Solved

DELETE archivelog until time '(sysdate -1/10)' backed up 1 times to device type disk;

Posted on 2012-03-28
2
610 Views
Last Modified: 2012-04-13
Can i use the below command in 8i.
0
Comment
Question by:dba1234
2 Comments
 
LVL 76

Assisted Solution

by:slightwv (䄆 Netminder)
slightwv (䄆 Netminder) earned 250 total points
Comment Utility
I don't know.  Can you?

I suggest you try it on a test system and see.

From the docs I was able to find:
http://docs.oracle.com/cd/F49540_01/DOC/server.815/a67773/toc.htm

I don't see a straight 'delete' command.

From the little I searched for, looks that might be a 9i feature.
0
 
LVL 16

Accepted Solution

by:
Wasim Akram Shaik earned 250 total points
Comment Utility
got this info from one of the forums, seems that you have to do sequence of steps in 8i to do this task...

$ cat /u01/scripts/cleanup_rman_arch_test2.sh
#!/bin/ksh
ORACLE_SID=TEST2; export ORACLE_SID
ORACLE_HOME=/u01/oracle8i/product/8.1.7; export ORACLE_HOME
PATH=$ORACLE_HOME/bin; export PATH
$ORACLE_HOME/bin/rman target username/password@TEST2 catalog rman/rman@rcat log=/u01/logs/cleanup_rman_arch_test2_log @/u01/scripts/cleanup_rman_arch_test2.rcv
exit

$ cat /u01/scripts/cleanup_rman_arch_test2.rcv
allocate channel for delete type disk;
change archivelog until time 'SYSDATE-7' delete;
release channel;

this is copied from here..
http://www.dbasupport.com/forums/archive/index.php/t-32982.html
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

Working with Network Access Control Lists in Oracle 11g (part 1) Part 2: http://www.e-e.com/A_9074.html So, you upgraded to a shiny new 11g database and all of a sudden every program that used UTL_MAIL, UTL_SMTP, UTL_TCP, UTL_HTTP or any oth…
Working with Network Access Control Lists in Oracle 11g (part 2) Part 1: http://www.e-e.com/A_8429.html Previously, I introduced the basics of network ACL's including how to create, delete and modify entries to allow and deny access.  For many…
This video shows how to copy a database user from one database to another user DBMS_METADATA.  It also shows how to copy a user's permissions and discusses password hash differences between Oracle 10g and 11g.
This videos aims to give the viewer a basic demonstration of how a user can query current session information by using the SYS_CONTEXT function

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now