Help - Search - Members - Calendar
Full Version: controlling dblink timeout
Oracle DBA Forums > Oracle > Oracle Forum
dbuser
hello all.
is there any way to reduce the dblink timeout, i need to test if the remote server is up by testing the dblink throw 'select 1 from dual@link_name' but it take too long time 5-6 min., i need to make it 5 sec after that the exception tns timeout appear. I try with some sqlnet.ora parameters like INBOUND_TIMEOUT but not work for me, also i try using tnsping but it also take long time when the remote server is down.
Rgards.
burleson
Hi,

>> i need to test if the remote server is up by testing the dblink

I di it this way:

http://www.dba-oracle.com/t_troubleshootin...vity_errors.htm

CODE
tnsping [email="uranus@mylink"]uranus@mylink[/email]
sleep 1


For working examples, get the Oracle shell scripting boook:

http://www.rampant-books.com/shadow_book_o...ll_scipting.htm

>> is there any way to reduce the dblink timeout,

Yes.

Mist dblinks are made in abount a half second and held for hour, if not days . . .
burleson
Hi again,

>> it take too long time 5-6 min., i need to make it 5 sec after that the exception tns timeout appear.

That's VERY slow!

AHA, Here you go:


PLEASE READ

http://www.dba-oracle.com/t_connect_time_i...ire_timeout.htm


The sqlnet.ora inbound_connect_timeout parameter
The sqlnet.ora inbound_connect_timeout parameter is used to limit the time, set in seconds, for a client to connect with the database server and provide the required authentication information.

As we have all seen with recent worm and virus attacks, unauthorized access to a system service such as the Listener or database server can result in denial-of-service attacks. In a denial-of-service attack, an unauthorized client attempts to block the authorized users’ ability to access the system. Malicious clients or hackers may attempt to flood the Listener or database server with bogus connect requests solely to consume resources, such as connections, processes, or threads.

To minimize the effect of denial-of-service attacks, you should configure limits that constrain the time in which resources can be held prior to authentication. In this way, client attempts to exceed the configured limits will result in connection terminations and an audit trail containing the IP address of the client being logged.

To limit consumption of Oracle 10g’s resources by unauthorized users and enable an audit trail, you should set time-limit values for the sqlnet.inbound_connect_timeout parameter described previously.






This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Invision Power Board © 2001-2014 Invision Power Services, Inc.