Foreword |
|
xiv | |
Preface |
|
xv | |
Acknowledgments |
|
xvi | |
Introduction |
|
xvii | |
|
Systems Administration Overview |
|
|
1 | (10) |
|
|
1 | (1) |
|
Responsibilities of the Sybase Systems Administrator |
|
|
1 | (6) |
|
Installing the Sybase Adaptive Server |
|
|
2 | (1) |
|
Establishing Connectivity Between Clients and Servers |
|
|
2 | (1) |
|
Installing and Maintaining User Databases |
|
|
3 | (1) |
|
Establishing Security for Adaptive Server Enterprise |
|
|
4 | (1) |
|
Maintaining and Troubleshooting the ASE |
|
|
5 | (1) |
|
Establishing Disaster Recovery Procedures |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (2) |
|
System Tables in Special Uses Databases |
|
|
10 | (1) |
|
Sybase System Stored Procedures |
|
|
10 | (1) |
|
Adaptive Server Installation |
|
|
11 | (20) |
|
|
12 | (3) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Sybase Software Asset Manager |
|
|
14 | (1) |
|
|
15 | (1) |
|
Step 3: Running Installation |
|
|
15 | (8) |
|
|
16 | (2) |
|
|
18 | (2) |
|
|
20 | (1) |
|
servername.cfg --- Server Configuration File |
|
|
20 | (1) |
|
|
20 | (2) |
|
|
22 | (1) |
|
Step 4: Front-End Installation |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (4) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Verifying the Server is Running |
|
|
26 | (2) |
|
|
28 | (3) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (2) |
|
Defining Physical and Sybase-Mirrored Devices to the Server |
|
|
31 | (24) |
|
|
31 | (1) |
|
Logical vs. Physical Devices |
|
|
31 | (1) |
|
|
32 | (1) |
|
Creating and Dropping Devices |
|
|
32 | (5) |
|
Creating Database Devices |
|
|
32 | (3) |
|
|
35 | (1) |
|
Dropping Database Devices |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Device Limitations and Restrictions |
|
|
39 | (1) |
|
|
39 | (1) |
|
Building the Master Device |
|
|
39 | (1) |
|
Mirroring and Volume Management |
|
|
40 | (6) |
|
|
40 | (3) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
Software- and Hardware-Level Mirroring |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (4) |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (5) |
|
|
50 | (5) |
|
|
55 | (16) |
|
|
56 | (2) |
|
Other Sybase-Provided Databases |
|
|
57 | (1) |
|
|
58 | (4) |
|
The create database Command |
|
|
58 | (1) |
|
Who Can Create a Database |
|
|
59 | (1) |
|
Creating a Default Database |
|
|
60 | (1) |
|
Creating Database Logs on Separate Devices |
|
|
61 | (1) |
|
|
62 | (1) |
|
The Alter Database Command |
|
|
63 | (1) |
|
|
63 | (2) |
|
|
65 | (1) |
|
Accessing Database Information |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (3) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (2) |
|
Database Logging and Recovery |
|
|
71 | (16) |
|
|
71 | (7) |
|
|
72 | (1) |
|
|
72 | (1) |
|
Transaction Control Statements |
|
|
73 | (5) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
When the Transaction Log is Full |
|
|
80 | (5) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (38) |
|
|
87 | (1) |
|
Operating System-Level Security |
|
|
88 | (1) |
|
|
88 | (9) |
|
|
89 | (1) |
|
Require Digits in Password |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (3) |
|
|
94 | (1) |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (8) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Information on Users and Aliases |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
System Built-in Functions |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
105 | (17) |
|
|
105 | (2) |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
Fine-Grained Access Control (FGAC) |
|
|
109 | (5) |
|
|
114 | (1) |
|
|
114 | (3) |
|
|
117 | (5) |
|
Integrated Security Overview |
|
|
122 | (1) |
|
|
123 | (2) |
|
|
125 | (18) |
|
|
125 | (1) |
|
|
126 | (1) |
|
The Sybsecurity Database and Tables |
|
|
127 | (3) |
|
Sybsecurity Transaction Log |
|
|
130 | (1) |
|
Sybsecurity Stored Procedures |
|
|
130 | (4) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
Audit Database Storage Requirements |
|
|
134 | (2) |
|
|
136 | (1) |
|
|
137 | (1) |
|
The Audit Table is Full, Help! |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (2) |
|
Auditing Interaction with Third-Party Software |
|
|
141 | (1) |
|
Additional Tips for Effective Auditing |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (28) |
|
Roles and Responsibilities |
|
|
144 | (1) |
|
How Often Should You Back Up a Database? |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (2) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (6) |
|
|
149 | (1) |
|
|
149 | (3) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (2) |
|
Loading a Corrupted Database |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Creating a Database for a Restore |
|
|
156 | (1) |
|
|
157 | (3) |
|
|
158 | (1) |
|
Dump Transaction Activities |
|
|
159 | (1) |
|
|
160 | (1) |
|
Up-to-the-Minute Recovery |
|
|
160 | (2) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
Aborting vs. Suspending Transactions |
|
|
164 | (1) |
|
Restoring the Master Database Step by Step |
|
|
164 | (2) |
|
|
166 | (2) |
|
|
167 | (1) |
|
Database Recovery Scenarios |
|
|
168 | (2) |
|
Answers for the Scenarios |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (12) |
|
|
172 | (1) |
|
|
172 | (3) |
|
|
173 | (1) |
|
Simplifying the Creation of Time Ranges |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (3) |
|
|
176 | (1) |
|
Choosing the Type of Enforcement |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (2) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (2) |
|
|
183 | (12) |
|
What is the Logical Process Manager? |
|
|
183 | (2) |
|
Logical Process Manager Execution Classes |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
Logical Process Manager Objects |
|
|
186 | (1) |
|
Logical Process Manager Procedures |
|
|
186 | (4) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (3) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (2) |
|
Logical Process Manager Conflicts and Precedence |
|
|
193 | (1) |
|
Important Exception to the Precedence Rule |
|
|
194 | (1) |
|
|
194 | (1) |
|
Configuring and Tuning the Server |
|
|
195 | (26) |
|
Pre-12.5 Memory Management |
|
|
195 | (1) |
|
|
196 | (2) |
|
Logical, Physical, and Max Memory |
|
|
196 | (2) |
|
Configuration System Tables |
|
|
198 | (21) |
|
|
199 | (11) |
|
Displaying Configuration Values |
|
|
210 | (1) |
|
|
210 | (5) |
|
Dynamic vs. Static Options |
|
|
215 | (1) |
|
|
216 | (1) |
|
Recommended Configuration Settings |
|
|
217 | (2) |
|
|
219 | (2) |
|
|
221 | (18) |
|
|
221 | (1) |
|
|
221 | (3) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (2) |
|
Results Before Cycling the Server |
|
|
226 | (1) |
|
Results After Cycling the Server |
|
|
226 | (1) |
|
|
227 | (3) |
|
|
227 | (1) |
|
|
228 | (2) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
Retrieving Information on Bindings |
|
|
231 | (1) |
|
Transaction Performance and Named Caches |
|
|
231 | (5) |
|
|
231 | (3) |
|
|
234 | (1) |
|
Benefits of Assigning tempdb to Its Own Data Cache |
|
|
235 | (1) |
|
Creating and Configuring Caches and Pools |
|
|
235 | (1) |
|
Guidelines for Cache Configuration |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (2) |
|
|
239 | (14) |
|
|
239 | (3) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
CIS -- Component Integration Services |
|
|
242 | (6) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
Remote Access Setup Example |
|
|
246 | (1) |
|
Using CIS for Remote Procedure Calls |
|
|
247 | (1) |
|
ASE Variable Page Size Issues |
|
|
248 | (1) |
|
|
249 | (1) |
|
Creating Tables from System Files |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (2) |
|
Preventative Maintenance Regimen |
|
|
253 | (44) |
|
|
253 | (1) |
|
|
253 | (12) |
|
|
254 | (2) |
|
|
256 | (3) |
|
Monitoring the System Errorlog |
|
|
259 | (5) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
Database-Level Maintenance |
|
|
265 | (29) |
|
Scheduling Database Maintenance |
|
|
266 | (1) |
|
|
267 | (9) |
|
Understanding the Output from dbcc Commands |
|
|
276 | (1) |
|
|
277 | (5) |
|
Planning the dbccdb Database |
|
|
282 | (1) |
|
Creating the dbccdb Database |
|
|
282 | (3) |
|
|
285 | (2) |
|
Generating Reports from dbccdb |
|
|
287 | (5) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
Monitoring Space Utilization |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
297 | (30) |
|
The Server Will Not Come Up |
|
|
297 | (1) |
|
Some Users Claim the Server Stopped |
|
|
297 | (1) |
|
Server is Up, but Some Users Cannot Gain Access |
|
|
298 | (1) |
|
Processing Slows Down or Stops |
|
|
298 | (1) |
|
Some Database or Databases Cannot be Accessed |
|
|
298 | (1) |
|
Users Cannot Access Objects |
|
|
299 | (1) |
|
From the Troubleshooting Guide |
|
|
299 | (26) |
|
|
299 | (7) |
|
Avoiding Disaster through Good DBA Practices |
|
|
306 | (4) |
|
Online Recovery and Recovery Fault Isolation |
|
|
310 | (3) |
|
What to Do When Online Recovery Fails |
|
|
313 | (1) |
|
|
313 | (4) |
|
How to Manually Change Sort Order or Default Character Set |
|
|
317 | (5) |
|
|
322 | (3) |
|
|
325 | (2) |
|
|
327 | (6) |
|
|
327 | (2) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (3) |
Appendix A CSPDBA Sample Test |
|
333 | (6) |
Appendix B CSPDBA Sample Test Answers |
|
339 | (14) |
Appendix C Tips |
|
353 | (50) |
Appendix D Other Resources |
|
403 | (2) |
Appendix E Tuning Sybase ASE Using Solid State Accelerators |
|
405 | (8) |
Appendix F Fragmentation and Database Performance |
|
413 | (18) |
Appendix G Disaster Recovery: A Practical Handbook |
|
431 | (34) |
Index |
|
465 | |