Muutke küpsiste eelistusi

Administrator's Guide to Sybase ASE 15 [Pehme köide]

  • Formaat: Paperback / softback, 472 pages, kõrgus x laius x paksus: 230x155x26 mm, kaal: 657 g, b/w illlus
  • Ilmumisaeg: 01-Apr-2006
  • Kirjastus: Wordware Publishing Inc.
  • ISBN-10: 1556223609
  • ISBN-13: 9781556223600
Teised raamatud teemal:
  • Formaat: Paperback / softback, 472 pages, kõrgus x laius x paksus: 230x155x26 mm, kaal: 657 g, b/w illlus
  • Ilmumisaeg: 01-Apr-2006
  • Kirjastus: Wordware Publishing Inc.
  • ISBN-10: 1556223609
  • ISBN-13: 9781556223600
Teised raamatud teemal:
Administrator's Guide to Sybase ASE 15 is a practical systems administration guide for the newest release of the ASE product. Designed to provide all administrators with an authoritative guide, topics include installation, defining physical and Sybase-mirrored devices, transaction logging and modes, security, auditing, database backup and restoration, troubleshooting, maintenance, and more. After reading this book, you should be able to perform any task that encompasses the creation or maintenance of a server. With this book any administrator will understand the responsibilities of a system administrator; find out how to set limits on server resources using the Resource Governor; learn how to prioritize tasks with the Logical Process Manager; use data partitioning to enable finer control over data placement, maintenance, and management.
Introduction xv
Chapter 1 System Administration Overview 1(12)
Architecture Overview
1(1)
Responsibilities of the Sybase System Administrator
2(5)
Installing the Sybase Adaptive Server
2(1)
Establishing Connectivity between Clients and Servers
3(1)
Installing and Maintaining User Databases
3(1)
Establishing Security for Adaptive Server Enterprise
4(1)
Maintaining and Troubleshooting Your ASE
5(1)
Establishing Disaster Recovery Procedures
6(1)
Monitoring ASE
6(1)
Use of Utilities
7(1)
Databases
7(1)
System Tables Overview
8(5)
System Tables in Special Uses Databases
10(1)
Sybase System Stored Procedures
11(2)
Chapter 2 Adaptive Server Installation 13(30)
Step 1: Preparation
14(5)
Logical Page Size
15(1)
Physical Devices
15(1)
Server Names
16(1)
Networking Information
16(1)
Sybase Software Asset Manager
17(1)
Sort Order
17(1)
SSL in Adaptive Server
17(2)
Step 2: File Transfer
19(1)
Step 3: Running Installation
20(15)
Interfaces File
29(3)
Runserver File
32(1)
Errorlog File
33(1)
servername.cfg — Server Configuration File
34(1)
Environmental Variables
34(1)
Step 4: Front-End Installation
35(2)
ODBC
37(1)
Starting the Server
37(2)
Normal Unix Startup
37(1)
Normal NT Startup
38(1)
Manual Unix Startup
38(1)
Automatic System Boot
39(1)
Verifying the Server Is Running
39(1)
Adaptive Server for Unix
39(1)
Adaptive Server for NT
40(1)
Shutting the Server Down
40(2)
Graceful Shutdowns
40(1)
Shutdown with nowait
41(1)
Maintenance Shutdowns
41(1)
Global Variables
42(1)
Chapter 3 Defining Physical Devices 43(28)
The Need for Devices
43(1)
Logical vs. Physical Devices
43(1)
Performance Implications
44(1)
Creating and Dropping Devices
44(6)
Creating Database Devices
45(4)
Creating Default Devices
49(1)
Dropping Database Devices
49(1)
Raw vs. Filesystem
50(1)
Dsync Option
51(1)
Device Limitations and Restrictions
52(1)
Master Device Creation
52(2)
Building the Master Device
53(1)
Sybase Mirroring
54(6)
What Should You Mirror9
56(1)
Disabling Mirroring
57(2)
Remirroring
59(1)
Software- and Hardware-Level Mirroring
59(1)
RAID
60(1)
Volume Management
60(1)
Maintenance and Ease of Use
60(1)
Load Balancing
61(1)
System Info
61(3)
System Procedures
61(2)
System Tables
63(1)
Disaster Recovery
64(1)
For Geeks Like Us
65(4)
Sysdevices
65(4)
Summary
69(2)
Chapter 4 Databases 71(20)
System Databases
72(3)
Other Sybase-Provided Databases
74(1)
Creating a Database
75(4)
The create database Command
75(1)
Creating a Default Database
76(1)
Creating Database Logs on Separate Devices
77(1)
Using the create database Command
78(1)
Sizing a Database
79(1)
Altering a Database
80(1)
Database Options
81(3)
Setting Database Options
82(1)
sp_helpdb System Procedure
83(1)
Dropping a Database
84(1)
Database Ownership
85(1)
System Tables
85(4)
sysdatabases
86(1)
sysdevices
86(1)
sysusages
87(2)
Who Can Create a Database
89(1)
Summary
89(2)
Chapter 5 Database Logging and Recovery 91(20)
Transactions
91(8)
The Transaction Log
92(1)
Transaction Modes
92(2)
Transaction Control Statements
94(5)
Checkpoint
99(1)
Recovery
100(2)
Recovery Interval
101(1)
When the Transaction Log Is Full
102(7)
Thresholds
107(1)
Suspended Transactions
108(1)
Automatically Truncating the Log
108(1)
More Fun for Bits and Bytes Geeks
109(1)
Summary
109(2)
Chapter 6 Security 111(48)
ASE Security Levels
111(1)
Operating System-Level Security
112(1)
Server-Level Security
113(10)
Requiring Digits in Password
114(1)
Special Logins/Users
114(2)
Standard Roles
116(3)
Dropping Logins
119(1)
The syslogins Table
119(1)
sp_displaylogin
119(1)
sp_modifylogin
120(1)
Who Is Logged into the Server2
121(1)
The Kill Command
122(1)
Database-Level Security
123(10)
Guest User
124(1)
Aliases
124(1)
Information on Users and Aliases
125(1)
Access Sequence
126(1)
Database Access
127(1)
Groups
127(2)
The sysusers Table
129(1)
Transporting Databases
130(1)
System Built-in Functions
131(1)
Command Security
132(1)
Object-Level Security
133(4)
With Grant Option
134(1)
Revoking Object Access
134(1)
Granting Vast Permissions
135(1)
Ownership Chains
135(1)
Displaying Permissions
136(1)
setuser Command
137(1)
Fine-Grained Access Control (FGAC)
137(15)
Access Rules
137(5)
Granting the set proxy Command
142(1)
The System Roles
143(2)
User-Defined Roles
145(7)
Column Encryption
152(6)
Components of Encryption
152(1)
Enabling Encryption
152(1)
The sysencryptkeys Table
153(1)
Creating New Tables with Encryption
154(1)
Altering Existing Tables
155(1)
Using select into with Encryption
155(1)
Ciphertext Randomization
155(1)
Performance Considerations
156(1)
Joins
157(1)
Decryption Permissions
157(1)
Integrated Security Overview
158(1)
Summary
158(1)
Chapter 7 Auditing 159(20)
Auditing Overview
159(2)
Installation of Auditing
160(1)
The Sybsecurity Database and Tables
161(7)
Sybsecurity Transaction Log
164(1)
Sybsecurity Stored Procedures
164(4)
The Audit Queue
168(1)
Audit Database Storage Requirements
168(3)
Creating Audit Tables
171(1)
Single-Table Auditing
171(2)
What to Do When the Audit Table Is Full
172(1)
Archiving Audit Records
173(1)
Querying the Audit Trail
174(2)
Using Audit to Determine Interactions with Third-Party Software
176(1)
Additional Tips for Effective Auditing
177(1)
Summary
178(1)
Chapter 8 Backing Up and Restoring 179(32)
Roles and Responsibilities
180(1)
How Often Should You Back Up a Database?
180(1)
Backup Types
181(1)
Backup Scenario
182(1)
Restore Scenario
183(1)
Backup Server
183(3)
Remote Backup Server
184(1)
Server Identification
185(1)
Starting a Backup Server
185(1)
Dump Devices
186(6)
sp_addumpdevice
186(1)
Dumping the Database
187(2)
Dump Compression
189(2)
Dump Database Summary
191(1)
Automatic Backups
192(1)
Loading the Database
192(2)
Loading a Corrupted Database
193(1)
Online Database
193(1)
Load Database Summary
193(1)
Creating a Database for a Restore
194(2)
Dumping Transactions
196(2)
Dump Transaction Options
196(2)
Dump Transaction Activities
198(1)
Loading Transactions
198(1)
Up-to-the-Minute Recovery
199(2)
Load Transaction
199(1)
Steps
200(1)
Point-in-Time Recovery
201(1)
sp_volchanged
201(1)
Monitoring the Log
202(2)
Last-Chance Threshold
202(1)
Free-Space Thresholds
203(1)
Aborting vs. Suspending Transactions
203(1)
Restoring the master Database Step by Step
204(1)
Quiesce Database
205(3)
Warm Standby
206(2)
Database Recovery Scenarios
208(2)
Answers for the Scenarios
209(1)
Summary
210(1)
Chapter 9 Resource Governor 211(12)
Enabling Resource Limits
212(1)
Time Ranges
213(2)
Adding Time Ranges
213(1)
Simplifying the Creation of Time Ranges
214(1)
Modifying Time Ranges
214(1)
Removing Time Ranges
215(1)
Creating a Limit
215(3)
Choosing a Limit Type
216(1)
Choosing the Type of Enforcement
217(1)
Choosing an Action
217(1)
Choosing a Scope
218(1)
Limit Hierarchies
218(2)
Examples of Limits
219(1)
Viewing Limits
219(1)
Changing Limits
220(1)
Removing Limits
220(1)
System Tables
220(1)
spt_limit_types
220(1)
systimeranges
221(1)
sysresourcelimits
221(1)
Summary
221(2)
Chapter 10 Logical Process Manager 223(14)
What Is the Logical Process Manager?
223(2)
Logical Process Manager Execution Classes
225(1)
Base Priority
225(1)
Engine Affinity
226(1)
Timeslice (Quantum)
226(1)
Logical Process Manager Objects
226(1)
Logical Process Manager Procedures
227(4)
sp_addexeclass
227(1)
sp_dropexeclass
228(1)
sp_bindexeclass
228(1)
sp_unbindexeclass
229(1)
sp_setpsexe
230(1)
sp_clearpsexe
230(1)
Engine Groups
231(4)
sp_addengine
231(1)
sp_dropengine
232(1)
More Detailed Examples
232(3)
Logical Process Manager Conflicts and Precedence
235(1)
Important Exception to the Precedence Rule
236(1)
General Recommendations
236(1)
Chapter 11 Memory Configuration and Tuning 237(36)
Pre-12.5 Memory Utilization
237(1)
Memory Utilization, 12.5 and Later
238(3)
Logical, Physical, and Max Memory
239(2)
Configuration System Tables
241(1)
sp configure Output
242(24)
Displaying Configuration Values
260(1)
Configuration File
260(6)
Dynamic vs. Static Options
266(1)
Memory-Related Variables
267(1)
Recommended Configuration Settings
268(3)
Cache Configuration
268(1)
Sizing Cache
269(1)
Memory Guidelines
269(1)
Calculating Procedure Cache
270(1)
Sample Server Configuration
270(1)
Summary
271(2)
Chapter 12 Named Caches 273(18)
Data Cache
273(1)
Tuning Cache
274(2)
Benefits of Named Caches
276(1)
Creating a Named Cache
277(1)
Buffer Pools
278(4)
Creating Buffer Pools
279(1)
Using Buffer Pools
279(1)
Wash Area
280(2)
Binding
282(2)
Binding to a Named Cache
283(1)
Dropping Cache Bindings
283(1)
Retrieving Information on Bindings
283(1)
Transaction Performance and Named Caches
284(3)
Spinlocks
284(3)
Cache Notes
287(2)
Sizing a Cache for a Transaction Log
287(1)
Benefits of Assigning tempdb to Its Own Data Cache
288(1)
Creating and Configuring Caches and Pools
289(1)
Guidelines for Cache Configuration
289(1)
Tuning Ideas
289(1)
Summary
290(1)
Chapter 13 Data Partitioning in ASE 15 291(8)
What is Data Partitioning?
291(1)
Why Use Data Partitioning?
292(2)
Reducing the Cost of Managing and Maintaining Databases
292(2)
Data Availability
294(1)
Index Partitioning
294(1)
How and When to Use Data Partitioning
295(2)
Summary
297(2)
Chapter 14 Remote Server Management 299(14)
Remote Access
299(3)
Server Naming
300(1)
Configuring the Server to Allow Remote Access
300(1)
Login Mapping
301(1)
CIS — Component Integration Services
302(7)
Remote Server
303(1)
Local Storage
304(1)
Proxy Databases
305(1)
Remote Access Setup Example
306(1)
Using CIS for Remote Procedure Calls
307(2)
ASE Variable Page Size Issues
309(1)
Creating Tables from System Files
310(1)
File Access
311(1)
Summary
312(1)
Chapter 15 Preventative Maintenance Regimen 313(54)
Periodic Maintenance
313(1)
Server-Level Maintenance
313(20)
Activity Monitoring
314(2)
MDA Tables
316(1)
What to Monitor
316(5)
Monitoring the System Errorlog
321(10)
Resource Verification
331(1)
Software Maintenance
332(1)
Recording Run-Time Data
333(1)
Database-Level Maintenance
333(31)
Scheduling Database Maintenance
333(2)
How to Run dbcc
335(9)
Understanding the Output from dbcc Commands
344(1)
Using dbcc checkstorage
345(9)
Maintaining the dbccdb Database
354(2)
Generating Reports from dbccdb
356(6)
Database Dumps
362(1)
Disaster Recovery Plan
362(1)
Log Management
363(1)
Space Management
363(1)
Script Maintenance
363(1)
Verifying Dumps
364(1)
Table-Level Maintenance
364(1)
Updating Statistics
364(1)
Indexes
365(1)
Summary
365(2)
Chapter 16 Troubleshooting 367(4)
The Server Will Not Come Up
367(1)
Some Users Claim the Server Stopped
368(1)
Server Is Up, Some Users Cannot Gain Access
368(1)
Processing Slows Down or Stops
369(1)
Some Database or Databases Cannot be Accessed
369(1)
Users Cannot Access Objects
370(1)
Summary
370(1)
Chapter 17 Tools 371(8)
bcp
371(2)
dcfncopy
373(1)
optdiag
374(1)
Sybase Central
375(1)
Interactive SQL
376(2)
Summary
378(1)
Appendix A CSPDBA Sample Test 379(8)
Appendix B CSPDBA Sample Test Answers 387(16)
Appendix C Tips 403(54)
Appendix D Other Resources 457(2)
Index 459