- Key pairs consist of a public and private key, where you use the private
key to create a digital signature, and then AWS uses the corresponding
public key to validate the signature. Key pairs are used only for Amazon EC2 and
Amazon CloudFront.
For Amazon EC2, you use key pairs to access Amazon EC2 instances like when you use SSH to log in to a Linux instance. For more information, see Connecting to Amazon EC2 Instances in the Amazon Elastic Compute Cloud Developer Guide.
Logged operations are replicated. These include, but are not limited to: DDL DML Create/alter table space Create/alter storage group Create/alter buffer pool XML data. Logged LOBs Not logged operations are not replicated. These include, but are not limited to: Database configuration parameters (this allows primary and standby databases to be configured differently). "Not logged initially" tables Not logged LOBs UDF (User Defined Function) libraries. UDF DDL is replicated. But the libraries used by UDF (such as C or Java libraries) are not replicated, because they are not stored in the database. Users must manually copy the libraries to the standby. Note: You can use database configuration parameter BLOCKNONLOGGED to block not logged operations on the primary.
Comments