{"id":1248,"date":"2012-10-08T23:35:00","date_gmt":"2012-10-08T15:35:00","guid":{"rendered":"https:\/\/yangtingkun.net\/?p=1248"},"modified":"2013-01-04T00:39:27","modified_gmt":"2013-01-03T16:39:27","slug":"oem%e5%ae%89%e8%a3%85%e6%8a%a5%e9%94%99%e4%b8%8d%e6%98%af%e5%86%85%e9%83%a8%e6%88%96%e5%a4%96%e9%83%a8%e7%a8%8b%e5%ba%8f%e7%9a%84%e8%a7%a3%e5%86%b3%e8%bf%87%e7%a8%8b","status":"publish","type":"post","link":"https:\/\/yangtingkun.net\/?p=1248","title":{"rendered":"OEM\u5b89\u88c5\u62a5\u9519\u4e0d\u662f\u5185\u90e8\u6216\u5916\u90e8\u7a0b\u5e8f\u7684\u89e3\u51b3\u8fc7\u7a0b"},"content":{"rendered":"<p>\u6807\u9898\u6bd4\u8f83\u62d7\u53e3\uff0c\u5ba2\u6237\u5728\u5b89\u88c5OEM\u7684\u65f6\u5019\u78b0\u5230\u4e86\u201c\u4e0d\u662f\u5185\u90e8\u6216\u5916\u90e8\u547d\u4ee4\uff0c\u4e5f\u4e0d\u662f\u53ef\u8fd0\u884c\u7684\u7a0b\u5e8f\u6216\u6279\u5904\u7406\u6587\u4ef6\u201d\u7684\u9519\u8bef\u3002<br \/>\n\u5ba2\u6237\u73af\u5883\u662f11.2.0.1 for Windows\u73af\u5883\uff0c\u4ee5\u524d\u914d\u7f6e\u8fc7OEM\uff0c\u6709\u4e00\u6bb5\u65f6\u95f4\u6ca1\u6709\u4f7f\u7528\uff0c\u6700\u8fd1\u6253\u7b97\u542f\u7528OEM\uff0c\u53d1\u73b0\u65e0\u6cd5\u6b63\u5e38\u542f\u52a8\uff0c\u5c1d\u8bd5\u4e86\u591a\u6b21\u540e\uff0c\u53ea\u80fd\u5c06OEM\u6e05\u9664\u6389\u3002\u5728\u5378\u8f7dOEM\u5e76\u91cd\u65b0\u5b89\u88c5\u65f6\uff0c\u51fa\u73b0\u4e86\u8fd9\u4e2a\u9519\u8bef\u3002<br \/>\n\u8be6\u7ec6\u7684\u9519\u8bef\u4e3a\uff1a<\/p>\n<pre lang='SQL'>Connecting to database using connect string (DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=NODE)(PORT=1521)))(CONNECT_DATA=(SERVICE_NAME=DAISY))) in home E:\\app\\Administrator\\product\\11.2.0\\dbhome_1 with user \"SYS\" role \"SYSDBA\". \r\nconnected to database. \r\nsql to execute declare repos_pwd varchar2(30); view_user varchar2(30); view_user_pwd varchar2(30); view_user_acc_status varchar2(30); begin repos_pwd := ?; sysman.mgmt_view_priv.get_view_user(view_user); select account_status into view_user_acc_status from sys.dba_users where upper(username) = upper ( view_user ); IF view_user_acc_status like '%LOCKED%' THEN execute immediate 'alter user ' || view_user || ' account unlock'; END IF; IF view_user_acc_status like '%EXPIRED%' THEN sysman.mgmt_view_priv.set_view_user_creds ( repos_pwd ); sysman.mgmt_view_priv.GET_VIEW_USER_CREDS ( view_user, view_user_pwd ); execute immediate 'alter user ' || view_user || ' identified by ' || view_user_pwd || ''; END IF; end; \r\nnoOfParams to bind: 1. \r\nsql execute successfully. \r\n2012-9-24 18:59:05 oracle.sysman.emcp.util.PlatformInterface executeCommand\r\n\u914d\u7f6e: '??S-1-5-21-343818398-2147128839-1417001333-500' \u4e0d\u662f\u5185\u90e8\u6216\u5916\u90e8\u547d\u4ee4\uff0c\u4e5f\u4e0d\u662f\u53ef\u8fd0\u884c\u7684\u7a0b\u5e8f\r\n\u6216\u6279\u5904\u7406\u6587\u4ef6\u3002\r\n2012-9-24 18:59:05 oracle.sysman.emcp.util.PlatformInterface executeCommand\r\n\u914d\u7f6e: \u6267\u884c CMD \/C E:\\app\\Administrator\\product\\11.2.0\\dbhome_1\\sysman\\admin\\scripts\\emca\\emcaDbUtil.bat \"E:\\app\\Administrator\\product\\11.2.0\\dbhome_1\\sysman\\admin\\scripts;E:\\app\\Administrator\\product\\11.2.0\\dbhome_1\\bin;\" E:\/app\/Administrator\/product\/11.2.0\/dbhome_1\/perl\/bin\\perl.exe E:\\app\\Administrator\\product\\11.2.0\\dbhome_1\\sysman\\admin\\scripts\\emca\\emcaDbUtil.pl E:\\app\\Administrator\\product\\11.2.0\\dbhome_1 \"(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=NODE)(PORT=1521)))(CONNECT_DATA=(SERVICE_NAME=DAISY)))\" SYS SYSDBA declare repos_pwd varchar2(30); view_user varchar2(30); view_user_pwd varchar2(30); view_user_acc_status varchar2(30); begin repos_pwd := ?; sysman.mgmt_view_priv.get_view_user(view_user); select account_status into view_user_acc_status from sys.dba_users where upper(username) = upper ( view_user ); IF view_user_acc_status like '%LOCKED%' THEN execute immediate 'alter user ' || view_user || ' account unlock'; END IF; IF view_user_acc_status like '%EXPIRED%' THEN sysman.mgmt_view_priv.set_view_user_creds ( repos_pwd ); sysman.mgmt_view_priv.GET_VIEW_USER_CREDS ( view_user, view_user_pwd ); execute immediate 'alter user ' || view_user || ' identified by ' || view_user_pwd || ''; END IF; end; DAISY 1 SYSMAN_PWD \u65f6\u51fa\u9519\r\n2012-9-24 18:59:05 oracle.sysman.emcp.EMReposConfig unlockMGMTAccount\r\n\u914d\u7f6e: Failed to unlock mgmt_view account\r\n2012-9-24 18:59:05 oracle.sysman.emcp.EMReposConfig invoke\r\n\u4e25\u91cd: \u65e0\u6cd5\u5bf9\u6240\u6709 EM \u76f8\u5173\u5e10\u6237\u89e3\u9501\r\n2012-9-24 18:59:05 oracle.sysman.emcp.EMConfig perform\r\n\u4e25\u91cd: \u65e0\u6cd5\u5bf9\u6240\u6709 EM \u76f8\u5173\u5e10\u6237\u89e3\u9501\r\n\u6709\u5173\u8be6\u7ec6\u8d44\u6599, \u8bf7\u53c2\u9605 E:\\app\\Administrator\\cfgtoollogs\\dbca\\DAISY\\emConfig.log \u4e2d\u7684\u65e5\u5fd7\u6587\u4ef6\u3002\r\n2012-9-24 18:59:05 oracle.sysman.emcp.EMConfig perform\r\n\u914d\u7f6e: Stack Trace: \r\noracle.sysman.emcp.exception.EMConfigException: \u65e0\u6cd5\u5bf9\u6240\u6709 EM \u76f8\u5173\u5e10\u6237\u89e3\u9501\r\nat oracle.sysman.emcp.EMReposConfig.invoke(EMReposConfig.java:349)\r\nat oracle.sysman.emcp.EMReposConfig.invoke(EMReposConfig.java:158)\r\nat oracle.sysman.emcp.EMConfig.perform(EMConfig.java:253)\r\nat oracle.sysman.assistants.util.em.EMConfiguration.run(EMConfiguration.java:583)\r\nat oracle.sysman.assistants.dbca.backend.PostDBCreationStep.executeImpl(PostDBCreationStep.java:968)\r\nat oracle.sysman.assistants.util.step.BasicStep.execute(BasicStep.java:210)\r\nat oracle.sysman.assistants.util.step.Step.execute(Step.java:140)\r\nat oracle.sysman.assistants.util.step.StepContext$ModeRunner.run(StepContext.java:2667)\r\nat java.lang.Thread.run(Thread.java:595)\r\n2012-9-24 18:59:05 oracle.sysman.emcp.EMConfig restoreOuiLoc\r\n\u914d\u7f6e: Restoring oracle.installer.oui_loc to E:\\app\\Administrator\\product\\11.2.0\\dbhome_1\\oui<\/pre>\n<p>\u672c\u6765\u6700\u5148\u5b9a\u4f4d\u7684\u662fOracle\u7684\u5f02\u5e38\u201c\u65e0\u6cd5\u5bf9\u6240\u6709 EM \u76f8\u5173\u5e10\u6237\u89e3\u9501\u201d\uff0c\u524d\u53f0\u51fa\u73b0\u7684\u4e5f\u662f\u8fd9\u4e2a\u9519\u8bef\u4fe1\u606f\u3002\u4f46\u662f\u5728MOS\u627e\u4e86\u5927\u91cf\u7684\u6848\u4f8b\uff0c\u53d1\u73b0\u90fd\u548c\u5f53\u524d\u7684\u95ee\u9898\u4e0d\u7b26\u3002\u4ed4\u7ec6\u68c0\u67e5\u6570\u636e\u5e93\u4e2d\u7528\u6237\u7684\u914d\u7f6e\uff0c\u4e5f\u672a\u53d1\u73b0\u4efb\u4f55\u7684\u5f02\u5e38\u3002<br \/>\n\u968f\u540e\u628a\u7591\u70b9\u9010\u6e10\u8f6c\u79fb\u5230\u4e0a\u9762\u201c\u4e0d\u662f\u5185\u90e8\u6216\u5916\u90e8\u547d\u4ee4\uff0c\u4e5f\u4e0d\u662f\u53ef\u8fd0\u884c\u7684\u7a0b\u5e8f\u6216\u6279\u5904\u7406\u6587\u4ef6\u3002\u201d\u4fe1\u606f\u4e0a\u3002\u5e76\u4e14\u53d1\u73b0\u8fd9\u4e2a\u95ee\u9898\u5e76\u975e\u53ea\u6709\u5728\u6267\u884cOEM\u7684\u811a\u672c\u65f6\u62a5\u9519\uff0c\u800c\u662f\u8d77\u52a8CMD\u547d\u4ee4\u7a97\u53e3\u65f6\u90fd\u4f1a\u51fa\u73b0\u8fd9\u4e2a\u9519\u8bef\u3002<br \/>\n\u90a3\u4e48\u5176\u5b9e\u95ee\u9898\u5c31\u5f88\u660e\u663e\u4e86\uff0c\u5bfc\u81f4\u95ee\u9898\u7684\u539f\u56e0\u5e76\u4e0d\u662f\u53d1\u751f\u5728\u6570\u636e\u5e93\u5c42\uff0c\u800c\u662f\u64cd\u4f5c\u7cfb\u7edf\u5c42\u9762\uff0c\u663e\u7136CMD\u547d\u4ee4\u88ab\u8fdb\u884c\u4e86\u6076\u610f\u7684\u7be1\u6539\u3002<br \/>\n\u8be6\u7ec6\u8be2\u95ee\u4e86\u4e00\u4e0b\u60c5\u51b5\uff0c\u5ba2\u6237\u4ee5\u524d\u786e\u5b9e\u4e2d\u8fc7\u75c5\u6bd2\uff0c\u540e\u6765\u901a\u8fc7\u6740\u6bd2\u5df2\u7ecf\u5c06\u75c5\u6bd2\u6e05\u9664\u3002\u6000\u7591\u867d\u7136\u75c5\u6bd2\u88ab\u6e05\u9664\uff0c\u4f46\u662fCMD\u7a0b\u5e8f\u5e76\u6ca1\u6709\u5b8c\u5168\u6062\u590d\u539f\u59cb\u72b6\u6001\uff0c\u5bfc\u81f4\u76ee\u524d\u542f\u52a8CMD\u65f6\u4f1a\u5bfb\u627e\u4e00\u4e2a\u4e0d\u5b58\u5728\u7684\u6587\u4ef6\u3002<br \/>\n\u68c0\u67e5CMD\u547d\u4ee4\u7684\u6ce8\u518c\u8868\u4fe1\u606f\uff0c\u5e76\u672a\u53d1\u73b0\u6709\u5f02\u5e38\u7684\u4fee\u6539\u3002\u6000\u7591\u662fCMD\u4ee3\u7801\u5c42\u7684autorun\u88ab\u4fee\u6539\uff1a<\/p>\n<pre lang='SQL'>reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Command Processor\" \/v \"AutoRun\" \/d \"\" \/f<\/pre>\n<p>\u901a\u8fc7\u6267\u884c\u4e0a\u9762\u7684\u547d\u4ee4\uff0cCMD\u542f\u52a8\u4e0d\u4f1a\u5728\u51fa\u73b0\u524d\u9762\u7684\u9519\u8bef\uff0c\u518d\u6b21\u5b89\u88c5OEM\u7ec4\u4ef6\uff0c\u5b89\u88c5\u987a\u5229\u5b8c\u6210\u3002<br \/>\n\u8fd9\u4e2a\u6848\u4f8b\u4e5f\u518d\u6b21\u53cd\u6620\u4e86Windows\u73af\u5883\u4e0b\u6570\u636e\u5e93\u5065\u58ee\u6027\u7684\u95ee\u9898\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6807\u9898\u6bd4\u8f83\u62d7\u53e3\uff0c\u5ba2\u6237\u5728\u5b89\u88c5OEM\u7684\u65f6\u5019\u78b0\u5230\u4e86\u201c\u4e0d\u662f\u5185\u90e8\u6216\u5916\u90e8\u547d\u4ee4\uff0c\u4e5f\u4e0d\u662f\u53ef\u8fd0\u884c\u7684\u7a0b\u5e8f\u6216\u6279\u5904\u7406\u6587\u4ef6\u201d\u7684\u9519\u8bef\u3002 \u5ba2\u6237\u73af\u5883\u662f11.2.0.1 for Windows\u73af\u5883\uff0c\u4ee5\u524d\u914d\u7f6e\u8fc7OEM\uff0c\u6709\u4e00\u6bb5\u65f6\u95f4\u6ca1\u6709\u4f7f\u7528\uff0c\u6700\u8fd1\u6253\u7b97\u542f\u7528OEM\uff0c\u53d1\u73b0\u65e0\u6cd5\u6b63\u5e38\u542f\u52a8\uff0c\u5c1d\u8bd5\u4e86\u591a\u6b21\u540e\uff0c\u53ea\u80fd\u5c06OEM\u6e05\u9664\u6389\u3002\u5728\u5378\u8f7dOEM\u5e76\u91cd\u65b0\u5b89\u88c5\u65f6\uff0c\u51fa\u73b0\u4e86\u8fd9\u4e2a\u9519\u8bef\u3002 \u8be6\u7ec6\u7684\u9519\u8bef\u4e3a\uff1a Connecting to database using connect string (DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=NODE)(PORT=1521)))(CONNECT_DATA=(SERVICE_NAME=DAISY))) in home E:\\app\\Administrator\\product\\11.2.0\\dbhome_1 with user &#8220;SYS&#8221; role &#8220;SYSDBA&#8221;. connected to database. sql to execute declare repos_pwd varchar2(30); view_user varchar2(30); view_user_pwd varchar2(30); view_user_acc_status varchar2(30); begin repos_pwd := ?; sysman.mgmt_view_priv.get_view_user(view_user); &hellip; <a href=\"https:\/\/yangtingkun.net\/?p=1248\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[1092,143,1093,123],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2yiY3-k8","_links":{"self":[{"href":"https:\/\/yangtingkun.net\/index.php?rest_route=\/wp\/v2\/posts\/1248"}],"collection":[{"href":"https:\/\/yangtingkun.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yangtingkun.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yangtingkun.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yangtingkun.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1248"}],"version-history":[{"count":1,"href":"https:\/\/yangtingkun.net\/index.php?rest_route=\/wp\/v2\/posts\/1248\/revisions"}],"predecessor-version":[{"id":1249,"href":"https:\/\/yangtingkun.net\/index.php?rest_route=\/wp\/v2\/posts\/1248\/revisions\/1249"}],"wp:attachment":[{"href":"https:\/\/yangtingkun.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yangtingkun.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yangtingkun.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}