In a clustered environment, data is placed on the shared storage, and identities between peers are equal and have the same access to the data. It is required that the clusterware have a control mechanism for concurrent access to such peer permissions. In Oracle RAC, you use the _____ mechanism to do multiple node-to-node collisions control of access.
In acustomer environment with SuSE 10SP3, HBA QLogic QLE2562, using the operating system comes with HBA card driver. The storage array is Huawei OceanStor V3 storage. When storing the FC host port on the system and the HBA on the host. When the card port modeis inconsistent, it is usually recommended to modify the FC host port mode on the storage side to solve the problem.
Existing set customer of database uses a raw device, due to the large amount of data inthe database. The customer plans to replace the old storage with new storage devices.
In the process of environmental inspection lvcb engineers found the following:
#getlvcb -TA sjklv
Intrapolicy =
copies = 0
interpolicy =
lvid =
lvname =
label =
machine id =
number Ips = 0
relocatable =
strict =
stripe width = 0
stripe size in exponent = 0
type =
upperbound = 0
fs =
time created = time modified =
As the vg is too large, the expansion of vg is impossible. As the service window is very short, and customersdo not want to avoid the risk of large adjustments of the whole original environment, what is the recommended approach?
The OceanStor 18000 system used by a client businessapplication has a total of three pools, each of which is a 9-disk RAID5. Someday analyzing the log of business interruption, we found that there are some scenarios in the system that caused the failure. What will cause the host access to the stored business in the following scenario? (Multiple choice.)