. The document then provides step-by-step instructions for installing CUPS via RPM or tarball, and for adding a new printer via the CUPS web interface by selecting the printer make, model, and connection type.
Schema-based multi-tenant architecture using Quarkus & Hibernate-ORM.pdfseo18
Architecture design is a must while developing a SaaS application to ensure its scalability and optimising infrastructure costs. In this blog, Lets discuss the implementation of one such architecture with Quarkus java framework and Hibernate ORM
Lightweight ETL pipelines with mara (PyData Berlin September Meetup)Martin Loetzsch
In the past few years, data warehousing went through a radical transition from using click-based ETL tools to using code for defining data pipelines. In this process, the field of “data engineering” was born, Python became the dominant language for describing data integration pipelines and Apache Airflow emerged as the dominant framework in the field. However, for most companies that don’t operate at the scale of Airbnb, Airflow is quite an overkill when the task is to integrate a few GB or TB of data. In this talk, I will introduce Mara as a lightweight opinionated ETL framework halfway between Airflow and plain python scripts, with a focus on transparency and complexity reduction. It condenses the learnings from 6 years of building data warehouses for more than 20 of the portfolio companies of Project A. I will guide you through some of the design decisions behind the platform and some general learnings for setting up successful data engineering teams.
The document discusses identifying tablespace scans caused by RID list failures in DB2. It provides an example where a SQL statement with a high getpage count was found to have 210 RID list failures, resulting in 210 tablespace scans. Analyzing dynamic statement cache statistics and execution statistics at the statement level can help identify when an access path is converted to a tablespace scan due to RID pool failures. Adjusting related RID pool DSNPARM settings or reducing dependence on the RID pool may help address the issue.
The student will understand the basics of the Relational Database Model.
The student will learn Database Administration functions as appropriate for software developers.
The student will learn SQL.
The student will become familiar with the entire implementation cycle of a client server application.
And, you will build one.
This document provides an overview of System i stored procedures. It discusses what stored procedures are, where they can be called from, why to use them over other options, how to create SQL and external stored procedures, and best practices. Examples are provided of RPG and SQL stored procedures that return recordsets. The document recommends practices like using stored procedures for data access and updates, limiting column selection for efficiency, and logging procedure execution for performance monitoring. Additional resources on the included CD are also listed.
This document provides a Bash style guide and coding standard for writing Bash scripts. It outlines best practices for script structure, formatting, commenting, and testing. Key recommendations include limiting line length to 88 characters, using indentation to indicate code blocks, including introductory and section comments, and thoroughly testing scripts for syntax, functionality, and edge cases. The goal is to create scripts that are easy to understand, maintain, and modify.
Converged architecture advantages: Dell PowerEdge FX2s and FC830 servers vs. ...Principled Technologies
Based on our testing with heavy SQL Server 2014 database workloads, the converged architecture solution of a Dell PowerEdge FX2s chassis and FC830 servers delivered 3.8 times the performance of our legacy HP solution. We also found the Dell PowerEdge FX2s and FC830 solution offered 72 lower cost per new order compared to the legacy HP ProLiant DL580 G7 solution. In addition, the PowerEdge FX2s and FC830 solution does not sacrifice traditional hardware redundancy while providing the same highly available database solution in a smaller rack space. If your business runs Microsoft SQL Server 2014, the converged architecture approach with Dell PowerEdge FX2s chassis and FC830 servers powered by Intel could bring a harmonious balance of performance, reliability, and cost efficiency to your data center.
This document provides instructions for setting up printing in Linux using CUPS (Common Unix Printing System). It discusses various printing programs available in Linux and recommends CUPS. CUPS supports the Internet Printing Protocol (IPP) standard, allows managing printers via a web browser, and is compatible with Samba and KDE. The document then provides step-by-step instructions for installing CUPS via RPM or tarball, and for adding a new printer via the CUPS web interface by selecting the printer make, model, and connection type.
Schema-based multi-tenant architecture using Quarkus & Hibernate-ORM.pdfseo18
Architecture design is a must while developing a SaaS application to ensure its scalability and optimising infrastructure costs. In this blog, Lets discuss the implementation of one such architecture with Quarkus java framework and Hibernate ORM
Lightweight ETL pipelines with mara (PyData Berlin September Meetup)Martin Loetzsch
In the past few years, data warehousing went through a radical transition from using click-based ETL tools to using code for defining data pipelines. In this process, the field of “data engineering” was born, Python became the dominant language for describing data integration pipelines and Apache Airflow emerged as the dominant framework in the field. However, for most companies that don’t operate at the scale of Airbnb, Airflow is quite an overkill when the task is to integrate a few GB or TB of data. In this talk, I will introduce Mara as a lightweight opinionated ETL framework halfway between Airflow and plain python scripts, with a focus on transparency and complexity reduction. It condenses the learnings from 6 years of building data warehouses for more than 20 of the portfolio companies of Project A. I will guide you through some of the design decisions behind the platform and some general learnings for setting up successful data engineering teams.
The document discusses identifying tablespace scans caused by RID list failures in DB2. It provides an example where a SQL statement with a high getpage count was found to have 210 RID list failures, resulting in 210 tablespace scans. Analyzing dynamic statement cache statistics and execution statistics at the statement level can help identify when an access path is converted to a tablespace scan due to RID pool failures. Adjusting related RID pool DSNPARM settings or reducing dependence on the RID pool may help address the issue.
The student will understand the basics of the Relational Database Model.
The student will learn Database Administration functions as appropriate for software developers.
The student will learn SQL.
The student will become familiar with the entire implementation cycle of a client server application.
And, you will build one.
This document provides an overview of System i stored procedures. It discusses what stored procedures are, where they can be called from, why to use them over other options, how to create SQL and external stored procedures, and best practices. Examples are provided of RPG and SQL stored procedures that return recordsets. The document recommends practices like using stored procedures for data access and updates, limiting column selection for efficiency, and logging procedure execution for performance monitoring. Additional resources on the included CD are also listed.
One of the major trends in data warehousing/data engineering is the transition from click-based ETL tools to using code for defining data pipelines. Nowadays, the vast majority of projects either start with a set of simple shell/ bash scripts or with platforms such as Luigi or Apache Airflow, with the latter clearly becoming the dominant player. In the past 6 years, Project A also followed this approach when building data warehouses for more than 20 of its portfolio companies and we are now open sourcing the underlying infrastructure (https://github.com/mara). Basically, it is a lightweight, opinionated Airflow, with a focus on transparency and complexity reduction. In this talk, I will guide you through some of the design decisions behind the platform and some general learnings for setting up successful data engineering teams.
Teradata RDBMS is a relational database management system based on Symmetric Multiprocessing (SMP) technology combined with a communication network connecting SMP systems to form a Massively Parallel Processing (MMP) system. It uses a hardware inter-processor network called BYNET to link SMP nodes. Components like the Parsing Engine, Access Module Processors, and Teradata File System work together to process SQL queries, manage databases, and store and retrieve data. BTEQ is a utility that allows users to connect to a Teradata database server and execute SQL statements if they have the proper privileges.
Ibm db2 analytics accelerator high availability and disaster recoverybupbechanhgmail
This document discusses high availability (HA) and disaster recovery (DR) strategies for IBM DB2 Analytics Accelerator. It describes built-in HA capabilities of the accelerator like redundant Netezza performance server hosts, S-Blades, networking, and disk arrays. It also discusses ways to integrate the accelerator into existing HA architectures, including workload balancing across multiple accelerators, maintaining consistent data across accelerators, and using incremental updates. The goal is to provide the desired recovery time objectives (RTOs) and recovery point objectives (RPOs) for analytical query workloads processed by the accelerator.
The document discusses various questions and answers related to ABAP and SAP. It provides explanations for topics such as user exits, how to debug SAPscript, copying standard tables, validating input fields in module programs, getting material data based on plant, and more. User exits allow custom code to be added to SAP applications without modifying core code, and there are different types like menu exits, screen exits, and function module exits.
This document provides a template for a Software Requirements Specification (SRS) document. It outlines the typical sections included in an SRS, including an introduction, overall description of the system, specific requirements, and additional sections for change management, approvals, and supporting information. The template offers explanatory comments and examples of the types of information that would be included in each section to help specify the requirements for a software project.
DB2 Express-C is a free version of the DB2 database server from IBM. It has no usage or deployment limits and can run on Windows, Linux, Mac OS X, and Solaris operating systems. Minimum requirements are 256MB of RAM but it is recommended to have at least 1GB. DB2 Express-C provides basic database functionality and sits below the paid DB2 Workgroup and Enterprise editions in terms of features. It uses concurrency controls like locking and transactions to allow for multi-user access to the database.
Use Performance Insights To Enhance MongoDB Performance - (Manosh Malai - Myd...Mydbops
Performance improvement, debugging, and monitoring are essential parts of the DBE(Database Engineering Team) role. The presentation present intriguing strategies, techniques, and tools that can be used to address or circumvent the majority of performance-related problems in this MongoDB Performance.
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
Whether you're a MongoDB professional or totally new to document databases, our MongoDB performance success factors & evaluation framework has something for you,
Curious about MongoDB performance?
Mydbops CTO, Manosh Malai illustrates the secret sauce for MongoDB performance best practices & analysis tool.
.NET is designed to solve problems that have plagued programmers in the past like incompatibilities between programming languages and technologies. It provides a common language runtime and type system that allows different languages to work together. The .NET Framework handles many common programming tasks like serialization automatically through metadata and provides a large class library for common functions.
This document contains a test for a Systems Administrator position with 21 multiple choice and short answer questions covering topics like NTFS permissions, Active Directory, networking, Outlook, and more. The test is meant to assess the candidate's knowledge but does not expect they will know all the answers.
The document discusses MongoDB performance best practices. It covers topics like schema design, indexing, Linux tuning, and MongoDB performance analysis tools. Specifically, it recommends embedding data where possible, following the ESR rule for compound indexes, enabling transparent huge pages and NUMA for Linux, and using tools like MongoDB explain, mtools, and Keyhole to analyze query performance and server logs.
The document discusses connecting modeling software like Vensim and GAMS to databases. It notes that Vensim accesses data through ODBC and files while GAMS uses GDX files. It suggests emulating a simple example database structure from Vensim for larger data transfers. It also outlines creating a common nomenclature to interface different modeling packages and databases.
The Power of Relationships in Your Big DataPaulo Fagundes
The document provides an overview of Oracle NoSQL Database Release 3.0, including new features such as table data modeling, secondary indexing, data centers for disaster recovery, and security enhancements. Best practices are discussed for choosing a data model, using indexes, and configuring data centers and zones.
The document summarizes a new 660-page IBM RedBook about DataStage documentation and examples. It provides overviews of DataStage architecture, best practices, popular stage descriptions, and a retail processing scenario with hundreds of pages and downloadable files. The RedBook aims to address past complaints about a lack of DataStage documentation by providing extensive guidelines, tips and examples.
Hpverticacertificationguide 150322232921-conversion-gate01Anvith S. Upadhyaya
Here are the key points about projection segmentation in Vertica:
- Projection segmentation splits large projections into multiple segments and distributes those segments across database nodes for improved parallelism and high availability.
- The segmentation process randomly distributes rows of a projection across all available nodes using a hash function. This random distribution balances the load evenly.
- Segmented projections allow Vertica to parallelize queries by enabling each node to work independently on its portion of the data.
- If a node fails, its segments can be recovered from the duplicate segments stored on other live nodes, ensuring the data remains available.
- Segmentation is determined automatically by Vertica based on projection size and number of nodes. The system monitors segment
This document provides instructions for mounting a shared folder from a remote system using Samba. It specifies using smbmount to mount the shared folder located at //192.188.101.133/D to the local /mnt/cd mount point, authenticating with the username mpasha, workgroup saudilighting, and password oracleapps11i.
This document provides instructions to zip log and configuration files from an Oracle Identity and Access Management installation directory into a timestamped archive file located in /tmp. The files to be zipped include all files matching *_log* in the logs subdirectory and all *.conf files in the conf subdirectory under $IAS_ORACLE_HOME/Apache/Apache.
More Related Content
Similar to Oracle application tech stack tips and queries for troubleshooting advanced topologies
One of the major trends in data warehousing/data engineering is the transition from click-based ETL tools to using code for defining data pipelines. Nowadays, the vast majority of projects either start with a set of simple shell/ bash scripts or with platforms such as Luigi or Apache Airflow, with the latter clearly becoming the dominant player. In the past 6 years, Project A also followed this approach when building data warehouses for more than 20 of its portfolio companies and we are now open sourcing the underlying infrastructure (https://github.com/mara). Basically, it is a lightweight, opinionated Airflow, with a focus on transparency and complexity reduction. In this talk, I will guide you through some of the design decisions behind the platform and some general learnings for setting up successful data engineering teams.
Teradata RDBMS is a relational database management system based on Symmetric Multiprocessing (SMP) technology combined with a communication network connecting SMP systems to form a Massively Parallel Processing (MMP) system. It uses a hardware inter-processor network called BYNET to link SMP nodes. Components like the Parsing Engine, Access Module Processors, and Teradata File System work together to process SQL queries, manage databases, and store and retrieve data. BTEQ is a utility that allows users to connect to a Teradata database server and execute SQL statements if they have the proper privileges.
Ibm db2 analytics accelerator high availability and disaster recoverybupbechanhgmail
This document discusses high availability (HA) and disaster recovery (DR) strategies for IBM DB2 Analytics Accelerator. It describes built-in HA capabilities of the accelerator like redundant Netezza performance server hosts, S-Blades, networking, and disk arrays. It also discusses ways to integrate the accelerator into existing HA architectures, including workload balancing across multiple accelerators, maintaining consistent data across accelerators, and using incremental updates. The goal is to provide the desired recovery time objectives (RTOs) and recovery point objectives (RPOs) for analytical query workloads processed by the accelerator.
The document discusses various questions and answers related to ABAP and SAP. It provides explanations for topics such as user exits, how to debug SAPscript, copying standard tables, validating input fields in module programs, getting material data based on plant, and more. User exits allow custom code to be added to SAP applications without modifying core code, and there are different types like menu exits, screen exits, and function module exits.
This document provides a template for a Software Requirements Specification (SRS) document. It outlines the typical sections included in an SRS, including an introduction, overall description of the system, specific requirements, and additional sections for change management, approvals, and supporting information. The template offers explanatory comments and examples of the types of information that would be included in each section to help specify the requirements for a software project.
DB2 Express-C is a free version of the DB2 database server from IBM. It has no usage or deployment limits and can run on Windows, Linux, Mac OS X, and Solaris operating systems. Minimum requirements are 256MB of RAM but it is recommended to have at least 1GB. DB2 Express-C provides basic database functionality and sits below the paid DB2 Workgroup and Enterprise editions in terms of features. It uses concurrency controls like locking and transactions to allow for multi-user access to the database.
Use Performance Insights To Enhance MongoDB Performance - (Manosh Malai - Myd...Mydbops
Performance improvement, debugging, and monitoring are essential parts of the DBE(Database Engineering Team) role. The presentation present intriguing strategies, techniques, and tools that can be used to address or circumvent the majority of performance-related problems in this MongoDB Performance.
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
Whether you're a MongoDB professional or totally new to document databases, our MongoDB performance success factors & evaluation framework has something for you,
Curious about MongoDB performance?
Mydbops CTO, Manosh Malai illustrates the secret sauce for MongoDB performance best practices & analysis tool.
.NET is designed to solve problems that have plagued programmers in the past like incompatibilities between programming languages and technologies. It provides a common language runtime and type system that allows different languages to work together. The .NET Framework handles many common programming tasks like serialization automatically through metadata and provides a large class library for common functions.
This document contains a test for a Systems Administrator position with 21 multiple choice and short answer questions covering topics like NTFS permissions, Active Directory, networking, Outlook, and more. The test is meant to assess the candidate's knowledge but does not expect they will know all the answers.
The document discusses MongoDB performance best practices. It covers topics like schema design, indexing, Linux tuning, and MongoDB performance analysis tools. Specifically, it recommends embedding data where possible, following the ESR rule for compound indexes, enabling transparent huge pages and NUMA for Linux, and using tools like MongoDB explain, mtools, and Keyhole to analyze query performance and server logs.
The document discusses connecting modeling software like Vensim and GAMS to databases. It notes that Vensim accesses data through ODBC and files while GAMS uses GDX files. It suggests emulating a simple example database structure from Vensim for larger data transfers. It also outlines creating a common nomenclature to interface different modeling packages and databases.
The Power of Relationships in Your Big DataPaulo Fagundes
The document provides an overview of Oracle NoSQL Database Release 3.0, including new features such as table data modeling, secondary indexing, data centers for disaster recovery, and security enhancements. Best practices are discussed for choosing a data model, using indexes, and configuring data centers and zones.
The document summarizes a new 660-page IBM RedBook about DataStage documentation and examples. It provides overviews of DataStage architecture, best practices, popular stage descriptions, and a retail processing scenario with hundreds of pages and downloadable files. The RedBook aims to address past complaints about a lack of DataStage documentation by providing extensive guidelines, tips and examples.
Hpverticacertificationguide 150322232921-conversion-gate01Anvith S. Upadhyaya
Here are the key points about projection segmentation in Vertica:
- Projection segmentation splits large projections into multiple segments and distributes those segments across database nodes for improved parallelism and high availability.
- The segmentation process randomly distributes rows of a projection across all available nodes using a hash function. This random distribution balances the load evenly.
- Segmented projections allow Vertica to parallelize queries by enabling each node to work independently on its portion of the data.
- If a node fails, its segments can be recovered from the duplicate segments stored on other live nodes, ensuring the data remains available.
- Segmentation is determined automatically by Vertica based on projection size and number of nodes. The system monitors segment
Similar to Oracle application tech stack tips and queries for troubleshooting advanced topologies (20)
This document provides instructions for mounting a shared folder from a remote system using Samba. It specifies using smbmount to mount the shared folder located at //192.188.101.133/D to the local /mnt/cd mount point, authenticating with the username mpasha, workgroup saudilighting, and password oracleapps11i.
This document provides instructions to zip log and configuration files from an Oracle Identity and Access Management installation directory into a timestamped archive file located in /tmp. The files to be zipped include all files matching *_log* in the logs subdirectory and all *.conf files in the conf subdirectory under $IAS_ORACLE_HOME/Apache/Apache.
To forcefully unmount a Linux disk partition that is busy, first use the lsof command to identify any processes accessing the partition. Then kill those processes using fuser or forcefully unmount the partition using umount with the -l or -f options. Forcibly unmounting can cause data loss if files are still open on the partition, so it should be used carefully.
This document discusses various ways to restrict UNIX system users, including changing passwords regularly, using file permissions, setting limits on system resources, and employing a restricted shell. It provides examples of limiting core file sizes, memory, processes, file sizes, open files, CPU time, and process priority for specific users or groups. The restricted shell prevents changing directories, environment variables, redirecting output, or using absolute paths, helping to contain trusted users within certain boundaries.
This document provides commands to check if a Unix system and hardware are 64-bit.
For the operating system, it lists commands to use on AIX, Solaris, HP-UX, and Linux to determine if the kernel is 64-bit.
For the hardware, it gives commands to check the architecture on AIX, Solaris, HP-UX, and a grep command to check the CPU flags on Linux. It also explains that 64-bit capable hardware can run 32-bit software for backward compatibility.
This 3 line script unzips and extracts tar.gz files on a Solaris system. It uses a for loop to iterate through all files ending in .tar.gz, gunzips the contents and pipes it to tar to extract. This allows unzipping and extracting multiple tar.gz files with one simple script.
1) The document provides step-by-step instructions for installing Oracle Ops Center 12c, including downloading required files, installing prerequisite packages, running the installer, and completing the initial configuration.
2) It also explains how to add new assets to be managed by Ops Center 12c, which involves creating a discovery profile to define the target systems, credentials, and IP range and initiating a discovery job to identify the targets.
3) Additional features of Ops Center 12c are highlighted such as the ability to manage targets without deploying agents and merged steps for discovering and adding assets.
Retrieve apps password in r12 or forgot apps password in r12Muqthiyar Pasha
This document provides steps to retrieve a forgotten Oracle Apps password in R12. It involves:
1. Creating a decryption function in the database
2. Querying the encrypted password for a user from the database
3. Calling the decryption function to decrypt and return the plaintext password
This document contains code to retrieve a user's password from an Oracle database. It defines a GET_PWD package with a decryption function. The package body calls a Java function to decrypt values. A query is provided that uses the decryption function to select a user's name and decrypted password by calling an Oracle seeded procedure to get the guest username and password and decrypting the encrypted password fields.
What is Master Data Management by PiLog Groupaymanquadri279
PiLog Group's Master Data Record Manager (MDRM) is a sophisticated enterprise solution designed to ensure data accuracy, consistency, and governance across various business functions. MDRM integrates advanced data management technologies to cleanse, classify, and standardize master data, thereby enhancing data quality and operational efficiency.
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfVALiNTRY360
Salesforce Healthcare CRM, implemented by VALiNTRY360, revolutionizes patient management by enhancing patient engagement, streamlining administrative processes, and improving care coordination. Its advanced analytics, robust security, and seamless integration with telehealth services ensure that healthcare providers can deliver personalized, efficient, and secure patient care. By automating routine tasks and providing actionable insights, Salesforce Healthcare CRM enables healthcare providers to focus on delivering high-quality care, leading to better patient outcomes and higher satisfaction. VALiNTRY360's expertise ensures a tailored solution that meets the unique needs of any healthcare practice, from small clinics to large hospital systems.
For more info visit us https://valintry360.com/solutions/health-life-sciences
Artificia Intellicence and XPath Extension FunctionsOctavian Nadolu
The purpose of this presentation is to provide an overview of how you can use AI from XSLT, XQuery, Schematron, or XML Refactoring operations, the potential benefits of using AI, and some of the challenges we face.
WWDC 2024 Keynote Review: For CocoaCoders AustinPatrick Weigel
Overview of WWDC 2024 Keynote Address.
Covers: Apple Intelligence, iOS18, macOS Sequoia, iPadOS, watchOS, visionOS, and Apple TV+.
Understandable dialogue on Apple TV+
On-device app controlling AI.
Access to ChatGPT with a guest appearance by Chief Data Thief Sam Altman!
App Locking! iPhone Mirroring! And a Calculator!!
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
SMS API Integration in Saudi Arabia| Best SMS API ServiceYara Milbes
Discover the benefits and implementation of SMS API integration in the UAE and Middle East. This comprehensive guide covers the importance of SMS messaging APIs, the advantages of bulk SMS APIs, and real-world case studies. Learn how CEQUENS, a leader in communication solutions, can help your business enhance customer engagement and streamline operations with innovative CPaaS, reliable SMS APIs, and omnichannel solutions, including WhatsApp Business. Perfect for businesses seeking to optimize their communication strategies in the digital age.
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Drona Infotech is a premier mobile app development company in Noida, providing cutting-edge solutions for businesses.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
Mobile App Development Company In Noida | Drona Infotech
Oracle application tech stack tips and queries for troubleshooting advanced topologies
1. Tips and Queries for Troubleshooting Advanced Topologies (Doc ID 364439.1)
In this Document
Purpose
Troubleshooting Steps
The Importance of Topology Diagrams
-
The FND_NODES query
Understanding the FND_NODES Query Results
-
The Trust Query
Understanding the Trust Query Results
Accidentally Locking Oneself Out
-
A Responsibility Query
Understanding the Responsibility Query Results
-
The Enabled Query
Understanding the Enabled Query Results
-
Understanding the Server and ServResp Hierarchy
Server Hierarchy
ServResp Hierarchy
-
The Profile Options Query
Understanding the Profiles Query
Setting ServResp Profile Options Manually
-
Orphaned Profile Options
Understanding the Orphans Query
-
Checking the Patch Requirements on each Appl_Top
Patch Query Caveats
-
Summary
References
APPLIES TO:
Oracle Applications Technology Stack - Version 11.5.10.2 to 12.2.2 [Release 11.5.10 to 12.2]
Information in this document applies to any platform.
PURPOSE
The Troubleshooting Guide is provided to assist in debugging advanced topologies and configurations as described in the following
notes that are recommended prerequisites for this note:
Note:287176.1-DMZ Configuration with Oracle E-Business Suite 11i
Note:217368.1-Advanced Configurations and Topologies for Enterprise Deployments of E-Business Suite 11i
Note:380489.1-Using Load-Balancers with Oracle E-Business Suite Release 12
Note:380490.1-Oracle E-Business Suite Release 12 Configuration in a DMZ
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
1 of 17 8/12/2014 6:54 PM
2. This is version 3.0 of this document which will always be a work in progress. Given the complexity of these issues, it is nearly
impossible to be comprehensive enough to cover every situation. Instead, the approach here is to provide well documented analysis
tools along with some example applications of these tools to illustrate the fundamental concepts that can then be applied to any
real-world instance. While this note was written primarily with 11i in mind, the concepts and queries do apply to release 12 instances as
well.
The format in this revision of the paper will be to offer the troubleshooting query and then follow each query with an example output
and a substantial explanation of the meaning of the query results. As written, these queries can be expected to do as the
accompanying explanation explains, but these explanations and queries are offered with the full intention that the reader will embrace
the concept as illustrated and will then modify the queries to suit their individual purposes.
TROUBLESHOOTING STEPS
The Importance of Topology Diagrams
Upgrading from a simple single-tier or even multiple tier environment to a DMZ or other advanced topology is extremely difficult
without some sort of preconceived plan in writing. When requesting support for an advanced configuration, customers should expect
that a request for a topology diagram will be made before any advice beyond the generic can be offered. The DMZ and other advanced
topology configurations are becoming more popular each day and it seems that for each TAR worked we find that many customers have
very differing ideas on what constitutes a good DMZ. For this reason the first thing that I always ask for is a simple drawing that
describes the proposed network architecture.
The logical drawing should show each machine that is part of the instance, to include each server, firewall, and hardware load balancer
(if any) with each described by their name, alias (if any), IP address, and the type of node installed (database, apache, forms,
web, etc.) with appropriate version information. In general, the drawing should look something like those featured in Note:287176.1
with appropriate labels specific to the customer configuration. The problems most often faced are configuration related and it is not
possible to know from the traces and configuration files where the functionality goes awry without a previous understanding of what
it SHOULD look like. When troubleshooting, we start with the drawing and confirm that the various configuration parameters match the
drawing.
The figure above is an example drawing based upon figure F4 of Note:287176.1 and will be used as the example testcase for all of the
queries that follow. These drawings don't have to be a major effort created with expensive utilities; I simply created the above drawing
with Microsoft paint after scratching the icons directly out of Note:287176.1. The important thing is that the drawing describe ever
major component by its role, location in the topology, and its proper name.
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
2 of 17 8/12/2014 6:54 PM
3. In this drawing, dcollierbe is a single tier install of 11.5.10.2 and dcollieremt is a clone of the dcollierbe middle tier to be used as an
external tier. The drawing shows the logical blocks; the internal tier is clearly indicated as a separate logical entity despite being
physically on the same server as the database. Also note that the majority of the patch levels in this drawing are superceded at this
date. This DMZ instance is therefore not an ideal example, just a working example.
-
The FND_NODES query
The FND_NODES query is usually the logical first place to start when troubleshooting an advanced topology such as a DMZ. An
example query that cleanly extracts important FND_NODES information follows and includes some sample output for discussion.
When uploading results of the queries in this note to a service request, ALWAYS run them from sqlplus as the apps user, spool the
results of the queries to a file, and upload the resulting, plain-text spool file. NEVER paste the results into the service request itself
as that results in an entry with a deluge of poorly formatted data.
FND_NODES Query
spool fnd_nodes
set pagesize 50
col node_name format a15
col server_id format a8
col server_address format a15
col platform_code format a4
col webhost format a12
col domain format a20
col virtual_ip format a12
set linesize 132
select
node_id,
platform_code,
support_db D,
support_cp C,
support_admin A,
support_forms F,
support_web W,
node_name,
server_id,
server_address,
domain,
webhost,
virtual_ip
from
fnd_nodes
order by node_id;
Example Output of FND_NODES Query
NODE_ID PLAT D C A F W NODE_NAME SERVER_ID SERVER_ADDRESS DOMAIN WEBHOST
------- ---- - - - - - ------------- --------- -------------- ------------- -----------
4066 46 Y Y Y Y Y DCOLLIERBE 102B7C50 10.1.2.3 us.oracle.com dcollierbe.
65BF2761 us.oracle.c
E040018A om
439451E5
16313498
31994113
06835324
76801476
4067 46 N N N N AUTHENTICATION SECURE *
4068 46 N N N Y Y DCOLLIEREMT 11473885 100.1.2.3 us.oracle.com dcollieremt
65677803 .us.oracle.
E040018A com
439450E9
29327317
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
3 of 17 8/12/2014 6:54 PM
4. 51161446
91712165
64996016
Understanding the FND_NODES Query Results
The FND_NODES table is the primary source of information used by AutoConfig in determining the names and types of nodes that make
up the release 11i and 12 instance and therefore the FND_NODES table is often the best, first place to look. You can quickly tell how
many servers a customer has and what they are configured to do and this should match their topology diagram. If it doesn't match the
diagram, this is the first hint at a configuration error.
Important Columns
Node_Id - a unique number for identifying the node.
This is used by the profile options tables to identify the server when using Server and/or ServResp profile options as discussed later in
this note.
Platform_Code - 2=HPUX, 46=Linux, 319=AIX 32-bit, 453=Solaris, 912-Windows, etc.
The Node type columns - each node can be a combination of these
D support_db -- this node has a database
C support_cp -- this node hosts the concurrent managers
A support_admin -- this is an administration tier
F support_forms -- this is a forms server tier (and likely a web tier as well)
W support_web -- this is a web tier (Apache)
Node_Name - Node/Machine Name.
This may also be "Authentication" which is a dummy row to support server_id authentication, but typically this is just the server's
hostname. This should not be an IP address.
Server_ID - this is a semi-randomly generated string created by the AdminAppServer utility to uniquely identify the server when
node_name is a valid server name. The exception to this rule is when node_name is the dummy row for authentication and then the
value of server_id for the authentication row may be ON, OFF, or SECURE. If Authentication is set to SECURE then this string must
match the server_id string in each server's DBC files. The DBC file location is defined by the environment variable FND_SECURE and is
typically $FND_TOP/secure.
Server_Address - the IP address of the server or, optionally, the IP address of the relevant reverse proxy server. This is normally
determined automatically by AutoConfig, but can be overridden and specified manually by the AutoConfig parameter
"s_server_ip_address" in the AutoConfig XML context file. This new variable first appeared in patch "4709948 - TXK (FND) AutoConfig
Template Rollup Patch M (April 2006)".
A common error is to have an incorrectly formatted /etc/hosts file that has only the loopback address. Since this table has the very
reasonable uniqueness constraint on server_address, you cannot use "127.0.0.1" here. If another server tries to use 127.0.0.1, it will
have only a partially formed (invalid) entry in this table.
Similarly, only a partially formed (invalid) entry will be formed when creating a virtually external tier and attempting to use the same IP
address for both the internal server and the virtually external server. For more information of virtually external tiers, see
Note:438744.1-Case History: Implementing a Reverse Proxy Alone in a DMZ Configuration
Domain - the TCP/IP domain of the server
Webhost - the fully qualified domain name of the server. Required for iRecruitment (Bug:3725573) and others.
-
The Trust Query
As discussed in Note:287176.1, each node listed in the fnd_nodes table can be set to be an External, Normal, or Administrative tier
using the system profile option "Node Trust Level" (internal name NODE_TRUST_LEVEL). Similarly, you can set externally available
responsibilities at the responsibility level using the system profile option "Responsibility Trust Level" (internal name
APPL_SERVER_TRUST_LEVEL).
The following query provides a handy dump of these "trust" profile options (run from sqlplus as apps):
Trust Query
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
4 of 17 8/12/2014 6:54 PM
5. spool trust
set linesize 132
set pagesize 100
col "Level Where Option Is Set" format a60
col "Profile Name" format a30
col value format a10
break on "Profile Name";
select
p.user_profile_option_name "Profile Name",
decode(v.profile_option_value,
1, 'Admin',
2, 'Normal',
3, 'External',
'Unknown') Value,
decode(v.level_id,
10001, 'SITE',
10002, (select 'App:'||a.application_short_name from fnd_application a
where a.application_id = v.level_value),
10003, (select 'Resp:'||f.RESPONSIBILITY_name||' ('||responsibility_key||')' from
fnd_responsibility_vl f
where f.responsibility_id = v.level_value),
10004, (select 'User:'||u.user_name from fnd_user u
where u.user_id = v.level_value),
10005, (select 'Server:'||n.node_name from fnd_nodes n
where n.node_id = v.level_value),
10006, (select 'Org:'||org.name from hr_operating_units org
where org.name = v.level_value),
'NOT SET') "Level Where Option Is Set"
from
fnd_profile_options_vl p,
fnd_profile_option_values v
where
p.profile_option_id = v.profile_option_id (+)
and p.application_id = v.application_id (+)
and p.profile_option_name like upper('%TRUST%')
order by 1,2,3 desc;
Example Output of Trust Query
Profile Name VALUE Level Where Option Is Set
--------------------------- ---------- --------------------------------------------------------
Node Trust Level Normal SITE
Admin Server:OTHERMT
External Server:DCOLLIEREMT
Responsibility Trust Level Normal SITE
External Resp:iRecruitment External Candidate (IRC_EXT_CANDIDATE)
Admin Resp:System Administration (SYSTEM_ADMINISTRATION)
Admin Resp:System Administrator (SYSTEM_ADMINISTRATOR)
Understanding the Trust Query Results
In the above example, the external server sitting in the DMZ is defined to be DCOLLIEREMT because the Node_Trust_Level is set to
External at the server level for the server named DCOLLIEREMT. Similarly, the only responsibility that will be available to users logging
into DCOLLIEREMT is iRecruitment External Candidate.
On a new tier identified as "OTHERMT", which didn't make it to the topology diagram yet, is an example of an Administrative tier. It is
possible to restrict Administrative responsibilities to a specific tier. In this example, if a user logs in to one of the normal tiers, neither
the responsibility "System Administration" nor "System Administrator" will appear in the responsibility list even if the user has those
responsibilities assigned. As setup in this example, the user must have these responsibilities AND be logged in on the server named
"OtherMT" to see and use them.
There is currently a bug open on the ADMIN trust level. While it is proper that the Admin responsibilities (such as in this example)
will not appear on a normal or external tier, they will appear on the admin tier, but an attempt to make use of a forms-based admin
responsibility (such as System Administrator) will fail shortly after forms is launched with the error of "Sorry, no valid responsibilities
are available [OK]".
Bug:7699618-ISSUE WHEN SETTING RESPONSIBILITY TRUST LEVEL (FORMS BASED)
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
5 of 17 8/12/2014 6:54 PM
6. Accidentally Locking Oneself Out
Note in the above example, that the Node Trust Level is set to Normal at the Site level. This is ideal, because all responsibilities are
"Normal" by default. In many customer instances, it is entirely common to have the Node Trust Level set to external only for the
external tiers and leave all other tiers to default to the Site level value of Normal. The problem arises when accidentally setting the
Node Trust level to External at the Site level when no servers are explicitly set to be normal since this results in ALL web nodes
becoming External nodes where only External responsibilities are allowed. If ALL nodes are External, then NONE of the nodes will allow
System Administration tasks, including changing profile options back.
To avoid this problem, it is a good practice to have at least one server explicitly marked as either Admin or Normal. If it is already too
late and you have locked yourself out of the instance, the only practical solution is to update the profile option via sqlplus as the apps
user.
To reset the Node Trust Level back to Normal at the Site level, use the following PL/SQL:
set serveroutput on
DECLARE
stat boolean;
BEGIN
stat := FND_PROFILE.SAVE('NODE_TRUST_LEVEL', '2', 'SITE');
IF stat THEN
dbms_output.put_line( 'Stat = TRUE - profile updated' );
ELSE
dbms_output.put_line( 'Stat = FALSE - profile NOT updated' );
END IF;
commit;
END;
/
Accidentally setting ALL servers, one by one, to External will cause a similar lockout situation. The following PL/SQL will set the given
server back to Normal. The Node_ID can be obtained from the fnd_nodes query at the top of this note. Note that, as written, this does
not check that the Node_ID entered is a valid Node_ID. If you enter a Node_ID that is not valid, you will create an orphaned profile
option. Orphaned profile options are discussed later in this paper.
set serveroutput on
DECLARE
stat boolean;
BEGIN
stat := FND_PROFILE.SAVE('NODE_TRUST_LEVEL', '2', 'SERVER', &Node_ID);
IF stat THEN
dbms_output.put_line( 'Stat = TRUE - profile updated' );
ELSE
dbms_output.put_line( 'Stat = FALSE - profile NOT updated' );
END IF;
commit;
END;
/
-
A Responsibility Query
Tailing off the previous discussion of the Trust Query, above, an important point to reiterate is that a user can be assigned any number
of responsibilities, but when logging in to an external tier, that user will see ONLY those responsibilities that are declared external and
then only if that user has been assigned one of those external responsibilities.
A common problem is to miss the forest for the trees and not understand why a user has no responsibilities available. The following
query will list the overall responsibilities that have been assigned to a user that can be compared with the list of responsibilities
declared as external as seen in the trust query.
Responsibility Query
undefine USER_NAME_IN_UPPER_CASE
col "Responsibility Name" format a40
select
urg.SECURITY_GROUP_ID SecGID,
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
6 of 17 8/12/2014 6:54 PM
7. urg.RESPONSIBILITY_ID RespID,
urg.RESPONSIBILITY_APPLICATION_ID RespAppID,
resp.RESPONSIBILITY_NAME "Responsibility Name"
from
fnd_user_resp_groups urg, fnd_responsibility_vl resp
where
urg.responsibility_id = resp.responsibility_id
and urg.responsibility_application_id = resp.application_id
and urg.user_id = (select user_id from fnd_user where user_name = '&&USER_NAME_IN_UPPER_CASE')
and urg.security_group_id = 0
union
select
urg.SECURITY_GROUP_ID SecGID,
urg.RESPONSIBILITY_ID RespID,
urg.RESPONSIBILITY_APPLICATION_ID RespAppID,
resp.RESPONSIBILITY_NAME || sec.security_group_name name
from fnd_user_resp_groups urg, fnd_responsibility_vl resp,
fnd_security_groups_vl sec
where
urg.responsibility_id = resp.responsibility_id
and urg.responsibility_application_id = resp.application_id
and urg.security_group_id = sec.security_group_id
and urg.user_id = (select user_id from fnd_user where user_name = '&USER_NAME_IN_UPPER_CASE')
and urg.security_group_id != 0;
Example Output of Responsibility Query
Enter value for user_name_in_upper_case: MISTERTESTER
SECGID RESPID RESPAPPID Responsibility Name
---------- ---------- ---------- ----------------------------------------
0 20419 0 Application Developer
0 20420 1 System Administrator
0 20872 178 System Administration
0 53981 1 Applications Administration
Understanding the Responsibility Query Results
The query simply lists, in this case, the responsibilities that are assigned to the user named "MisterTester". Notice that this user has
quite a few sensitive responsibilites that are available when logging into a "normal" tier, but when logging into an external tier this user
has "No Active Responsibilities" and therefore cannot use any of them. In this paper's example, there are only two responsibilities that
have been declared as external (iReceivables External Vision UK and iStore) and since MisterTester has neither of these he gets the
following screen when logging in from an external tier:
-
The Enabled Query
Note:287176.1 requires that certain specific profile options need to be enabled at the server level and some at the new ServResp level.
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
7 of 17 8/12/2014 6:54 PM
8. The following query is a very good check to make certain that the key profile options have been set to the appropriate hierarchy and
that the flags are correctly set to allow updates.
Enabled Query
col profile_option_name format a32
col SITE format a4
col APPL format a4
col RESP format a4
col USER format a4
col SRVR format a4
col ORG format a3
col svrp format a4
set pagesize 100
select unique profile_option_name,
hierarchy_type "Type",
WRITE_ALLOWED_FLAG,
READ_ALLOWED_FLAG,
SITE_ENABLED_FLAG || SITE_UPDATE_ALLOWED_FLAG "Site",
SERVERRESP_ENABLED_FLAG || SERVERRESP_UPDATE_ALLOWED_FLAG "SvRp",
SERVER_ENABLED_FLAG || SERVER_UPDATE_ALLOWED_FLAG "Srvr",
USER_ENABLED_FLAG || USER_UPDATE_ALLOWED_FLAG "User",
RESP_ENABLED_FLAG || RESP_UPDATE_ALLOWED_FLAG "Resp",
ORG_ENABLED_FLAG || ORG_UPDATE_ALLOWED_FLAG "Org",
APP_ENABLED_FLAG ||APP_UPDATE_ALLOWED_FLAG "Appl"
from
fnd_profile_options
where
profile_option_name in
('APPS_WEB_AGENT','APPS_SERVLET_AGENT','APPS_JSP_AGENT','APPS_FRAMEWORK_AGENT',
'ICX_FORMS_LAUNCHER','ICX_DISCOVERER_LAUNCHER','ICX_DISCOVERER_VIEWER_LAUNCHER',
'HELP_WEB_AGENT','APPS_PORTAL','CZ_UIMGR_URL','ASO_CONFIGURATOR_URL',
'QP_PRICING_ENGINE_URL','TCF:HOST')
or hierarchy_type='SERVER'
or hierarchy_type='SERVRESP'
order by hierarchy_type,profile_option_name;
Example Output of Enabled Query
PROFILE_OPTION_NAME Type W R Site SvRp Srvr User Resp Org Appl
-------------------------------- -------- - - ---- ---- ---- ---- ---- --- ----
FND_FUNCTION_VALIDATION_LEVEL SERVER Y Y YY NN YY NN NN NN NN
FND_VALIDATION_LEVEL SERVER Y Y YY NN YY NN NN NN NN
NODE_TRUST_LEVEL SERVER Y Y YY NN YY NN NN NN NN
OKS_SMTP_DOMAIN SERVER Y Y YY NN YY YN NN NN NN
UMX_REGISTER_HERE_HTMLPARAMS SERVER Y Y NN NN YY NN NN NN NN
UMX_REGISTER_HERE_REGPARAMS SERVER Y Y NN NN YY NN NN NN NN
UMX_REGISTER_HERE_REG_SRV SERVER Y Y NN NN YY NN NN NN NN
APPS_FRAMEWORK_AGENT SERVRESP Y Y YY YY NN YY NN NN NN
APPS_JSP_AGENT SERVRESP Y Y YY YY NN YY NN NN NN
APPS_PORTAL SERVRESP Y Y YY YY NN YY NN NN NN
APPS_SERVLET_AGENT SERVRESP Y Y YY YY NN YY NN NN NN
APPS_WEB_AGENT SERVRESP Y Y YY YY NN YY NN NN NN
ASO_CONFIGURATOR_URL SERVRESP Y Y YY YY NN YY NN NN NN
CZ_UIMGR_URL SERVRESP Y Y YY YY NN YY NN NN NN
HELP_WEB_AGENT SERVRESP Y Y YY YY NN YY NN NN NN
ICX_DISCOVERER_LAUNCHER SERVRESP Y Y YY YY NN YY NN NN NN
ICX_DISCOVERER_VIEWER_LAUNCHER SERVRESP Y Y YY YY NN YY NN NN NN
ICX_FORMS_LAUNCHER SERVRESP Y Y YY YY NN YY NN NN NN
QP_PRICING_ENGINE_URL SERVRESP Y Y YY YY NN YY NN NN NN
TCF:HOST SERVRESP Y Y YY YY NN YY NN NN NN
20 rows selected.
Understanding the Enabled Query Results
Version 1.0 of this note had this query showing just the hierarchy type plus whether or not the server and ServResp levels were enabled
and updateable. This version of the note expands that query with a more complex appearance. The resulting matrix of Y's and N's
from a customer's instance should be similar to what is posted above. The meaning of the columns can easily be determined from the
query above, but the main goal here is to show the pattern of Y's versus N's as an example for comparison.
As described in the long discussion of profile options at the server versus ServResp hierarchy section below, the server and ServResp
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
8 of 17 8/12/2014 6:54 PM
9. hierarchies should be enabled and updateable only at certain levels. When troubleshooting, it is best to confirm that ONLY these valid
levels (as shown in the example output) are available for the key profile options used in the more advanced topologies and that the
enabled and updateable flags haven't been changed by some errant twiddling. Similarly, since this configuration is sensitive to what
server a user logs into it is useful to know what profile options are under the server hierarchy and if those are also properly accessible
to AutoConfig. This should always be the case, but behind the scenes there is often someone trying to work beyond the supported
notes in an effort to force a configuration to work in an unnatural way.
A key reason why ServResp hierarchy is required for advanced topologies such as DMZ is that profile option values set at the server
level are NOT controlled by AutoConfig, but ServResp values are. As you work through Note:287176.1, settings for s_webentry_url,
s_webentry_host, etc. in the AutoConfig context file SHOULD propagate to the web related profile options after running AutoConfig, but
AutoConfig will not set these values if your web related profile options are not using ServResp hierarchy and then your DMZ instance
will not work unless you take on the burden of setting the profile options manually (errant twiddling).
-
Understanding the Server and ServResp Hierarchy
As shown above, the web like profile options (options with values like "http://...") in a DMZ configuration tend to be defined under
either the SERVER level hierarchy or the SERVRESP level hierarchy. Before providing a script to display the settings of every profile
option at each level, a discussion of how to interpret these profile option levels is required for understanding.
Server Hierarchy
Under the server level hierarchy, the profile options can be set at only the following levels:
Site
Server
User
The SITE level is essentially the default value if no other level applies.
The SERVER level will override the value set at the SITE level. This new feature is particularly useful in that it now matters what server
a user logs into. If a user logs into Server-A, his activities can be controlled by the profile options that are specific to Server-A and may
be very different from those of Server-B. This is ideal in a DMZ configuration.
The USER level overrides both the SITE and SERVER level.
Based upon this simple, outline explanation the site, responsibility, user, and server profile options are fairly straightforward to interpret
when running the Profiles Query, below, for listing all web like profile options and where they are set. When evaluating the value of the
profile option, the user level takes precedence over all other levels and the site level is only used when the settings at the other levels
do not apply to the current user's username or server. In contrast, the ServResp profile option algorithm is a bit more complex.
Note that if you are somehow (refer to the enabled query, above) able to set a value at the responsibility level, but the hierarchy type
is set to server, that responsibility level value will be ignored. Server hierarchy is only meant to look at the user, server, and site level.
ServResp Hierarchy
In contrast to server hierarchy, the ServResp profile option hierarchy is a hybrid combination of the server level and the responsibility
level and is especially useful when you want to specify a specific responsibility to be available only on a specific server (a functionally
directed load as described in Note:287176.1) or when you simply want a specific server to behave in a specific way. This is typical in a
DMZ configuration with administrative, normal, and external servers which need to act differently.
The value of the profile option under the ServResp hierarchy is derived by a specific set of rules as defined in internal Bug:3824790 and
discussed below. When a profile option is setup to have the ServResp hierarchy, it can only (legally) be set at one of the following three
levels:
Site
Server/Responsibility (ServResp)
User
The middle "Server/Responsibility" level is a combination of responsibility and server. Either or both of the responsibility or server
components may be specific values, or may be the "default" value. For purposes of evaluating "default" matches, the server is
considered to be at a higher level (and less specific) than the responsibility so values specified at the responsibility level will override
values specified only at the server level. When evaluating profile values at this "Server/Responsibility" level, the values of both the
level_value/level_application_value pair and level_value2 columns are considered together. If no overriding value is specified at the
user level, the algorithm will first look for a specific match for both responsibility and server level values. If no such match is found, it
will next look for a row matching the responsibility and with "default" for the server level. If no such match is found in that comparison,
it will next look for a row matching the server with "default" for the responsibility level. If no such match is found there either, it will
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
9 of 17 8/12/2014 6:54 PM
10. continue up the hierarchy to the Site level.
For example:
Suppose you have a profile set to the values A, B, C, D, E, F, G, and H at the various levels described in the following table:
With the above profile option set as above, the following combinations would be interpreted as
follows for the reasons stated:
-
The Profile Options Query
Based upon the above discussion, the following script will produce a nice report detailing where all of the URL type profile options are
set and what they are set to. Seeing these profile option values at once in a report format is much easier than picking through them
one by one from within forms (System Administrator/Profiles/System). As always, it is best to cut and paste this into sqlplus as apps
and create a simple text based spool file.
As written, this query will only show the profile options of general interest to a DMZ configuration. To show ALL profile options, simply
omit the boldfaced section of the where clause. This is sometimes very useful, but will produce a very large spool file.
Profiles Options Query
set linesize 132
set pagesize 132
col NAME format A40
col LEVEL_SET format a15
col CONTEXT format a20
col VALUE format A20 wrap
col Server format a10
col resp format a8 wrap
col application format a10
break on NAME
select
'('||language||')-'||n.user_profile_option_name NAME,
decode(v.level_id,
10001, 'Site',
10002, 'Application',
10003, 'Responsibility',
10004, 'User',
10005, 'Server',
10006, 'Organization',
10007, 'ServResp',
'Undefined') LEVEL_SET,
decode(to_char(v.level_id),
'10001', '',
'10002', app.application_short_name,
'10003', rsp.responsibility_key,
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
10 of 17 8/12/2014 6:54 PM
11. '10004', usr.user_name,
'10005', svr.node_name,
'10006', org.name,
'10007', (select n.node_name
from fnd_nodes n
where n.node_id=level_value2)
||'/'||
(decode(v.level_value,
-1,'Default',
(select responsibility_key
from fnd_responsibility
where responsibility_id=level_value))),
v.level_id) "CONTEXT",
v.profile_option_value VALUE
from
fnd_profile_options p,
fnd_profile_option_values v,
fnd_profile_options_tl n,
fnd_user usr,
fnd_application app,
fnd_responsibility rsp,
fnd_nodes svr,
hr_operating_units org
where
p.profile_option_id = v.profile_option_id (+)
and p.profile_option_name = n.profile_option_name
and ((upper(v.profile_option_value) like '%HTTP%')
or p.profile_option_name in
('APPS_WEB_AGENT','APPS_SERVLET_AGENT','APPS_JSP_AGENT','APPS_FRAMEWORK_AGENT',
'ICX_FORMS_LAUNCHER','ICX_DISCOVERER_LAUNCHER','ICX_DISCOVERER_VIEWER_LAUNCHER',
'HELP_WEB_AGENT','APPS_PORTAL','CZ_UIMGR_URL','ASO_CONFIGURATOR_URL',
'QP_PRICING_ENGINE_URL','TCF:HOST','NODE_TRUST_LEVEL','APPL_SERVER_TRUST_LEVEL')
or hierarchy_type='SERVER'
or hierarchy_type='SERVRESP')
and usr.user_id (+) = v.level_value
and rsp.application_id (+) = v.level_value_application_id
and rsp.responsibility_id (+) = v.level_value
and app.application_id (+) = v.level_value
and svr.node_id (+) = v.level_value
and org.organization_id (+) = v.level_value
order by name, v.level_id;
Example Output of Profiles Query (small excerpt)
NAME LEVEL_SET CONTEXT VALUE
----------------------------------- ------------- -------------------- --------------------
(US)-Application Framework Agent Site http://dcollieremt.u
s.oracle.com:8006
ServResp DCOLLIEREMT/Default http://dcollieremt.u
s.oracle.com:8005
ServResp DCOLLIERBE/Default htp://dcollierbe.us
.oracle.com:8005
(US)-Node Trust Level Site 2
Server DCOLLIEREMT 3
Understanding the Profiles Query
In the above profile options query example, each row is a specific value of a specific profile option at a specific level explained by each
of the four columns:
NAME - The name of the profile option prefixed with the NLS language code.
LANG NLS_LANGUAGE
---- ------------------------
AR ARABIC
D GERMAN
E SPANISH
EG EGYPTIAN
ESA LATIN AMERICAN SPANISH
F FRENCH
FRC CANADIAN FRENCH
GB ENGLISH
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
11 of 17 8/12/2014 6:54 PM
12. IW HEBREW
JA JAPANESE
KO KOREAN
US AMERICAN
ZHS SIMPLIFIED CHINESE
ZHT TRADITIONAL CHINESE
(This is a short version of select language_code, nls_language from fnd_languages;)
As written, the profiles query grabs all that is readily apparent to be important for DMZ and hardware load balancing. It currently
shows all of the profile values of the profiles mentioned by Note:287176.1 and every profile option set at a server and ServResp level.
LEVEL_SET - The level where the specific value of the specific profile option comes from i.e.; site, application, responsibility, user,
server, org, ServResp.
CONTEXT - The context of the level_set. For example, if the level_set is responsibility, this column will show the specific responsibility
and for server it will show the server's name. In the more complex case of ServResp, this column will show the name of the server plus
the responsibility it is tied to for the ServResp evaluation explained above.
VALUE - The raw value of the profile option. As an example, the query result shows "Node Trust Level", which can be a value of 1, 2,
or 3. The meaningful value of "Node Trust Level" is attainable from the above Trust query which translates the 1, 2, 3 to admin,
normal, external.
Setting ServResp Profile Options Manually
The way Note:287176.1 is setup, you should not need to manually set the ServResp level profile options. As you work your way through
section five of the note, you find that section 5.2 directs you to declare which servers are internal and which are external. AutoConfig
will handle setting the profile options from there using a script such as afwebprf.sql (buried under a stack of calls).
After running the txkChangeProf.sql from Note:287176.1 with the SERVRESP argument, you won't be able to see the profile options in
the forms unless you have applied the updated forms patch. The one-off patch that updates the forms so that you can see and
manipulate SERVRESP hierarchy based profile options is "4733943-One-off ARU for 4240917: SERVRESP UI ENHANCEMENTS FOR
FNDPOMPV, FNDPOMPO, FNDPOMSV".
Example screenshot after applying 4733943:
To see the ServResp column in the successive form you must specify both a Responsibility and a Server as illustrated above.
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
12 of 17 8/12/2014 6:54 PM
13. -
Orphaned Profile Options
As another troubleshooting point, it is often helpful to consider orphaned profile options as described in Bug:4858843. As discussed
earlier, the server (and therefore ServResp) profile option hierarchies do not store the server name in the profile option tables. Instead,
the server is identified by its node_id as listed in the fnd_nodes table. This has the chance to cause problems in cloned instances.
Per Bug:4858843, a customer starts with an original instance and sets up the various profile options at the Server/ServResp level to
implement a DMZ (Note:287176.1). The current revision of Note 287176.1 sets the appropriate profile options using the script
afwebprf.sql via AutoConfig. With the original instance working well, they now clone the instance, run
FND_CONC_CLONE.SETUP_CLEAN, and finally run AutoConfig on the new instance with the reasonable expectation that the new
instance's DMZ configuration will work well. At this point they have new nodes defined in the fnd_nodes table and new Server/ServResp
level profile options with the names of the new nodes that make up the cloned instance. Unfortunately, they also have the original, but
now orphaned, profile option values for the nodes of the original instance. These orphaned profile options are Server/ServResp level
profile options that refer to node_id's that were removed from the fnd_nodes table by the FND_CONC_CLONE.SETUP_CLEAN and still
linger, somewhat inaccessible, in the profile option value tables.
The query below is meant only to show if the instance has orphaned profile options.
Orphans Query
set pagesize 66
set linesize 132
col "Effected Profile Name" format a40
col "Orphaned ID(s)" format a14
Break on "Effected Profile Name"
select
p.Profile_option_name "Effected Profile Name",
decode(v.level_value, -1,'',v.level_value)||v.level_value2 "Orphaned ID(s)",
decode(v.level_id,
10005, 'Server',
10007, 'ServResp',
'Other') "Level"
from
fnd_profile_options p,
fnd_profile_option_values v,
fnd_profile_options_tl n
where
p.profile_option_name = n.profile_option_name
and p.profile_option_id = v.profile_option_id (+)
and ( /* check Server level */
(
v.level_id=10005
and v.level_value > 0
and v.level_value
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
13 of 17 8/12/2014 6:54 PM
14. not in ( select f.node_id from fnd_nodes f )
)
or /* check ServResp level */
(
v.level_id=10007 and (v.level_value2 is not null)
and (v.level_value2 > 0)
and v.level_value2
not in
(
select
f.node_id
from
fnd_nodes f
)
)
)
order by p.Profile_option_name;
Example Output of Orphans Query
Effected Profile Name Orphaned ID(s) Level
---------------------------------------- -------------- --------
APPS_FRAMEWORK_AGENT 5067 ServResp
5065 ServResp
APPS_JSP_AGENT 5065 ServResp
5067 ServResp
APPS_PORTAL 5065 ServResp
5067 ServResp
APPS_SERVLET_AGENT 5065 ServResp
5067 ServResp
APPS_WEB_AGENT 5065 ServResp
5067 ServResp
ASO_CONFIGURATOR_URL 5065 ServResp
5067 ServResp
CZ_UIMGR_URL 5065 ServResp
5067 ServResp
FND_FUNCTION_VALIDATION_LEVEL 5067 Server
HELP_WEB_AGENT 5067 ServResp
5065 ServResp
ICX_DISCOVERER_LAUNCHER 5065 ServResp
5067 ServResp
ICX_DISCOVERER_VIEWER_LAUNCHER 5065 ServResp
5067 ServResp
ICX_FORMS_LAUNCHER 5067 ServResp
5065 ServResp
NODE_TRUST_LEVEL 5067 Server
QP_PRICING_ENGINE_URL 5067 ServResp
5065 ServResp
TCF:HOST 5065 ServResp
5067 ServResp
28 rows selected.
Ideally this will return "no rows selected".
Understanding the Orphans Query
Ideally the above query will return "no rows selected" and indicate that the instance has no orphaned profile options. Otherwise, it will
show the node_id that is present at the Server level_value or ServResp level_value2 that is NOT tied to a value in FND_NODES. In the
above example, we see that two nodes were orphaned and that this effected 14 different profile options. These profile option values
cannot be removed via the forms interface because the node_id is already missing from FND_NODES. The only way to remove it is via
SQL. In many instances, orphaned profile options can simply be left alone, but there are a few cases where they cause problems. For
example, if a new node were added to the instance or if the post-clone run of AutoConfig happened to assign a node_id that is already
existing from a previous instance, that new node would inherit all of the profile option values of that previously orphaned node. Using
the above query as a guide, these orphaned node_ids can be removed via sqlplus as the apps user using the following delete
statement:
delete from fnd_profile_option_values
where
(level_id = 10005
and level_value > 0
and level_value not in (select node_id from fnd_nodes))
or
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
14 of 17 8/12/2014 6:54 PM
15. (level_id = 10007
and level_value2 > 0
and level_value_application_id=-1
and level_value2 not in (select node_id from fnd_nodes));
28 rows deleted.
The official fix for this comes from a modification of afcpclean.sql to delete the orphaned profile options. This fix was first delivered in
5107107-TXK (FND) AUTOCONFIG TEMPLATE ROLLUP PATCH N (July 2006).
-
Checking the Patch Requirements on each Appl_Top
A number of customers use the AD_BUGS table to see if patches are applied. This really isn't accurate. Take, for example, the need to
see if your 11.5.10.2 instance has all of the patches required by the DMZ note 287176.1:
Example of a bad way to check for patch application
select
creation_date,
bug_number
from
ad_bugs
where
bug_number in ('3240000','3460000','4204335','4125550','3942483','4733943');
Example output of a bad way to check for patch application
CREATION_DATE BUG_NUMBER
--------------- ---------------
13-JUL-05 3460000
29-APR-06 3942483
13-JUL-05 4125550
29-APR-06 4733943
The above example output shows that this instance is fully compliant, even with the additional "nice to have" patches that aren't
required by the note like '4733943'. This is misleading, because the instance is NOT compliant. For this illustration, I didn't apply these
patches to every tier and therefore my DMZ instance will not work. A better approach is to use the "ad_patch.is_patch_applied" function
which considers each APPL_TOP such as in the following PL/SQL example:
Patch Query
set serveroutput on
DECLARE
TYPE p_patch_array_type is varray(10) of varchar2(10);
--
p_patchlist p_patch_array_type;
p_appltop_name varchar2(50);
p_patch_status varchar2(15);
p_appl_top_id number;
--
CURSOR alist IS
select appl_top_id, name
from ad_appl_tops;
--
procedure println(msg in varchar2)
is
begin
dbms_output.enable;
dbms_output.put_line(msg);
end;
--
BEGIN
open alist;
--
p_patchlist:= p_patch_array_type('3240000','3460000','4204335','4125550','3942483','4733943');
--
LOOP
FETCH alist INTO p_appl_top_id,p_appltop_name;
EXIT WHEN alist%NOTFOUND;
--
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
15 of 17 8/12/2014 6:54 PM
16. IF p_appltop_name NOT IN ('GLOBAL','*PRESEEDED*')
THEN
println(p_appltop_name || ':');
for i in 1..p_patchlist.count
loop
p_patch_status := ad_patch.is_patch_applied('11i',p_appl_top_id,p_patchlist(i));
println('..Patch ' || p_patchlist(i) || ' was ' || p_patch_status);
end loop;
END if;
println('.');
END LOOP;
--
close alist;
END;
/
Example Output of Patch Query
dcollierbe:
..Patch 3240000 was NOT_APPLIED
..Patch 3460000 was EXPLICIT
..Patch 4204335 was NOT_APPLIED
..Patch 4125550 was EXPLICIT
..Patch 3942483 was EXPLICIT
..Patch 4733943 was EXPLICIT
.
dcollieremt:
..Patch 3240000 was NOT_APPLIED
..Patch 3460000 was EXPLICIT
..Patch 4204335 was NOT_APPLIED
..Patch 4125550 was EXPLICIT
..Patch 3942483 was NOT_APPLIED
..Patch 4733943 was NOT_APPLIED
Notice in the above example output that patches 3942483 and 4733943 HAVE NOT BEEN APPLIED to dcollieremt (my external middle
tier), but AD_BUGS implied that I had applied everything that I needed to! In a DMZ environment, this is especially important to check
since the DMZ middle tiers shouldn't share an APPL_TOP with the internal tiers.
Patch Query Caveats
This patch query is becoming very popular and is often copy/pasted into other notes and TARs without its proper context and
explanation of its limitations. The philosophy behind this whitepaper is to offer these queries as troubleshooting tools with the full
expectation that the reader, after understanding how the query works as written, will modify them to suit their particular need. To do
this in a meaningful way, the existing limitations of the query must be understood.
1. The p_patchlist can any single-quoted, comma-separated list of patch numbers of patches applied using adpatch. What is currently
listed above is a list of patches as mentioned in an early revision of Note:287176.1. Most of these patches are now obsoleted and
therefore p_patchlist lists the realistic minimum patches and not necessarily the current recommended list. It is fully expected that the
user of this script update the p_patchlist to suit their need.
2. As written, p_patchlist looks for all of the patches listed in the early revision of Note:287176.1. In many cases, it is NOT a problem
that a patch was NOT_APPLIED because Note:287176.1 states that if a certain patch was applied, then some certain other patch is not
required. It is the responsibility of the reader to have a current copy of Note:287176.1 in front of them to determine what patches still
need to be applied.
3. This query will not find patches that were not applied with adpatch. For example: iAS rollup patches, forms patchsets, and RDBMS
specific patches.
4. It is important for the reader to understand what APPL_TOPs are valid for their instance before interpreting the query results.
Many customers will run this script on cloned systems that haven't had the old patch histories cleaned and therefore the script will list
APPL_TOPs that, while still in the database, are NOT a part of the current instance ("p_appltop_name NOT IN ..." can address
this). The reader should also understand what servers in their instances are sharing APPL_TOPs with other servers so as to understand
that the p_applop_name doesn't always refer to a specific server.
5. Most of the newer patches run by adpatch will finish by running "Maintain Snapshot Info", but some customer's take shortcuts and
get behind on this. For best results, run adadmin "Maintain Snapshot Info" before running this query (or if you suspect the results are
amiss) or newer patches may not be seen in the query results.
-
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
16 of 17 8/12/2014 6:54 PM
17. Summary
This note is the first of a currently four part series of advanced topology troubleshooting notes and provides some explanations of
fundamental concepts and queries useful in diagnosing such instances. Readers wanting to increase their knowledge in this subject
area are encouraged to read the rest of the series.
Advanced Topology/DMZ Troubleshooting Series
Note:364439.1-Tips and Queries for Troubleshooting Advanced Topologies (this document)
Note:460564.1-Hints and Tips for Troubleshooting the URL Firewall
Note:438744.1-Case History: Implementing a Reverse Proxy Alone in a DMZ Configuration - 11i
Note.726953.1-Case History: Implementing a Reverse Proxy Alone in the DMZ Configuration - R12
REFERENCES
NOTE:287176.1 - DMZ Configuration with Oracle E-Business Suite 11i
BUG:7699618 - ISSUE WHEN SETTING RESPONSIBILITY TRUST LEVEL (FORMS BASED)
NOTE:217368.1 - Advanced Configurations and Topologies for Enterprise Deployments of E-Business Suite 11i
NOTE:438744.1 - Case History: Implementing a Reverse Proxy Alone in a DMZ Configuration - 11i
NOTE:460564.1 - Hints and Tips for Troubleshooting the URL Firewall (410-Gone on DMZ External Tiers)
Document 364439.1 https://support.oracle.com/epmos/faces/DocumentDisplay?_adf.ctrl-state...
17 of 17 8/12/2014 6:54 PM