The document provides an overview of DB2 and discusses key concepts such as instances, databases, tablespaces, and recovery. It describes how to install and configure DB2, create instances and databases, load and move data between databases, and perform backups and recovery. Examples are given of commands used to create tablespaces and load data. The document also mentions tools for visualizing queries and monitoring performance.
This document provides examples of using SQL commands in DB2 to create and manage database tables, insert and query data, create views, and more. It shows how to start and connect to a DB2 database instance named "sample", create tables like "EMPLOYEE" and insert sample records, perform joins, unions and other queries, update and delete records, create a view, list tables, and shut down the DB2 instance. The examples demonstrate basic and some advanced SQL features in DB2.
DB2 is a family of database server products developed by IBM that support relational and object relational models. DB2 was first introduced by IBM in 1983 for mainframe systems and has since been ported to Linux, Unix, and Windows. There are three main DB2 products: DB2 for Linux, Unix, and Windows (DB2 LUW), DB2 for Z/OS (mainframe), and DB2 for iSeries. DB2 LUW provides features such as high availability, security, workload management, and federation between data sources. The document discusses DB2 architecture including the instance model, database storage model, engine dispatchable units, and memory architecture.
"Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 350 (or) INR 21000
Number of Hours: 30-35 hours
Regards,
Karthik
www.etraining.guru"
DB2 runs on 5 address spaces that each perform essential functions:
- DSNMSTR controls connections to other systems and performs logging, recovery, and system management.
- DSNDBM1 supports data definition, manipulation, and retrieval.
- IRLMPROC controls concurrent data access and maintains integrity through locking.
- DSNDIST enables remote access to distributed databases.
- DSNSPAS provides an isolated environment to execute stored procedures.
DB2 LUW Security introduces new auditing features in DB2 9.5 that make auditing more flexible and granular. Key points include:
- Database auditing now has separate instance and database levels for more flexibility and separation of duties.
- New auditing categories like EXECUTE allow auditing just SQL statements instead of entire operation contexts.
- Audit policies are used at the database level instead of the old db2audit commands. Policies are created and assigned to objects by SECADMs.
- Instance level auditing is still done with db2audit commands by SYSADMs, while database level uses stored procedures delegated by SECADMs.
- The new
The document discusses various DB2 recovery options including backup and restore, the recovery process model, important recovery-related system files, advanced copy services, and transportable schemas. It provides examples of the backup and restore process models and describes key DB2 recovery-related files. It also outlines the scripted interface for advanced copy services backup and differences between DB2 versions 9.7 and 10.1 related to advanced copy services.
This document discusses DB2 backup and recovery. It covers logging, different backup types including full, incremental, and delta backups. It also discusses performing backups offline and online. The document describes how to check backup history and image consistency. Recovery types like crash, version, and roll-forward recovery are explained. Commands for restarting, restoring, and recovering databases are provided. The appendix includes links for more information on backup, restore, and roll-forward commands.
This document provides examples of using SQL commands in DB2 to create and manage database tables, insert and query data, create views, and more. It shows how to start and connect to a DB2 database instance named "sample", create tables like "EMPLOYEE" and insert sample records, perform joins, unions and other queries, update and delete records, create a view, list tables, and shut down the DB2 instance. The examples demonstrate basic and some advanced SQL features in DB2.
DB2 is a family of database server products developed by IBM that support relational and object relational models. DB2 was first introduced by IBM in 1983 for mainframe systems and has since been ported to Linux, Unix, and Windows. There are three main DB2 products: DB2 for Linux, Unix, and Windows (DB2 LUW), DB2 for Z/OS (mainframe), and DB2 for iSeries. DB2 LUW provides features such as high availability, security, workload management, and federation between data sources. The document discusses DB2 architecture including the instance model, database storage model, engine dispatchable units, and memory architecture.
"Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 350 (or) INR 21000
Number of Hours: 30-35 hours
Regards,
Karthik
www.etraining.guru"
DB2 runs on 5 address spaces that each perform essential functions:
- DSNMSTR controls connections to other systems and performs logging, recovery, and system management.
- DSNDBM1 supports data definition, manipulation, and retrieval.
- IRLMPROC controls concurrent data access and maintains integrity through locking.
- DSNDIST enables remote access to distributed databases.
- DSNSPAS provides an isolated environment to execute stored procedures.
DB2 LUW Security introduces new auditing features in DB2 9.5 that make auditing more flexible and granular. Key points include:
- Database auditing now has separate instance and database levels for more flexibility and separation of duties.
- New auditing categories like EXECUTE allow auditing just SQL statements instead of entire operation contexts.
- Audit policies are used at the database level instead of the old db2audit commands. Policies are created and assigned to objects by SECADMs.
- Instance level auditing is still done with db2audit commands by SYSADMs, while database level uses stored procedures delegated by SECADMs.
- The new
The document discusses various DB2 recovery options including backup and restore, the recovery process model, important recovery-related system files, advanced copy services, and transportable schemas. It provides examples of the backup and restore process models and describes key DB2 recovery-related files. It also outlines the scripted interface for advanced copy services backup and differences between DB2 versions 9.7 and 10.1 related to advanced copy services.
This document discusses DB2 backup and recovery. It covers logging, different backup types including full, incremental, and delta backups. It also discusses performing backups offline and online. The document describes how to check backup history and image consistency. Recovery types like crash, version, and roll-forward recovery are explained. Commands for restarting, restoring, and recovering databases are provided. The appendix includes links for more information on backup, restore, and roll-forward commands.
Practical Recipes for Daily DBA Activities using DB2 9 and 10 for z/OSCuneyt Goksu
This document discusses several practical DBA activities in DB2 9 and 10 for z/OS including recovering from accidentally dropping a table, defining a trusted context for security, including columns in indexes for performance, creating indexes on expressions, and using MAXTEMP_RID in version 10 for performance. Steps are provided for recovering a dropped table using log records, archive logs, and VSAM copy techniques. Trusted contexts are introduced for efficiently switching users without credentials. Including columns in indexes and new features in version 10 like MAXTEMP_RID are highlighted for potential performance improvements.
DB2 is a relational database developed by IBM that supports SQL and the relational model. It has various editions including Advanced Enterprise Server Edition and Express Edition. DB2 uses a multi-tier architecture with components like SSAS, DBAS, and IRLM. It manages data through logical objects like tables and physical objects like tablespaces and databases. Tables are stored in tablespaces which are contained within databases. DB2 supports data types, null values, indexes, and referential integrity through primary keys, unique keys, and foreign keys to link tables.
"Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 350 (or) INR 21000
Number of Hours: 30-35 hours
Regards,
Karthik
www.etraining.guru
This document discusses the relationship between DB2 and storage management. It describes how DB2 uses storage through tablespaces, indexes, and other objects that are stored on disk as VSAM data sets. It also discusses how DB2 interacts with DFSMS to manage data sets and how storage groups and SMS can be used to simplify storage administration for DB2 objects. While DB2 provides storage management features, there is still a gap between DBA and storage administration that tools can help address.
This document provides an overview of using DB2 on IBM mainframe systems. It discusses logging into TSO, allocating datasets for DB2 use, using the SPUFI tool to interactively execute SQL statements against DB2, and some key DB2 concepts like logical unit of work and the different views that programs and the system have of the DB2 environment.
This PPT File, helps with the Basic Interview Questions specially for DataBase Domain.. For more questions , please log in to www.rekruitin.com
By ReKruiTIn.com
Solving the DB2 LUW Administration DilemmaRandy Goering
As a DB2 LUW Database Administrator you are probably reluctant to or prohibited from granting your users* these permissions because doing so gives them permission to other DB2 administrations tasks like stopping the database. If your users are not allowed to do these tasks then who is? Most likely, you, as the DBA will perform these and other administrative functions for your users. Would you like a way to eliminate these tasks from your daily to-do list? This presentation will discuss how to externalize specific administrative tasks with Stored Procedures, Federated procedures, Administrative SQL routines, and views.
The document discusses DB2 architecture and concepts. It explains that each DB2 installation has a Database Administration Server (DAS) that provides remote administration support. It also discusses the DB2 Profile Registry, which stores configurable settings. The document then covers the instance concept, noting that an instance is a set of processes, disk, and memory allocations that provide database services and can contain one or more databases.
This document discusses various DB2 database objects and utilities. It provides descriptions of storage groups, databases, tablespaces, tables, indexes, views, and the utilities for unload, load, reorganization, running statistics, and copy. It includes examples of creating and using these objects and utilities.
The document is a presentation on IBM's DB2 database software. It contains:
1) An overview of the DB2 product family and add-on products.
2) Descriptions of DB2 administrative programs, table spaces, constraints, and data types.
3) Explanations of instances and databases, controlling authorities, and the development center.
4) Details about the backup wizard, failure detection and recovery, and a comparison to Oracle's database software.
This document provides an overview of Oracle database history, architecture, components, and terminology. It discusses:
- Oracle's release history from 1978 to present.
- The physical and logical structures that make up an Oracle database, including data files, control files, redo logs, tablespaces, segments, and blocks.
- The Oracle instance and its memory components like the SGA and PGA. It describes the various background processes.
- How clients connect to Oracle using the listener, tnsnames.ora file, and naming resolution.
- Common Oracle tools for accessing and managing databases like SQLPlus, SQL Developer, and views for monitoring databases.
The document provides an overview of basic concepts related to SQL server databases including database objects, file systems, storage structures, and query processing. It discusses topics like SQL server databases, storage files and file groups, data pages and extents, data organization in heaps vs indexed tables, and how queries are processed through either full table scans or using indexes.
Contains information about the DB2 DSNZPARM that forms the DB2 configuration parameters. All about the different types of zPARMs. A way to update them dynamically.
- The document discusses Oracle Data Guard, which is Oracle's disaster recovery solution that automates the creation and maintenance of transactionally consistent standby copies of a primary database.
- Data Guard helps protect data by taking the primary database data and automatically replicating it to one or more standby databases. This allows for failover to a standby if the primary fails.
- There are three types of standby databases: physical standby databases which are block-for-block identical copies, and logical standby databases which transform redo logs into SQL for application.
- Data Guard provides switchover and failover capabilities for planned and unplanned outages, respectively, to transition the primary role to a standby without
A First Look at the DB2 10 DSNZPARM ChangesWillie Favero
This document discusses changes to DB2 subsystem parameter module (DSNZPARM) in DB2 10. It provides information on DSNZPARM macros, how parameters can be changed through installation panels or dynamically using -SET SYSPARM command, and differences between hidden, opaque and visible parameters. The document also introduces new documentation for opaque parameters and explains how to display current DSNZPARM settings using sample program DSN8ED7.
I Didn't Know You Could Do That with zOS.pdfMarna Walle
1. The document discusses several new and updated features in recent z/OS releases: controlling GDGE maximum limits, using z/OS UNIX commands on MVS data sets, sending redacted dumps from z/OSMF Incident Log using Data Privacy for Diagnostics, installing individual products using z/OSMF portable software instances, viewing SNA application activity via the Function Registry, managing resource shortages with JES2's Emergency Subsystem, and a planned z/OS UUID capability.
2. The topics provide insights into system usage and improvements for problem diagnosis, software management, and urgent system tasks.
3. Users can benefit from these features to better understand their systems, install software easily, and respond to
The document provides an overview of DB2 security features including authorization, authentication, LBAC, RCAC, backup and recovery, data encryption, trusted contexts, and InfoSphere data replication. It discusses authorization at the instance, database, and object levels and covers row and column access controls. The document also outlines different data encryption options in DB2, backup approaches, and trusted connections. It concludes with references for further information.
This document provides an overview of the DB2DART tool and examples of how it can be used to analyze and repair issues with DB2 databases and tables. Key points include:
- DB2DART is an offline tool that can be used to check the architectural correctness of databases and investigate problems like data corruption.
- It allows inspection of entire databases, specific tablespaces, tables, and indexes. Examples demonstrate using it to check for index corruption and reduce high water marks.
- The document shows the command syntax and provides a sample report output. It also provides steps to use DB2DART to export table data in delimited format when the original data is corrupted.
DB2 is a database manager that runs on Linux, Unix, and Windows operating systems. It allows users to catalog databases, start and stop instances, and configure parameters. Key commands for managing DB2 include db2icrt for creating instances, db2idrop for dropping instances, db2ilist for listing instances, and db2set for setting configuration parameters at the global, instance, and node level. The db2set command provides centralized control over environmental variables.
Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA in Hyderabad by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 300 (or) INR 18000
Number of Hours: 30 hours
If there is any opportunity, we will be very happy to serve you. Appreciate if you can explore other training opportunities in our website as well.
We can be reachable at info@etraining.guru (or) 91-996-669-2446 for any further info/details.
Regards,
Karthik
www.etraining.guru"
"Title: Online Training in IBM DB2 LUW/UDB DBA in Hyderabad (www.etraining.guru)
Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA in Hyderabad by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 300 (or) INR 18000
Number of Hours: 30 hours
If there is any opportunity, we will be very happy to serve you. Appreciate if you can explore other training opportunities in our website as well.
We can be reachable at info@etraining.guru (or) 91-996-669-2446 for any further info/details.
Regards,
Karthik
www.etraining.guru"
Practical Recipes for Daily DBA Activities using DB2 9 and 10 for z/OSCuneyt Goksu
This document discusses several practical DBA activities in DB2 9 and 10 for z/OS including recovering from accidentally dropping a table, defining a trusted context for security, including columns in indexes for performance, creating indexes on expressions, and using MAXTEMP_RID in version 10 for performance. Steps are provided for recovering a dropped table using log records, archive logs, and VSAM copy techniques. Trusted contexts are introduced for efficiently switching users without credentials. Including columns in indexes and new features in version 10 like MAXTEMP_RID are highlighted for potential performance improvements.
DB2 is a relational database developed by IBM that supports SQL and the relational model. It has various editions including Advanced Enterprise Server Edition and Express Edition. DB2 uses a multi-tier architecture with components like SSAS, DBAS, and IRLM. It manages data through logical objects like tables and physical objects like tablespaces and databases. Tables are stored in tablespaces which are contained within databases. DB2 supports data types, null values, indexes, and referential integrity through primary keys, unique keys, and foreign keys to link tables.
"Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 350 (or) INR 21000
Number of Hours: 30-35 hours
Regards,
Karthik
www.etraining.guru
This document discusses the relationship between DB2 and storage management. It describes how DB2 uses storage through tablespaces, indexes, and other objects that are stored on disk as VSAM data sets. It also discusses how DB2 interacts with DFSMS to manage data sets and how storage groups and SMS can be used to simplify storage administration for DB2 objects. While DB2 provides storage management features, there is still a gap between DBA and storage administration that tools can help address.
This document provides an overview of using DB2 on IBM mainframe systems. It discusses logging into TSO, allocating datasets for DB2 use, using the SPUFI tool to interactively execute SQL statements against DB2, and some key DB2 concepts like logical unit of work and the different views that programs and the system have of the DB2 environment.
This PPT File, helps with the Basic Interview Questions specially for DataBase Domain.. For more questions , please log in to www.rekruitin.com
By ReKruiTIn.com
Solving the DB2 LUW Administration DilemmaRandy Goering
As a DB2 LUW Database Administrator you are probably reluctant to or prohibited from granting your users* these permissions because doing so gives them permission to other DB2 administrations tasks like stopping the database. If your users are not allowed to do these tasks then who is? Most likely, you, as the DBA will perform these and other administrative functions for your users. Would you like a way to eliminate these tasks from your daily to-do list? This presentation will discuss how to externalize specific administrative tasks with Stored Procedures, Federated procedures, Administrative SQL routines, and views.
The document discusses DB2 architecture and concepts. It explains that each DB2 installation has a Database Administration Server (DAS) that provides remote administration support. It also discusses the DB2 Profile Registry, which stores configurable settings. The document then covers the instance concept, noting that an instance is a set of processes, disk, and memory allocations that provide database services and can contain one or more databases.
This document discusses various DB2 database objects and utilities. It provides descriptions of storage groups, databases, tablespaces, tables, indexes, views, and the utilities for unload, load, reorganization, running statistics, and copy. It includes examples of creating and using these objects and utilities.
The document is a presentation on IBM's DB2 database software. It contains:
1) An overview of the DB2 product family and add-on products.
2) Descriptions of DB2 administrative programs, table spaces, constraints, and data types.
3) Explanations of instances and databases, controlling authorities, and the development center.
4) Details about the backup wizard, failure detection and recovery, and a comparison to Oracle's database software.
This document provides an overview of Oracle database history, architecture, components, and terminology. It discusses:
- Oracle's release history from 1978 to present.
- The physical and logical structures that make up an Oracle database, including data files, control files, redo logs, tablespaces, segments, and blocks.
- The Oracle instance and its memory components like the SGA and PGA. It describes the various background processes.
- How clients connect to Oracle using the listener, tnsnames.ora file, and naming resolution.
- Common Oracle tools for accessing and managing databases like SQLPlus, SQL Developer, and views for monitoring databases.
The document provides an overview of basic concepts related to SQL server databases including database objects, file systems, storage structures, and query processing. It discusses topics like SQL server databases, storage files and file groups, data pages and extents, data organization in heaps vs indexed tables, and how queries are processed through either full table scans or using indexes.
Contains information about the DB2 DSNZPARM that forms the DB2 configuration parameters. All about the different types of zPARMs. A way to update them dynamically.
- The document discusses Oracle Data Guard, which is Oracle's disaster recovery solution that automates the creation and maintenance of transactionally consistent standby copies of a primary database.
- Data Guard helps protect data by taking the primary database data and automatically replicating it to one or more standby databases. This allows for failover to a standby if the primary fails.
- There are three types of standby databases: physical standby databases which are block-for-block identical copies, and logical standby databases which transform redo logs into SQL for application.
- Data Guard provides switchover and failover capabilities for planned and unplanned outages, respectively, to transition the primary role to a standby without
A First Look at the DB2 10 DSNZPARM ChangesWillie Favero
This document discusses changes to DB2 subsystem parameter module (DSNZPARM) in DB2 10. It provides information on DSNZPARM macros, how parameters can be changed through installation panels or dynamically using -SET SYSPARM command, and differences between hidden, opaque and visible parameters. The document also introduces new documentation for opaque parameters and explains how to display current DSNZPARM settings using sample program DSN8ED7.
I Didn't Know You Could Do That with zOS.pdfMarna Walle
1. The document discusses several new and updated features in recent z/OS releases: controlling GDGE maximum limits, using z/OS UNIX commands on MVS data sets, sending redacted dumps from z/OSMF Incident Log using Data Privacy for Diagnostics, installing individual products using z/OSMF portable software instances, viewing SNA application activity via the Function Registry, managing resource shortages with JES2's Emergency Subsystem, and a planned z/OS UUID capability.
2. The topics provide insights into system usage and improvements for problem diagnosis, software management, and urgent system tasks.
3. Users can benefit from these features to better understand their systems, install software easily, and respond to
The document provides an overview of DB2 security features including authorization, authentication, LBAC, RCAC, backup and recovery, data encryption, trusted contexts, and InfoSphere data replication. It discusses authorization at the instance, database, and object levels and covers row and column access controls. The document also outlines different data encryption options in DB2, backup approaches, and trusted connections. It concludes with references for further information.
This document provides an overview of the DB2DART tool and examples of how it can be used to analyze and repair issues with DB2 databases and tables. Key points include:
- DB2DART is an offline tool that can be used to check the architectural correctness of databases and investigate problems like data corruption.
- It allows inspection of entire databases, specific tablespaces, tables, and indexes. Examples demonstrate using it to check for index corruption and reduce high water marks.
- The document shows the command syntax and provides a sample report output. It also provides steps to use DB2DART to export table data in delimited format when the original data is corrupted.
DB2 is a database manager that runs on Linux, Unix, and Windows operating systems. It allows users to catalog databases, start and stop instances, and configure parameters. Key commands for managing DB2 include db2icrt for creating instances, db2idrop for dropping instances, db2ilist for listing instances, and db2set for setting configuration parameters at the global, instance, and node level. The db2set command provides centralized control over environmental variables.
Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA in Hyderabad by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 300 (or) INR 18000
Number of Hours: 30 hours
If there is any opportunity, we will be very happy to serve you. Appreciate if you can explore other training opportunities in our website as well.
We can be reachable at info@etraining.guru (or) 91-996-669-2446 for any further info/details.
Regards,
Karthik
www.etraining.guru"
"Title: Online Training in IBM DB2 LUW/UDB DBA in Hyderabad (www.etraining.guru)
Dear Students,
Greetings from www.etraining.guru
We provide BEST online training for IBM DB2 LUW/UDB DBA in Hyderabad by a database architect. Our DB2 Trainer comes with a working experience of 11+ years, 9+ years in DB2 and a DB2 certified professional.
DB2 LUW DBA Course Content: http://www.etraining.guru/course/dba/online-training-db2-luw-udb-dba
Course Cost: USD 300 (or) INR 18000
Number of Hours: 30 hours
If there is any opportunity, we will be very happy to serve you. Appreciate if you can explore other training opportunities in our website as well.
We can be reachable at info@etraining.guru (or) 91-996-669-2446 for any further info/details.
Regards,
Karthik
www.etraining.guru"
DB2 is a database manager that runs on Linux, Unix, and Windows operating systems. It allows users to catalog databases, start and stop instances, and configure parameters. Key commands for managing DB2 include db2icrt for creating instances, db2idrop for dropping instances, db2ilist for listing instances, and db2set for setting configuration parameters. The db2set command allows centralized control of environment variables for the global, instance, and node registry profiles in DB2.
The document discusses various database backup, restore, load, and import utilities in DB2. It provides information on taking full and table space backups online and offline, restoring from backups, and loading and importing data. Backup options include incremental and delta backups. The load utility loads data in four phases and supports restarting failed loads. The import utility inserts data from files into tables and supports restarting failed imports.
This document provides an overview of the DB2 10.1 Basic Database Administration Workshop for Linux, Unix and Windows. It introduces the instructor, Iqbal Goralwalla, who has extensive experience developing and working with DB2. The document discusses DB2 editions and key features, tools replaced in DB2 10 like Control Center, the new IBM Data Studio tool, and the DB2 instance and process models.
The document discusses new features in Informix 11.70, including:
- Table and storage space defragmentation tools to improve performance.
- Enhancements to storage space administration through utilities to generate schemas and commands.
- Tools for deploying and embedding Informix instances through the Deployment Assistant and Utility.
- Increased usability through features like automatic DBA procedures, table location, and event alarms.
Informix User Group France - 30/11/2010 - Fonctionalités IDS 11.7Nicolas Desachy
Informix 11.70 includes several new features to improve administration, performance, and availability. Key features include:
1) A table defragmenter (OLTR) that can reorganize tables online with no downtime.
2) Enhancements to storage provisioning and the ability to generate schemas for dbspaces, chunks, and logs.
3) An embeddability toolkit including a deployment assistant and utility to rapidly deploy packaged Informix instances.
4) Performance improvements such as forest of trees indexing, multi-index scans, and fragment-level statistics.
The document discusses High Availability Disaster Recovery (HADR) in DB2. It describes how HADR uses log shipping to replicate transactions from a primary database to a standby database. HADR supports three synchronization modes - SYNC, NearSync and Async - which determine how transaction logs are replicated. The document provides steps for setting up and configuring HADR, including required database parameters. It also discusses using reorgchk and runstats utilities to check for table/index reorganization needs and update database statistics.
The document discusses two DB2 utilities: db2top and db2pd. Db2top allows users to take periodic snapshots of the system and identify any problems during a period of time. Db2pd provides options to display information about transactions, table spaces, statistics, and configurations for monitoring and troubleshooting databases. It can be used to show operating system information, instance details, and details of a specific database.
This document discusses IBM DB2 9 security. It covers authentication types that control where user passwords are verified, such as at the client or server. It also discusses authorities like SYSADM, SYSCTRL, and DBADM that control administrative privileges and database access. The document defines database privileges for actions like connecting to a database or creating tables.
DB2 pureScale provides high availability and continuous operations by automatically recovering from component failures through workload redistribution and fast in-flight transaction recovery. It protects databases by balancing workloads across nodes and uses duplexed secondary components to tolerate multiple simultaneous node failures while keeping other nodes online and services available.
This document provides instructions for installing and upgrading DB2 Express-C. For a new installation, review system requirements, download the image, and run the setup or installation script. For upgrades, uninstall the old version and install the new version. When upgrading the free version, back up data, export the configuration profile, uninstall the old version, install the new version, and import the saved configuration profile.
Ibm db2 10.5 for linux, unix, and windows getting started with db2 installa...bupbechanhgmail
This document provides instructions for installing and configuring IBM DB2 10.5 on Linux and Windows systems. It covers prerequisites such as disk space and memory requirements. It also provides step-by-step instructions for installing DB2 using the Setup wizard on both Windows and Linux. Additional sections describe verifying the installation, configuring licensing, and includes appendices on tasks like uninstalling DB2, checking for updates and applying fix packs.
Must Read HP Data Protector Interview QuestionsLaxman J
This Tutorial especially collected for who searching for Exact Interview Question - Must Read HP Data Protector Interview Questions. Chec more Details at - <a>Dealdimer</a>
<a>Technical Help</a>
This document discusses database transaction logging and concurrency control in DB2. It covers topics such as locks, isolation levels, deadlocks, snapshots, and transaction logging. It provides information on DB2's use of row-level and table-level locks, lock modes, lock escalation, lock monitoring using snapshots, and the two logging methods of circular logging and archival logging.
Introduction to MariaDB. Covers the history of Structured Query language, MySQL and MariaDB, shows how to install on Windows, Mac or Linux desktop, and practical examples.
This document provides an overview of MySQL for Oracle DBAs, covering topics such as MySQL architecture, backup and recovery strategies, managing space and tables, and connecting MySQL to Oracle. The key points discussed include MySQL's product architecture and internal memory structures, filesystem layout for binaries, data and log files, InnoDB and MyISAM storage engines for managing space, and using tools like mysqldump, mysqlhotcopy, and mysqlbinlog for backups and point-in-time recovery.
Bp307 Practical Solutions for Connections Administrators, tips and scrips for...Sharon James
This document provides an agenda and overview for a presentation on practical solutions and scripts for Connections administrators. The presentation covers topics like installing and configuring IBM WebSphere, DB2, and IBM HTTP Server; performance tuning datasources; setting J2EE security roles; configuring JVM log files and heap sizes; using mod_deflate to improve performance; and scripts for common administrative tasks like checking user IDs, activating/deactivating users, syncing user data, managing file policies, database maintenance, and backups. Demo scripts are provided for many of the tasks.
This presentation will discuss DB2 UDB Fundamentals.
The presentation will cover the DB2 UDB for the Distributed Platforms and basic database administration. From starting DB2 versions are listed below:
3.4 (Code web), 8.1,8.2 (Stinger) , 9.1 (Viper), 9.5 (Viper2) , 9.7 (Cobra), 9.8 (added feature with pure scale) , 10.1 (Galileo), 10.5 (Capler)
DB2 Personal Edition is a standalone database system. A user can only connect to the database server, when on the server. It is a full function database. No one can connect remotely to the database.
DB2 UDB Express Edition is IBM’s lowest price fully functional relational database.
DB2 UDB Workgroup Server Edition is the relational database server of choice for deployment in a departmental or workgroup or medium-sized business environment that has a reasonable number of internal users. WSE is licensed on a per-user model, designed to provide an attractive price point for medium-size installations while providing a full-function relational database server. DB2 WSE can be deployed in Linux, UNIX, and Windows server environments on systems with up to four CPUs. DB2 Workgroup Server Unlimited Edition offers a per-processor licensing model for relational database deployment in a departmental or workgroup or medium-sized business environment that has Internet users or number of users that makes per-processor licensing more attractive than the WSE per-user licensing model. DB2 WSUE can be deployed in Linux, UNIX, and Windows environments on systems with up to four CPUs. DB2 UDB Enterprise Server Edition has the option of the Data Partitioning Feature. This the parallel edition feature. DB2 UDB Enterprise Server Edition may scale up to 999 processors. DB2 UDB Enterprise Server Edition for Linux may scale up to 1024 processors.
DB2 UDB Personal Developer Edition enables a developer to be able to create applications. Includes DB2 Connect personal edition, DB2 Personal Edition, IBM Developer Kit (Java Technology),DB2 Net Search Extender, DB2 Spatial Extender.
An instance manages one or more databases. Multiple instances may be place on a server. The normal reason for more than one instance
is for performance and security. If running the Data Partition Feature (DPF), you should have one instance per database.
When installing on Windows a database instance named DB2 will be created. On UNIX the db2setup –install will create a database instance.
An instance may managed one or more databases. A database may only be associated with one instance.
The command db2ilist will list all the instances on a server.
CREATE DATABASE MUSICKEG is the command to create a DB2 UDB V8.2 database.
A table space is the logical layer between the database and the disk drive.
The table spaces created, when the database is created are: SYSCATSPACE, TEMPSPACE1 and USERSPACE1.
System catalog tables are created in the table space SYSCATSPACE.
TEMPSPACE is used for sorting (if the sorted data does not fit into sort heap).
When a database is created, the system catalog tables with the schema name SYSIBM. The views of the system catalog tables will be created with the schema name SYSCAT. Certain system catalog table information may be updated. The views that may be updated have the schema name of SYSSTAT.
If you specify the alias name, the user will use that alias name for the connect statement. The database configuration file is created when the database is created. The table spaces SYSCATSPACE, TEMPSPACE1 and USERSPACE1 are created.
The system catalog tables are created.
There are two types of table space management systems: Database and System. System managed table space is easier to maintain. Database managed space is slightly faster than System managed space when adding data to a table. The reason is that DMS table space will format data pages in advance. SMS managed space has significant performance improvements in DB2 UDB V8.1. SMS table space will acquire an extent at time on DB2 V8.1, where on previous release DB2 UDB obtained 1 page at a time.
If you use SMS table space, the entire table must exist in the one table space.
If you use DMS table space, the table may have the data portion in one table space, the index in a second table space and the large object portion in a third table space.
Table space definition will set the page size. The default page size is 4K. Page sizes can be 4K, 8K, 16K and 32K.
The maximum number of rows on a page is 255 rows. This is significant, if you have small row sizes.
A table space may contain up to 64 GB of data, if the page size is 4K.
Table spaces may be managed by System requires a directory. The directory will be created.
Table spaces managed by Database requires a file or raw device.
The table space named TS1 is an SMS table space. If the directory does not exist, it will be created.
The table space named DMS01D is a DMS table space. Data will be placed in a file.
From the DB2 Command Line Processor the create table command is preceded by “db2”. Notice that on the Large Object columns BIO and PICTURE the NOT LOGGED option is used. If the column is updated, the update is not logged. This will save space on the log file. The table is divided over three table spaces. The data portion of the table is placed in the table space DMS01D. The index portion of the table spaces is placed in the table space DMS01I. The Large Object portion of the table space is placed in the table space DMS01L.
A table may only be place in multiple table spaces, if the table spaces are DMS (Database Managed Space).
A table may only be a total size 128GB. If you use the page size of 8K.
If table is placed into a table space with 4K page size, the maximum size of the table is 64GB.
You may only have 255 rows per page.
The script file will contain the create table statement.
The option –tvf indicate –t terminate SQL statement when a semicolon is found.
-v verbose echo the command to the terminal.
-f use the following file
If you need any other options, issue the command: db2 ? Options
The describe command will display the table characteristics. The describe command is able to show the index characteristics.
db2 describe indexes for table table-name.
In this case there are two indexes. PK_ARTISTS is an index that was created for primary key definition and the index ARTISTS_COMPANY_IX, which allows for duplicate keys.
Populating data into tables. IMPORT inserts data into tables.
LOAD utility used for loading large amounts of data is faster than the IMPORT utility.
Export utility moves data from a table to a flat file.
db2move is a utility that may move many tables at the same time.
The Import utility will take the data from a flat file and place it into table. Inserts will be used to place the data into the table.
The inserts will be logged. Triggers, if they exist, will be executed. DB2 UDB V8.2 will allow Online IMPORT. This means that users may access the table, while the IMPORT utility is running.
The IMPORT utility will insert data into a table.
The format of the input file is IXF (PC/Integrated Exchange format) used by DB2 only.
DEL indicates a delimited ASCII format. The columns will be delimited by a comma. Character columns will be delimited by a double quote mark.
ASC indicates an ASCII file with a column beginning and ending position of the data. If you use the ASC file type the METHOD L must be used to state the beginning and ending position.
Example:
IMPORT FROM ARTISTS.DAT OF ASC LOBS FROM C:\LOBS\ MODIFIED BY LOBSINFILE
METHOD L ( 40 43, 1 39, 50 69, 70 83, 84 98) MESSAGES IMPORT_ARTISTS.MSG
INSERT INTO ARTISTS
Export data from a table(s) and place data into file. With the Export utility you can take data from more than one table. Any valid SELECT statement may be used. The SELECT statement may even be JOIN.
The 4 phases from load.
The Load command is used for placing large amounts of data into the table.
When using the load command, exception tables should be created. The exception tables are identical to the original table. The exception table may have two additional columns: TS (Timestamp) and MSG (CLOB 32K).
If you do not have an exception table and a row violates referential integrity, the LOAD will fail.
Note: If you are running the DPF (Data Partitioning Feature), the exception table must be in the same partitions as the original table.
The LOAD utility supports using a cursor. This is a way to load data from tables that do not exist in the database. The nickname is a federated database concept. The nickname will refer to table in a separate database. The federated database concept allows access to non-IBM database stores.
db2move is the Database Movement Tool.
db2move is a tool that allows the DBA to copy a large number of tables using one command. Tables will be exported in the PC/IXF format. The tables can be imported and exported into another DB2 database.
The db2move tool will create a db2move.lst file that will contain the table name resolution file.
Each table will have an tab.ixf file associated with the table data.
db2move can export only the tables with a specific schema name, table name, or who created the table. The db2move can also import the tables. If the table does not exist, the db2move utility is able to create the table if the import is done.
The Control Center is the major GUI (Graphical User Interface). In this case create a database using the Control Center. All Databases -&gt; Create Database -&gt; Standard
The Control Center can be used to managed a database server on a UNIX, LINUX, Windows and z/OS platforms.
Decide what system to place the database. Give the database a name. Database name can be up to 8 characters.
Table space TS1 is managed by the system so a directory “\sms\musickeg\ts1” will be created. Table space DMS01D is managed by the database so a file of 161 4K pages will be used. The table space DMS01I will be managed by the database and a file of 48 pages will be created.
Creating a table space using the Control Center. Open the Control Center. Expand the tree for the database you want to create the table space. In this case let us use the database MUSICKEG. Select the “+” to left of the database.
Create a new table space. Select the Table Space with the RMB (Right Mouse Button).
Give the table space a name.
The type of a table space will be chosen.
A regular table space is used to contain data.
A Large table space may be used to contain Large Objects and index data.
System Temporary table space is used for maintaining sorting data or joined data.
User Temporary table space for creating temporary tables.
The creating of the table space allows you to either use SMS (System Managed Space) or DMS (Database Managed Space). SMS allows a pages to be allocated as needed. DMS has a specific predefined limit. If the DMS table space becomes full. no more pages can be allocated until the DBA (Database Administrator) increases the size of a table space. (This will be covered in detail later in the presentation.)
At this point the size of the table space can be specified and the location of the table space containers.
The Command Editor is used to issue interactive commands. The Command Editor can also be used to run the Visual Explain tool to see the access path.
The Visual Explain tool may be invoked from the Command Editor, Control Center or Activity Monitor. Let’s take a simple query from the Command Editor.
SELECT NAME, TITLE, TITLES.COMPANY, YEAR
FROM ARTISTS, TITLES
WHERE ARTISTS.ARTNO = TITLES.ARTNO
AND NAME LIKE ‘Ra%’
ORDER BY NAME;
In this particular case no indexes were used. Table scans were executed on the table TITLES and ARTISTS.
Added an index on the NAME column of the ARTISTS table. Notice a diamond shows above the ARTISTS table. This indicates an index is being used on the ARTISTS table. The timeron cost has decreased from the previous query.
Rectangles indicate a table. Diamond indicates an index is being used.
Task Center is used to schedule tasks. This is very effective in setting up DBA tasks that require continuous running of the job. For example tasks that might be considered for the Task Center might be: REORGANIZATION of tables, running statistics for a table, online backup of a database.
The Journal shows certain activities that have been run against the databases. From the Journal the DBA can see the status of jobs run from the Task Center.
When the database is started, either by the first connect or using the “ACTIVATE DATABASE” command, the primary log files are allocated. The number of primary logs is defined by the database configuration parameter LOGPRIMARY. When LOGRETAIN = NO (Database Configuration parameter) and the primary log files are full, the secondary log files will be allocated.
LOGPRIMARY indicates the number of log files that will be allocated when the database starts.
LOGSECOND indicates the maximum number of secondary log files that can be allocated. If you set LOGSECOND to a -1, an infinite number of secondary log files can be allocated.
When LOGRETAIN = RECOVERY, log files are maintained. When the primary log files are used, additional log files will be created.
Backup in DB2 UDB V8.2 will allow the logs to backed up at the same time as the database. You may only include the logs only in an online backup.
BACKUP DB database-name ONLINE to c:\backup INCLUDE LOGS
This command will include the log files with the backup.
If LOGRETAIN=NO, you may only do offline backups.
Offline backup no one can access the database during a backup.
Online backup will allow users to be accessing the database at the time the backup is executing.
If LOGRETAIN=RECOVERY, a table space(s) may be recovered from a full database backup.
When the restore is finished, the database is left in a roll forward pending state. If the database configuration parameter LOGRETAIN = RECOVERY, the DBA (database administrator) may recover the database to a point in time.
The RECOVER DATABASE command combines both RESTORE DATABASE and ROLLFORWARD DATABASE commands.
HADR allows for a standby database. The standby database is used, if the primary database is unavailable. The clients will be automatically rerouted to the standby database. To invoke the HADR feature update the database configuration. If the standby database does not hear from the primary database is 120 seconds (default), the standby database takes over.
HADR is not available with the DPF (Data Partitioning Feature)
Let us cover a few simple performance and tuning options of using DB2.
The Configuration Advisor allows the DBA to answer several questions. DB2 UDB will then set the configuration parameters.
As with any performance configuration parameters your performance improvement may vary.
Each person has there own personal preferences.
There is one default buffer pool. The buffer pool is named IBMDEFAULTBP and is 250 4K pages on a Windows operating system and 1000 4K pages on a UNIX operating system. When page is requested, DB2 will search the buffer pool first. If the page is not in the buffer pool, DB2 will issue a physical I/O request. Therefore it is imperative to keep pages, that are needed in the buffer pool.
Suggestion: In an OLTP (Online Transaction Processing ) environment you would want high impact tables in a buffer pool by itself. For DSS (Decision Support Systems) one large buffer pool should suffice.
The command “GET SNAPSHOT FOR TABLES ON database” will produce what tables are accessed the most.
If you change page sizes from the default 4K page, make sure that a buffer pool is made with the same size.
A logical read occurs when DB2 attempts to find a page in the buffer pool. A physical read occurs, when the page requested is not in the buffer pool.
It is probably better to keep sort data in memory. Sort overflows indicate data to be sorted did not fit in memory.
The command “GET SNAPSHOT FOR ALL ON database” will show how many sort overflows have occurred.
The database configuration parameter SORTHEAP should be adjusted to eliminate a number of the sort heaps.
If the SORTHEAP is not big enough, DB2 will overflow the sort into TEMPSPACE. Note: If you change a page size from the default size of 4K, you must also create TEMPORARY table space of that size.
A dynamic SQL statement is executed. The database manager will verify if the statement is in package cache (package cache lookup). If the SQL statement is not in package cache, the statement is compiled and placed in package cache (package cache insert). If there are no sections available in package cache, a package cache overflow will occur.
When package cache overflows, it expands dynamically.
You may flush package cache with the command:
FLUSH PACKAGE CACHE DYNAMIC
Package cache is allocated at database start up time. Look for the database parameter PCKCACHESZ (it is a calculated value of MAXAPPLS * 8).
By default a row is locked. The LOCKLIST is number of 4K pages, that will hold all the lock request blocks. MAXLOCKS determines the percentage of locklist that 1 user may hold. If this percentage is exceeded, the lock request blocks will updated into one table lock. Lock escalation normally indicates a problem. Changing the default row level locking for a table to table level, especially if the table is read only is a good idea.
A LOCKWAIT occurs when a user is waiting on an object in the database. This slide shows two users, DBAPOT and ADMIN, waiting for a resource held by user KGARDEN.
From the Control Center select the instance named “DB2” with the RMB (Right Mouse Button). From the pop-up menu select the Applications (menu item). Highlight the user holding the lock and select the command button Show Lock Chains.
The Activity monitor (new to DB2 UDB V8.2) is able to assist in finding the high impact SQL statements.
Visual Explain and the character explain tools are able to show the access path of a single SQL Statement.
The Design Advisor is able to suggest indexes and MQT (Materialized Query Table), that may help in deciding what may improve performance of the SQL statement.
To get to this point
Open the Control Center -&gt; Select the database with the RMB (Right Mouse Button) -&gt; Activity Monitor
Determine the SQL Statement that is causing the problem. In this example select the Report:
Dynamic SQL statements in the cache with the longest average execution time.
From here you can select the SQL Statement and execute Visual Explain.
In this case an index was used for the table TITLES. Notice the diamond above the table DBAPOT.TITLES. This diamond indicates an index is being used. A table scan was run against the tables WAREHOUSE and ARTISTS. DB2 UDB has a cost based optimizer so it is important to have statistics up to date.
If you double click on the tables (rectangle), the table statistics will be displayed.
Notice the STATS_TIME row.
There are many things that may affect performance. These are just a couple of tuning tips.
All these groups should be defined to the operating system. If the group is defined in the operating systems security, any userid in that group has the authority.
The SYSMON_GROUP is new for DB2 UDB V8.1. Users in this group will be able issue GET DATABASE MANAGER MONITOR SWITCHES, GET MONITOR SWITCHES, GET SNAPSHOT, LIST ACTIVE DATABASES, LIST APPLICATIONS, RESET MONITOR SWITCHES and UPDATE MONITOR SWITCHES.
DB2 UDB Administration for the Oracle DBA
For the Distributed Database on Linux, Windows, UNIX. Hands on Labs on Windows workstation.
Date: July 12, 13, 2005 (Tuesday and Wednesday)
Start Time: 09:00 A.M.
End Time: 05:00 P.M.
Location:
IBM Technology Center
8401 Greensboro Drive
McClean, VA 22102
Suite 120 (First Floor)
Customers who would like to attend contact:
Keith E. Gardenhire
e-mail: [email_address]
Phone: (301)803-1717
I am doing a 2 day class DB2 UDB V8.2 for the Oracle DBA. The class will cover
Database Structure
Discuss the differences between DB2 UDB and Oracle RDBMS data structures.
Show what table spaces are created, when a DB2 UDB database is created.
Discuss the database configuration parameters and the difference that Oracle uses for INIT.ORA file.
Labs: Create the SAMPLE and a custom DB2 UDB database
Lecture 1: Command Line Processor
Lab: Using the DB2 Command Line Processor to examine instance and database configuration.
List the tables that exist for a database
Show the column characteristics for a table
Use the Graphical User Interface (GUI) to display database manager configuration parameters and database configuration parameters.
Lecture 2: Database Exploration
Understand the database structure: Table Spaces, tables, indexes and system catalog tables. Discuss Referential Integrity constraints.
Lab: Create the table spaces and tables using the DB2 Command Line Processor. Learn how to use script files to create database objects.
Use the Task Center (GUI) to schedule a job to create the table spaces. If this job is successful, execute a second script to create
tables. This exercise will demonstrate how to create and schedule jobs.
Use the Journal to see the results of a previously executed task.
Alter the tables and add the referential integrity.
Lecture 3: Populate the Database
Discussions on the Import and Load utilities. Discuss the differences between the two utilities.
Lab: Populate the tables created in the previous exercise using the LOAD utility.
Use the SET INTEGRITY command to correct the referential integrity constraint violations.
Lecture 4: Security
Discuss the basic security for DB2 UDB environment. Understand DB2 UDB uses group authority for SYSADM, SYSMAINT and SYSCTRL
authority. A new group in DB2 UDB V8.2 SYSMON has been added. Discuss the reasons that this group is used.
The students will discuss the GRANT and REVOKE authority commands. The implicit security will be discussed.
Lecture 5: Explain
Understand how to use the Visual and character explain tools to help in discovery of SQL statement performance problems.
Lab: Take an SQL statement and determine what might be incorrect with the database structure (index, Materialized Query Tables, etc..),
that is causing a performance problem.
Lecture 6: Automatic maintenance
DB2 UDB V8.2 allows for certain database maintenance be executed automatically. Learn how to have the RUNSTATS (update the table
statistics), REORG (reorganization of a table), and database backups to run automatically.
Lab: Using the Control Center (GUI) to set up a maintenance window and to have the REORG, RUNSTATS and database backup be
executed during this maintenance window.
Lecture 7: Recovery
Discussions on the two types of logging: Circular and Archival modes
Discussions on the two types of database backup: Offline and Online
Recovery modes: Full database recovery, Partial database recovery (table space) and recovery to a point in time
Database Configuration parameters that are used in recover will be discussed.
Lab: Backup a database. Recover the database to a point in time.
Lecture 8: Design Advisor
The Design Advisor is a tool, that will assist the DBA (Database Administrator) in designing the proper database structure.
Discuss how to capture SQL statements and run the SQL statements through the Design Advisor.
Lab: Take 3 complex SQL statements and run through the Design Advisor.
Take the results of the Design Advisor and place in the recommendations into the Task Center to run at a later time.
Execute the Design Advisor using the DB2 Command Line Processor.
Lecture 9: Health Center
The Health Center is a new GUI tool for DB2 UDB V8. The Health Center captures alerts and is designed to send the alert to
a user. Alerts can be set up by the DBA (Database Administrator) to be customize for a particular situation.
Lab: Modify the alter configuration parameters to capture warnings when a table space gets to be 60 percent full.
Modify the alter configuration parameters to capture errorss when a table space gets to be 70 percent full.
Update the database manager configuration file to start the Health monitor.
Lecture 10: Using the Activity Monitor
The Activity Monitor, which is new for DB2 UDB V8.2, monitors the dynamic SQL Statements. The lecture will discuss
dynamic versus static SQL statements. We will discuss how to capture SQL statements and generate reports.
Lab: Execute 3 script files that will run 3 SQL statements.
Use the Activity monitor to determine the slowest SQL statement.
Use the Activity monitor to Explain the SQL statement.
Run Statistics on the tables used by the SQL statement (SQL statement is a join) and Explain the SQL statement again
and notice the differences in the total cost to run the SQL Statement.
Create two new indexes and update the statistics on both tables. Run the Explain on the SQL statement and determine
if the performance was improved.
Lecture 11: Stored Procedures.
Discuss the differences between Oracle PL/SQL and DB2 UDB SQL/Procedure Langauge.
Show how to use the DB2 Development Center to create a simple stored procedure.
Learn several SQL/Procedure Language statements.
Discuss the structure of a Stored Procedure.
Learn how to run Stored Procedure Debugger.
Lab: Create a stored procedure, that will show how to build
Basic Stored Procedure Structure
Manage the SQLCODE and SQLSTATE variables
Code the basic EXIT HANDLERS when a row is NOT FOUND.
Define a CURSOR that will manage a result set.
Code a nested FOR LOOP.
Lecture 3: Populate the Database
Discussions on the Import and Load utilities. Discuss the differences between the two utilities.
Lab: Populate the tables created in the previous exercise using the LOAD utility.
Use the SET INTEGRITY command to correct the referential integrity constraint violations.
Lecture 4: Security
Discuss the basic security for DB2 UDB environment. Understand DB2 UDB uses group authority for SYSADM, SYSMAINT and SYSCTRL
authority. A new group in DB2 UDB V8.2 SYSMON has been added. Discuss the reasons that this group is used.
The students will discuss the GRANT and REVOKE authority commands. The implicit security will be discussed.
Lecture 5: Explain
Understand how to use the Visual and character explain tools to help in discovery of SQL statement performance problems.
Lab: Take an SQL statement and determine what might be incorrect with the database structure (index, Materialized Query Tables, etc..),
that is causing a performance problem.
Lecture 6: Automatic maintenance
DB2 UDB V8.2 allows for certain database maintenance be executed automatically. Learn how to have the RUNSTATS (update the table
statistics), REORG (reorganization of a table), and database backups to run automatically.
Lab: Using the Control Center (GUI) to set up a maintenance window and to have the REORG, RUNSTATS and database backup be
executed during this maintenance window.
Lecture 7: Recovery
Discussions on the two types of logging: Circular and Archival modes
Discussions on the two types of database backup: Offline and Online
Recovery modes: Full database recovery, Partial database recovery (table space) and recovery to a point in time
Database Configuration parameters that are used in recover will be discussed.
Lab: Backup a database. Recover the database to a point in time.
Lecture 8: Design Advisor
The Design Advisor is a tool, that will assist the DBA (Database Administrator) in designing the proper database structure.
Discuss how to capture SQL statements and run the SQL statements through the Design Advisor.
Lab: Take 3 complex SQL statements and run through the Design Advisor.
Take the results of the Design Advisor and place in the recommendations into the Task Center to run at a later time.
Execute the Design Advisor using the DB2 Command Line Processor.
Lecture 9: Health Center
The Health Center is a new GUI tool for DB2 UDB V8. The Health Center captures alerts and is designed to send the alert to
a user. Alerts can be set up by the DBA (Database Administrator) to be customize for a particular situation.
Lab: Modify the alter configuration parameters to capture warnings when a table space gets to be 60 percent full.
Modify the alter configuration parameters to capture errorss when a table space gets to be 70 percent full.
Update the database manager configuration file to start the Health monitor.
Lecture 10: Using the Activity Monitor
The Activity Monitor, which is new for DB2 UDB V8.2, monitors the dynamic SQL Statements. The lecture will discuss
dynamic versus static SQL statements. We will discuss how to capture SQL statements and generate reports.
Lab: Execute 3 script files that will run 3 SQL statements.
Use the Activity monitor to determine the slowest SQL statement.
Use the Activity monitor to Explain the SQL statement.
Run Statistics on the tables used by the SQL statement (SQL statement is a join) and Explain the SQL statement again
and notice the differences in the total cost to run the SQL Statement.
Create two new indexes and update the statistics on both tables. Run the Explain on the SQL statement and determine
if the performance was improved.
Lecture 11: Stored Procedures.
Discuss the differences between Oracle PL/SQL and DB2 UDB SQL/Procedure Langauge.
Show how to use the DB2 Development Center to create a simple stored procedure.
Learn several SQL/Procedure Language statements.
Discuss the structure of a Stored Procedure.
Learn how to run Stored Procedure Debugger.
Lab: Create a stored procedure, that will show how to build
Basic Stored Procedure Structure
Manage the SQLCODE and SQLSTATE variables
Code the basic EXIT HANDLERS when a row is NOT FOUND.
Define a CURSOR that will manage a result set.
Code a nested FOR LOOP.