Efficient DBA Part 1 Scripting Your Logins “Efficiency is intelligent laziness.” ~ David Dunham TCOUG.

Slides:



Advertisements
Similar presentations
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Advertisements

1 Automated SFTP Windows and SUN Linux and SUN. 2 Vocabulary  Client = local=the machine generating the SFTP request  Server = remote = the machine.
The VeriTrak Enterprise Application Created for The Verification Company By CTO Source, Inc. This presentation provides an overview of the system and links.
Overview of User Set-up & Security. Administrator Functions Before adding new Users, we first need to define some User Security Settings To do this navigate.
CS 497C – Introduction to UNIX Lecture 36: - Customizing the Environment Chin-Chih Chang
A Guide to MySQL 3. 2 Objectives Start MySQL and learn how to use the MySQL Reference Manual Create a database Change (activate) a database Create tables.
Guide to Linux Installation and Administration, 2e1 Chapter 6 Using the Shell and Text Files.
Lecture 02CS311 – Operating Systems 1 1 CS311 – Lecture 02 Outline UNIX/Linux features – Redirection – pipes – Terminating a command – Running program.
hotEx RADIUS Manager Installation
1 Tuning PL/SQL procedures using DBMS_PROFILER 20-August 2009 Tim Gorman Evergreen Database Technologies, Inc. Northern California Oracle.
1 PL/SQL programming Procedures and Cursors Lecture 1 Akhtar Ali.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Remote access and file transfer Getting files on and off Bio-Linux.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Lenovo Yoga 11e Setup Instructions. Before starting Set time aside for the setup process Setup process takes a long time…about an hour Have plans for.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
IBM Maximo Asset Management © 2007 IBM Corporation Tivoli Technical Exchange Calls Aug 31, Maximo - Multi-Language Capabilities Ritsuko Beuchert.
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
DBA’s, Oracle Designer and the Development Life Cycle By Peter Wilkinson, Mercury International Ltd. Leslie Tierstein, SCI Consulting, Inc.
Web Server Administration Chapter 7 Installing and Testing a Programming Environment.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Access Training Linux/Unix Power Broker Access Custom Schema Database Access Customer Training Date: 25-JAN-2005.
Week 7 Lecture 1 Database Roles. Learning Objectives  Discover when and why to use roles  Learn how to create, modify, and remove roles  Learn how.
The Professional Open Source™ Company CLI Shell JBossNetwork Enterprise Manager Command Line Interface.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Once you have located the ISBN you would like to purchase, click “Add to Cart”. You will get a pop-up window showing the item you’ve added. If you are.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
 This guide will cover the process of connecting to VPN Server with the Desktop Client.
Regis: Academic Research Network: ARN ARN Getting Connected Drive Mapping SQL*Plus Spooling Your Work Presented by “SOETJAHJO”
1 Chapter Overview Performing Configuration Tasks Setting Up Additional Features Performing Maintenance Tasks.
A Guide to MySQL 3. 2 Introduction  Structured Query Language (SQL): Popular and widely used language for retrieving and manipulating database data Developed.
HotEx Radius Manager Installation. hotEx RADIUS Manager Network Diagram.
Sponsored by the National Science Foundation 1 ICDCS13: July 8, 2013 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you do the.
14 Copyright © Oracle Corporation, All rights reserved. SQL Workshop.
Week 2 Lecture 1 Creating an Oracle Instance. Learning Objectives  Learn the steps for creating a database  Understand the prerequisites for creating.
1 Day 18 Bash and the.files. 2 The.files ls shows you the files in your directory –Or at least most of them. –Some files are hidden. Try: ls –a –This.
SCSC 455 Computer Security Chapter 3 User Security.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
PL/SQL programming Procedures and Cursors Lecture 1 [Part 2]
1 Introduction to SQL *Plus Oracle SQL Interface MIS309 Database Systems.
1 Very basics on DB access CS Nov DBMS? Oracle Accounts already created Documentation: mySQL: To create an account,
Oracle Business Intelligence Foundation – Testing and Deploying OBI Repository.
Settings MySQL Database and JDBC configuration Instructor: Sergey Goldman.
Internship with Contemporary Technologies (Remote DBA Experts) Jenna LuttonFebruary 1, 2007.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Let's build a VMM service template from A to Z in one hour Damien Caro Technical Evangelist Microsoft Central & Eastern Europe
EduGeek Logon Tracker Next generation user tracking.
Backup and Restore on the ALSMS Server Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
PuTTY Introduction to Web Programming Kirkwood Continuing Education by Fred McClurg © Copyright 2016, All Rights Reserved ssh client.
Introduction to Ansible
How to convert a Demo to Multi-user
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
NTP, Syslog & Secure Shell
Chapter 5 : Designing Windows Server-Level Security Processes
LINUX ADMINISTRATION 1
Getting SSH to Work Between Computers
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Remote Computing Services Cloud connection Distributed system
VirgoStaging Status F.Carbognani, S. Cortese, E. Pacaud.
Getting Started: Accessing Our Amazon AWS Server
Presentation transcript:

Efficient DBA Part 1 Scripting Your Logins “Efficiency is intelligent laziness.” ~ David Dunham TCOUG

Start at the End TCOUG

Set the SQL prompt TCOUG

Always be aware of your environment TCOUG

Script the environment variables for each instance TCOUG

rlwrap TCOUG Gives capability to re-execute commands in sqlplus and rman Command history program similar to bash’s history package Installable as RPM or compile from source Gives similar behavior to sqlplus in Windows Will run in Cygwin Very robust, but simple arrow up gives last command executed to-get-a-command-history-in-sqlplus/ to-get-a-command-history-in-sqlplus/

Put environment scripts in an easily accessible location and alias the most frequently used TCOUG

Sudo prohibits and allows commands to be run TCOUG

Sudo has a verification timeout before asking for your password again TCOUG

Only requires password once, then loops and executes command once every 10 seconds Note: Your company’s security department may not like this TCOUG

Add this script to your profile script Will execute automatically on login TCOUG

Will run as long as your login PID exists TCOUG

AD/LDAP user automatic login TCOUG

Shared Key Authentication is enabled on the server by default TCOUG

Generate private and public keys with PuttyKeyGen TCOUG

Private key client authentication done by Pageant TCOUG

The key generated will look similar to this Formatted like this will work with Linux SSHD

$HOME/.ssh should be set to 700 TCOUG $HOME/.ssh/authorized_keys should be set to 600

Once the public key is added, the server is ready to accept the paired keys TCOUG

Shared Key Authentication bypasses the need for a password on login TCOUG

Desktop Log into server using share-key authentication Sudo keep-alive loop started Switch User to Oracle Set environment variables Log into sqlplus Review

When Time is Your Bottle Neck Every Second Counts! TCOUG Become an Efficient DBA Spend some time each week finding shortcuts Thank You! Seth Miller