How can we help you today? How can we help you today?
andersharder
Hi Eddie, As a colleague of  jaspernygaard and the originator of this query let me elaborate. There are actually 3 discussions in this. 1. Cache:  cache option for tables is an operational directive that has no structural bearing on your datamodel. The reason it can be relevant to exclude is that is Oracle Edition dependent whether it is supported and thus destination dependent a bit in the same way as storage parameters are which you allow to ignore.  This is a minor point and as we have a another way of handling this so this is not really an issue for us anymore. Nevertheless I believe it would be reasonable and simple improvement of SCO to have that as an option. I believe there are other Oracle Edition options that in the same way could be relevant to ignore, but the cache option is the one I have experienced so far. 2. Roles,  Context,  Directories (and users come to think of it) A DB based system as the one we develop consists of many things. By bulk this is the user (schema) owned objects such as tables, indexes, packages etc which is handled by SCO. But there are objects that are in DB system level name spaces like Directories, Contexts, Roles and the Users (Schemas) themselves etc.  It would be nice to be able to handle these objects (and the generation of scripts for deployment and maintenance of these) within SCO.  I realize this is a quite substantial augmentation request and this will actually take SCO beyond what is in the name (*Schema* compare for Oracle) :-)  For our needs, these are faily static as objects anyway and we can manage outside SCO. 3. Roles, privileges and the 'Cross-schema Permission' option The 'Cross-schema permission' option restricts SCO to consider privileges for the objects it manages given to the schemas within the project. This is necessary to use this option if one works with Databases (instances) that host several systems (related to different SCO projects) Even if SCO is not to handle deployment of the schemas (create user) themselves or roles or other system level component it would be beneficial if it recognized that a DB based system consist of more than the schemas and what they own. Particularly when it comes to privilege management. Typically as privilege management is done via roles. It would be beneficial if one could give a list roles (in line with the list of schemas ones SCO project consists of) to the SCO project. Just so privileges on objects handled by SCO given to these roles are also managed when the 'Cross-schema permission' option is selected. Further privileges for these roles (e.g. system privileges or for system level objects like dictionaries) is not part of this (that would be part of item 2 above). For our needs this is the most important issue and it will require attention outside SCO for every deployment. Hope this clarify things a bit. Thanks,  Anders / comments
Hi Eddie,As a colleague of  jaspernygaard and the originator of this query let me elaborate.There are actually 3 discussions in this.1. Cache: cache option for tables is an operational directive th...
0 votes
For anyone else seeing this thread.  This has been resolved. Qouting Eddie from the ticket to what solved our specific problem.(note you might have same symptoms due to other underlying issues) "There is an error which is permissions related trying to obtain the Materialized View Reduced Precision. I suspect you may already know this, our tools query a number of data dictionaries and system objects as listed in this help article: https://documentation.red-gate.com/sco5/requirements/permissions-required-to-use-schema-compare-for-oracle The query being run is as follows: SELECT s.sowner as owner, s.vname as mview_name, decode(bitand(s.flag, 262144), 262144, 'Y', 'N') as reduced_precisions   FROM sys.snap$ s WHERE ((s.sowner = 'H6601' OR s.sowner = 'DCFO' OR s.sowner = 'DCF_SERVICES' OR s.sowner = 'H0915' OR s.sowner = 'SNP' OR s.sowner = 'GLRCHR' OR s.sowner = 'INVOICING' OR s.sowner = 'REPORTING' OR s.sowner = 'STAGING' OR s.sowner = 'H6601ADM' OR s.sowner = 'H6601FEJL') ); I suspect the user of your RHS does not have security permissions to the system object 'sys.snap$'  which results in a ORA-00942 error.  Just before this point in the log file the process indicates it is populating object privileges, types, triggers, clusters, materialized views. Does giving the user for the RHS permissions to 'sys.snap$' help to resolve the problem? " / comments
For anyone else seeing this thread. This has been resolved.Qouting Eddie from the ticket to what solved our specific problem.(note you might have same symptoms due to other underlying issues)"There...
0 votes