Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Teradata RDBMS Database Administration - NCR

NCR Teradata RDBMS Database Administration - NCR , 2004. - 616 p.
Download (direct link): teradatadatabaseadmin2004.pdf
Previous << 1 .. 202 203 204 205 206 207 < 208 > 209 210 211 212 213 214 .. 218 >> Next


managing I/O 15-2 Cylinder space, Free Space Percent and 3-5

D

Data

accessing dump 7-42 archiving 8-1 archiving overview 8-2 automatic data protection 7-2 changing 2-11 changing representation 2-62 data structures and 2-62 guidelines for choosing 7-41 hardware protection 7-23 integrity 7-15 joining 2-11 protecting 7-1 recovering 8-1 recovery 7-6

recovery using roll operations 8-37 reloading and relocating, tools for 2-49 restoring 8-1

restoring after a down AMP 8-34

restoring dual before- and after-image protected

tables 8-35

restoring single before- and after-image protected

tables 8-35 structures 2-62 Data blocks, setting size limits 3-4 Data Dictionary

archiving and restoring tables 8-27 fallback-protected tables 4-3 maintaining system logs 4-16 maintaining the log files 4-15 non-hashed tables 4-3 overview of contents 4-2

Index -4

Teradata RDBMS Database Administration Index

timestamp 4-13 updating tables 4-4 using tables 4-1 using views 4-1 Data integrity 7-15 cliques 7-28 permanent journals 7-38 Data protection 7-42

AMP clustering and fallback 7-32 ANSI mode 7-15 automatic mechanisms 7-2 automatic with fallback clustering 7-3 boot slice 7-26 cliques 7-28

disk array architecture 7-23 down-AMP recovery journal 7-34 dumps and 10-11 failure handling 7-33 fallback 7-32 fallback and automatic 7-3 guidelines 7-41 hardware 7-23

of committed DBQL rows 14-27 RAID 1 7-26 RAID 5 7-26

RAID availability comparison 7-27 RAID failure handling comparison 7-27 RAID management tools comparison 7-28 RAID operation comparison 7-27 RAID overhead comparison 7-27 RAID S 7-26

RAID throughput comparison 7-27 software 7-29 Teradata mode 7-16 transactions 7-15 transient journals 7-2, 7-30 user slice 7-26 Data protection options advantages 7-41 disadvantages 7-41 fallback advantages 7-41 fallback disadvantages 7-41 no fallback 7-41 no fallback advantages 7-41 no fallback disadvantages 7-41 permanent journal advantages 7-41 permanent journal disadvantages 7-41 permanent journals 7-41 Data protection, fallback

automatic with Down AMP Recovery Journal 7-4 Data recovery 7-6 Data structures 2-62

Data structures, converting to relational 2-62 Data types

changing 2-7 Data types, consistecy across tables 2-11 Database

default, user, affects of dropping 4-4 Database analysis tools 13-1 Database DBC archive 8-23 Database DBC archive, restart log 8-25 Database design, identifying design similarities 2-63 Database hierarchy

administrative user 1-7 changing using GIVE statement 1-17 child 1-2 children 1-13 Crashdumps database 1-2 creators 1-2 DBQM 1-2 objects 1-2 overview 1-2 owners 1-13 parent/owner 1-2 parents 1-13 removing a level 1-17 Sys_Calendar database 1-2 SysAdmin database 1-2 system users 1-2 SystemFE database 1-2 user DBC 1-2 Database Initialization Program. See DIP utility Database Query Log. See DBQL 14-1 Database Query Manager. See DBQM Database Window

ABORT SESSION command D-9 troubleshooting Teradata RDBMS 12-2, 12-5 Database, user default, affects of dropping 4-4 Databases

creating 2-2, 5-2 creating the QCD 13-4 DBC 1-3

dropping empty 2-3 fine-tuning prototype definitions 2-49 objects associated with 1-9 objects, tools for easily changing and

recreating 2-49 other 1-5

prototyping to test design 2-49 Sys_Calendar 1-6, E-3 SysAdmin 1-4 SystemFE 1-4

testing the schema, tools for 2-49 upgrading the QCD 13-4

Teradata RDBMS Database Administration

Index -5 Index

users versus 1-9 DBC

server character set default A-7 DBC database 1-3 DBC.AccessLog view 6-46 DBC.AccessRights system table

reducing rows with roles and profiles 5-12 DBC.AccessRights table

removing rights from PUBLIC 6-13 DBC.AccLogRule macro 6-46 DBC.AccLogRule macro, DIP utility E-3 DBC.AccLogRules view 6-46 DBC.AccLogTbl

maintaining 4-16 DBC.AccountInfo view 5-35 DBC.Acctg table, clearing with DBC.AMPUsage

view 4-15 DBC.All_RI_Children view 7-14 DBC.All_RI_Parents view 7-14 DBC.AllRights view 6-9 DBC.AllSpace view 3-15 DBC.AMPUsage

statistics, using 5-21 DBC.AMPUsage view 5-36

accumulating statistics with 5-26 aggregating account statistics 5-26 clearing DBC.Acctg table 4-15 logging ASE variables 5-27 DBC.Association view 8-44 DBC.CharSets A-10 DBC.CharSets view, use of A-10 DBC.CharTranslations view, use of A-9 DBC.ClearPeakDisk macro

resetting peak space values in DBC.DatabaseSpace 4-15 DBC.DatabaseSpace table

resetting peak values with DBC.ClearPeakDisk macro 4-15 DBC.DataBaseSpace table, resetting peak values 3-13

DBC.DataBasesSpace table, correcting inconsistencies in 4-17

DBC.DBase table, correcting inconsistencies in 4-17 DBC.DBQL tables

maintaining 4-16 DBC.DiskSpace view 3-14, 12-3

comparing results with DBC.TableSize view 3-18 resolving lack of disk space 12-11 troubleshooting hung jobs 12-24 DBC.Events view 8-45 DBC.Events_Configuration view 8-46 DBC.Events_Media view 8-46

DBC.HostsInfo view, use of A-10 DBC.IndexConstraints view 2-28 DBC.Indices view 2-28 DBC.LogOnOff view 6-34 DBC.LogonRule macro, controlling SSO 6-23 DBC.LogonRules view 6-34 DBC.LogonRuleTbl system table 6-24 DBC.ResUsage tables maintaining 4-16 DBC.RI_Child_Tables view 7-14 DBC.RI_Distinct_Children view 7-14 DBC.RI_Distinct_Parents view 7-14 DBC.RI_Parent_Tables view 7-14 DBC.SecurityDefaults view 6-22
Previous << 1 .. 202 203 204 205 206 207 < 208 > 209 210 211 212 213 214 .. 218 >> Next