Solved

How to gather the kernel parameters in a text file for example ?

Posted on 2011-02-11
7
515 Views
Last Modified: 2013-11-17
Hi experts.

I need to gather the kernel parameters of the Oracle user and the parameters in the smit for the oracle user to a text file.
0
Comment
Question by:LindaC
  • 4
  • 3
7 Comments
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 34871618
What exactly do you mean with "kernel parameters" and "parameters in the smit"?
Something like "ulimit" or so?

wmp


0
 
LVL 8

Author Comment

by:LindaC
ID: 34871632
The parameters shown in the ulimit -a and all the smit parameters for the Oracle user.
Smit or smitty is the program used by System Admins (I'am a Dba not a System Admin) to configure different parameters that affect the oracle user.
0
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 34871684
Well, I know what smit is .....

smit is used to configure almost anything - network, devices, file systems, printing, accounting, installation ...

So what do you want to get displayed?

su - oracle -c ulimit -a > /tmp/oracle.ulimit
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 68

Expert Comment

by:woolmilkporc
ID: 34871895
Maybe

lsuser -f oracle

?
0
 
LVL 8

Author Comment

by:LindaC
ID: 34872409
Why the lsuser -f oracle did not bring the ulimit ?
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 34872461
1) Because lsuser and ulimit are two different commands?

2) Take a closer look at the output of lsuser:

fsize, cpu, data, stack, core, rss, nofiles, threads ...
 
they're all present waiting just for you to give them a smile.
0
 
LVL 8

Author Closing Comment

by:LindaC
ID: 34872484
Thank you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
sed -- search an replace multiple pattern 11 67
aix tls version 6 221
AIX 5.x set up arrow to recall 11 46
Image not there 4 44
A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now