Solved

Scheduling in UNIX

Posted on 1997-07-29
5
281 Views
Last Modified: 2010-04-22
Hello!
I'm working with Windows NT and MS SQL, but some important data in our organization are on Oracle 7.3 which run on the UNIX box. After the last crash of Oracle server when we lost a whole day's work I have a quarrel with our administrator. He explained that on UNIX there isn't a way to schedule the command execution at later time, but during the working hours he doesn't have a time to run the log backup of database. Living all my life in Windows world I don't believe him.
So my question: is there a way to make schedule of running log backup automaticaly either by UNIX or Oracle means?
If yes then how, if no then why you're using them (UNIX and Oracle).
0
Comment
Question by:armands
  • 3
  • 2
5 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 200 total points
ID: 2006599
There 2 traditional ways to schedule commands: at and cron.
While `at' starts a command at the specified time once, `cron' may do the same periodically (i.e. each sunday at 9pm), see corresponding man-pages.

I don't know if this is possible for your Oracle database, because of open files and such things.
0
 
LVL 2

Author Comment

by:armands
ID: 2006600
Thanks, but there is other problem. To run backup utility we must supply a pasword which is then seen in the process list as parameter. Can we prevent this?
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2006601
If you use cron (crond), each user has its on crontab (usually in /var/spool/cron/crontabs), and so there is no password needed.
0
 
LVL 2

Author Comment

by:armands
ID: 2006602
This is the Oracle password which UNIX display as utility parameter.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2006603
I don't know how Oracle reads its passwords.
You can be lucky if it's poorly programmed, meaning that it reads from stdin and not from /dev/tty, then you can redirect it, like:

your_script_containing_oracle_call < oracle_passwd_file
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now