用10046 跟踪exp
之前写过一个blog,Oracle expdp为什么比exp快,原理是什么,是从官方文档中获知的,如今通过10046来分析exp的过程。
C:\Users\Administrator>exp LCAMTEST/LCAMTEST@10.10.15.25_LCAM file=d:/test.dmp tables=(BPMS_RU_ACTIVE_INS)
SQL> SELECT p.spid,p.addr,p.pid,s.sid,SUBSTR(s.username,1,15) "USERNAME",
SUBSTR(s.program,1,15) "PROGRAM"
FROM v$process p,v$session s
WHERE s.paddr=p.addr
AND addr=(SELECT paddr FROM v$session WHERE UPPER(program) LIKE 'EXP%');
SPID ADDR PID SID USERNAME PROGRAM
------- ---------------- ----- ---- ---------- --------
15067 000000018C4FFD10 24 10 LCAMTEST exp.exe
要以sys登录。否则oradebug setospid 15067会报ORA-01031: 权限不足。
SQL> oradebug setospid 15067
Oracle pid: 18, Unix process pid: 15067, image: oracle@oracle (S000)
SQL> oradebug unlimit
已处理的语句
SQL> oradebug Event 10046 trace name context forever, level 12
已处理的语句
D:\>tkprof lcamtest_s000_15067.trc 15067.txt
********************************************************************************
count = number of times OCI procedure was executed
cpu = cpu time in seconds executing
elapsed = elapsed time in seconds executing
disk = number of physical reads of buffers from disk
query = number of buffers gotten for consistent read
current = number of buffers gotten in current mode (usually for update)
rows = number of rows processed by the fetch or execute call
********************************************************************************
SQL ID: 9c4gmqy4k7a7q
Plan Hash: 3521625488
SELECT /*+NESTED_TABLE_GET_REFS+*/ "LCAMTEST"."BPMS_RU_ACTIVE_INS".*
FROM
"LCAMTEST"."BPMS_RU_ACTIVE_INS"
call count cpu elapsed disk query current rows
------- ------ -------- ---------- ---------- ---------- ---------- ----------
Parse 0 0.00 0.00 0 0 0 0
Execute 0 0.00 0.00 0 0 0 0
Fetch 460025 18.25 13.83 31870 485572 0 2300122
------- ------ -------- ---------- ---------- ---------- ---------- ----------
total 460025 18.25 13.83 31870 485572 0 2300122
Misses in library cache during parse: 0
Parsing user id: 87
Elapsed times include waiting on following events:
Event waited on Times Max. Wait Total Waited
---------------------------------------- Waited ---------- ------------
virtual circuit wait 919983 0.25 309.81
SQL*Net message from client 460026 0.01 36.02
SQL*Net message to client 460025 0.00 0.67
db file scattered read 250 0.07 1.68
********************************************************************************
相关文章
- 压缩跟踪Compressive Tracking(转)
- windows server 2008取消关闭事件跟踪
- 使用SQL Server Profiler跟踪数据库
- SAP One Order应用的跟踪工具CRMD_TRACE_SET
- paip.性能跟踪profile原理与架构与本质-- python扫带java php
- Py之pygame:有趣好玩—利用pygame库实现鱼儿自动实时目标跟踪(附完整代码)
- Qt分析之调试跟踪系统
- OpenCV使用稀疏光流实现视频对象跟踪
- m分别使用meanshift和camshift两种算法实现人员跟踪并输出人员移动曲线matlab仿真
- Linux tracepath跟踪路径到沿着该路径发现MTU的网络主机
- 记一次服务器路由跟踪 (2019-01-23 TODO)
- WannaCry 变种跟踪分析——本质上还是在持续利用没有修复永恒之蓝漏洞的机器进行攻击
- nmap -A 启用操作系统和版本检测,脚本扫描和路由跟踪功能