Description
An evolution to Excellence
This section gives a brief overview of RMAN history, Introduction about it and what are its uses.
Introduction to Architecture
The environment consists of utilities and databases that helps in backing up your data. The environment basically contains the following components – Target database, executable, Recovery catalog database and Media management software.
All the entities are explained in detail under this chapter
Section 2: Learning about RMAN commands
This section helps you to learn how to start and exit and what are the commands used to start It .
The commands can be entered either directly or from a text file. This section contains the following topics
Entering commands at the RMAN prompt
Using command files
Entering comments in command files
Substitution variables
The retention policy mentions which backups are to be retained to meet the data recovery requirements. This section covers the following
Commands used to configure retention policy
Configuring a redundancy based retention policy
Configuring a recovery window based retention policy
Disabling the retention policy
RMAN CLI and Security
Under this section you will learn how to configure It and Oracle secure backups. The other sections covered under this chapter are
How to perform backups and Oracle secure Backup
How to perform recovery and Oracle secure Backup
How to use It and oracle secure backup in a real application clusters environment
The recovery catalog is database schema that consists the RMAN repository data for one or more target databases. This chapter contains
Overview of the recovery catalog
How to register a database in recovery catalog
Protecting the recovery catalog
Maintaining the recovery catalog
Dropping a recovery catalog
Section 3: RMAN Database Backup
In this tutorial you will see what are the commands used to backup files which are offline.
Backup Compression and Restore points
It has two types of compression when creating backups – Unused block compression and Null block compression. These two types of compressions are explained under this chapter.
Restore points provide capabilities which are related to flashback database. There are two types of restore points which are explained in this section – Normal restore points and guaranteed restore points.
Introducing the set command
The backup set command is used to save disk space. This command is used to back up backup sets which are created by other backup jobs. This command is explained in detail in this chapter.
Other RMAN backup concepts
Under this chapter you will learn in detail about the other RMAN concepts like
Online Backups and Backup mode – User managed backup, fractured block
Image copies – RMAN created image copies, User managed image copies
Incremental Backups – Differential incremental backup, cumulative incremental backup, algorithm, recovery with incremental backups
Control file and Server Parameter file Auto backups – When and how It performs Control file auto backups
Backing up Archived Redo logs with RMAN – Archived Redo log failover, Online Redo log switching, Backing up archived redo log files, deleting archived redo logs after backups.
Section 4: RMAN Recovery Topics
Media Management
This section gives an overview of the media management software and its implications for it . The other topics included in this chapter are
Prerequisites for using a media manager
Finding the location of the Media Management Library
Configuring Media Management Software for backups
Testing the integration of Media Manager
Configuration of SBT channels with media manager
Oracle secure backup (OSB)
Oracle secure backup acts as a media management layer. This section contains the features of oracle secure backup, products of OSB, OSB administrative domain and accessing OSB.
This chapter contains the more complicated scenarios of recovery and it includes
Recovering a NOARCHIVELOG database with Incremental backups
Restoring the Server Parameter file
Performing disaster recovery
Restoring a database on a new host
Section 5: Backup Verification
Tablespace Point-In-Time Recovery (TSPITR)
TSPITR helps quick recovery of one or more tablespaces in a database without affecting the rest of the database. This section covers the following topics
Introduction to RMAN TSPITR
Restrictions, Cases and Limitations
Planning and preparing for TSPITR
How to perform or run TSPITR
How to troubleshoot the problems in TSPITR
Backup verification
This section explains how to validate the integrity of backups in it and includes the following sections
RMAN validation
VALIDATE command
BACKUP VALIDATE
Flashback technologies for RMAN
This section lets you learn to find out unwanted database changes and how to perform recovery strategy using flashback technology. The topics included in this section are
Introduction to Oracle Flashback Technology
Rewinding a Table using Flashback table
Rewinding a DROP TABLE operation using Flashback Drop
Maintaining the RMAN
This tutorial will help you to learn how to manage the repository records and backups. It also deals with the maintenance tasks of and includes the below topics
Introduction to backup and repository maintenance
How to maintain the Control file repository
How to maintain the Fast recovery area
How to update the repository
Deleting backups and Archived Redo Logs
Section 6: Backup Database
Configuring the Environment – Pratical_part01
Under this section you will learn the most common tasks involved in configuring it and it includes the following sections
Configuring the environment for backups
Configuring the fast recovery area
Configuring the backup retention policy
Configuring the Archived Redo Log deletion policy
Configuring Advanced Backup options
Configuring Advanced Channel Options
Backup Database
This section will help you to understand the most commonly performed backup tasks and how to implement backup strategies in it . It contains the following headings
Overview of backups
Backup output options
Backing up database files
Backing up Archived Redo Logs
Long term storage Backups
Backing up backups
DRA -Practical
This chapter explains how to use the Data Recovery Advisor tool to find out and repair database failures. It contains the following topics
Overview of DRA
Listing failures
Block Corruptions
Repair options
Repairing failures
Failure status and priority
Increment backup and troubleshootingThis section gives you details about incremental backup, the purpose of incremental backup, types of incremental backup and how to troubleshoot operations.
Catalog -Practical
The recovery catalog practical example is given under this section.
Section 7: Backup and Restore
MML
Media Management Layer (MML) API allows the third party vendors to build a media manager that works. This section explains how the media manager works in it , how to install it, interaction with the media manager and how to perform backup and restore in a media manager.
Backing Up to Amazon Web Services Using the OSB Cloud Module
This chapter gives a brief introduction to Oracle Secure Backup Cloud Module. It also includes the benefits of Oracle Cloud backup and steps to get started with Amazon S3 Cloud Backup. The best Cloud Backup practices are also mentioned in this chapter.
VERITAS Net Backup TM for Oracle
VERITAS is a third party MML vendor. This section explains how it is integrated with it .
Section 8: RMAN and Dataguard
HP data protector is a hardware based recovery solution which is fully integrated through MML. This chapter explains how HP Data Protector is interfaced with Oracle RMAN.
RMAN and Tivoli Storage Manager (TSM)
This section gives you the RMAN Database Backup Guidelines using TSM with few screenshots for your easy understanding.
Duplication
The Duplicate command is used in it to create an independently functioning database copy. This section includes the below headings
Overview of Database Duplication
Preparing to duplicate a database
Connecting to databases
Configuration of channels for duplication
How to duplicate a database
Restarting Duplicate after a failure
RMAN and Data guard
If it is used in a Data guard environment then a recovery catalog is needed. This chapter includes
Configuration in a Data Guard Environment
RMAN file management in a Data Guard Environment
Course Duration:-8h 46m