溫馨提示×

您好,登錄后才能下訂單哦!

密碼登錄×
登錄注冊(cè)×
其他方式登錄
點(diǎn)擊 登錄注冊(cè) 即表示同意《億速云用戶服務(wù)條款》

查看oracle數(shù)據(jù)庫(kù)job及會(huì)話信息

發(fā)布時(shí)間:2020-07-29 04:16:12 來(lái)源:網(wǎng)絡(luò) 閱讀:1962 作者:敏而所學(xué) 欄目:關(guān)系型數(shù)據(jù)庫(kù)

查看所有job
select from dba_jobs;
查看正在運(yùn)行的job
select
from dba_jobs_running;
select job,log_user,priv_user,schema_user,BROKEN from dba_jobs where job=545;
查看數(shù)據(jù)庫(kù)建立的回話情況
select sid,serial#,username,program,machine,status
from v$session;
查看對(duì)應(yīng)sid的sql_id
select * from v$session where sid=2272 or sid=327;
知道sql_id后查看sql語(yǔ)句
select SQL_TEXT from v$sql where sql_id='3f18ygbqg41mw';
給MESPRD賦權(quán)
grant execute on DBMS_WORKLOAD_REPOSITORY to MESPRD;
kill會(huì)話
alter system kill session 'sid,serial#';
alter system kill session '327,8133';
查看進(jìn)程的spid
select spid, program from v$process
where program!= 'PSEUDO'
and addr not in (select paddr from v$session)
and addr not in (select paddr from v$bgprocess)
and addr not in (select paddr from v$shared_server);
!ps -ef|grep spid|grep -v grep;
查看進(jìn)程的spid
SELECT s.username,s.status,
x.ADDR,x.KSLLAPSC,x.KSLLAPSN,x.KSLLASPO,x.KSLLID1R,x.KSLLRTYP,
decode(bitand (x.ksuprflg,2),0,null,1)
FROM x$ksupr x,v$session s
WHERE s.paddr(+)=x.addr
and bitand(ksspaflg,1)!=0;
查看進(jìn)程的spid
select spid,program from v$process where pid in(327,2272);

向AI問(wèn)一下細(xì)節(jié)

免責(zé)聲明:本站發(fā)布的內(nèi)容(圖片、視頻和文字)以原創(chuàng)、轉(zhuǎn)載和分享為主,文章觀點(diǎn)不代表本網(wǎng)站立場(chǎng),如果涉及侵權(quán)請(qǐng)聯(lián)系站長(zhǎng)郵箱:is@yisu.com進(jìn)行舉報(bào),并提供相關(guān)證據(jù),一經(jīng)查實(shí),將立刻刪除涉嫌侵權(quán)內(nèi)容。

AI