VAX Rdb/VMS Guide to Database Maintenance and Performance

*HyperReader

  CONTENTS

  Title Page

  Copyright Page

  Preface

  Technical Changes and New Features

  1      Introduction

  1.1     For the New Database Administrator

  1.2     Availability of Rdb/VMS
    1.2.1      Online Backups
    1.2.2      VAXcluster and Network-Wide Automatic Recovery
    1.2.3      Automatic Cleanup
    1.2.4      Online DBA Activities
    1.2.5      Offline DBA Activities
    1.2.6      DBA Activities Requiring Database Reload
    1.2.7      Quick and Automatic Database Recovery
    1.2.8      Database Integrity
    1.2.9      Checking Database Integrity and Evaluating Performance and Database Behavior

  1.3     Database Maintenance Operations

  1.4     Evaluating and Improving Performance

  1.5     Using Rdb/VMS in a VAXcluster Environment

  1.6     Creating Sample Single-File and Multifile Databases

  2      Loading Data

  2.1     Data Loading Strategies
    2.1.1      Using the PLACE Statement
      2.1.1.1      Using the PLACE Statement to Get the Dbkey for Each Row to Be Stored
      2.1.1.2      Sorting the Dbkeys in Ascending Order
      2.1.1.3      Using the Dbkeys to Read the Rows in Sorted Order to Be Stored in the Database
    2.1.2      Defining the Database
      2.1.2.1      Defining the Database-Wide Parameters
      2.1.2.2      Defining Storage Area Parameters
      2.1.2.3      Defining the Table
      2.1.2.4      Defining the Hashed Index
      2.1.2.5      Defining the Storage Map

  2.2     Placement and Clustering Strategies Using Hashed Indexes
    2.2.1      Separate Areas, No Placement Clause
    2.2.2      Separate Areas, with Placement Clause
    2.2.3      Same Area, with Placement Clause (One I/O Operation)
    2.2.4      Clustering:  Add Child Rows, Separate Storage Area, with Placement Clause
    2.2.5      Shadowing:  Child and Parent in Separate Areas, with Placement Clause
    2.2.6      Clustering:  Child and Parent Rows and Hashed Index All in the Same Area with Placement Clause

  2.3     Troubleshooting Data Load Operations

  2.4     Loading Data from a Record Management Services (RMS) File
    2.4.1      Using BASIC to Load Data
    2.4.2      Using COBOL to Load Data
    2.4.3      Using FORTRAN to Load Data

  2.5     Loading and Unloading Data Using the RMU/LOAD and RMU/UNLOAD Commands
    2.5.1      Understanding the Format of the RMS Record Definition File
    2.5.2      Loading Data into a Database Table

  2.6     Changing Database Definitions Following a Data Load Operation
    2.6.1      Using DATATRIEVE to Load Data

  2.7     Importing an Rdb/ELN Database into an Rdb/VMS Database

  3      Monitoring Your Rdb/VMS Databases

  3.1     Rdb/VMS Monitor Process
    3.1.1      Starting and Stopping the Monitor Process Interactively
    3.1.2      Renaming the Monitor Log File
    3.1.3      Changing the Monitor Process Priority
    3.1.4      Reopening the Monitor Log File
    3.1.5      Reading the Monitor Log File

  3.2     Listing Active User Information

  3.3     Displaying Clusterwide User Information

  3.4     Information About Database Characteristics

  4      Security Auditing in Rdb/VMS

  4.1     An Overview of Rdb/VMS Security Auditing
    4.1.1      Rdb/VMS Default Security Auditing and RMU Security Auditing Commands
    4.1.2      Rdb/VMS and Its Use of VMS Security Auditing
    4.1.3      Monitoring Security Auditing Resources

  4.2     Security Audit Event Types
    4.2.1      The AUDIT Audit Event Type
    4.2.2      The DACCESS Audit Event Type
    4.2.3      The PROTECTION Audit Event Type
    4.2.4      The RMU Audit Event Type

  4.3     Defining Security Events to Be Audited
    4.3.1      Setting User level Information for Security Auditing
    4.3.2      Setting Audit Access to Database Objects (DACCESS Auditing)
    4.3.3      Enabling and Disabling Event Information for Security Auditing
    4.3.4      Starting and Stopping Security Auditing and Other Database Auditing Characteristics

  4.4     Reviewing Security Audit Information
    4.4.1      How to Interpret Security Auditing Alarm Information
      4.4.1.1      How to Interpret AUDIT Eve~~