10.07.2015 Views

Expert Oracle Exadata - Parent Directory

Expert Oracle Exadata - Parent Directory

Expert Oracle Exadata - Parent Directory

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 14 STORAGE LAYOUT> chmod 640 cellkey.oraNote that if a realm is defined in this file it must match the realm nameassigned to the storage cells using the alter cell realm= command.4. Find the DB_UNIQUE_NAME for your ASM cluster using the show parametercommand from one of the ASM instances:SYS:+ASM1>show parameter db_unique_nameNAME TYPE VALUE---------------- ----------- ------------------db_unique_name string +ASM5. Use the CellCLI assign key command to assign the security key to the ASMcluster being configured. This must be done on each storage cell to which youwant the ASM cluster to have access:CellCLI> ASSIGN KEY -FOR '+ASM='66e12adb996805358bf82258587f5050'6. Using the CellCLI create griddisk command, set the availableTo attribute foreach grid disk to which you want this ASM cluster to have access. This can bedone for all grid disks on the cell as follows:CellCLI> create griddisk all prefix='DATA_DG' -size= 1282.8125G availableTo='+ASM'7. For existing grid disks, use the alter grid disk command to set up security:CellCLI> alter griddisk all prefix='DATA_DG' -availableTo='+ASM'8. A subset of grid disks may also be assigned, as follows:CellCLI> alter griddisk DATA_CD_00_cell03, -DATA_CD_01_cell03, -DATA_CD_02_cell03, -…availableTo='+ASM'This completes the configuration of ASM-scoped cell security. The ASM cluster and all databasescan now be restarted. When ASM starts up it will check for the cellkey.ora file and pass the key to thestorage cells in order to gain access to the grid disks.Configuring Database-Scoped SecurityDatabase-scoped security locks down database access to specific grid disks within an ASM cluster. It isuseful for controlling access to grid disks when multiple databases share the same ASM cluster. Beforedatabase-scoped security may be implemented, ASM-scoped security must be configured and verified.When using database-scoped security, there will be one cellkey.ora file per database, per databaseserver, and one ACL entry on the storage cell for each database. The following steps may be used toimplement simple database-scoped security for two databases, called HR (Human Resources) and PAY(Payroll)).490

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!