Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Teradata RDBMS Database Administration - NCR

NCR Teradata RDBMS Database Administration - NCR , 2004. - 616 p.
Download (direct link): teradatadatabaseadmin2004.pdf
Previous << 1 .. 200 201 202 203 204 205 < 206 > 207 208 209 210 211 212 .. 218 >> Next

DIPSYSFE SytemFE macros Macros and tables used with Target Level Emulation Generate diagnostic reports used by Teradata support personnel. Enable implementation of Target Level Emulation for analyzing the performance of your SQL applications. "SystemFE Contents" on page 1-4. "Target Level Emulation (TLE)" on page 13-3
DIPVIEW User-accessible views defined on the Teradata RDBMS system tables Special DBQL objects, including the control macro, the query log tables, and views into the logs System views let you investigate the contents of the system tables in the Teradata RDBMS data dictionary. (System views are created in database DBC; thus, a fully-qualified reference, required by users other than DBC, is DBC.viewname.) DBQL objects also are created in database DBC. "DBC Contents" on page 1-3 Chapter 4: "Using Data Dictionary Tables and Views" "Introducing DBQL" on page 14-2

E - 2

Teradata RDBMS Database Administration Index

Numerics

2PC 7-17

API interface 7-19 components 7-18 coordinator 7-17 CPI interface 7-19 defined vii error handling 7-22 in-doubt participant 7-20 in-doubt resolution 7-22 in-doubt transactions 7-20, 7-22 interface functions 7-19 interfaces 7-18 participant 7-17 PCI interface 7-19 phase 1 processing 7-20 phase 2 processing 7-21 protocol requirements 7-17

2-Phase Commit Protocol. See 2PC

A

ABORT SESSION command Database Window D-9 DBC.SW_Event_Log table and Performance Monitor 6-36 Access

control mechanisms 6-37 controlling 6-1 controlling system 6-17 disabling logging 6-45 enabling logging 6-45 logging 6-45

logon, tools for controlling 12-18 objects, tools for controlling 12-18 securing with passwords 6-20 Access rights

controlling by privilege 6-37 controlling using stored procedures 6-44 controlling using system views 6-39 controlling with macros 6-43 creating with DIPACR E-3 viewing 6-9 Accessing NCR knowledge articles with

NCR@YourService 10-26 Account

Priority, changing dynamically 5-23 Account String Expansion. See ASE Account strings, defining 5-20 Account values, clearing from DBC.Acctg table with

DBC.AMPUsage view 4-15 Account, NCR@YourService 10-26 Accounts

setting up 5-1 Accumulators archiving 4-15 resetting 4-15 Aggregate results, performing 2-12 ALL option 6-15 ALTER TABLE statement 2-5 capabilities 2-5

regenerating table headers with REVALIDATE

PRIMARY INDEX 2-29 REVALIDATE PRIMARY INDEX option 2-33 ALTER TABLE statement, changing free space

percent 12-11 AMPs

adding 12-30, A-17, A-18

backup and change images 2-82 changing cluster assignments 7-35 clustered, automatic recovery with fallback 7-3 clustering and fallback protection 7-3 clusters and fallback protection 7-32 fallback 7-33

fallback and change images 2-82 primary and change images 2-82 AMPs, Configuration utility A-13 ANALYZE statement, ARC utility 8-28 ANSI mode 7-15

BEGIN TRANSACTION statement 7-16 END TRANSACTION statement 7-16 unsuccessful requests 7-15 Application performance, improving 13-1 Applications

ensuring scalability of 12-32 modifying 2-63 ARC

affects on abilities when altering PIs 8-8 affects on roll operations of a changed table version

number 8-8 restrictions when table version number changes 2-79, 8-8 ARC language statements archiving scripts 8-12

Teradata RDBMS Database Administration

Index -1 Index

creating scripts 8-11 managing scripts 8-11 scripts and 8-11 ARC Utility

revalidating primary indexes 2-33 ARC utility B-5, B-10, B-15 affects of altering a PI 2-27 AMP clusters 7-37 ANALYZE statement 8-28 archive objects 8-17

ARCHIVE statement group read lock option 8-20

ARCHIVE statement indexes option 8-19

ARCHIVE statement options 8-19

archive types 8-16

archiving and 8-2

archiving statements 8-16

backing up permanent journals 2-81

backing up tables 2-81

BUILD statement 8-32

capabilities of 8-3

CHECKPOINT statement 8-38

clustering and journals 7-37

common uses for 8-3

COPY statement 8-31

DELETE function 2-81

DELETE JOURNAL statement 8-43

described 8-4

functionality 8-4

LOGOFF statement 8-14

LOGON statement 8-14

monitoring a job B-20

multiple archive sessions 8-14

multiple recover sessions 8-14

overview 8-3

partitions B-21

recovering permanent journals 2-81

recovering tables 2-81, 8-4

recovery versus FastLoad 8-9

RELEASE LOCK statement 8-33, 12-5, 12-25

RESTORE statement 8-29

restore-related statements 8-28

REVALIDATE REFERENCES FOR

statement 8-32 ROLLBACK function 2-81 ROLLBACK statement 8-39 ROLLFORWARD function 2-81 ROLLFORWARD statement 8-41 session control 8-14 Teradata Manager and B-22 terminology 8-3 types of archives 8-21 using NetVault 8-4 ARC utility statements

ANALYZE 8-28 ARCHIVE 8-16 BUILD 8-32 CHECKPOINT 8-38 COPY 8-31

DELETE JOURNAL 8-43 LOGOFF 8-14 LOGON 8-14 RELEASE LOCK 8-33 RESTORE 8-29

REVALIDATE REFERENCES FOR 8-32 ROLLBACK 8-39 Archive and Recovery utility. See ARC utility ARCHIVE statement, ARC utility 8-16 ARCHIVE statements, primary resource usage and
Previous << 1 .. 200 201 202 203 204 205 < 206 > 207 208 209 210 211 212 .. 218 >> Next