没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
Tibero
Administrator's Guide
Tibero 6
Copyright © 2018 TmaxData Co., Ltd. All Rights Reserved.
Copyright Notice
Copyright © 2018 TmaxData Co., Ltd. All Rights Reserved.
Restricted Rights Legend
All TmaxData Software (Tibero®) and documents are protected by copyright laws and international convention.
TmaxData software and documents are made available under the terms of the TmaxData License Agreement
and this document may only be distributed or copied in accordance with the terms of this agreement. No part of
this document may be transmitted, copied, deployed, or reproduced in any form or by any means, electronic,
mechanical, or optical, without the prior written consent of TmaxData Co., Ltd. Nothing in this software document
and agreement constitutes a transfer of intellectual property rights regardless of whether or not such rights are
registered) or any rights to TmaxData trademarks, logos, or any other brand features.
This document is for information purposes only. The company assumes no direct or indirect responsibilities for
the contents of this document, and does not guarantee that the information contained in this document satisfies
certain legal or commercial conditions.The information contained in this document is subject to change without
prior notice due to product upgrades or updates.The company assumes no liability for any errors in this document.
Trademarks
Tibero® is a registered trademark of TmaxData Co., Ltd. Other products, titles or services may be registered
trademarks of their respective companies.
Open Source Software Notice
Some modules or files of this product are subject to the terms of the following licenses: OpenSSL, RSA Data
Security, Inc., Apache Foundation, Jean-loup Gailly and Mark Adler, Paul Hsieh's hash.
Detailed Information related to the license can be found in the following directory:
${INSTALL_PATH}/license/oss_licenses.
Document Information
Title: Tibero Administrator's Guide
Publication Date: 2018-07-06
Software Version: Tibero 6 (FixSet07)
Edition: v2.1.7
Table of Contents
About This Document ................................................................................................................ xv
Chapter 1. Introduction to Tibero .............................................................................................. 1
1.1. Overview ..................................................................................................................... 1
1.2. Key Features ................................................................................................................ 1
1.3. Basic Properties ........................................................................................................... 3
1.4. Row Level Locking ........................................................................................................ 4
1.5. Process Structure ......................................................................................................... 4
1.5.1. Listener ............................................................................................................. 5
1.5.2. Worker Process ................................................................................................. 6
1.5.3. Background Process .......................................................................................... 7
1.6. Directory Structure ....................................................................................................... 8
Chapter 2. Basic Database Administration .............................................................................. 15
2.1. User Types ................................................................................................................. 15
2.1.1. DBA ................................................................................................................ 15
2.1.2. SYS ................................................................................................................ 16
2.1.3. System Administrators ..................................................................................... 17
2.1.4. Application Developers ..................................................................................... 17
2.1.5. Database Users ............................................................................................... 18
2.2. Installation Environment .............................................................................................. 18
2.3. tbSQL Utility Usage .................................................................................................... 19
2.4. Creating Users and Tables .......................................................................................... 25
2.5. Startup and Shutdown ................................................................................................ 31
2.5.1. tbboot ............................................................................................................. 31
2.5.2. tbdown ............................................................................................................ 34
2.6. Using Binary TIP ........................................................................................................ 39
Chapter 3. File and Data Management ..................................................................................... 41
3.1. Data Storage Structure ............................................................................................... 41
3.2. Tablespaces ............................................................................................................... 41
3.2.1. Tablespace Structures ...................................................................................... 41
3.2.2. Creating and Deleting Tablespaces ................................................................... 43
3.2.3. Changing Tablespaces ..................................................................................... 45
3.2.4. Viewing Tablespace Data .................................................................................. 47
3.3. Log Files .................................................................................................................... 48
3.3.1. Redo Log File Structure ................................................................................... 49
3.3.2. Creating and Deleting Log Files ........................................................................ 51
3.3.3. Viewing Log File Data ...................................................................................... 53
3.4. Control Files ............................................................................................................... 53
3.4.1. Modifying Control Files ..................................................................................... 55
3.4.2. Viewing Control File Data ................................................................................. 56
Tibero iii
Chapter 4. Schema Object Management ................................................................................. 57
4.1. Overview .................................................................................................................... 57
4.2. Tables ........................................................................................................................ 57
4.2.1. Creating, Altering, and Dropping Tables ............................................................. 58
4.2.2. Efficient Table Management .............................................................................. 63
4.2.3. Viewing Table Data ........................................................................................... 64
4.2.4. Compressing Tables ......................................................................................... 64
4.2.5. INDEX ORGANIZED TABLE ............................................................................. 67
4.3. Constraints ................................................................................................................. 69
4.3.1. Declaring, Changing, and Removing Constraints ............................................... 69
4.3.2. Constraint States ............................................................................................. 73
4.3.3. Viewing Constraint Data ................................................................................... 75
4.4. Disk Blocks ................................................................................................................ 75
4.4.1. PCTFREE Parameter ....................................................................................... 75
4.4.2. INITRANS Parameter ....................................................................................... 76
4.4.3. Parameter Settings .......................................................................................... 76
4.5. Indexes ...................................................................................................................... 77
4.5.1. Creating and Deleting Indexes .......................................................................... 78
4.5.2. Efficient Index Management ............................................................................. 79
4.5.3. Viewing Index Data .......................................................................................... 81
4.5.4. Monitoring Index Usage ................................................................................... 82
4.6. Views ......................................................................................................................... 82
4.6.1. Creating, Changing, and Deleting Views ............................................................ 82
4.6.2. Viewing View Data ........................................................................................... 84
4.7. Sequences ................................................................................................................. 85
4.7.1. Creating, Changing, and Deleting Sequences .................................................... 85
4.7.2. Viewing Sequence Data ................................................................................... 88
4.8. Synonyms .................................................................................................................. 88
4.8.1. Creating and Deleting Synonyms ...................................................................... 88
4.8.2. Creating and Deleting Public Synonyms ............................................................ 90
4.8.3. Viewing Synonym Data .................................................................................... 91
4.9. Triggers ...................................................................................................................... 91
4.9.1. Creating and Deleting Triggers .......................................................................... 91
4.10. Partitions .................................................................................................................. 92
4.10.1. Creating Partitions ......................................................................................... 93
4.10.2. Creating Composite Partitions ......................................................................... 95
4.10.3. Creating Index Partitions ................................................................................ 96
4.10.4. Viewing Partition Data .................................................................................... 97
Chapter 5. User Management and Database Security ............................................................. 99
5.1. Managing User Accounts ............................................................................................ 99
5.1.1. Creating, Modifying, and Removing Users ....................................................... 100
5.1.2. Viewing User Data ......................................................................................... 103
iv Tibero Administrator's Guide
5.1.3. Locking and Unlocking User Accounts ............................................................. 103
5.1.4. Creating an OS Authenticated User ................................................................. 104
5.2. Privileges ................................................................................................................. 104
5.2.1. Schema Object Privileges ............................................................................... 105
5.2.2. System Privileges .......................................................................................... 107
5.2.3. Viewing Privilege Data .................................................................................... 110
5.2.4. Additional Privileges ....................................................................................... 111
5.3. Profiles .................................................................................................................... 111
5.3.1. Creating, Changing, and Deleting Profiles ....................................................... 112
5.3.2. Specifying a Profile ........................................................................................ 113
5.3.3. Viewing Profile Data ....................................................................................... 113
5.3.4. VERIFY_FUNCTION ...................................................................................... 114
5.4. Roles ....................................................................................................................... 114
5.4.1. Creating, Granting, and Revoking Roles .......................................................... 115
5.4.2. Predefined Roles ........................................................................................... 117
5.4.3. Default Roles ................................................................................................. 117
5.4.4. Viewing Role Data .......................................................................................... 118
5.5. Network Access Control ............................................................................................ 118
5.5.1. Full Network Access Control ........................................................................... 119
5.5.2. IP-based Network Access Control ................................................................... 119
5.5.3. Dynamically Adding and Deleting a Listener Port ............................................. 121
5.6. Auditing .................................................................................................................... 122
5.6.1. Enabling and Disabling Auditing ...................................................................... 122
5.6.2. Audit Trails ..................................................................................................... 123
5.6.3. Auditing SYS User ......................................................................................... 125
Chapter 6. Backup and Recovery .......................................................................................... 127
6.1. Component Files in Tibero ......................................................................................... 127
6.2. Backups ................................................................................................................... 128
6.2.1. Backup Types ................................................................................................ 129
6.2.2. Performing a Backup ...................................................................................... 130
6.3. Recovery .................................................................................................................. 134
6.3.1. Recovery for Each Boot Mode ........................................................................ 135
6.3.2. Crash Recovery ............................................................................................. 135
6.3.3. Media Recovery ............................................................................................. 136
6.3.4. Online Media Recovery .................................................................................. 138
6.4. Recovery Manager (RMGR) ...................................................................................... 138
6.4.1. Basic Functions ............................................................................................. 138
6.4.2. RMGR Options .............................................................................................. 139
6.4.3. Backup and Recovery Examples ..................................................................... 142
6.4.4. Example of Deleting a Backup ........................................................................ 157
Chapter 7. Distributed Transactions ...................................................................................... 163
7.1. XA ........................................................................................................................... 163
Tibero v
剩余323页未读,继续阅读
资源评论
楊建中JoeYang
- 粉丝: 0
- 资源: 3
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- js-leetcode题解之146-lru-cache.js
- js-leetcode题解之145-binary-tree-postorder-traversal.js
- js-leetcode题解之144-binary-tree-preorder-traversal.js
- js-leetcode题解之143-reorder-list.js
- js-leetcode题解之142-linked-list-cycle-ii.js
- js-leetcode题解之141-linked-list-cycle.js
- js-leetcode题解之140-word-break-ii.js
- js-leetcode题解之139-word-break.js
- js-leetcode题解之138-copy-list-with-random-pointer.js
- js-leetcode题解之136-single-number.js
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功