Manually restart crs daemon in Cluster RAC 11gR2 (11.2)

In Cluster RAC 11g release2 (11.2) on Linux Platform (Red Hat Enterprise Linux Server release 5.3 ), if crs daemon fall down, is it possible to restart manually (in old version: init.crsd start) ? If yes, how?
Edited by: user6717729 on Jun 24, 2010 12:46 AM

ok I've opened another thread:
Manual restart CRS Daemon in Cluster RAC 11gR2

Similar Messages

  • RAC 11GR2 + VIP

    Hi all,
    I have a cluster RAC 11GR2 with 2 nodes on a site A (datacenter).
    I have used 1 IP SCAN et 2 VIP.
    The scan IP is 10.XXX.X.181
    The rac1-vip is 10.XXX.X.165
    The rac2-vip is 10.XXX.X.166
    I used /etc/hosts file and not the dns for the moment.
    These IP are used on a LAN.
    Now, i need to attack this RAC 11GR2 via a WAN (on a site B) and so via other IP adress.
    How can i do to make this? Do you have an idea ?
    Thanks.

    can you be more specific ? You want to setup new environment similar to you have in datacenter you mentioned?

  • Cluser RAC 11gR2 installation : where is default position for voting file?

    During installation of CLuster RAC 11gR2 (Linux RH platform) is indicated the device where is positioned OCR file, but there not indication about the default position where is created Voting file.
    Neither in installation document i found this.
    Can you help me?

    You may check like this:
    crsctl query css votedisk
    regards

  • /etc/cron.d confusion - avoiding manual restart of the crond

    It seems that I must restart crond any time I make a change to a file under /etc/cron.d which is very inconvenient.  Is there a way to modify the behavior of the daemon to automatically look under that dir for something without manually restarting the daemon?

    There's no interface for that, you'd have to patch the source and recompile. I can tell you where if you really want to know. But I bet there's an easier way to do what you want. What are you putting into /etc/cron.d? Crontabs, not scripts, right? (Scripts don't belong there.) If crontabs, why are you putting them into /etc/cron.d rather than putting them into a user's crontab (perhaps root's crontab)? There are legitimate reasons for doing what you're describing, but I want to be sure you're clear about the alternatives. The most natural use-case for an /etc/cron.d/ crontab is for use by packaging system.
    Actually, I mispoke. Perhaps there is a way to do what you want. Try this as root, instead of copying the crontab file into the /etc/cron.d directory by hand:
    # crontab -c /etc/cron.d crontab_file_you_want_installed
    That may write a cron.update file in /etc/cron.d, which crond will read within one minute. In fact I forget right now whether that will work, but no harm will come if it doesn't.
    EDIT: more cautiously, back up the contents of /etc/cron.d and the crontab_file_you_want_installed before doing this.
    EDIT2: Just rechecked the source. Here's what I think will happen. Part of my thought was right, you can make crond see files in /etc/cron.d more quickly by having a cron.update file there. The format of the cron.update file is a list of files you want crond to notice, separated by newlines. Now, it's tedious to create this file yourself, so you can piggyback on the fact that crontab creates these files automatically for you. However, crontab isn't really designed to work with non-user crontabs. It can be coaxed into doing it, in a clumsy way, with the -c switch, as I describe above. The limitation is that (I think), no matter what filename you supply to crontab, it will save it as a crontab named "root" and that's what it will write to the cron.update file.
    Now you can work around that in two ways:
    1. Forget about crontab, just copy the file to /etc/cron.d yourself, and append the name of the file you just wrote to /etc/cron.d/cron.update (which may not yet exist).
    2. Or use crontab as I described above, and after crond reads and deletes the cron.update file, you can rename the file "root" to whatever you want. Then when crond rescans the directory each hour, it will see that the old "root" file is gone and it will read the newly-named file instead. Actually, this is so complicated I can't imagine why one would prefer to do it rather than #1.
    I can't test any of this at the moment, but that's how I expect it to work.
    Last edited by Profjim (2010-01-29 21:22:41)

  • RAC 11GR2 + swap

    Hi all,
    I have a 2 node cluster rac 11GR2 on linux RedHat 5.6.
    Since 01/07/12, i can see swap memory which increase from 500 Mo to 4.3 Go on node1. The swap memory don't move on node2.
    I have 12Go of memory on each node and 8Go to Oracle on each node.
    How can we explain this increase ?
    Thanks.

    You can see now results of vmstat on 2 node :
    Node1 :
    procs -----------memory---------- ---swap-- -----io---- system -----cpu------
    r b swpd free buff cache si so bi bo in cs us sy id wa st
    1 1 4423068 483752 152820 6237720 0 0 491 155 0 0 1 0 97 2 0
    1 0 4423068 490664 152820 6237740 0 0 234 2100 3381 8321 1 1 97 2 0
    0 0 4423068 468880 152828 6237772 0 0 142 1828 3078 8594 2 1 96 1 0
    1 1 4423068 485936 152828 6237788 0 0 155 2488 3376 8867 1 1 96 1 0
    1 0 4423068 487224 152832 6237812 0 0 191 3512 4091 9554 2 1 94 2 0
    0 0 4423068 536804 152832 6237828 0 0 504 2110 5146 10722 2 1 92 4 0
    0 1 4423068 532692 152832 6237868 0 0 212 1045 5035 10334 2 1 95 2 0
    1 1 4423068 526116 152840 6237880 0 0 254 921 4417 9610 1 1 96 2 0
    0 0 4423068 521696 152844 6237912 0 0 411 776 3488 8462 1 0 97 2 0
    0 0 4423068 506852 152848 6237944 0 0 1343 743 4714 9821 2 1 95 3 0
    Node 2:
    procs -----------memory---------- ---swap-- -----io---- system -----cpu------
    r b swpd free buff cache si so bi bo in cs us sy id wa st
    2 1 879012 127784 148472 6685632 0 0 341 81 0 0 1 0 97 2 0
    0 2 879012 155620 148476 6685644 0 0 2247 20188 5061 9554 3 1 89 7 0
    0 1 879008 158816 148476 6685676 0 0 31097 46576 5686 10709 4 1 88 7 0
    2 1 879008 150588 148484 6685696 0 0 1774 17193 4420 9436 3 1 90 6 0
    1 0 879008 132116 148492 6685704 0 0 1470 14493 4889 9915 3 1 91 5 0
    1 0 879008 107500 148492 6685720 0 0 1931 14274 6137 11377 7 1 86 6 0
    0 2 879008 107888 148492 6685740 0 0 1606 13066 6069 11152 3 1 90 6 0
    2 0 879008 114488 148492 6685764 0 0 1655 13489 5775 11103 3 1 90 5 0
    0 1 879008 113328 148496 6685772 0 0 1668 15360 5250 10313 4 1 90 5 0
    1 0 879008 105948 148496 6685792 0 0 1547 14169 5101 10359 3 1 91 5 0

  • Steps to stop / start CRS & ASM in RAC 11gr2

    Hello Gurus,
    Environment is as below:
    RAC 2 nodes
    Oracle RAC 11gr2
    Enterprise Linux Server release 5.5 (Carthage)
    I am new to Oracle RAC 11gr2 and facing some issues while stop / start crs & asm.
    We want to reboot both nodes and for that I have done following steps.
    1. srvctl stop database -d <db name> -- from one node
    Databse is down now.2. srvctl stop nodeapps -n <hostname> -- from both nodes
    services are down now.3. Now I want to stop asm
    $ export ORACLE_HOME=/u01/app/11.2.0/grid ( Grid Home)
    $ srvctl stop asm - This is not stopping ASM instance.
    4. crsctl stop crs -- this is also not working.
    I would appreciate if you please give me full steps.
    Thanks and Regards,

    In 11gr2, gsd remains offline. When I had checked with metalink, they said that it is fine.
    In 11gr2 you can stop all resouces as below
    <CRS_HOME>/bin/crsctl stop has
    or you can stop in the following sequence
    stop or relocate service using srvctl
    stop instnace using srvctl
    stop asm using srvctl
    stop nodeapps using srvctl
    stop cluster resources as root - <CRS_HOME>/bin/crsctl stop has
    To start
    <CRS_HOME>/bin/crsctl start has - it should bring all resources automatically
    verify the services status and start or relocate it back.

  • CRS-2630: Only cluster administrators are allowed to create local resources

    I have installed and configured a 12c database across two linux nodes and all is well. I have also installed the Oracle rdbms 12.1.01 on the same nodes. Now when I try and use netca or dbca to create a database or listener, I get the following errors;
    CRS-2630: Only cluster administrators are allowed to create local resources
    I can log in as the GRID user and can create resources but not as database user. Both users are members of the dba group.
    Any ideas anyone?  Thanks a lot H.

    The issue is resolved, the 12c configuration is a lot more comprehensive than 11g. Here we have to create the user DBA with the right rights to access and change the cluster resources.
    For example to allow the dba users the ability to create listeners on the RAC nodes, we have to issue some command such as follows; here the oedsdp is the dba user and ogridp is the grid main owner.
    t@rac2node ~]# /oracle/grid/bin/crsctl setperm resource ora.rac1node.vip -u user:oedsdp:rwx
    [root@rac2node ~]# /oracle/grid/bin/crsctl setperm resource ora.net1.network -u user:oedsdp:rwx
    [root@rac2node ~]# /oracle/grid/bin/crsctl setperm resource ora.net1.network -u user:oedsdp:rwx
    [root@rac2node ~]# /oracle/grid/bin/crsctl setperm resource ora.rac2node.vip -u user:oedsdp:rwx
    [root@rac2node ~]# /oracle/grid/bin/crsctl setperm resource ora.net1.network -u user:oedsdp:rwx
    Interesting, I think we need to carefully plan the new user groups before we start the GRID configuration.
    H.

  • VIPCA and CRS-0184: Cannot communicate with CRS daemon

    I have some strange issue during Clusterware installation. I've installed software on 2 nodes, and have ran root.sh on both. On second node I've had problem with interfaces but it came through after using oifcfg for both public and private interface. Silent vipca executed by root.sh failed, but as it is said in docs it's ok. I need to run vipca on second node manually. But when I'm running it I'm receiving CRS-0184 Cannot communicate with CRS daemon. Daemons are running, there's no error running crs_start -all. I don't have any idea what can I do now.
    Clusterware 10.2.0.1
    SUSE Linux Enterprise Server 10 SP2

    10/26/2008 17:56:08
    ./ocrdump.bin
    [SYSTEM]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.interfaces]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_CREATE_SUB_KEY, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth0]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth0.172|d16|d216|d0]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth0.172|d16|d216|d0.1]
    ORATEXT : public
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth0.172|d216|d16|d0]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth0.172|d216|d16|d0.1]
    ORATEXT : public
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth1]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth1.192|d168|d0|d0]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.interfaces.global.eth1.192|d168|d0|d0.1]
    ORATEXT : cluster_interconnect
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [SYSTEM.css.clustername]
    ORATEXT : crs
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.misscount]
    UB4 (10) : 60
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.diskfile]
    ORATEXT : /dev/raw/raw2
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.configured_node_map]
    BYTESTREAM (16) : 6
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_names]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_names.slesorange]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_names.slesorange.nodenum]
    UB4 (10) : 1
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_names.slesred]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_names.slesred.nodenum]
    UB4 (10) : 2
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node1]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node1.nodename]
    ORATEXT : slesorange
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node1.privatename]
    ORATEXT : slesorange-priv
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node1.hostname]
    ORATEXT : slesorange
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node1.nsendpoint]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesorange-priv)(PORT=49895))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node2]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node2.nodename]
    ORATEXT : slesred
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node2.privatename]
    ORATEXT : slesred-priv
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node2.hostname]
    ORATEXT : slesred
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.node_numbers.node2.nsendpoint]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesred-priv)(PORT=49895))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.privatenames]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.privatenames.slesorange-priv]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.privatenames.slesorange-priv.nodenum]
    UB4 (10) : 1
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.privatenames.slesred-priv]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.privatenames.slesred-priv.nodenum]
    UB4 (10) : 2
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.hostnames]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.hostnames.slesorange]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.hostnames.slesorange.nodenum]
    UB4 (10) : 1
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.hostnames.slesred]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.css.hostnames.slesred.nodenum]
    UB4 (10) : 2
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.language]
    ORATEXT : AMERICAN_AMERICA.WE8ISO8859P1
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.version]
    UB4 (10) : 3
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.version.node_numbers]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.version.node_numbers.node1]
    ORATEXT : 10.2.0.1.0
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.version.node_numbers.node2]
    ORATEXT : 10.2.0.1.0
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.version.activeversion]
    ORATEXT : 10.2.0.1.0
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.versionstring]
    ORATEXT : 10G Release 2
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.ORA_CRS_HOME]
    ORATEXT : /u01/oracle/product/10.2.0/crs
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.local_only]
    ORATEXT : false
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.cevmkey]
    ORATEXT : 17536746
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.rmport]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.rmport.localhost]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=localhost)(PORT=49897))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.rmport.slesorange]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesorange-priv)(PORT=49897))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.rmport.slesred]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesred-priv)(PORT=49897))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.cevmport]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.cevmport.slesorange]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesorange-priv)(PORT=49898))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.cevmport.slesred]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesred-priv)(PORT=49898))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.acceptor]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.acceptor.slesorange]
    ORATEXT : (ADDRESS=(PROTOCOL=ipc)(KEY=Aslesorange_crs_evm))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.acceptor.slesred]
    ORATEXT : (ADDRESS=(PROTOCOL=ipc)(KEY=Aslesred_crs_evm))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.cevmipc]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.cevmipc.slesorange]
    ORATEXT : (ADDRESS=(PROTOCOL=ipc)(KEY=Cslesorange_crs_evm))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.evm.cevmipc.slesred]
    ORATEXT : (ADDRESS=(PROTOCOL=ipc)(KEY=Cslesred_crs_evm))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.usersecurity]
    ORATEXT : 1
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.deny]
    ORATEXT :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.user_default_dir]
    ORATEXT : /u01/oracle/product/10.2.0/crs/crs/public
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.e2eport]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.e2eport.slesorange]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesorange-priv)(PORT=49896))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.e2eport.slesred]
    ORATEXT : (ADDRESS=(PROTOCOL=tcp)(HOST=slesred-priv)(PORT=49896))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.uiport]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.uiport.slesorange]
    ORATEXT : (ADDRESS=(PROTOCOL=ipc)(KEY=CRSD_UI_SOCKET))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.crs.uiport.slesred]
    ORATEXT : (ADDRESS=(PROTOCOL=ipc)(KEY=CRSD_UI_SOCKET))
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.0]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.0.NODENAME]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.0.TIMESTAMP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.0.LOC]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.1]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.1.NODENAME]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.1.TIMESTAMP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.1.LOC]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.2]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.2.NODENAME]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.2.TIMESTAMP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.2.LOC]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY.NODENAME]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY.TIMESTAMP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY.LOC]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY_]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY_.NODENAME]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY_.TIMESTAMP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.DAY_.LOC]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK.NODENAME]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK.TIMESTAMP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK.LOC]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK_]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK_.NODENAME]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK_.TIMESTAMP]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [SYSTEM.OCR.BACKUP.WEEK_.LOC]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}
    [DATABASE]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_CREATE_SUB_KEY, OTHER_PERMISSION : PROCR_CREATE_SUB_KEY, USER_NAME : root, GROUP_NAME : root}
    [DATABASE.NODEAPPS]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_CREATE_SUB_KEY, GROUP_PERMISSION : PROCR_CREATE_SUB_KEY, OTHER_PERMISSION : PROCR_CREATE_SUB_KEY, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.VIP_RANGE]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_CREATE_SUB_KEY, GROUP_PERMISSION : PROCR_CREATE_SUB_KEY, OTHER_PERMISSION : PROCR_CREATE_SUB_KEY, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.LOG]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_ALL_ACCESS, OTHER_PERMISSION : PROCR_ALL_ACCESS, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.ASM]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_CREATE_SUB_KEY, GROUP_PERMISSION : PROCR_CREATE_SUB_KEY, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.DATABASES]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_CREATE_SUB_KEY, GROUP_PERMISSION : PROCR_CREATE_SUB_KEY, OTHER_PERMISSION : PROCR_CREATE_SUB_KEY, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.ONS_HOSTS]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.ONS_HOSTS.slesorange]
    ORATEXT : slesorange
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.ONS_HOSTS.slesorange.PORT]
    ORATEXT : 6200
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.ONS_HOSTS.slesred]
    ORATEXT : slesred
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [DATABASE.ONS_HOSTS.slesred.PORT]
    ORATEXT : 6200
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : oinstall}
    [CRS]
    UNDEF :
    SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_READ, OTHER_PERMISSION : PROCR_READ, USER_NAME : root, GROUP_NAME : root}

  • CRS-0184: Cannot communicate with the CRS daemon.

    I am getting teh foll error when starting up a database
    [oracle@linux2 ~]$ srvctl start database -d orcl
    PRKH-1010 : Unable to communicate with CRS services.
    [oracle@linux2 ~]$ product/crs/bin/crs_start -all
    CRS-0184: Cannot communicate with the CRS daemon.
    From the available information on the net, I have already tried the below steps.
    a) Deleted all the files from /var/tmp/.oracle
    b) Ensured that the deamon is running
    [oracle@linux2 ~]$ ps -ef | grep crs
    root 6192 1 0 15:31 ? 00:00:00 /bin/sh /etc/init.d/init.crsd run
    oracle 1284 9630 0 16:02 pts/1 00:00:00 grep crs
    c) The foll lines are already added to the /etc/inittab file
    h1:3:respawn:/sbin/init.d/init.evmd run >/dev/null 2>&1 </dev/null
    h2:3:respawn:/sbin/init.d/init.cssd fatal >/dev/null 2>&1 </dev/null
    h3:3:respawn:/sbin/init.d/init.crsd run >/dev/null 2>&1 </dev/null
    Plz help. I'm still getting the error on one node of the Cluster.

    [oracle@linux2 bin]$ crsctl check crs
    Failure 1 contacting CSS daemon
    Cannot communicate with CRS
    Cannot communicate with EVM
    The node is setup on RHEL 4u7 (2.6.9-78.0.13.ELsmp)
    The first error in the crsd.log file says
    2009-11-05 06:07:57.196: [  CRSOCR][3086907072]0OCR api procr_open_key failed for key CRS.CUR. OCR error code = 4 OCR error msg: PROC-4: The cluster registry key to be operated on does not exist.
    Also, I have the '/u02/oradata/orcl' for the OCR and the CSS Files. On thsi node this directory is empty.
    Whereas on the other node in the sam cluster, thsi directory contains the OCR and CSS files and their mirrors.
    Is my OCR corrupted on thsi node? How can I restore it??

  • Using ZFS for Oracle RAC 11gR2 binaries

    Hi,
    We have following scenario,
    Two Node Cluster: Oracle RAC 11Gr2 with Clusterware on Solaris 10
    We want to keep Oracle & Clusterware binaries on ZFS mirror file system on each node locally and for Data files, FRA, Voting disks & OCR on shared SAN using ASM.
    My question, is the above scenario certified by Oracle or can we keep Oracle binaries on ZFS...?
    Will appreciate your input.
    Thanks

    Well my confusion started after reading this doc on oracle support:
    Certification of Zeta File System (Zfs) On Solaris 10 for Oracle RDBMS [ID 403202.1]
    "Oracle database 10gR2 (10.2.0.3 and higher patches), 11gR1 (11.1.0.6 and higher patches) and 11gR2 (11.2.0.1 and higher patches) are certified with Solaris 10 ZFS on Sparc 64-bit and Solaris x84-64. See Solaris ZFS_Best_Practices_Guide. This is for single instance ONLY. ZFS is currently not applicable to RAC and not Certified to use it as a shared filesystem."

  • Oracle rac 11gr2 + sga

    Hi all,
    I have a 2 nodes rac 11GR2 on linux redhat with 12Go RAM each one.
    Since 15 days, a dba add more memory on each node (+ 24Go RAM) and modify SGA like :
    On each node :
    create a pfile from spfile, modify memory_max_target on pfile (from 7Go to 8Go), and restart each instance from this pfile.
    Now, the problem are :
    Each node consume 36Go of 36Go RAM,
    The parameter spfile is empty (show parameter spfile).
    Do you an idea why all RAM is consumed on each node ?
    Thanks.

    Problem 1: Why is that a problem? How did you establish 36 Gb is used. The Unix tools are notoriously for providing incorrect information as the SGA is accounted for in every process.
    Problem 2: Evidently the "DBA' used an incorrect procedure to change these parameters, and didn't convert the pfile to spfile again, and started using the 'startup pfile' command.
    The action plan for this twofold
    - educate the "DBA' or don't hire him anymore
    - use the create spfile from pfile command, and restart the database.
    Sybrand Bakker
    Senior Oracle DBA

  • RAC 11gR2 DB Time monitor script

    Hi,
    I need to monitor DB Time in my RAC 11gR2 environment, in redhat linux.
    Could you please provide me a script to monitor the DB time resource?
    I am not licensed to use diagnostic pack.
    thank you

    /u01/app/11.2.0/grid/bin/ocrcheck
    Status of Oracle Cluster Registry is as follows :
    Version : 3
    Total space (kbytes) : 262120
    Used space (kbytes) : 2392
    Available space (kbytes) : 259728
    ID : 264487450
    Device/File Name : +DATA
    Device/File integrity check succeeded
    Device/File not configured
    Device/File not configured
    Device/File not configured
    Device/File not configured
    Cluster registry integrity check succeeded
    Logical corruption check succeeded

  • Why does my small rainbow wheel spin endlessly when I choose a story from Yahoo that happens to have a video attached?  I have to manually shut my Mac down and manually restart.

    Yahoo is my homepage and I also have just moved and have a new internet provider.  I doubt this has anything to do with my issue but thought just in case, I'd provide that information.  When I select an article to read from the yahoo news section, it goes directly to the article. However, if there is a video attached, the small rainbow wheel appears and turns endlessly.  I can't get out of the cycle.  I can't select restart.  I eventually must manually close down the Mac and then must manually restart.  This happens EVERY time I select an article with a video attached to the text of the article. Anybody have a clue what is going on and how to stop the insanity?
    Thanks,
    Sheri

    Sheri
    It sounds like your ISP is slow and this is causing the video to take a long time to download.
    Go to http://www.speedtest.net and click Start Test.
    Whatever you do don't click anything on the rightside of the screen for MacKeeper. That is scamware and all it will do is hose your computer up royally.
    My numbers were Ping 11ms     Download Speed 25.44 Mbps     Upload Speed 3.49 Mbps
    Which aren't bad.
    Let us know what you get.
    Allan

  • Set Message in BPM to System Error - Manual Restart Possible ?

    Hello,
    I'm working on a scenario where two idocs are merged in a BPM. The next step is sending the message in a synchronous RFC (BAPI) to a SAP R/3. Is it possible to set the merged message to the message status 'System Error - Manual Restart Possible' in the SXMB_MONI, when the BAPI returns an Error message?
    When it's not possible, is there an othe possibility to sent the message again, without involving the source system?
    Thanks in advance
    Matthias

    Hi,
    It would be better i think if you use the concept of raising an exception in your response mapping
    please refer:
    /people/alessandro.guarneri/blog/2006/01/26/throwing-smart-exceptions-in-xi-graphical-mapping
    /people/michal.krawczyk2/blog/2007/04/26/xipi-throwing-generic-exceptions-from-any-type-of-mapping
    in the response mapping you can check the condition for the responce code from RFC.
    Ranjit

  • How to cancel automatically messages stated 17 (Application error - manual restart possible) in SAP ECC

    Hi people. I need to create a job to cancel automatically the messages with the status 17 (Application error - manual restart possible) in SAP ECC.
    In SXI_MONITOR I can retrieve these messages filtering just for "Application Error". I can cancel them here, however I need for a Job to do it.
    I appreciate your help.
    Regards
    Arturo Santos

    Hi,
    >Is there any way we can make this automatic
    In RWB-Component Montoring-Adapter Engine-Communication Channel Montoring- Select the Adapter- Go to Settings  and  change as per your Business Requirement.
    Regards
    Agasthuri Doss

Maybe you are looking for

  • Indexes missing

    Hi team ,   We have found one index missing in db02. The index is in Abap Dictionary but not in Database. How to find the who perform the deletion of index from data base OR who perforn the creation of index in only Abap Dictionary. Regards   Vishnu

  • Does iMT 1.1 support ND3 projects

    Hi , We have got a couple of projects in ND3. The requirement is to migrate them to iPlanet environment, using JATO/iMT tool. - Does the latest "iMT 1.1" support ND3 projects in its migration process. I mean, I will open ND3 project in ND5, and make

  • HT1338 QuickTime Error: 2

    The share operation Master File has failed Share command- final cut pro x - master export - error QuickTime Error: 2. ?????

  • Time Capsule via ADSL modem: settings

    In italy there's not a cable ADSL, so we need an ADSL modem (adapter) in order to connect to the web. So now I've just purchased a new Time Capsule and I'm in order to set the connection. I would set the device this way: 1)Set bridge mode the modem t

  • How do I take images from DVD's?

    How do I take single images from a home movie DVD?