How to trace someone else's session

Hello,
How do I trace a user's session. A user is complaining of an error and I want to trace the user's session. Thank you.

You will need to get the sid and the serial# from v$session. Once you have them, issue one of the following:
You can use dbms_support to enable and disable the trace. If it is not installed, you will need run $ORACLE_HOME/rdbms/admin/dbmssupp.sql
To enable a level 1 trace, like setting sql_trace=true
exec dbms_support.start_trace_in_session(<sid>,<serial#>);
To enable trace with binds
exec dbms_support.start_trace_in_session(<sid>,<serial#>,binds=true);
Toe enable trace with binds and waits
exec dbms_support.start_trace_in_session(<sid>,<serial#>,waits=true,binds=true);
To stop tracing
exec dbms_support.stop_trace_in_session(<sid>,<serial#>);
It is better to end the session instead of disabling the trace. Some cursor stat lines may not be written to the trace when disabling trace that would have been written if the session terminated.

Similar Messages

  • Simulating someone else's session in APEX

    Hi,
    Just curious if someone has successfully implemented simulating someone else's session in APEX. For example:
    Admin logs into their account as user: Admin
    Regular user, Bob, calls up and says that he's having problems viewing a report etc...
    Admin then goes to the admin section of the application, and clicks on "run application as: " and selects Bob
    Admin can then run the entire application "as Bob" (so that he's viewing bob's data) to help debug the problem.
    If you have, have you been able to also view the other user's custom interactive reports etc?
    Thank you,
    Martin
    [http://apex-smb.blogspot.com/]

    Hello,
    >> Modify the authentication scheme to accept a master password …
    I don’t like master passwords. It’s too risky, especially if you have several people who need to use them, and as you mentioned yourself, it can create serious auditing problems.
    As I mentioned in my previous post, the actual implementation can vary, depends on the privileges of the help desk people, and the nature of their work. If the assistance they provide are only functional (helping others to correctly use the application) they only use remote desktop (or similar software, which just allow them to see the user screen). If they are part of the development team, and they need to verify and correct possible bugs pertains to a specific user, they are changing its original password to their own; within the Application builder, they are login to the application as the end user, and perform all the necessary repairs; Change the end user password to a general password, like ‘1234’ with the “Require Change of Password on First Use” field set to “YES”. The end user will login to the application, using the general password, and will be asked to change it. Now he can enter (back) its original password. This way the end user password remains private, and members of the development team (or other users for that matter) can’t impersonate to be that user. Auditing is also remaining intact.
    Regards,
    Arie.

  • How to trace an already running session

    Hi,
    Sometime I come across following situation.
    Queries/SQL statements keep on running for a long time and users complain about the same.
    But since they have already started I am not able do anything about it.
    So please guide me "how can I trace already running session."
    Thanks,
    Rushi

    Rushi Shah wrote:
    Hi,
    Sometime I come across following situation.
    Queries/SQL statements keep on running for a long time and users complain about the same.
    But since they have already started I am not able do anything about it.
    So please guide me "how can I trace already running session."
    http://www.petefinnigan.com/ramblings/how_to_set_trace.htm
    Use DBMS_SUPPORT to set trace in another users session
    Next use the interface to again set trace for SCOTT's session that we found earlier. here it is:
         SQL> exec dbms_support.start_trace_in_session(10,20,waits=>true,binds=>false);
         PL/SQL procedure successfully completed.
         SQL> -- execute some code
         SQL> exec dbms_support.stop_trace_in_session(10,20);
         PL/SQL procedure successfully completed.
         SQL>                          
                                  

  • How to trace other user's session?

    Dear Experts,
    I would like to trace other user's session, I am on Oracle 10g R2 (10.2.0.4) on a Windows box. I did search on google and found tons of articles explaining about tracing techniques. But unfortunately, trace file is not getting generated in my case. Below are the steps I am following:
    SQL> conn /as sysdba
    Connected.
    SQL>
    SQL> select sid, serial# from v$session where username = 'TEST';
           SID    SERIAL#
            38         17
    SQL> show parameter user_d
    NAME                                 TYPE        VALUE
    user_dump_dest                       string      C:\DB10G\UDUMP
    SQL> show parameter timed_s
    NAME                                 TYPE        VALUE
    timed_statistics                     boolean     TRUE
    SQL>Connect a new SQL*Plus session as TEST and then
    SQL> show user
    USER is "SYS"
    SQL>
    SQL> select sid, serial# from v$session where username = 'TEST';
           SID    SERIAL#
            19      24465
            38         17
    SQL> exec dbms_system.set_ev(38,17, 10046, 12, '');
    PL/SQL procedure successfully completed.
    SQL> exec dbms_system.set_ev(38,17, 10046, 0, '');
    PL/SQL procedure successfully completed.
    SQL> grant execute on dbms_system to test;
    Grant succeeded.
    SQL> exec dbms_system.set_ev(38,17, 10046, 12, '');
    PL/SQL procedure successfully completed.in the new session (TEST):
    SQL> select * from tab;
    TNAME                          TABTYPE  CLUSTERID
    T                              TABLE
    T3                             TABLE
    T1                             TABLE
    T2                             TABLE
    MYEMP                          TABLE
    SQL>Yet, no trace file is generated in "C:\db10g\udump" folder.
    C:\db10g\udump>dir
    Volume in drive C is SYSTEM
    Volume Serial Number is AC21-0462
    Directory of C:\db10g\udump
    12/15/2008  12:36 PM    <DIR>          .
    12/15/2008  12:36 PM    <DIR>          ..
                   0 File(s)              0 bytes
                   2 Dir(s)   9,891,508,224 bytes free
    C:\db10g\udump>Your help/advice in this regard will be very helpful.
    Regards

    You must be using shared server.
    You can verify this by referring to the SERVER column of v$session.
    In shared server several servers will execute your code, so that's why you don't find a trace file.
    The method described in this article should work in your case also:
    http://technology.amis.nl/blog/1794/how-to-trace-a-java-application-through-a-connection-pool-using-dbms_monitor-6
    Hth
    Sybrand Bakker
    Senior Oracle DBA

  • How to delete someone else's photos on my iPad 2

    Just purchased iPad2 and setup with someone else's laptop. I now have about 600 photos in my photo app that are not mine. How do I.delete these images.

    I did sync my iPad 2 to my pc. However, those 'someone else's photos are still in the photo app. I also have a small quantity of photos on my iPhone and iPod touch that did not transfer to the new iPad.

  • How to delete someone else's iCloud account on your iPhone without password?

    I purchased my old iPhone 4 off a friend when I lost my phone at the time. All of my music and photos on that phone were under her iCloud account.
    Now that I have just got a new iPhone 6, when I backed up all of my photos, music etc. onto iTunes and synced up my new phone, it transferred her iCloud account to my new phone. She does not remember her password, and it will not let me delete this account without the password. I have spent hours searching the internet for a solution but have had no luck. Surely someone else has had this happen to them in the past.
    Any suggestions are greatly appreciated.

    Hello megneth,
    Thanks for using Apple Support Communities.
    In order to get an iCloud account signed out of your iPhone, you will need to have the previous owner sign out with their Apple ID login information.  If they do not remember their Apple ID password, then they can reset it by following the directions in the article below.
    If you forgot your Apple ID password - Apple Support
    Take care,
    Alex H.

  • How to text someone else on the I pod 5th gene.?

    I purchased a 16gb iPod and I set it up. It asked me to create a number so I could most likely text someone else. I soon realized that it did not have the camera so I switched it out for a 32gb. When I set that I pod up I put the Apple ID on that new I pod but it never asked for the create a number so I assumed it was in the Apple ID account, but then I tried to text someone with internet access; it highlighted the persons name in red so I tapped it and it said that it was not registered with I message. Please help me so I can text my family and friends with my I pod.

    The Apple Messages app will only receive and send to other iPod touches. iPhone or iPads with the Messages app.
    http://support.apple.com/kb/index?page=answerlink&url=http%3A%2F%2Fsupport.apple .com%2Fkb%2FHT3529&answerid=16777216&src=support_site.kbase.search
    To text to other users you need a third-party app like Text+

  • Paranoia - how to stop someone else secretly monit...

    After coming across anti-theft software posted by another user on this forum, I suddenly realised how vulnerable we could all be if someone were able to track our phone's various features. A company (amongst many others) called "KillerMobile.com" has created the following three pieces of software for the Nokia Symbian S60 O/S:
    >Total Recall S60 Call Recorder - allows you to easily record all or just some of your calls either automatically (both incoming & outgoing) or manually as you need - without the other caller knowing.
    >Tracer S60 - Device & Activity Tracking - Ideal for discreetly tracking activity & backing up Device Data of Employees, Family (when appropriate) or for personal usage. Optionally hide the application from the running applications list for privacy. Record & Upload Calls. Discreetly Backup your Contacts, Calls, SMS's & Call Logs to your own remote web account. Remotely take Photos from both the front and back camera.
    >SecureMe S60 Anti Theft Security - automatically lock down, and prevent usage, send location details, hide, password protect or delete data you choose, either automatically on SIM change or remotely via SMS commands. You can even listen into the thief, get reports of calls made or sms's sent and much more. SecureMe runs completely hidden. "Call & Listen" feature allowing you to call from a secondary number and listen to background sound. Locate your device with GPS and or Cell ID location SMS's.
    Okay, these products may be great as anti-theft devices or employee monitoring in case sensitive data is suspected of being stolen. But surely I can't be the only one here thinking how this type of software could be VERY DANGEROUS in the wrong hands.
    Knowing that someone can record whom I am speaking to, what messages I am sending, what my camera lenses are displaying (both the front and rear ones) and what ambient audio my microphone is picking up even when I am not on the phone (thus any of my conversations), leaves me with a great sense of fear! As phones go everywhere with us, this is any psycho's dream software tool.
    So basically I would like to ask how I can make sure my phone never gets 'hacked' with one of these. How I do I know if my camera is being used or not, or whether my microphone is active; even if neither of the applications are open on the phone? Argh I hate technology now!

    Yes, that form of access is understandable (to a certain extent as one assumes the relevant authorities have obtained a warrant or court order allowing such surveillance). But I am more concerned with how easy is it for individuals, who are not law enforcement personnel and thus have no right, to monitor your messages/conversations/phone's cameras etc. ? And is there any way to know whether or not your phone has been hacked?
    For example, you can run anti-virus software on a PC to scan the system files thus ensuring nothing untoward is installed on that system. A firewall also prevents unwanted intrusions. You can also monitor your network connections thus seeing what data is leaking out and when. But with regards to mobile phones, there doesn't seem to be anything to reassure the phone's owner that he/she has not been hacked.
    This, for me, is rather surprising as phones have many more personal features that one would like to keep private such as the camera lenses, microphones and GPS trackers. This is highly personal stuff yet there doesn't seem much protection for us users?! Why?

  • How to trace for multiple user sessions?

    Hello -
    I have a username from the app that has 7 connections to the database. What is the easiest way that I can run the 10046 trace event across all 7 sessions, and also name the trace files so they can be recognized in user_dump?
    Thanks in advance!

    Check what sid and serial# has session:
    select sid, serial# from sys.v_$session where ...
    start tracing session with:
    execute dbms_system.set_sql_trace_in_session(sid, serial#, true);
    stop tracing with
    execute dbms_system.set_sql_trace_in_session(sid, serial#, false);
    Look into udump directory for trace files:
    The default name for a trace files is INSTANCE_PID_ora_TRACEID.trc where:
    INSTANCE is the name of the Oracle instance,
    PID is the operating system process ID (V$PROCESS.OSPID); and
    TRACEID is a character string of your choosing.

  • How to show someone else has document open on a sharepoint.

    We have an Apple Server with several sharepoints on. If a user saves a document to the server, then two users can open it simultaniously, edit and save the document, whoever saves last becomes the final version. The other persons work is then stored in the 'Versions' section or a folder is generated with .pages.234-dfjgh-32 and other garbage at the end. (I know if you rename ending .pages, it becomes a document again).
    Is there anyway of getting iWork to say that the document is open by another user?
    In a business enviroment, people are opening and editting docuements all the time, it then looks like someone's changes are being lost, and a waste of time to then try and recover the bits you want from another 'Version'. This happens with both Numbers and Pages documents. If there is no answer to this, then we will have to revert to using Microsoft Office for Mac, which does let you know another user has the document open, and this seems crazy!

    You haven't said which Pages version you are referring to, but Pages 09 and earlier have not been behaving well if saved to a server. They always worked best if the documents were saved to the users own hard disc. Nor do I think versioning is meant for a a shared server. To me Pages is an application that created documents for one user at the time, not for multiple users at the same time. Pages isn't created for large businesses. Pages 5 is a very stripped down version of earlier Pages versions so I cna't imagine it will do what you ask for either.

  • How to trace someone's IP via msn using a MAC?

    Hi:
    I would like to know, If i receive a file transfer on MSN messenger, how can I find the senders IP address from my Mac? And how can i find the physical address when ive traced the Ip number?
    Thanx alot.
    Said.

    Hi and welcome!
    Since this is software not made by Apple but made by Microsoft, you may have better luck trying over on Microsoft's Forums. Here is their Microsoft Messenger forum:
    http://www.officeformac.com/ProductForums/MacMessenger/
    I give my luck !

  • How to stop someone else's name appearing in my changes to a document

    I am amending a document and when I track the changes a relative's name comes up in the comment box.  This looks very unprofessional and I keep trying to change it but am unable to.  I can't talk to a "genius" until Monday when it is too late for my deadline.  Any help to alter the name would be appreciated.

    Not a problem, it sounds like your relative was a previous author, try:
    Choose Pages > Preferences (from the Pages menu at the top of your computer screen), then click General.
    Enter a name in the Author field.

  • Having someone else record audio in Captivate 5 presentation

    Does anyone know how I have someone else record on an captivate 5 presentation if they don't Captivate? I have created online training and I need it translated. They do not need to publish, or create the presentation - they just need to record audio. I had the functionality in Adobe Presenter and I am hoping that it exists in Captivate 5. - Please help!

    Welcome to our community
    Generally speaking, they can just watch your finished Captivate presentation and use an audio recording application such as Audacity, SoundBooth or other to record the narration. Then they supply that back to you as one or more WAV or MP3 files. You then insert those files into your Captivate projects and re-publish.
    Cheers... Rick
    Helpful and Handy Links
    Begin learning Captivate 5 moments from now! $29.95
    Captivate Wish Form/Bug Reporting Form
    Adobe Certified Captivate Training
    SorcererStone Blog
    Captivate eBooks

  • How do I replace someone else's Mac ID with my own? Bought iPhone second hand. Previous owner re-set the phone but his ICloud account stayed on now my phone. He uses his macID on his new iPhone now?? Any ideas, as this issue is blocking my access to iTune

    How do I replace someone else's Mac ID with my own?
    Bought iPhone second hand on TradeMe.
    Previous owner re-set the phone but his ICloud account stayed on now my phone. He uses his AppleID on his new iPhone now and, understandably, does not want to give me his password. Any ideas?? Please.
    This issue is blocking my access to iTunes and any other file from my home computer. It keeps on telling me that I have to autorise my computer to pass on files, yet, it seems, for all this to happen, I need to get logged in through the phone's Apple ID. This of course is different to my one on my computer - and I have no password for it.
    This phone is not stolen!! I payed still a fair bit for it. Am still in contact with the previous owner. He doesn't know how to fix the problem either.
    Would appreciate any suggestion ????
    Thanks
    SamSings

    Settings>general>resets>erase all content and settings.
    That will put it back to its out of the box state. Set it up with your own apple Id.

  • I will give my laptop to someone else, how do I unlink my apple id? Do I need to remove the apps I downloaded with my id?

    I will give my laptop to someone else, how do I unlink my apple id? Is it just the app store unlink? Do I need to remove the apps I downloaded with my id? Will they get removed when I unlink my apple id?
    Are there any other procedures I need to take into account?
    Thanks

    You need to remove all software that you acquired from the Mac App Store, including newer versions of OS X. These are all registered to you and encoded with your Apple ID in the licensed copy. You cannot legally pass any of the software to the new owner, which is why Apple states to erase the Mac and return it to the version of OS X that shipped from the factory on the Mac. You must also remove any older Apple software that you installed by DVD or pass the DVD to the new owner with the Mac.

Maybe you are looking for