Posts

Showing posts from February, 2010

Redis user permissions (ACL) and python connection

 Recently, I was working on setting up a redis cluster along with separate users for readwrite and readonly. I setup the readonly user using the below privileges (ACLs):   user redisreadonly on >mySuperSecretPassword ~* resetchannels -@all +@read +ping +asking   Once this is setup, I wrote a simple program in python to connect to the redis cluster using the readonly credentials and print the number of keys.   #!/usr/bin/env python3 """ pip3 install redis """ from redis.cluster import RedisCluster, ClusterNode # ─────── Cluster connection ─────── startup_nodes = [ ClusterNode("redis_host_1", 6379), ClusterNode("redis_host_2", 6379), ClusterNode("redis_host_3", 6379) ] rc = RedisCluster(startup_nodes=startup_nodes,decode_responses=True,username='redisreadonly',password='mySuperSecretPassw...

Quirky 11i Apps Patch queires

Long time since I blogged. I was a bit busy with my vacations and work! Anyway, check out my travelogue , if you are interested enough. This time, I plan to write about a few quirky and rarely used queries to find out whether a patch is applied. Method 1 Check Patches applied from Oracle Applications Manager (OAM). a) Connect to OAM: http://hostname.domain:port/servlets/weboam/oam/oamLogin Go to Site Map-->Maintenance-->Applied Patches Enter Patch ID and press 'Go' See if Patch is returned. Method 2 Use 'adphrept' utility documented in Metalink Note:181665.1, section 'Retrieving information on patches or files that have been applied via adpatch'. $AD_TOP/patch/115/sql/adphrept.sql (available on admin and web nodes in multi tier APPL_TOP) (1) Patch History report usage: $AD_TOP/patch/115/sql/adphrept.sql <query_depth> < bug_number or ALL> <bug_product or ALL> \ <end_date_from (mm/dd/rr or ALL)> <end_date_to (mm/dd/rr or ALL)> \...

Popular posts from this blog