$ crsctl stat res ora.ons -p
NAME=ora.ons
TYPE=ora.ons.type
ACL=owner:grid:rwx,pgrp:oinstall:r-x,other::r--
ACTIONS=
ACTION_SCRIPT=
ACTION_TIMEOUT=60
AGENT_FILENAME=%CRS_HOME%/bin/oraagent%CRS_EXE_SUFFIX%
ALLOW_PUBLISH=
ALLOW_PUBLISH_NODES=1
ALLOW_UNSECURE_SUBSCRIBER=yes
AUTO_START=always
CHECK_INTERVAL=60
CHECK_TIMEOUT=0
CLEAN_TIMEOUT=60
CSS_CRITICAL=no
DEBUG_COMP=
DEBUG_FILE=
DELETE_TIMEOUT=60
DESCRIPTION=Oracle ONS resource
EM_PORT=2016
ENABLED=1
GEN_LAST_STARTED=racnode1_1626153918
GEN_ORACLE_CONFIG_HOME=
GEN_ORACLE_CONFIG_HOME@SERVERNAME(racnode1)=/u01/app/19.0.0.0/grid
GEN_ORACLE_CONFIG_HOME@SERVERNAME(racnode2)=/u01/app/19.0.0.0/grid
GEN_ORACLE_CONFIG_HOME@SERVERNAME(racnode3)=/u01/app/19.0.0.0/grid
GEN_ORACLE_CONFIG_HOME@SERVERNAME(racnode4)=/u01/app/19.0.0.0/grid
IGNORE_TARGET_ON_FAILURE=no
INSTANCE_FAILOVER=1
INTERMEDIATE_TIMEOUT=0
LOAD=1
LOCAL_PORT=6100
LOGGING_LEVEL=1
LOG_COMP=
LOG_FILE=
MEMBER_ID=0
MODIFY_TIMEOUT=60
NLS_LANG=
OFFLINE_CHECK_INTERVAL=0
ONS_CLIENTCLUSTER_NAME=
REMOTE_HOSTS=
REMOTE_PORT=6200
RESOURCE_GROUP=
RESTART_ATTEMPTS=3
RESTART_DELAY=0
SCRIPT_TIMEOUT=60
SERVER_CATEGORY=ora.hub.category
START_CONCURRENCY=0
START_DEPENDENCIES=hard(ora.net1.network) pullup(ora.net1.network)
START_TIMEOUT=300
STOP_CONCURRENCY=0
STOP_DEPENDENCIES=hard(intermediate:ora.net1.network)
STOP_TIMEOUT=300
TARGET_DEFAULT=default
TYPE_VERSION=2.1
UPTIME_THRESHOLD=1d
USER_WORKLOAD=no
USE_EVM=true
USE_SSL=1
USR_ORA_ENV=
WORKLOAD_CPU=0
WORKLOAD_CPU_CAP=0
WORKLOAD_MEMORY_MAX=0
WORKLOAD_MEMORY_TARGET=0
Month: July 2021
12c TDE : ORA-28354 ORA-28417: password-based keystore is not open
In 12c, while opening a software keystore and set the software TDE master encryption key, the following errors occur:
SQL> ADMINISTER KEY MANAGEMENT SET KEYSTORE OPEN IDENTIFIED BY "wallet_password" CONTAINER =all;
ADMINISTER KEY MANAGEMENT SET KEYSTORE OPEN IDENTIFIED BY "wallet_password" CONTAINER =all
*
ERROR at line 1:
ORA-28354: Encryption wallet, auto login wallet, or HSM is already open
SQL>ADMINISTER KEY MANAGEMENT SET KEY IDENTIFIED BY "wallet_password" WITH BACKUP USING 'first_key_backup' CONTAINER = ALL;
ERROR at line 1:
ORA-28417: password-based keystore is not open
CAUSE
An auto-open wallet is created. It was working fine when the password-based keystore is open.
WORKAROUND
1) Remove the auto-open wallet cwallet.sso
$mv cwallet.sso cwallet.sso.bkp
2) Close the wallet
SQL>administer key management set keystore close;
3) Open the password based wallet
SQL>administer key management set keystore open identified by "wallet_password" ;
4) Retry the original Set Key statement
SQL>ADMINISTER KEY MANAGEMENT SET KEY IDENTIFIED BY "wallet_password" WITH BACKUP USING 'first_key_backup' CONTAINER = ALL;
keystore altered.
5) Finally re-enable auto_login
SQL>administer key management create AUTO_LOGIN keystore from keystore '<wallet directory>' identified by "wallet_password" ;
ORA-12919: Can not drop the default permanent tablespace
SQL> drop tablespace users including contents and datafiles;
drop tablespace users including contents and datafiles
*
ERROR at line 1:
ORA-12919: Can not drop the default permanent tablespace
SQL> alter database default tablespace user1;
Database altered.
SQL> drop tablespace users including contents and datafiles;
Tablespace dropped.
USERNAME DEFAULT_TABLESPACE
------------------------------ ------------------------------
ORACLE_OCM USER1
OJVMSYS USER1
SYSKM USER1
XS$NULL USER1
GSMCATUSER USER1
MDDATA USER1
AUDSYS USER1
DIP USER1
SYSDG USER1
SPATIAL_CSW_ADMIN_USR USER1
SPATIAL_WFS_ADMIN_USR USER1
GSMUSER USER1
SYSBACKUP USER1
SYSTEM SYSTEM
SYS SYSTEM
How To Change SYS Password On ExaCC
Changing Oracle Database SYS user password is more complicated in Exacc Gen 2 environment.
The following should be considered, and takes action appropriately when changing SYS user password:
- SYS Password Changing( Not using Alter User …)
- ExaCC Database Backup Reconfiguration
- A Secure External Password Store (SEPS) SYS Password Update in Keystore
- TDE Wallet Password Changing Recommended
- DG Standby Site Update
Subscribe to get access
Read more of this content when you subscribe today.
How to Check if TDE ( Transparent Data Encryption ) is Enabled in Oracle Database
This post shows us how to check if TDE ( Transparent Data Encryption ) has even been enabled or not in your Oracle database, even there is no encrypted tables or tablespaces in your Oracle database at the moment.
Subscribe to get access
Read more of this content when you subscribe today.