Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Teradata RDBMS Database Administration - NCR

NCR Teradata RDBMS Database Administration - NCR , 2004. - 616 p.
Download (direct link): teradatadatabaseadmin2004.pdf
Previous << 1 .. 209 210 211 212 213 214 < 215 > 216 217 .. 218 >> Next


using to control access 6-44 streams log 12-10

finding hardware faults 12-10 troubleshooting hardware problems 12-10 troubleshooting hung jobs 12-24 troubleshooting UNIX 12-5 troubleshooting with 12-24 stune file

preventing UNIX panics 12-11 troubleshooting Teradata RDBMS 12-5 Support tools, VEComp facility 13-4 SW_Event_Log, viewing C-8 Sys_Calendar database 1-6 Sys_Calendar database, creating E-3 Sys_Calendar.CalDates E-3 Sys_Calendar.CalDates table 1-6 Sys_Calendar.Calendar E-3 Sys_Calendar.Calendar view 1-6 SysAdmin database 1-4 syscheck command

troubleshooting hung jobs 12-23 troubleshooting Teradata RDBMS 12-5

syscheckrc file, setting resource limits with 12-21 System

accounting capacity planning 5-39 accounting functions 5-39 accounting resource control 5-39 accounting views 5-35 capturing dumps 11-3 controlling access 6-17 expanding the Teradata RDBMS 12-28 maintaining logs 4-16 System access, monitoring 6-30 System accounting 5-39 capacity planning 5-39 functions 5-39 resource control 5-39 views 5-35 System dumps

accessing data 7-42

calculating crashdump space 10-13

changing Windows 2000 paging file size 11-11

crashdump space 10-13

forcing 11-3

forcing UNIX 11-6

handling on UNIX 11-4

location of UNIX 11-2

location of Windows 2000 11-2

no fallback and 7-42

overview 10-1

saving UNIX 11-7

sending tapes to Teradata Support Center 11-14 setting the save options on UNIX 11-4 setting up the Windows 2000 Application

Log 11-9 types of 11-2 versus PDE Dumps 10-4 viewing information in UNIX 11-8 viewing information in Windows 2000 11-9 viewing UNIX 11-8 viewing Windows 2000 11-9 Windows 2000 11-9 System expansion, determining needs for Teradata

RDBMS 12-28 System files

preventing UNIX panics with stune 12-11 setting resource limits with syscheckrc 12-21 troubleshooting with stune 12-5 System logs

archiving 4-16 purging 4-16 streams 12-10 System Management Facility. See SMF System planning, charge-back billing 5-39 System reconfiguration, after expansion 12-31

Index -18

Teradata RDBMS Database Administration Index

System tables

adding check constraints 2-8 adding column-level constraints 2-8 adding columns 2-7 adding fallback protection 2-8 adding hash indexes 2-8 adding join indexes 2-8 adding referential constraints 2-8 adding secondary indexes 2-8 adding table-level constraints 2-8 analyzing performance 2-53 backing up using ARC utility 2-81 changing column-level constraints 2-8 changing COMPRESS specification for a

column 2-7 changing cylinder FREESPACE percent 2-8 changing data types 2-7 changing default formats of a column 2-7 changing permanent journal 2-8 changing size of DATABLOCKSIZE 2-8 changing table-level constraints 2-8 converting to Teradata RDBMS 2-64 creating permanent journal 2-8 DBC.AccessRights

reducing rows with roles and profiles 5-12 DBC.LogonRuleTbl, storing access logging

rules 6-24 DBC.SW_Event_Log 6-36 DBC.SysSecDefaults, updating global

preferences 6-22 defining 2-10

dropping check constraints 2-8 dropping column-level constraints 2-8 dropping hash indexes 2-8 dropping join indexes 2-8 dropping permanent journal 2-8 dropping referential constraints 2-8 dropping secondary indexes 2-8 dropping table-level constraints 2-8 fallback-protected Data Dictionary 4-3 global temporary 2-17 maintaining by purging 4-15 materializing global temporary 2-18 non-hashed Data Dictionary 4-3 permanent journal 2-78 planning 2-10 purging the logs 4-16 recovering using ARC utility 2-81 recreating 2-9

redefining primary indexes 2-7 removing fallback protection 2-8 renaming columns 2-8 updating Data Dictionary 4-4

volatile 2-17, 2-18 volatile versus derived 2-19 volatile versus global 2-19

System views

accounting 5-35 creating with DIPVIEW E-4 DBC.AccessLog 6-46 DBC.AccLogRules 6-46 DBC.AccountInfo 5-35 DBC.All_RI_Children 7-14 DBC.All_RI_Parents 7-14 DBC.AllRights 6-9 DBC.AllSpace 3-15 DBC.AMPUsage 5-36 DBC.Association 8-44 DBC.DiskSpace 3-14, 12-24 DBC.Events 8-45 DBC.Events_Configuration 8-46 DBC.Events_Media 8-46 DBC.LogonOnOff 6-34 DBC.LogonRules 6-34 DBC.RI_Child_Tables 7-14 DBC.RI_Distinct_Children 7-14 DBC.RI_Distinct_Parents 7-14 DBC.RI_Parent_Tables 7-14 DBC.SecurityDefaults 6-22 DBC.SessionInfo 6-30

DBC.SessionInfo, finding session source 6-30

DBC.Software_Event_Log 12-10

DBC.SysSecDefaults 6-21

DBC.TableSize 3-15

DBC.Users 6-21

Events_Configuration 8-46

nested 6-41

non-restricted 4-8

password control with

DBC.SecurityDefaults 6-22 recovery control 8-44 restricted 4-7 SELECT privilege 4-8 session-related 6-30 timestamps 4-13

troubleshooting with DBC.TableSize 12-6

troubleshooting with Software_Event_Log 12-5

user-restricted 4-7

using 3-14, A-2

using to control access 6-39

SystemFE database 1-4

SystemFE macros, creating with DIPSYSFE E-4

SystemFE user, privileges for DBQL 14-21

Teradata RDBMS Database Administration

Index -19 Index

Previous << 1 .. 209 210 211 212 213 214 < 215 > 216 217 .. 218 >> Next