IBM DB2 Universal database 重重 Administration Guide: Implementation Version 8 Sc09482000
IBM® DB2 Universal Database™ Administration Guide: Implementation Version 8 SC09-4820-00
IBM DB2 Universal database 重重 Administration Guide: Implementation Version 8 Sc09482000
IBM® DB2 Universal Database™ Administration Guide: Implementation Version 8 SC09-4820-00
efore using this information and the product it supports, be sure to read the general information under Notices This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. You can order IBM publications online or through your local IBM representative. ToorderpublicationsonlinegototheIbMPublicationsCenteratwww.ibm.com/shop/publications/order To find your local IBM representative, go to the IBM Directory of Worldwide Contacts at To order DB2 publications from DB2 Marketing and Sales in the United States or Canada, call 1-800-IBM-YOU (426-4968) When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incur ny obligation to you o Copyright International Business Machines Corporation 1993-2002. All rights reserved. US Government Users Restricted Rights- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp
Before using this information and the product it supports, be sure to read the general information under Notices. This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. You can order IBM publications online or through your local IBM representative. v To order publications online, go to the IBM Publications Center at www.ibm.com/shop/publications/order v To find your local IBM representative, go to the IBM Directory of Worldwide Contacts at www.ibm.com/planetwide To order DB2 publications from DB2 Marketing and Sales in the United States or Canada, call 1-800-IBM-4YOU (426-4968). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1993 - 2002. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp
Contents About this book eclaring registry and environment Who should use this book variables How this book is structured Setting environment variables on Windows 34 a brief overview of the other Administration Setting environment variables on UNIX Guide volumes systems Administration Guide: Planning Creating a node configuration file Administration Guide: Performance Creating the database configuration file Fast communications manager(FCM) Part 1. Implementing Your Design ommunications DB2 Administration Server(DAs) 392244 Chapter 1. Before Creating a Database DB2 Administration Server Create a db2 Administration Server Prerequisites for Creating a Database Starting DB2 UDB on UNIX Starting and stopping the DAS Starting DB2 UDB on Windows Listing the DAS Multiple Instances of the Database Manager 6 Configuring the DAS Attaching to another instance of the Tools catalog database and DAS scheduler database manager etup and configuration Grouping objects by schema Notification and contact list setup and Parallelism Stopping a DB2 instance on UNIX DAS Java virtual machine setup Stopping a DB2 instance on Windows Security considerations for the DAS on Preparing to Create a Database Windows Designing Logical and Physical Database dating the DAS on UNⅨ Characteristics Removing the das Instance creation Setting up DAS with Enterprise Server Setting the DB2 environment automatically Edition(ESE)systems on unix DAS configuration on Enterprise Server Edition(ESE) systems Setting the DB2 Environment Manually on UNIX Control Center communications with das: Multiple instances on a UNIX operating service ports Internode administrative communications. Multiple instances on a windows Windows DB2 ESE operating system Discovery of administration servers, Creating additional instances 24 instances, and databases UNIX Details When Creating Instances 25 Hiding server instances and database Windows Details When Creating Instances 26 from discovery 64 Add an Instance Setting discovery parameters uIse the Listing instances Setting up the das to Setting the current instance Configuration Assistant and the Control Center Auto-starting instances Running multiple instances concurrent Update the DAS configuration for License management discovery DB2 administration server first failure data c Copyright IBM Corp. 1993-2002
Contents About this book . . . . . . . . . . ix Who should use this book. . . . . . . .x How this book is structured . . . . . . .x A brief overview of the other Administration Guide volumes . . . . . . . . . . . xii Administration Guide: Planning . . . . xii Administration Guide: Performance . . . xii Part 1. Implementing Your Design . 1 Chapter 1. Before Creating a Database . . 3 Prerequisites for Creating a Database . . . .4 Starting DB2 UDB on UNIX . . . . . .4 Starting DB2 UDB on Windows . . . . .5 Multiple Instances of the Database Manager 6 Attaching to another instance of the database manager . . . . . . . . .7 Grouping objects by schema . . . . . .8 Parallelism . . . . . . . . . . . .9 Stopping a DB2 instance on UNIX . . . 15 Stopping a DB2 instance on Windows . . 16 Preparing to Create a Database. . . . . . 17 Designing Logical and Physical Database Characteristics . . . . . . . . . . 18 Instance creation . . . . . . . . . 18 Setting the DB2 environment automatically on UNIX . . . . . . . . . . . . 20 Setting the DB2 Environment Manually on UNIX . . . . . . . . . . . . . 21 Multiple instances on a UNIX operating system . . . . . . . . . . . . . 22 Multiple instances on a Windows operating system . . . . . . . . . 23 Creating additional instances . . . . . 24 UNIX Details When Creating Instances . . 25 Windows Details When Creating Instances 26 Add an Instance . . . . . . . . . 27 Listing instances . . . . . . . . . 28 Setting the current instance . . . . . . 28 Auto-starting instances . . . . . . . 29 Running multiple instances concurrently 29 License management . . . . . . . . 30 Environment Variables and the Profile Registry . . . . . . . . . . . . 30 Declaring registry and environment variables . . . . . . . . . . . . 32 Setting environment variables on Windows 34 Setting environment variables on UNIX systems . . . . . . . . . . . . 37 Creating a node configuration file. . . . 39 Creating the database configuration file . . 42 Fast communications manager (FCM) communications. . . . . . . . . . 42 DB2 Administration Server (DAS). . . . . 44 DB2 Administration Server . . . . . . 44 Create a DB2 Administration Server . . . 47 Starting and stopping the DAS. . . . . 48 Listing the DAS . . . . . . . . . . 49 Configuring the DAS . . . . . . . . 49 Tools catalog database and DAS scheduler setup and configuration . . . . . . . 50 Notification and contact list setup and configuration. . . . . . . . . . . 55 DAS Java virtual machine setup . . . . 56 Security considerations for the DAS on Windows . . . . . . . . . . . . 57 Updating the DAS on UNIX . . . . . 57 Removing the DAS . . . . . . . . 58 Setting up DAS with Enterprise Server Edition (ESE) systems . . . . . . . . 59 DAS configuration on Enterprise Server Edition (ESE) systems . . . . . . . . 61 Control Center communications with DAS: service ports . . . . . . . . . . . 62 Internode administrative communications: Windows DB2 ESE . . . . . . . . . 62 Discovery of administration servers, instances, and databases . . . . . . . 62 Hiding server instances and databases from discovery . . . . . . . . . . 64 Setting discovery parameters . . . . . 65 Setting up the DAS to use the Configuration Assistant and the Control Center . . . . . . . . . . . . . 66 Update the DAS configuration for discovery . . . . . . . . . . . . 67 DB2 administration server first failure data capture. . . . . . . . . . . . . 67 © Copyright IBM Corp. 1993 - 2002 iii
Chapter 2. Creating a database 71 Populating a typed table Creating a database Hierarchy table Definition of initial database partition groups Creating a table in multiple table spaces 119 Defining initial table spaces Creating a table in a partitioned database 120 Definition of system catalog tables Creating a trigg Definition of database directories 123566 Trigger dependencies ocal database directory Using triggers to update view content System database directory 76 Creating a user-defined function(UDF)or Viewing the local or system database method 77 Details on creating a user-defined function 77 (UDF)or methe Lightweight Directory Access Protocol Creating a function mapping (LDAP) Directory Service Creating a function template Creating database partition groups User-defined type (UDT) (nodegroups) Details on creating a user-defined typ Binding utilities to the database 6 Definition of Database recove Creating a user-defined distinct type Cataloging a database Creating a user-defined structured type 132 Updating the directories with information Creating a type mapping about remote database server machines Creating a view Creating a table space Details on creating a view 137 Creating specific types of table spaces Creating a typed view Creating a system temporary table space 87 Creating a materialized query table 13 Creating a user temporary table space 88 Creating a staging table 141 Creating table spaces in database partition Creating group ndex, index extension, or index specification 145 Specifying raw I/O Details on creating an index, index Setting up raw I/O on Linux 90 extension, or index specification 148 Creating a schema 92 Creating an index Details on the creation of schemas Setting a schema sing the CREATE INDEX statement.. 150 Details on creating and populating a table..98 Details on creating a user-defined extendeo154 Creating and populating a table Creating a user-defined extended index ty Introduction to space compression for index type 155 tables Details on index maintenance Space compression for new tables Details on index searching Large object(LOB)column considerations 99 Defining Constraints A scenario for defining an index Defining a table check constraint extension Defining an informational constraint . 108 Invoking the Performance Configuration Defining a generated column on a new Wizard through the command line processor. 161 table Creating a user-defined temporary table 110 Chapter 3. Altering a Database 163 Defining an identity column on a new Before Altering a Database Changing logical and physical design Creating a sequence characteristics Comparing IDENTITY columns and Changing the license information Changing instances(UNIX only Defining dimensions on a table 115 Details on changing instances Creating a typed table 117 Changing the node configuration file 169 IV Administration Guide: Implementatio
Chapter 2. Creating a Database . . . . . 71 Creating a database . . . . . . . . . 71 Definition of initial database partition groups 72 Defining initial table spaces . . . . . . . 73 Definition of system catalog tables . . . . 75 Definition of Database Directories . . . . . 76 Local database directory . . . . . . . 76 System database directory . . . . . . 76 Viewing the local or system database directory files . . . . . . . . . . 77 Node directory . . . . . . . . . . 77 Lightweight Directory Access Protocol (LDAP) Directory Service . . . . . . . 78 Creating database partition groups (nodegroups). . . . . . . . . . . . 79 Definition of Database Recovery Log. . . . 80 Binding utilities to the database . . . . . 81 Cataloging a database. . . . . . . . . 81 Updating the directories with information about remote database server machines . . . 83 Creating a table space. . . . . . . . . 84 Creating specific types of table spaces . . . 87 Creating a system temporary table space 87 Creating a user temporary table space . . 88 Creating table spaces in database partition groups . . . . . . . . . . . . . 89 Specifying raw I/O . . . . . . . . 89 Setting up raw I/O on Linux . . . . . 90 Creating a schema . . . . . . . . . . 92 Details on the creation of schemas . . . . 94 Setting a schema . . . . . . . . . 94 Creating and populating a table . . . . . 95 Details on creating and populating a table . . 98 Introduction to space compression for tables . . . . . . . . . . . . . 98 Space compression for new tables . . . . 99 Large object (LOB) column considerations 99 Defining Constraints . . . . . . . . 101 Defining a table check constraint. . . . 107 Defining an informational constraint . . 108 Defining a generated column on a new table . . . . . . . . . . . . . 108 Creating a user-defined temporary table 110 Defining an identity column on a new table . . . . . . . . . . . . . 111 Creating a sequence . . . . . . . . 112 Comparing IDENTITY columns and sequences . . . . . . . . . . . 114 Defining dimensions on a table . . . . 115 Creating a typed table . . . . . . . 117 Populating a typed table . . . . . . 118 Hierarchy table . . . . . . . . . 118 Creating a table in multiple table spaces 119 Creating a table in a partitioned database 120 Creating a trigger . . . . . . . . . . 122 Trigger dependencies . . . . . . . . 124 Using triggers to update view contents . . 125 Creating a user-defined function (UDF) or method . . . . . . . . . . . . . 126 Details on creating a user-defined function (UDF) or method . . . . . . . . . . 127 Creating a function mapping . . . . . 128 Creating a function template . . . . . 129 User-defined type (UDT) . . . . . . . 130 Details on creating a user-defined type (UDT). . . . . . . . . . . . . . 131 Creating a user-defined distinct type . . 131 Creating a user-defined structured type 132 Creating a type mapping . . . . . . 133 Creating a view . . . . . . . . . . 133 Details on creating a view . . . . . . . 137 Creating a typed view . . . . . . . 137 Creating a materialized query table . . . . 137 Creating a staging table . . . . . . . . 141 Creating an alias . . . . . . . . . . 143 Index, index extension, or index specification 145 Details on creating an index, index extension, or index specification . . . . . 148 Creating an index . . . . . . . . . 148 Using an index. . . . . . . . . . 150 Using the CREATE INDEX statement . . 150 Creating a user-defined extended index type 154 Details on creating a user-defined extended index type . . . . . . . . . . . . 155 Details on index maintenance . . . . . 155 Details on index searching . . . . . . 156 Details on index exploitation . . . . . 157 A scenario for defining an index extension . . . . . . . . . . . 158 Invoking the Performance Configuration Wizard through the command line processor. 161 Chapter 3. Altering a Database . . . . 163 Before Altering a Database . . . . . . . 163 Changing logical and physical design characteristics . . . . . . . . . . 163 Changing the license information . . . 163 Changing instances (UNIX only) . . . . 164 Details on changing instances . . . . . 164 Changing the node configuration file . . 169 iv Administration Guide: Implementation
Changing the database configuration file 169 Privileges, authorities, and authorization. 233 Changing the database configuration Details on privileges, authorities, and oss multiple partitions 171 authorization 235 Altering a Database System administration authority a database Altering a database partition group System control authority (SYSCTRL) Itering a table space System maintenance authority Details on altering a table space 174 (SYSMAINT ropping a schema Database administration authority modifying a table in both structure and (DBADM LOAD authority Itering a user-defined structured type 205 Database privileges Deleting and updating rows of a typed Implicit schema authority table (IMPLICIT_SCHEMA) considerations Renaming an existing table or index Dropping a table Table space privileges Dropping a user-defined temporary table 209 Table and view privileges Dropping a trigger Package privileges 246 Dropping a user-defined function(UDF) Index privileges .247 function mapping, or method Sequence pri Dropping a user-defined type (UDT)or Procedure, function, and method ype mapping privileges Altering or dropping a view 212 Controlling access to database objects Recovering inoperative views 213 Details on controlling access to Dropping a materialized query or staging 14 Granting privileges Recovering inoperative summary tables 215 Revoking privileges Dropping an index, index extension, or Managing implicit authorizations by index specification 216 creating and dropping objects Statement dependencies when changing Establishing ownership of a packag Indirect privileges through a package Indirect privileges through a package art 2 Database securit 221 containing nickname Controlling access to data with views Chapter 4. Controlling Database Access 223 Monitoring access to data using uaudi'256 Selecting user IDs and groups for your installation Data encryption Details on security based on operating Tasks and required authorizations system Using the catalog for security issues 262 Windows NT platform security Details on using the system catalog for securit considerations for users UNIX Platform security considerations for Retrieving authorization names with granted privileges General rules for naming objects and Retrieving all names with DBADM authority 264 users Authentication methods for your server etrieving names authorized to access a Authentication considerations for remote clients Retrieving all privileges granted to users 265 Partitioned database authentication Securing the system catalog view considerations Introduction to firewall support 268 Contents v
Changing the database configuration file 169 Changing the database configuration across multiple partitions . . . . . . 171 Altering a Database . . . . . . . . . 171 Dropping a database . . . . . . . . 172 Altering a database partition group . . . 173 Altering a table space . . . . . . . 173 Details on altering a table space . . . . 174 Dropping a schema . . . . . . . . 182 Modifying a table in both structure and content . . . . . . . . . . . . 183 Altering a user-defined structured type 205 Deleting and updating rows of a typed table . . . . . . . . . . . . . 205 Renaming an existing table or index . . 205 Dropping a table . . . . . . . . . 207 Dropping a user-defined temporary table 209 Dropping a trigger . . . . . . . . 209 Dropping a user-defined function (UDF), function mapping, or method . . . . . 210 Dropping a user-defined type (UDT) or type mapping . . . . . . . . . . 211 Altering or dropping a view . . . . . 212 Recovering inoperative views . . . . . 213 Dropping a materialized query or staging table . . . . . . . . . . . . . 214 Recovering inoperative summary tables 215 Dropping an index, index extension, or an index specification . . . . . . . . 216 Statement dependencies when changing objects . . . . . . . . . . . . 217 Part 2. Database Security . . . . 221 Chapter 4. Controlling Database Access 223 Selecting user IDs and groups for your installation . . . . . . . . . . . . 223 Details on security based on operating system . . . . . . . . . . . . . 225 Windows NT platform security considerations for users . . . . . . . 225 UNIX platform security considerations for users . . . . . . . . . . . . . 226 General rules for naming objects and users . . . . . . . . . . . . . 227 Authentication methods for your server . . 227 Authentication considerations for remote clients. . . . . . . . . . . . . . 232 Partitioned database authentication considerations . . . . . . . . . . . 233 Privileges, authorities, and authorization . . 233 Details on privileges, authorities, and authorization . . . . . . . . . . . 235 System administration authority (SYSADM) . . . . . . . . . . . 235 System control authority (SYSCTRL) . . 236 System maintenance authority (SYSMAINT) . . . . . . . . . . 237 Database administration authority (DBADM) . . . . . . . . . . . 238 LOAD authority . . . . . . . . . 239 Database privileges . . . . . . . . 240 Implicit schema authority (IMPLICIT_SCHEMA) considerations . . 241 Schema privileges. . . . . . . . . 242 Table space privileges . . . . . . . 244 Table and view privileges . . . . . . 244 Package privileges . . . . . . . . 246 Index privileges . . . . . . . . . 247 Sequence privileges . . . . . . . . 248 Procedure, function, and method privileges . . . . . . . . . . . 248 Controlling access to database objects . . . 248 Details on controlling access to database objects . . . . . . . . . . . . . 249 Granting privileges . . . . . . . . 249 Revoking privileges . . . . . . . . 250 Managing implicit authorizations by creating and dropping objects . . . . . 253 Establishing ownership of a package . . 253 Indirect privileges through a package . . 254 Indirect privilveges through a package containing nicknames . . . . . . . 254 Controlling access to data with views . . 256 Monitoring access to data using the audit facility . . . . . . . . . . . . 259 Data encryption . . . . . . . . . 259 Tasks and required authorizations . . . . 261 Using the system catalog for security issues 262 Details on using the system catalog for security issues . . . . . . . . . . . 263 Retrieving authorization names with granted privileges. . . . . . . . . 263 Retrieving all names with DBADM authority. . . . . . . . . . . . 264 Retrieving names authorized to access a table . . . . . . . . . . . . . 264 Retrieving all privileges granted to users 265 Securing the system catalog view . . . 266 Introduction to firewall support . . . . . 268 Contents v
Screening router firewalls Appendix B. Lightweight Directory Pplication proxy firewalls 269 Access Protocol (LDAP)Directory Circuit level firewalls Services 317 Stateful multi-layer inspection( SMLI) Introduction to Lightweight Directory Access col (LDAP) Supported LDAP client and server Chapter 5 Auditing DB2 Activities 271 configurations 318 Introduction to the DB2 audit facility 271 Support for Windows Active Director 19 Audit facility behavior Configuring DB2 in the IBM LDAP ory..320 Configu ring DB2 to use Active Directe Audit facility usage scenario Audit facilit Audit facility record layouts(introduction) 280 Creating an LDAP user Details on audit facility record layouts 280 Configuring the LDAP user for DB2 Audit record layout for AUDIT events 281 applications Audit record layout for CHECKING Registration of DB2 servers after installation 324 events Update the protocol information for the DB2 List of possible CHECKING access server 283 Catalog a node alias for ATTACH List of possible CHECKING access Deregistering the DB2 server attempted types 284 Registration of databases in the LDAP Audit record layout for OBJMAINT directory events 86 Attaching to a remote server in the LDAP Audit record layout for SECMAINT environment events Deregistering the database from the LDAP List of possible SECMAINT privileges or 290 Refreshing LDAP entries in local database Audit record layout for SYSADMIN and node directories events 293 Searching the LDAP directory partitions or List of possible SYSADMIN audit events 294 domains Audit record layout for VALIDATE events 296 Registering host databases in LDAP Audit record layout for CONTEXT events 297 Setting DB2 registry variables at the user List of possible CONTEXT audit events 298 level in the LDAP environment Audit facility tips and techniques 299 Enabling LDAP support after installation in Controlling DB2 audit facility activities . 301 complete Disabling LDAP support art 3. Appendixes 307 LDAP support and DB2 Connect Security considerations in an LDAP environment Appendix A Naming Rules 309 Security considerations for Windows 2000 Active Directory DB2 object naming rules Extending the ldap directory schema with Delimited identifiers and object names DB2 object classes and attributes User, userID and group naming rules 311 Federated database object naming rules . 312 Extending the directory schema for Windows 2000 Active Direc 339 Additional schema names information Additional password information 312 DB2 objects in the Windows 2000 Active Directory 341 Workstation naming rules Naming rules in an NLS environment LDAP object classes and attributes used by 315 DB2 Naming rules in a Unicode environment.. 316 Netscape LDAP directory support and attribute definitions 353 VI Administration Guide: Implementation
Screening router firewalls . . . . . . . 268 Application proxy firewalls . . . . . . 269 Circuit level firewalls . . . . . . . . 269 Stateful multi-layer inspection (SMLI) firewalls . . . . . . . . . . . . . 269 Chapter 5. Auditing DB2 Activities . . . 271 Introduction to the DB2 audit facility . . . 271 Audit facility behavior . . . . . . . . 273 Audit facility usage scenario . . . . . . 275 Audit facility messages . . . . . . . . 279 Audit facility record layouts (introduction) 280 Details on audit facility record layouts . . . 280 Audit record layout for AUDIT events 281 Audit record layout for CHECKING events. . . . . . . . . . . . . 281 List of possible CHECKING access approval reasons . . . . . . . . . 283 List of possible CHECKING access attempted types . . . . . . . . . 284 Audit record layout for OBJMAINT events. . . . . . . . . . . . . 286 Audit record layout for SECMAINT events. . . . . . . . . . . . . 288 List of possible SECMAINT privileges or authorities . . . . . . . . . . . 290 Audit record layout for SYSADMIN events. . . . . . . . . . . . . 293 List of possible SYSADMIN audit events 294 Audit record layout for VALIDATE events 296 Audit record layout for CONTEXT events 297 List of possible CONTEXT audit events 298 Audit facility tips and techniques . . . . 299 Controlling DB2 audit facility activities . . 301 Part 3. Appendixes . . . . . . . 307 Appendix A. Naming Rules . . . . . . 309 Naming rules . . . . . . . . . . . 309 DB2 object naming rules . . . . . . . 309 Delimited identifiers and object names . . . 311 User, userID and group naming rules . . . 311 Federated database object naming rules . . 312 Additional schema names information . . . 312 Additional password information . . . . 313 Workstation naming rules . . . . . . . 313 Naming rules in an NLS environment . . . 315 Naming rules in a Unicode environment . . 316 Appendix B. Lightweight Directory Access Protocol (LDAP) Directory Services . . . . . . . . . . . . 317 Introduction to Lightweight Directory Access Protocol (LDAP) . . . . . . . . . . 317 Supported LDAP client and server configurations . . . . . . . . . . . 318 Support for Windows Active Directory. . . 319 Configuring DB2 to use Active Directory . . 320 Configuring DB2 in the IBM LDAP environment . . . . . . . . . . . 321 Creating an LDAP user . . . . . . . . 322 Configuring the LDAP user for DB2 applications . . . . . . . . . . . . 323 Registration of DB2 servers after installation 324 Update the protocol information for the DB2 server. . . . . . . . . . . . . . 326 Catalog a node alias for ATTACH . . . . 326 Deregistering the DB2 server . . . . . . 327 Registration of databases in the LDAP directory . . . . . . . . . . . . . 327 Attaching to a remote server in the LDAP environment . . . . . . . . . . . 328 Deregistering the database from the LDAP directory . . . . . . . . . . . . . 329 Refreshing LDAP entries in local database and node directories . . . . . . . . . 330 Searching the LDAP directory partitions or domains . . . . . . . . . . . . . 331 Registering host databases in LDAP . . . 332 Setting DB2 registry variables at the user level in the LDAP environment . . . . . 334 Enabling LDAP support after installation in complete . . . . . . . . . . . . . 334 Disabling LDAP support . . . . . . . 336 LDAP support and DB2 Connect. . . . . 336 Security considerations in an LDAP environment . . . . . . . . . . . 336 Security considerations for Windows 2000 Active Directory . . . . . . . . . . 337 Extending the LDAP directory schema with DB2 object classes and attributes . . . . . 338 Extending the directory schema for Windows 2000 Active Directory . . . . . . . . 339 DB2 objects in the Windows 2000 Active Directory. . . . . . . . . . . . . 341 LDAP object classes and attributes used by DB2 . . . . . . . . . . . . . . 341 Netscape LDAP directory support and attribute definitions . . . . . . . . . 353 vi Administration Guide: Implementation
Appendix C Issuing Commands to DB2 for Windows nt user name and Multiple Database Partitions group name restrictions Issuing commands in a partitioned database Groups and user authentication on environment Windows nt rah and db2 all commands overview Trust relationships between domains on rah and db2_all command descriptions Windows nt Specifying the rah and db2_all commands 359 DB2 for Windows NT security service..386 Running commands in parallel Installing DB2 on a backup domain UNDX-based platforms Monitoring rah processes on UNIX-based DB2 for Windows NT authentication with platforms groups and dom securit Additional rah information(Solaris and AIX DB2 for Windows NT support of domain only) rah command prefix sequences ecifying the list of machines in a Appendix F Using the Windows partitioned environment Eliminating duplicate entries from a list of Windows performance monitor introduction machines in a partitioned environment.. 367 Registering DB2 with the Windows Controlling the rah command 368 performance monitor Using SRAHDOTFILES on UNIX-based Enabling remote access to DB2 performance platfor information Setting the default environment profile for Displaying DB2 and DB2 Connect rah on Windows nt 37 performance values Determining problems with rah on 3 UNIX-based platforms 371 Accessing remote DB2 performance information Appendix D Windows Managemer Resetting DB2 performance values 95 Instrumentation(WMI)Support 375 Introduction to Windows Management Appendix G. Working with Windows Instrumentation(WMi) Database partition servers 397 DB2 Universal Database integration with Listing database partition servers in an Windows Management Instrumentation Adding a database partition server to an ppendix E How DB2 for Windows NT instance(Windows orks with Windows NT Security 379 Changing the database partition(Windows) 399 DB2 for Windows Nt and Windows Nt Dropping a database partition from ar security introduction A DB2 for Windows nt scenario with server authentication 380 Appendix H Configuring Multiple Logical A DB2 for Windows NT scenario with client Nodes 403 authentication and a windows nt client When to use multiple logical nodes machine Configurin 404 A DB2 for Windows NT scenario with client authentication and a windows x client Appendix L. Extending the Control Center 407 Support for global groups (on Windows). ,- introducing the plug-in architecture for the achine Control Center 407 Using a backup domain controller with DB2 383 Control Center plug-in performance User Authentication with DB2 for Windows considerations Guidelines for Control Center plugin Contents vIl
Appendix C. Issuing Commands to Multiple Database Partitions . . . . . 357 Issuing commands in a partitioned database environment . . . . . . . . . . . 357 rah and db2_all commands overview . . . 358 rah and db2_all command descriptions . . 358 Specifying the rah and db2_all commands 359 Running commands in parallel on UNIX-based platforms . . . . . . . . 361 Monitoring rah processes on UNIX-based platforms . . . . . . . . . . . . 362 Additional rah information (Solaris and AIX only) . . . . . . . . . . . . . . 363 rah command prefix sequences . . . . . 364 Specifying the list of machines in a partitioned environment . . . . . . . 367 Eliminating duplicate entries from a list of machines in a partitioned environment. . . 367 Controlling the rah command. . . . . . 368 Using $RAHDOTFILES on UNIX-based platforms . . . . . . . . . . . . 370 Setting the default environment profile for rah on Windows NT . . . . . . . . . 371 Determining problems with rah on UNIX-based platforms . . . . . . . . 371 Appendix D. Windows Management Instrumentation (WMI) Support . . . . 375 Introduction to Windows Management Instrumentation (WMI) . . . . . . . . 375 DB2 Universal Database integration with Windows Management Instrumentation . . 376 Appendix E. How DB2 for Windows NT Works with Windows NT Security . . . 379 DB2 for Windows NT and Windows NT security introduction . . . . . . . . . 379 A DB2 for Windows NT scenario with server authentication . . . . . . . . . . . 380 A DB2 for Windows NT scenario with client authentication and a Windows NT client machine . . . . . . . . . . . . . 381 A DB2 for Windows NT scenario with client authentication and a Windows 9x client machine . . . . . . . . . . . . . 382 Support for global groups (on Windows) . . 383 Using a backup domain controller with DB2 383 User Authentication with DB2 for Windows NT. . . . . . . . . . . . . . . 384 DB2 for Windows NT user name and group name restrictions . . . . . . . 384 Groups and user authentication on Windows NT . . . . . . . . . . 385 Trust relationships between domains on Windows NT . . . . . . . . . . 385 DB2 for Windows NT security service . . 386 Installing DB2 on a backup domain controller . . . . . . . . . . . 386 DB2 for Windows NT authentication with groups and domain security . . . . . 388 DB2 for Windows NT support of domain security . . . . . . . . . . . . 389 Appendix F. Using the Windows Performance Monitor . . . . . . . . 391 Windows performance monitor introduction 391 Registering DB2 with the Windows performance monitor . . . . . . . . 391 Enabling remote access to DB2 performance information . . . . . . . . . . . . 392 Displaying DB2 and DB2 Connect performance values . . . . . . . . . 393 Windows performance objects . . . . . 393 Accessing remote DB2 performance information . . . . . . . . . . . . 395 Resetting DB2 performance values . . . . 395 Appendix G. Working with Windows Database Partition Servers . . . . . . 397 Listing database partition servers in an instance . . . . . . . . . . . . . 397 Adding a database partition server to an instance (Windows) . . . . . . . . . 398 Changing the database partition (Windows) 399 Dropping a database partition from an instance (Windows) . . . . . . . . . 401 Appendix H. Configuring Multiple Logical Nodes . . . . . . . . . . . . . 403 When to use multiple logical nodes . . . . 403 Configuring multiple logical nodes . . . . 404 Appendix I. Extending the Control Center 407 Introducing the plug-in architecture for the Control Center. . . . . . . . . . . 407 Control Center plug-in performance considerations . . . . . . . . . . . 407 Guidelines for Control Center plugin developers . . . . . . . . . . . . 407 Contents vii
Compiling and running the example plugins 408 Viewing technical documentation online Writing plugins as Control Center extensions 410 directly from the DB2 HTML Documentation Plug-in task descriptions 411 CD 143 Creating a plugin that adds a toolbar Updating the hTmL documentation installed button on your machine 44 Creating a plug-in that adds new menu Copying files from the DB2 HTML items to the Database object 412 Documentation Cd to a Web Server Creating a plug-in that adds plug-in Troubleshooting DB2 documentation search objects under Database in the tree 417 with Netscape 4. Disabling configuration features with Searching the DB2 documentation isConfigurableO Online dB2 troubleshooting informatio Disabling the ability to alter objects using Accessibility isEditableO Keyboard Input and Navigation 449 Disabling the default buttons in Accessible Display configuration dialogs using Alternative Alert Cues has Configuration Defaults Compatibility with Assistive Technologies 45( Accessible Documentation Appendix J DB2 Universal Database DB2 tutorial 450 technical information DB2 Information Center for topics Overview of DB2 Universal Database technical information Appendix K. Notices Categories of DB2 technical information 429 Trademarks Printing DB2 books from PDF files Ordering printed DB2 book ndex Accessing online help Finding topics by accessing the DB2 Contacting IBM 469 Information Center from a browser 440 Product information Finding product information by accessing le DB2 Information Center from the administration tools 42 Vill Administration Guide: Implementatic
Compiling and running the example plugins 408 Writing plugins as Control Center extensions 410 Plug-in task descriptions . . . . . . . 411 Creating a plugin that adds a toolbar button . . . . . . . . . . . . 411 Creating a plug-in that adds new menu items to the Database object . . . . . 412 Creating a plug-in that adds plug-in objects under Database in the tree . . . 417 Disabling configuration features with isConfigurable() . . . . . . . . . 427 Disabling the ability to alter objects using isEditable() . . . . . . . . . . . 428 Disabling the default buttons in configuration dialogs using hasConfigurationDefaults(). . . . . . 428 Appendix J. DB2 Universal Database technical information . . . . . . . . 429 Overview of DB2 Universal Database technical information . . . . . . . . 429 Categories of DB2 technical information 429 Printing DB2 books from PDF files . . . . 437 Ordering printed DB2 books . . . . . . 438 Accessing online help . . . . . . . . 438 Finding topics by accessing the DB2 Information Center from a browser . . . . 440 Finding product information by accessing the DB2 Information Center from the administration tools . . . . . . . . . 442 Viewing technical documentation online directly from the DB2 HTML Documentation CD. . . . . . . . . . . . . . . 443 Updating the HTML documentation installed on your machine . . . . . . . . . . 444 Copying files from the DB2 HTML Documentation CD to a Web Server. . . . 446 Troubleshooting DB2 documentation search with Netscape 4.x . . . . . . . . . . 446 Searching the DB2 documentation . . . . 447 Online DB2 troubleshooting information . . 448 Accessibility . . . . . . . . . . . 449 Keyboard Input and Navigation . . . . 449 Accessible Display . . . . . . . . 450 Alternative Alert Cues . . . . . . . 450 Compatibility with Assistive Technologies 450 Accessible Documentation . . . . . . 450 DB2 tutorials . . . . . . . . . . . 450 DB2 Information Center for topics . . . . 451 Appendix K. Notices . . . . . . . . 453 Trademarks . . . . . . . . . . . . 456 Index . . . . . . . . . . . . . 459 Contacting IBM . . . . . . . . . . 469 Product information . . . . . . . . . 469 viii Administration Guide: Implementation
About this book The Administration Guide in its three volumes provides information necessary (RDBMS) Products, and includes Information about database design(found in Administration Guide: Planning) Information about implementing and managing databases(found in Administration Guide: Implementation Information about configuring and tuning your database environment to improve performance(found in Administration Guide: Performance) Many of the tasks described in this book can be performed using different interfaces: The Command Line Processor, which allows you to access and manipul databases from a graphical interface. From this interface, you can also execute SQL statements and DB2 utility functions. Most examples in this book illustrate the use of this interface. For more information about using the command line processor, see the Command reference. The application programming interface, which allows you to execute DB2 utility functions within an application program. For more information about using the application programming interface, see the Administrative API Refe The Control Center, which allows you to use a graphical user interface to perform administrative tasks such as configuring the system, managing directories, backing up and recovering the system, scheduling jobs, and managing media. The Control Center also contains Replication Administration, which allows you set up the replication of data between systems. Further, the Control Center allows you to execute DB2 utility functions through a graphical user interface. There are different methods to invoke the Control Center depending on your platform. For example,use the db2cc command on a command line, select the Control Center icon from the DB2 folder, or use the Start menu on Windows platforms. For introductory help, select Getting started from the Help pull-down of the Control Center window. The Visual Explain and Performance Monitor tools are invoked from the Control Center There are other tools that you can use to perform administration tasks. they The Script Center to store small applications called scripts. These scripts may contain SQL statements, DB2 commands, as well as operating system commands right IBM Corp. 1993-2002 IX
About this book The Administration Guide in its three volumes provides information necessary to use and administer the DB2 relational database management system (RDBMS) products, and includes: v Information about database design (found in Administration Guide: Planning) v Information about implementing and managing databases (found in Administration Guide: Implementation) v Information about configuring and tuning your database environment to improve performance (found in Administration Guide: Performance) Many of the tasks described in this book can be performed using different interfaces: v The Command Line Processor, which allows you to access and manipulate databases from a graphical interface. From this interface, you can also execute SQL statements and DB2 utility functions. Most examples in this book illustrate the use of this interface. For more information about using the command line processor, see the Command Reference. v The application programming interface, which allows you to execute DB2 utility functions within an application program. For more information about using the application programming interface, see the Administrative API Reference. v The Control Center, which allows you to use a graphical user interface to perform administrative tasks such as configuring the system, managing directories, backing up and recovering the system, scheduling jobs, and managing media. The Control Center also contains Replication Administration, which allows you set up the replication of data between systems. Further, the Control Center allows you to execute DB2 utility functions through a graphical user interface. There are different methods to invoke the Control Center depending on your platform. For example, use the db2cc command on a command line, select the Control Center icon from the DB2 folder, or use the Start menu on Windows platforms. For introductory help, select Getting started from the Help pull-down of the Control Center window. The Visual Explain and Performance Monitor tools are invoked from the Control Center. There are other tools that you can use to perform administration tasks. They include: v The Script Center to store small applications called scripts. These scripts may contain SQL statements, DB2 commands, as well as operating system commands. © Copyright IBM Corp. 1993 - 2002 ix