Solved

Oracle statspack, awr & addm

Posted on 2011-09-02
5
680 Views
Last Modified: 2013-11-11
Hey please let me know the steps to run statspack, awr & addm. And also let me know what do we look in those statspack , awr & addm report and how do we resolve it
0
Comment
Question by:hussainkhan22
  • 3
  • 2
5 Comments
 
LVL 76

Accepted Solution

by:
slightwv (䄆 Netminder) earned 500 total points
ID: 36474653
>>Hey please let me know the steps to run statspack, awr & addm.

The docs:
2 Day + Performance Tuning Guide
http://download.oracle.com/docs/cd/E11882_01/server.112/e10822/toc.htm

Performance Tuning Guide
http://download.oracle.com/docs/cd/E11882_01/server.112/e16638/toc.htm

>>And also let me know what do we look in those statspack , awr & addm report and how do we resolve it

Same doc links.  There is no way for us to answer that broad of a question here.  People make careers out of nothing but tuning Oracle.

What you look at depends on what performance issue you are wanting to 'tune'.
0
 

Author Comment

by:hussainkhan22
ID: 36476012
Can you let me know the best book or link learn about oracle 11g databases. I would appreciate your help
0
 
LVL 76

Expert Comment

by:slightwv (䄆 Netminder)
ID: 36476179
The online docs are the best.  Start with the concepts guide.
0
 

Author Comment

by:hussainkhan22
ID: 36476518
Can you please provide link for concepts guide. Thanks alot in advance
0
 
LVL 76

Expert Comment

by:slightwv (䄆 Netminder)
ID: 36476725
Same doc link.  Select the 'book list' link, then look for concepts.

You have been on the site for a while and asked a lot of questions where I have referenced the online docs.

You should be very familiar with the online documentation for the various versions and the books available.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Background In several of the companies I have worked for, I noticed that corporate reporting is off loaded from the production database and done mainly on a clone database which needs to be kept up to date daily by various means, be it a logical…
This video shows setup options and the basic steps and syntax for duplicating (cloning) a database from one instance to another. Examples are given for duplicating to the same machine and to different machines
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now