Introduction |
|
xv | |
Chapter 1 System Administration Overview |
|
1 | (12) |
|
|
1 | (1) |
|
Responsibilities of the Sybase System Administrator |
|
|
2 | (5) |
|
Installing the Sybase Adaptive Server |
|
|
2 | (1) |
|
Establishing Connectivity between Clients and Servers |
|
|
3 | (1) |
|
Installing and Maintaining User Databases |
|
|
3 | (1) |
|
Establishing Security for Adaptive Server Enterprise |
|
|
4 | (1) |
|
Maintaining and Troubleshooting Your ASE |
|
|
5 | (1) |
|
Establishing Disaster Recovery Procedures |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (5) |
|
System Tables in Special Uses Databases |
|
|
10 | (1) |
|
Sybase System Stored Procedures |
|
|
11 | (2) |
Chapter 2 Adaptive Server Installation |
|
13 | (30) |
|
|
14 | (5) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Sybase Software Asset Manager |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (2) |
|
|
19 | (1) |
|
Step 3: Running Installation |
|
|
20 | (15) |
|
|
29 | (3) |
|
|
32 | (1) |
|
|
33 | (1) |
|
servername.cfg — Server Configuration File |
|
|
34 | (1) |
|
|
34 | (1) |
|
Step 4: Front-End Installation |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
37 | (2) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
Verifying the Server Is Running |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (2) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
Chapter 3 Defining Physical Devices |
|
43 | (28) |
|
|
43 | (1) |
|
Logical vs. Physical Devices |
|
|
43 | (1) |
|
|
44 | (1) |
|
Creating and Dropping Devices |
|
|
44 | (6) |
|
Creating Database Devices |
|
|
45 | (4) |
|
|
49 | (1) |
|
Dropping Database Devices |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Device Limitations and Restrictions |
|
|
52 | (1) |
|
|
52 | (2) |
|
Building the Master Device |
|
|
53 | (1) |
|
|
54 | (6) |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
59 | (1) |
|
Software- and Hardware-Level Mirroring |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
Maintenance and Ease of Use |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (3) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (4) |
|
|
65 | (4) |
|
|
69 | (2) |
Chapter 4 Databases |
|
71 | (20) |
|
|
72 | (3) |
|
Other Sybase-Provided Databases |
|
|
74 | (1) |
|
|
75 | (4) |
|
The create database Command |
|
|
75 | (1) |
|
Creating a Default Database |
|
|
76 | (1) |
|
Creating Database Logs on Separate Devices |
|
|
77 | (1) |
|
Using the create database Command |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (3) |
|
|
82 | (1) |
|
sp_helpdb System Procedure |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (4) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
Who Can Create a Database |
|
|
89 | (1) |
|
|
89 | (2) |
Chapter 5 Database Logging and Recovery |
|
91 | (20) |
|
|
91 | (8) |
|
|
92 | (1) |
|
|
92 | (2) |
|
Transaction Control Statements |
|
|
94 | (5) |
|
|
99 | (1) |
|
|
100 | (2) |
|
|
101 | (1) |
|
When the Transaction Log Is Full |
|
|
102 | (7) |
|
|
107 | (1) |
|
|
108 | (1) |
|
Automatically Truncating the Log |
|
|
108 | (1) |
|
More Fun for Bits and Bytes Geeks |
|
|
109 | (1) |
|
|
109 | (2) |
Chapter 6 Security |
|
111 | (48) |
|
|
111 | (1) |
|
Operating System-Level Security |
|
|
112 | (1) |
|
|
113 | (10) |
|
Requiring Digits in Password |
|
|
114 | (1) |
|
|
114 | (2) |
|
|
116 | (3) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
Who Is Logged into the Server2 |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (10) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Information on Users and Aliases |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
130 | (1) |
|
System Built-in Functions |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (4) |
|
|
134 | (1) |
|
|
134 | (1) |
|
Granting Vast Permissions |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
Fine-Grained Access Control (FGAC) |
|
|
137 | (15) |
|
|
137 | (5) |
|
Granting the set proxy Command |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (7) |
|
|
152 | (6) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Creating New Tables with Encryption |
|
|
154 | (1) |
|
|
155 | (1) |
|
Using select into with Encryption |
|
|
155 | (1) |
|
|
155 | (1) |
|
Performance Considerations |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
Integrated Security Overview |
|
|
158 | (1) |
|
|
158 | (1) |
Chapter 7 Auditing |
|
159 | (20) |
|
|
159 | (2) |
|
|
160 | (1) |
|
The Sybsecurity Database and Tables |
|
|
161 | (7) |
|
Sybsecurity Transaction Log |
|
|
164 | (1) |
|
Sybsecurity Stored Procedures |
|
|
164 | (4) |
|
|
168 | (1) |
|
Audit Database Storage Requirements |
|
|
168 | (3) |
|
|
171 | (1) |
|
|
171 | (2) |
|
What to Do When the Audit Table Is Full |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (2) |
|
Using Audit to Determine Interactions with Third-Party Software |
|
|
176 | (1) |
|
Additional Tips for Effective Auditing |
|
|
177 | (1) |
|
|
178 | (1) |
Chapter 8 Backing Up and Restoring |
|
179 | (32) |
|
Roles and Responsibilities |
|
|
180 | (1) |
|
How Often Should You Back Up a Database? |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (3) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (6) |
|
|
186 | (1) |
|
|
187 | (2) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (2) |
|
Loading a Corrupted Database |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
Creating a Database for a Restore |
|
|
194 | (2) |
|
|
196 | (2) |
|
|
196 | (2) |
|
Dump Transaction Activities |
|
|
198 | (1) |
|
|
198 | (1) |
|
Up-to-the-Minute Recovery |
|
|
199 | (2) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
202 | (1) |
|
|
203 | (1) |
|
Aborting vs. Suspending Transactions |
|
|
203 | (1) |
|
Restoring the master Database Step by Step |
|
|
204 | (1) |
|
|
205 | (3) |
|
|
206 | (2) |
|
Database Recovery Scenarios |
|
|
208 | (2) |
|
Answers for the Scenarios |
|
|
209 | (1) |
|
|
210 | (1) |
Chapter 9 Resource Governor |
|
211 | (12) |
|
|
212 | (1) |
|
|
213 | (2) |
|
|
213 | (1) |
|
Simplifying the Creation of Time Ranges |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (3) |
|
|
216 | (1) |
|
Choosing the Type of Enforcement |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (2) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (2) |
Chapter 10 Logical Process Manager |
|
223 | (14) |
|
What Is the Logical Process Manager? |
|
|
223 | (2) |
|
Logical Process Manager Execution Classes |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
Logical Process Manager Objects |
|
|
226 | (1) |
|
Logical Process Manager Procedures |
|
|
227 | (4) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (4) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (3) |
|
Logical Process Manager Conflicts and Precedence |
|
|
235 | (1) |
|
Important Exception to the Precedence Rule |
|
|
236 | (1) |
|
|
236 | (1) |
Chapter 11 Memory Configuration and Tuning |
|
237 | (36) |
|
Pre-12.5 Memory Utilization |
|
|
237 | (1) |
|
Memory Utilization, 12.5 and Later |
|
|
238 | (3) |
|
Logical, Physical, and Max Memory |
|
|
239 | (2) |
|
Configuration System Tables |
|
|
241 | (1) |
|
|
242 | (24) |
|
Displaying Configuration Values |
|
|
260 | (1) |
|
|
260 | (6) |
|
Dynamic vs. Static Options |
|
|
266 | (1) |
|
|
267 | (1) |
|
Recommended Configuration Settings |
|
|
268 | (3) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Calculating Procedure Cache |
|
|
270 | (1) |
|
Sample Server Configuration |
|
|
270 | (1) |
|
|
271 | (2) |
Chapter 12 Named Caches |
|
273 | (18) |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (4) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (2) |
|
|
282 | (2) |
|
|
283 | (1) |
|
|
283 | (1) |
|
Retrieving Information on Bindings |
|
|
283 | (1) |
|
Transaction Performance and Named Caches |
|
|
284 | (3) |
|
|
284 | (3) |
|
|
287 | (2) |
|
Sizing a Cache for a Transaction Log |
|
|
287 | (1) |
|
Benefits of Assigning tempdb to Its Own Data Cache |
|
|
288 | (1) |
|
Creating and Configuring Caches and Pools |
|
|
289 | (1) |
|
Guidelines for Cache Configuration |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
Chapter 13 Data Partitioning in ASE 15 |
|
291 | (8) |
|
What is Data Partitioning? |
|
|
291 | (1) |
|
Why Use Data Partitioning? |
|
|
292 | (2) |
|
Reducing the Cost of Managing and Maintaining Databases |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
294 | (1) |
|
How and When to Use Data Partitioning |
|
|
295 | (2) |
|
|
297 | (2) |
Chapter 14 Remote Server Management |
|
299 | (14) |
|
|
299 | (3) |
|
|
300 | (1) |
|
Configuring the Server to Allow Remote Access |
|
|
300 | (1) |
|
|
301 | (1) |
|
CIS — Component Integration Services |
|
|
302 | (7) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
Remote Access Setup Example |
|
|
306 | (1) |
|
Using CIS for Remote Procedure Calls |
|
|
307 | (2) |
|
ASE Variable Page Size Issues |
|
|
309 | (1) |
|
Creating Tables from System Files |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
Chapter 15 Preventative Maintenance Regimen |
|
313 | (54) |
|
|
313 | (1) |
|
|
313 | (20) |
|
|
314 | (2) |
|
|
316 | (1) |
|
|
316 | (5) |
|
Monitoring the System Errorlog |
|
|
321 | (10) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Database-Level Maintenance |
|
|
333 | (31) |
|
Scheduling Database Maintenance |
|
|
333 | (2) |
|
|
335 | (9) |
|
Understanding the Output from dbcc Commands |
|
|
344 | (1) |
|
|
345 | (9) |
|
Maintaining the dbccdb Database |
|
|
354 | (2) |
|
Generating Reports from dbccdb |
|
|
356 | (6) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (2) |
Chapter 16 Troubleshooting |
|
367 | (4) |
|
The Server Will Not Come Up |
|
|
367 | (1) |
|
Some Users Claim the Server Stopped |
|
|
368 | (1) |
|
Server Is Up, Some Users Cannot Gain Access |
|
|
368 | (1) |
|
Processing Slows Down or Stops |
|
|
369 | (1) |
|
Some Database or Databases Cannot be Accessed |
|
|
369 | (1) |
|
Users Cannot Access Objects |
|
|
370 | (1) |
|
|
370 | (1) |
Chapter 17 Tools |
|
371 | (8) |
|
|
371 | (2) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (2) |
|
|
378 | (1) |
Appendix A CSPDBA Sample Test |
|
379 | (8) |
Appendix B CSPDBA Sample Test Answers |
|
387 | (16) |
Appendix C Tips |
|
403 | (54) |
Appendix D Other Resources |
|
457 | (2) |
Index |
|
459 | |