SAP Adaptive Server Enterprise 16.0
Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX
Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux
Release Bulletin SAP Adaptive Server Enterprise 16.0 Solaris
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows
Release Bulletin SAP Control Center 3.3
Product Summary
Installation and Upgrade
Installation and Implementation of SAP Control Center
Choosing an Installer
Supported Server Versions
Supported Product Modules and Release Documents
Known Issues
Known Issues for Installation, Upgrade, and Deployment
Known Issues for SAP Control Center
Known Issues for SAPĀ® Adaptive ServerĀ® Enterprise
Known Issues for Data Assurance
Known Issues for Replication
Known Issues for SAP Sybase Event Stream Processor
Known Issues for SAP Sybase IQ
Known Issues for Accessibility
Documentation Changes
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
SAP Control Center Accessibility Information
Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Making Input/Output Completion Port API Available
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
The System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux
Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Preparing to Install SAP ASE
Managing Java in the Database During Installations and Upgrades
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Set Up sybase User in Windows
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Adding a Server to the Interfaces File
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading SAP ASE on Windows
Testing the SAP ASE Upgrade
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Control Center 3.3
About SAP Control Center
Installation Task Flows for SAP Control Center
Planning Your Installation
Obtaining a License
System Requirements
SAP Control Center Network Ports
Installation Considerations
Preparing to Roll Back from an Upgrade
Preinstallation Tasks
Installing SAP Control Center
Installing with the SAP Installer
Installing with a Response File
Creating a Response File
Installing in Unattended (Silent) Mode
Uninstalling
Upgrading SAP Control Center
Upgrading a Singleton SAP Control Center
Upgrading Shared-Disk Instances
Installing JDBC Drivers for Third-Party Replicate Databases
Starting and Stopping SAP Control Center
Registering the ODBC Driver in Windows
Starting and Stopping SAP Control Center in Windows
Starting and Stopping SAP Control Center in UNIX
Getting Started After Installing
Configuring the SSL Certificate
Setting Passwords or Disabling Default Login Accounts
Encrypting a Password
Enabling Incremental Backups
Configuring SAP Control Center
Troubleshooting Installation
Configuration Guide for UNIX Adaptive Server Enterprise 16.0
About SAP ASE
System-Specific Issues
System User Roles
Environment Variables
SAP ASE Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
sybmgmtdb Database
Using Operating System Files as Database Devices
The directio Parameter
The dsync Parameter
Determine the Size of a Database Device
Support for Raw Partitions or Files
Preparation of a Raw Partition Device
Choosing a Raw Partition
Client/Server Communication
About Changing SAP ASE Configuration
Languages Other Than US English
SAP ASE Specifications
Database Specifications
Table Specifications
Procedure Specifications
Query Specifications
Maximum Column Sizes
Database Requirements for Varying Page Sizes
Data Limits for Tables According to Page Size
Start and Stop Servers
Start Servers
Server Start-up Parameters
RUN_server_name File
Using the startserver Command
Start Servers When the Operating System Restarts
Creating a System Restart Script for HP-UX
Creating a System Restart Script for IBM RS/6000
Creating a System Restart Script for Sun Solaris and Linux
Starting XP Server After Initial Installation
Stop Servers
Stopping SAP ASE
Stopping Backup Server
Using the kill Command
Shutdown and Shared Memory Files
Huge Pages on Linux
Configure the Operating System
Verifying Environment Variables
Using the stty Setting
Restore Correct Permissions
File Descriptors and User Connections
File Descriptors and User Connections for HP-UX
File Descriptors and User Connections for AIX
File Descriptors and User Connections for Linux
File Descriptors and User Connections for Sun Solaris
Displaying Current Soft and Hard Limits
Increasing the Soft Limit
Increasing the Hard Limit
Enable Asynchronous Disk I/O
Enabling Asynchronous Disk I/O on Linux
Enabling Asynchronous Disk I/O on IBM AIX
Enabling Asynchronous Disk I/O HP-UX
Enabling Asynchronous I/O for File System Devices
Enabling Asynchronous I/O for File Systems
Adjust the Client Connection Timeout Period
Adjusting the Client Connection Timeout for HP-UX
Adjusting the Client Connection Timeout for IBM RS/6000
Adjusting the Client Connection Timeout for Linux
Check for Hardware Errors
Monitor the Use of Operating System Resources
Monitor Operating System Resources for HP-UX
Monitor Operating System Resources for IBM RS/6000
Monitor Operating System Resources for Sun Solaris and Linux
Check Database Integrity
Configuring New Servers with srvbuild
Optimize the SAP ASE Configuration
SAP ASE Default Configuration
Default Settings
Set Up Communications Across the Network
How SAP ASE Determines Which Directory Service Entry to Use
How a Client Uses Directory Services
Create a Directory Services Entry
Supported Directory Drivers
Contents of the interfaces File
interfaces File Format
Components of an interfaces File Entry
Create a Master interfaces File
Using dsedit or dscp to Create a Master interfaces File
Using a Text Editor to Create a Master interfaces File
Configure the interfaces File for Multiple Networks
Configuring the Server for Multiple Network Handlers
Configure Client Connections
Manage One Network-Independent DSQUERY Name
Using Different DSQUERY Names
Configuring for Query Port Backup
IPv6 Support
IPv6 Infrastructure
Troubleshoot
Troubleshooting when the Server Fails to Start
Troubleshooting an Error when Executing an ESP
Use the Lightweight Directory Access Protocol as a Directory Service
LDAP Directory Services Versus the SAP Interfaces File
The libtcl*.cfg File
Enabling LDAP Directory Services
Keywords for the LDAP URL Variables
Adding a Server to the Directory Services
Multiple Directory Services
Encrypting the Password
Performance
Migrating from the interfaces File to LDAP
Localization Support
Language Modules
Default Character Sets
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Names
Load Character Sets
Language Definition Files Sort Order
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders for Character Sets
Language Modules
Installing a New Language Module
Message Languages
Localization Directories
About the locales Directory
About the charsets Directory
Format of locales.dat File Entries
How Client Applications Use locales.dat
Changing SAP ASE Localization Configuration
Configuring SAP ASE for Other Character Sets
Editing the locales.dat File
Changing Backup Server Localization Configuration
SAP ASE Error Logging
Set Error Log Paths
Set the SAP ASE Error Log Path
Manage Messages
Log User-Defined Messages
Log Auditing Events
Manage Database Devices
Device Requirements
Create Files for Database Devices
Database Management System Auditing
Audit System Devices and Databases
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Configuration Guide for Windows Adaptive Server Enterprise 16.0
About SAP ASE
System-Specific Issues
User Roles
Environment Variables
SAP ASE Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
Using Operating System Files as Database Devices
The dsync Parameter
The directio Parameter
Client/Server Communication
About Changing SAP ASE Configurations
Languages Other Than US English
SAP ASE Specifications
Database Specifications
Table Specifications
Query Specifications
Procedure Specifications
Extended-Limit Capabilities
Start and Stop Servers
Server Start-up Parameters
Specifying Additional Start-up Parameters
Starting and Stopping Servers Using Unified Agent
Start and Stop Servers Using the Control Panel
Starting Servers as an Automatic Service
Setting Up SAP ASE as an Automatic Service
Starting, Stopping, and Pausing Servers Manually
Stopping Backup Server
Stopping SAP ASE
Monitor Servers
Monitoring Servers with the Control Panel
SAP ASE Configurations
Default SAP ASE Configuration
Default SAP ASE Parameter Settings
Default Backup and XP Server Settings
Change SAP ASE Configurations
Starting Server Config
Configuring SAP ASE
Setting SAP ASE Parameters
Changing the Default Backup Server
Changing the Default XP Server
Configuring Backup Server
Configuring Job Scheduler and Self Management
Optimize the SAP ASE Configuration
Network Communications Using sql.ini
Client Connections to SAP ASE
Determine the Address to Listen for Client Connections
Client Access to SAP ASE
Enabling Client Access to a Server
Changing the Server Entries in sql.ini
Components in the sql.ini File
Server Name
Network Driver
Service Type
Server Address
Address Format
IP Address
Named Pipes Format
Windows Sockets Format
Increasing Windows Sockets Connections
Modifying an Existing TcpNumConnections Value
Adding a TcpNumConnections Value
Using Multiple TCP/IP Network Interface Cards
Controlling the Connection Timeout
Increasing the TcpKeepTries Value
NWLink IPX/SPX Format
Available NWLink IPX/SPX Connection Formats
Selecting Valid Connection Formats
Share Network Configuration Information
Creating a Master sql.ini File
Windows Registry as a Directory Service
Using Windows Registry as a Directory Service
Verify Server Connections
Configure ODBC Connections
Configuring the ODBC Driver
IPv6 Support
IPv6 Infrastructure
Lightweight Directory Access Protocol in SAP ASE
LDAP Directory Services versus the SAP Interfaces File
The libtcl.cfg File
Enabling LDAP Directory Services
Adding a Server to the Directory Services
Adding a Server Entry to the Directory Service Using dsedit
Multiple Directory Services
Encrypting the Password
Performance with LDAP
Migrating from the sql.ini File to LDAP
Localization Support
Language Modules
Default Character Sets for Servers
Changing the Default Character Set for Servers
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders
Language Modules
Installing a New Language Module
Message Languages
Localization
Localization Directories
charsets and locales Directories
Format of locales.dat File Entries
Client Application Use of locales.dat
Editing the locales.dat File
Changing SAP ASE and Backup Server Localization Configuration
Completing SAP ASE Localization Changes
Completing Backup Server Localization Changes
Configuring SAP ASE for Other Character Sets
Language-Specific Sort Orders
SAP ASE Character Set Names
charset Utility
Log Error Messages and Events
SAP ASE Error Logging
Windows Event Logging
Setting Up Windows Event Logging
Enable and Disable Windows Event Logging
Enabling or Disabling Event Logging Using Server Config Utility
Enabling or Disabling Event Logging Using sp_configure
Windows Event Log Information
Manage Logs
Set Error Log Paths
Setting the SAP ASE Error Log Path
Setting the Backup Server Error Log Path
Manage Messages
Log User-Defined Messages
New Messages
Existing Messages
Log Auditing Events
Log User-Defined Events
Using a Remote Log
Central Logging Site
Log Messages from Multiple SAP ASEs
Set Up a Local Central Logging Site
Creating a Registry key
Defining a Registry Key
View Messages
Viewing Messages in the Windows Event Log
Viewing Messages in the SAP ASE Error Log
Security Services with Windows LAN Manager
How Login Authentication Works
Administering Security Services Using LAN Manager
Modify Configuration Files Required for a Unified Login
Set Up Drivers for Network-Based Security
Entries for Network Drivers
Entries for Directory Services
Entries for Security Drivers
Editing the libtcl.cfg File
Checking the LAN Manager's Local Name
Specifying Security Information for SAP ASE
Identify Users and Servers to LAN Manager
Configure SAP ASE for LAN Manager Security
Enabling and Disabling External Security Services
Manage Unified Login
Requiring Unified Login
Establishing a Secure Default Login
Map LAN Manager Login Names to Server Names
Data Integrity Check
Ensure Adequate Memory for Security Services
Add Logins to Support Unified Login
Adding Logins
Define the Connection to a Server for Security Services
Specifying the Principal Name
Specifying Network-Based User Authentication
Specifying the Name Assigned to LAN Manager
Determining the Status of Security Services
Configuration Parameters Used in Security Services
Data Integrity Check
Message Sequence Check
Detect Interception or Replay
Specify a Login
Control User Authentication
Manage Login Security on an Windows Computer
SAP ASE Security
Combined SAP ASE and Windows Login Security
Trusted Connections and Combined Login Security
Login Security Modes
Standard Mode
Integrated Mode
Mixed Mode
Manage the Login Security Features
Permit Trusted Connections
Windows Registry Parameters
Default Login
Default Domain
SetHostName
Character Mappings
Modify the Parameter Values
Administer Login Security Using System Procedures
Assigning Trusted Connection Permissions
Display the Current Registry Values
Display Permissions and User Names
Revoke Permissions Granted with sp_grantlogin
Configuring Login Security
Creating Windows Users and Groups
Configuring Mapping and Default Domain Values
Setting Login Security Mode
Adding Network Login Names to syslogins
Assigning Roles
Change Login Security Options
Enabling Standard Login Security Mode
Enabling Integrated or Mixed Login Security Mode
Manage SAP ASE Databases
Manage Database Devices
Device Requirements
Creating .dat Files for Database Devices
Back Up and Restore Data
Backing Up Data with a Tape Drive
Windows Tape Drive Names
Set the Maximum Capacity for a Tape Drive
Backing Up Data Using a Hard Disk
Dumping Across a Network
Examples of Backing Up and Restoring User Databases
Back Up and Restore to a Database and Device
Back Up and Restore on a Remote Backup Server
Backup File Names
Additional Dump Devices
Tape Handling Options
Get Information About Files
Backing Up and Restoring System Databases
Optimize SAP ASE Performance and Tuning
Using Dedicated SAP ASE Operation
Disk Drives and SAP ASE Performance
Monitor Disk Usage
Monitoring SAP ASE Statistics
Database Management System Auditing
Audit System Devices and Databases
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Troubleshoot Network Connections
Running Server Ping
Troubleshoot Connection Failures
Using Returned Messages to Diagnose a Failure
Troubleshooting a Connection Failure to SAP ASE
Failure to Load Net-Library DLLs
Troubleshooting Failure of Other Applications
Before Calling Technical Support
SAP ASE Registry Keys
\SOFTWARE\SYBASE\Server\server_name
\SOFTWARE\SYBASE\SQLServer\server_name\parameter
\SOFTWARE\SYBASE\SQLServer
\SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
New Features Summary SAP Adaptive Server Enterprise 16.0
Version 16.0
Increased Data Availability with Partition Locking
CIS Support for HANA Server
Relaxed Query Limits
Query Plan Optimization with Star Joins
Query Performance Improvements
Full-Text Auditing
Auditing for Authorization Checks Inside Stored Procedures
Replacing Object Definitions
Query Plan and Execution Statistics in HTML
Index Compression
SAP JVM Support
Full Database Encryption
Scalability Enhancements and Features
Monitoring Threshold-Based Events
Multiple Triggers
Residual Data Removal
Configuration History Tracking
Cyclic Redundancy Checks for dump database
Calculating the Transaction Log Growth Rate
System Changes for SAP ASE Version 16.0
Version 15.7 SP100
Adaptive Server 15.7 SP100 Feature and Platform Matrix
Shrinking Databases
Enhancements to Backup and Restore
Aggregating Metrics from Syntactically Similar Queries
Updates to Precomputed Result Sets
Improved Data Load Performance
Incremental Reorganization
Creating Indexes Without Blocking Access to Data
Query Plan and Execution Statistics in HTML
Gathering Hash-Based Statistics with create index
Query Plan Optimization with Bloom Filters
Support for Replication by Column Value
Support for Multiple Scanner Threads
Sybase Central Adaptive Server Plug-in
Running Adaptive Server on VMware vSphere
Support for OData
Support for NTLM and MIT Kerberos on Windows 64-bit
Properties Added to Responses File
Automatic Physical Database Rearrangement
System Changes for Adaptive Server Version 15.7 SP100
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Permission Changes for Commands and Functions
Version 15.7 ESD #4
15.7 ESD #4.2
Improved Rollback Reporting
15.7 ESD #4
Remote Backup Server Maximum Name Length
Support for Query Plan Pinning
AF_UNIX Support
Changes to sp_addthreshold and Roles
System Changes for Adaptive Server Version 15.7 ESD #4
Utilities
Configuration Parameters
Version 15.7 ESD #3
sybrestore Utility
System Changes for Adaptive Server Version 15.7 ESD #3
Commands
Functions
System Stored Procedures
Monitoring Table Changes
Version 15.7 ESD #2
Granular Permissions
Predicated Privileges
Deferred Table Creation
Online Utilities
Merging and Splitting Partitions
Maximum Size of Query in the Statement Cache
Enhancements to show_cached_plan_in_xml
Fast-Logged Bulk Copy
Precomputed Result Sets
Concurrent dump database and dump transaction Commands
Hash-Based Update Statistics
Enhancements to dump and load
alter table drop column without datacopy
Expanded Maximum Database Size
User-Defined Optimization Goal
Shared Query Plans
Initializing Databases Asynchronously
In-Row Large Object Compression
Configuring Shared Memory Dumps
System Changes for Adaptive Server Version 15.7 ESD #2
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Version 15.7 ESD #1
Proxy Table Support for In-row LOB Columns
Support for System Procedures in Replicated Master Database
Increased Number of Parameters
Multiple Listeners on Windows
Windows Supports Adaptive Server High Availability
New and Changed Configuration Parameters
Version 15.7
Application Functionality Configuration Group
New Adaptive Server Kernel
Compressing Data in Adaptive Server
New Security Features
End-to-End CIS Kerberos Authentication
Dual Control of Encryption Keys and Unattended Startup
Securing Logins, Roles, and Password Management Extensions
Login Profiles
Employee Lifecycle Management
External Passwords and Hidden Text
Abstract Plans in Cached Statements
Shrink Log Space
Displaying Currently Set Switches with sysoptions
Changes for Large Objects
In-Row Off-Row LOB
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Using LOB Locators in Transact-SQL Statements
Extension to where Clause for Large Objects
Showing Cached Plans in XML
Padding a Character Field Using str
Changes to select for update
Creating Nonmaterialized, Non-null Columns
Sharing Inline Defaults
Retain Monitoring Data
Analyze Dynamic Parameters
Monitor Lock Timeouts
Truncate Trailing Zeros
Fully Recoverable DDL
Transfer Rows from Source to Target Table Using merge
View Statistics and Histograms with sp_showoptstats
Changes to Cursors
Release Cursor Locks at Cursor Close
Enhanced Transaction Support for Cursors
Monitor Cursor Statements
Nested select Statement Enhancements
Changes to Commands and System Procedures in Chained Transaction
Expanded Variable-Length Rows
Changes to like Pattern Matching
Changes to Quoted Identifiers
Allowing Unicode Noncharacters
Reduce Query Processing Latency
The sybdiag Utility
The Optimizer Diagnostic Utility
System Changes for Adaptive Server Version 15.7
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
New Monitoring Tables
Changes to Monitoring Tables
Global Variables
Version 15.5 Cluster Edition
Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
Multiple simultaneous failover
Adding space to an archive database
Distributed transaction management in the shared-disk cluster
System Changes for Adaptive Server Version 15.5 Cluster Edition
Changed commands
Monitoring Tables
Configuration Parameters
Functions
Version 15.5
Adaptive Server 15.5 Feature and Platform Matrix
In-Memory and Relaxed-Durability Databases
Faster Compression for Backups
Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
Deferred Name Resolution for User-Defined Stored Procedures
FIPS 140-2 Login Password Encryption
Incremental Data Transfer
bigdatetime and bigtime Datatypes
Creating and Managing tempdb Groups
System Changes for Adaptive Server Version 15.5
Datatypes
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Utilities
Auditing
Version 15.0.3
SQL Statement Replication
Security Enhancements
LDAPS User Authentication Enhancement
Automatic LDAP User Authentication and Failback
Login Mapping of External Authentication
Using SSL to Specify a Common Name
Concurrent Kerberos Authentication
Virtually Hashed Tables
Huge Pages
Upgrading During a High Availability Configuration
Reinstalling System Stored Procedures
Distributed Transaction Management (DTM)
Adaptive Server Plug-in Updates
The Java Interface
System Changes for Adaptive Server Version 15.0.3
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Version 15.0.2
Encrypted Columns
Archive Database Access
Finding Slow-Running Queries
Deferred Compilation
Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Statistical Aggregate Functions
Standard Deviation and Variance
Eager and Lazy Aggregation
Vector and Scalar Aggregation
Improved Performance for Data Insertion
Using Asynchronous Writes During a Page Split
Improving Throughput of tempdb Transactions
Post-commit Optimization
Changes to the Query Processor
Deferred Compilation
Non-binary Character Set Histogram Interpolation
Expression Histogramming Selectivity Estimates
Viewing Current Optimizer Settings
New Security Features
PAM Support in 64-bit Adaptive Server on AIX
Global Login Triggers Set Automatically
SSL Support
Improved Password Security
Auditing Enhancements
Hiding System Stored Procedure and Command Password Parameters
Monitoring Failed Login Attempts
High Availability Considerations
Installing and Editing Monitoring Tables
Monitoring Tables for the Statement Cache
Row-Level Locking for System Tables
The xmltable() Function
Relocated Joins
User-Defined SQL Functions
instead of Triggers
System Changes for Adaptive Server Version 15.0.2
Trace Flags
Commands
Changes to the set Command
Utilities
System Stored Procedures
System Tables
Configuration Parameters
Functions
Global Variables
Version 15.0.1
Changes to Abstract Plans
New Query-Level Settings
Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
Extending the Optimizer Criteria Set Syntax
Literal Parameterization
System Changes for Adaptive Server Version 15.0.1
Functions
Configuration Parameters
Commands
Monitoring Tables
Version 15.0
Partition Support
Row-Locked System Catalogs
Query Processor
Large Identifiers
Computed Columns
Differences Between Computed Columns and Function-Based Indexes
Differences Between Materialized and Not Materialized Computed Columns
Scrollable Cursors
unitext Datatype Support
big int Datatype Support
Unsigned Integer Datatype Support
Integer Identity
Enhancements to XML Services
Adaptive Server Plug-in Enhancements
Interactive SQL
User-Defined Web Services
Very Large Storage Support
Automatic Running of update statistics
SySAM License Management
Query Processing Metrics (qp Metrics)
Updates to Abstract Plans
showplan Changes
Secure Socket Layer Uses FIPS 140-2
System Changes for Adaptive Server Version 15.0
Utilities
Reserved Words
Global Variables
Configuration Parameters
Functions
Commands
System Stored Procedures
System Tables
Monitoring Tables
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
New Features Guide SAP Adaptive Server Enterprise 16.0
Overview of Version 16.0
Increased Data Availability with Partition Locking
Partition Locks
Partition Lock Name
Enabling Partition Locking
View Partition Locks with sp_lock
View Partition Locks with sp_familylock
View Partition Locks with monLocks and monDeadLock
Deadlocks and Lock Timeouts
Partition Lock Promotion
Setting Partition Lock Promotion Thresholds
Dropping Partition Lock Promotion Thresholds
Lock Compatibility and Lock Sufficiency
Partition Lock Compatibility
Partition Lock Sufficiency
Schema Lock Compatibility
Schema Lock Sufficiency
Improved Concurrency for Partition-Level Online Operations
Partition-Level Online Operation Syntax
Concurrency with Partition-Level Online Operations
Partition-Level Online Operations with Global Index
Schema Locks
Component Integration Services Support for HANA Server
Configuring CIS for HANA
Creating SAP HANA as an ODBC Data Source on Windows
Adding SAP HANA to the SAP ASE Interfaces File
Configuring the PCI Bridge and PCA/ODBC
Adding Server Class HANAODBC
Datatype Mapping Between SAP ASE and HANA
Restrictions
Relaxed Query Limits
Query Plan Optimization with Star Joins
Star Join Hint
Star Join Query Plans Under the use fact_table Hint
Query Performance Improvements
Dynamic Thread Assignment
SORT Operator Performance Improvement
Hash Join Operator Performance Improvement
Full-Text Auditing
Auditing for Authorization Checks Inside Stored Procedures
Replacing Object Definitions
Install Script Changes
Data and Log Segment Changes
Query Plan and Execution Statistics in HTML
Option for Prefix of Generated File
Index Compression
Enabling Index Compression
Creating an Index Compressed Table
Creating a Compressed Index
Changing the Compression State
SAP JVM Support
Full Database Encryption
Full Database Encryption Versus Encrypted Columns
Creating the Database Encryption Key
Changing a Database Encryption Key
Dropping a Database Encryption Key
Create an Encrypted Database
Encrypt an Existing Database
Encryption Status and Progress
Performance Considerations
Suspend the Encryption Process
The quiesce database Command and Fully Encrypted Databases
Resume the Encryption Process
Decrypt an Encrypted Database
Recover Fully Encrypted Databases
Back Up (Dump) a Fully Encrypted Database
Back Up the Database Encryption Key
Restore (Load) Backups of Fully Encrypted Databases
Loading Behavior of Encrypted Databases
Dropping a Database That is Being Encrypted
Mounting and Unmounting a Fully Encrypted Database
Archive Databases and Full Encryption
Full Database Encryption and System Changes
Scalability Enhancements and Features
Run-Time Logging Enhancements
Lock Management Enhancements
Metadata and Latch Management Enhancements
Monitoring Threshold-Based Events
Multiple Triggers
Creating Multiple Triggers
Changing the Order of When a Trigger is Fired
Order of Triggers in Merge Statements
Transactional Behavior with Multiple Triggers
Disabling and Reenabling Triggers
@@trigger_name Global Variable
Residual Data Removal
Configuration History Tracking
Configuring SAP ASE to Track Configuration Changes
Changes Captured
Querying ch_events to View Changes
Cyclic Redundancy Checks for dump database
Calculating the Transaction Log Growth Rate
System Changes
Configuration Parameters
New Configuration Parameters
Changed Configuration Parameters
Built-In Functions
dbencryption_status
Commands
alter database for Full Database Encryption
alter index
alter table for Index Compression
alter table for Multiple Triggers
alter table for Residual Data Removal
create archive database for Full Database Encryption
create database for Full Database Encryption
create default
create encryption key
create function
create function (SQLJ)
create index
create procedure
create procedure (SQLJ)
create rule
create table for Index Compression
create table for Residual Data Removal
create trigger for Multiple Triggers
create trigger for or replace
create view
drop encryption key
drop trigger
dump database
kill
load database
select
select into
set
System Procedures
Changed System Procedures
sp_audit
sp_chgattribute
sp_clusterlockusage
sp_dboption
sp_depends
sp_encryption
sp_familylock
sp_helpdb
sp_lock
New System Procedures
sp_confighistory
sp_ dropglockpromote_ptn
sp_droprowlockpromote_ptn
sp_helptrigger
sp_jsconfigure
sp_logging_rate
sp_setpglockpromote_ptn
sp_setrowlockpromote_ptn
System Tables
Changed System Tables
New System Tables
ch_events
Changed Monitoring Tables
New Monitoring Tables
monThresholdEvent
Utilities
ddlgen
sybmigrate
sybrestore
Global Variables
Security Administration Guide SAP Adaptive Server Enterprise 16.0
SAP Control Center 3.3 for SAP Adaptive Server Enterprise
About SAP Control Center for SAP Adaptive Server Enterprise
New Features in SAP Control Center for SAP Adaptive Server Enterprise
User Interface Overview
Toolbar Icons
Status Icons
Display and Copy Options in SAP Adaptive Server Enterprise Monitors
Common Display Options
Keyboard Shortcuts
Displaying the Versions of SCC Components
Style and Syntax Conventions
SAP Control Center Accessibility Information
Get Started
Quick Start for an Evaluation
Get Started in a Production Environment
Deploying an Instance from a Shared Disk Installation
Enabling and Disabling Shared-Disk Mode
Shared-Disk Mode
sccinstance Command
Launching SAP Control Center
Registering the ODBC Driver in Windows
Starting and Stopping SAP Control Center in Windows
Starting and Stopping SAP Control Center in UNIX
Configuring Memory Usage
Changing a Memory Option on the Command Line
Changing a Memory Option for an SAP Control Center Windows Service
Changing a Memory Option for an SCC UNIX Service
scc Command
Logging in to SAP Control Center
Logging out of SAP Control Center
Setting Up Security
Security
Configuring Authentication for Windows
Configuring a Pluggable Authentication Module (PAM) for UNIX
Configuring an LDAP Authentication Module
LDAP Configuration Properties
Mapping SAP Control Center Roles to LDAP or OS Groups
Encrypting a Password
Configuring Ports
Configuring the E-mail Server
Configuring the Automatic Logout Timer
Configuring Retrieval Thresholds for the Administration Console
User Authorization
Assigning a Role to a Login or a Group
Removing a Role from a Login or a Group
Adding a Group
Removing a Group
Adding a Login Account to a Group
Removing a Login Account from a Group
Adding a Login Account to the System
Removing a Login Account from the System
Modifying a User Profile
Logins, Roles, and Groups
Configure
Configuring SAP Adaptive Server Enterprise for Monitoring
Registering an SAP ASE Server
Importing Resources for Batch Registration
Registering the Agent for an SAP ASE Server
Authenticating a Login Account for a Managed Resource
Role Assignment in SAP Control Center for SAP ASE
Encrypted Authentication for SAP ASE
Setting Up Statistics Collection
About Statistics
SAP ASE Data Collections
Key Performance Indicators for SAP ASE
Creating an Alert
SAP ASE Alerts
Alert Types, Severities, and States for SAP ASE
Alert-Triggered Scripts
Alert-Triggered Script Examples
Substitution Parameters for Scripts
Setting Display Options for SAP ASE Performance Data
Optional Configuration Steps
Manage and Monitor
Displaying Resource Availability: the Heat Chart
Graphing Performance Counters: the Statistics Chart
Manage SAP Control Center
Administration Console
Browsing and Managing Resources
Searching and Filtering Resources
Searching for Objects in SAP ASE
Manage Message Rows for Search Requests
Configuring Retrieval Thresholds for the Administration Console
Job Scheduling
Executing and Stopping a Data Collection Job
Deleting a Data Collection Job
Resuming and Suspending a Data Collection Job
Adding a New Schedule to a Job
Viewing or Deleting a Schedule
Modifying the Data Collection Interval for a Job
Resuming and Suspending the Scheduler
Viewing the Job Execution History
Alerts
SAP ASE Alerts
Alert Types, Severities, and States for SAP ASE
Creating an SAP ASE Alert
Displaying SAP ASE Alerts
Modifying an Alert
Deleting an Alert
Alert Subscriptions
Adding or Modifying an Alert Subscription
Unsubscribing from an Alert
Enabling and Disabling Alert Subscription
Alert Notifications
Displaying Alert History and Resolutions
Resolving Alerts
Alert-Triggered Scripts
Substitution Parameters for Scripts
Testing an Alert-Triggered Script
Alert-Triggered Script Examples
Resources
Unregistering a Resource
Adding a Resource to a Perspective
Removing a Resource from a Perspective
Modifying a Resourceās Name and Connection Properties
Searching for Resources in the Resource Explorer
Perspectives
Creating a Perspective
Removing a Perspective
Renaming a Perspective
Views
Managing a View
Arranging View Layout in a Perspective
Instances
Enabling and Disabling Shared-Disk Mode
Deploying an Instance from a Shared Disk Installation
Refreshing or Converting an Instance
Removing an Instance
Shared-Disk Mode
sccinstance Command
Repository
Scheduling Backups of the Repository
Modifying the Backup Schedule
Forcing an Immediate Backup
Restoring the Repository from Backups
Configuring Repository Purging
Logging
Viewing the SAP ASE Component Log
Viewing SAP Control Center Server Logs
Viewing the SAP Control Center Client Log
Changing the Logging Level
Logging or Message Levels
Changing Logging Configuration
SAP Control Center Console
Console Commands
help Command
info Command
shutdown command
status Command
Setting SAP ASE Parameters in the Configuration File
Configuration Parameters for SAP ASE
Manage and Monitor the SAP ASE Environment
Managing an SAP ASE server
Executing SQL Statements
Registering the Agent for an SAP ASE Server
Authenticating the Unified Agent
Authenticating the SCC Agent
Starting an SAP ASE Server
Stopping an SAP ASE Server
Configuring Retrieval Thresholds for the Administration Console
SAP ASE Error Log
Viewing the SAP ASE Error Log
Searching the Error Log for Messages
Managing Flag Definitions
Importing Flag Definitions
Exporting Flag Definitions
Server Configuration
Displaying Configuration Values
Modifying Server Configuration Parameters
Server Configuration Statistics and Details
Server Monitor Settings
Server Properties
Activating a Role
Managing Permissions
Enabling Granular Permissions
Replacing Compiled Object Definitions
Displaying the Performance Overview
Performance Overview Statistics and Details
Caches
Monitor Caches
Monitoring SAP ASE Data Caches
Modifying Data Cache Sizes
Adding Data Cache Buffer Pools
Data Cache Statistics and Details
Monitoring the SAP ASE Procedure Cache
Procedure Cache Statistics and Details
Monitoring the SAP ASE Statement Cache
Setting the Statement Cache Size
Statement Cache Statistics and Details
Monitoring SAP ASE In-memory Storage
In-memory Storage Statistics and Details
Manage Caches
Creating a Cache
Cache Properties
Managing Binding Options
Managing Buffer Pools
Managing Cache Configurations
Generating DDL for a Cache
Deleting a Cache
Clusters
Monitor Clusters
Cluster Instances
Monitoring Cluster Instances in Cluster Configurations
Cluster Instances Statistics and Details
Cluster Interconnect
Displaying the Cluster Overview
Cluster Interconnect Statistics and Details
Monitoring Interprocess Communication in Cluster Configurations
Workload Management
Monitoring Workloads in Cluster Configurations
Workload Management Statistics and Details
Manage Clusters
Starting the SCC agent for a Cluster
Starting the Unified Agent for a Cluster
Preparing to Create a Cluster
Creating a Cluster
Registering a Cluster
Registering the Agent and Starting a Cluster
Displaying Cluster Configuration Values
Starting a Cluster
Stopping a Cluster
Dropping a Cluster
Viewing a Cluster Log
Cluster Properties
Manage Logical Clusters
Adding a Logical Cluster
Designating a Failover Logical Cluster
Designating a Failback Logical Cluster
Logical Cluster States
Changing the State of a Logical Cluster
Deleting a Logical Cluster
Generating a DDL Script for a Logical Cluster
Logical Cluster Properties
Manage Cluster Instances
Displaying Instance Configuration Values
Starting an Instance
Adding an Instance to a Cluster
Stopping an Instance
Deleting an Instance
Instance Properties
Viewing an Instance Log
Manage Load Profiles
Adding a Load Profile
Deleting a Load Profile
Generating a DDL Script for a Load Profile
Load Profile Properties
Manage Routes
Adding a Route
Deleting a Route
Route Properties
Manage Auxiliary Servers
Configuring a Backup Server
Deleting a Backup Server
Backup Server Properties
Configuring an XP Server
Deleting an XP Server
XP Server Properties
Databases
Monitor Databases
Determining the Backup Status of a Database
Displaying Resources Used by a Database
Modifying Database Sizes
Database Statistics and Details
Displaying Information About Segments Used by a Database
Manage Databases
Creating a User Database
Creating a Proxy Database
Creating a Temporary Database
Creating an Archive Database
Creating an In-Memory Database
Creating an In-Memory Temporary Database
Creating an Encrypted Database
Encrypting an Existing Database
Suspending the Encryption Process
Resuming the Encryption Process
Decrypting an Encrypted Database
Suspending the Decryption Process
Resuming the Decryption Process
Creating a Temporary Database Group
Shrinking a Database
Backing Up (Dumping) a Database
Viewing Available Dump Configurations
Creating a Dump Configuration
Backing Up a Database Using a Dump Configuration
Dump Configuration Properties
Deleting a Dump Configuration
Backing Up a Database or Transaction Log to Multiple Stripes
Backing Up a Database Incrementally
Backing Up a Database Incrementally Using a Dump Configuration
Viewing Dump Records
Purging Dump Records from Dump History
Generating Database-Creation SQL for a Target Database
Generating Database-Creation SQL from a Dump Image
Backing Up Server Configuration Files
Scheduling a Database Backup
Requirements and Permissions for Scheduling Backups
Creating a Schedule for Backups
Schedule Properties
Deleting a Schedule
Scheduling a Backup Job in the Backup Wizard
Creating a New Scheduled Backup Job
Properties of a Scheduled Backup Job
Manage a Scheduled Backup Job
Enabling Scheduled Jobs
Deleting a Backup Job from the Schedule
Disabling Scheduled Jobs
Running a Scheduled Job Now
Rescheduling a Backup Job
Terminating a Scheduled Job in Progress
Viewing the Execution History of a Scheduled Backup Job
Job History Properties
Viewing the Contents of the Execution History Log
Deleting the Execution History of a Scheduled Backup Job
Job Scheduler Administration
Set Up an Alert for When a Backup Job Fails
Restoring (Loading) a Database
Generating a Database Load Sequence
Generating a Database Load Sequence for a Target Database from Dump History
Restoring a Database from a Cumulative Dump
Restoring a Database from a SQL Script
Restoring a Database from a Point in Time
Viewing Database Statistics
Checkpointing Databases
Checking Database Consistency
Placing a Database in Quiesce-Hold
Placing a Database in Quiesce-Release
Mounting an SAP ASE Database
Unmounting an SAP ASE Database
Database Properties
Changing Database Ownership
Modifying Database Storage Allocations
Modifying the Transaction Log Cache and the Log I/O Buffer Size
Changing Database Options
Generating DDL for a Database
Deleting a Database
Defaults
Creating a Default
Defaults Properties
Replacing a Default Definition
Deleting a Default
Devices
Monitor Devices
Determining Device I/O Response and I/O per Second
Modifying Device Sizes
Device Statistics and Details
Manage Devices
Displaying a Device Object
Creating a Database Device
Creating an In-Memory Device
Creating a Dump Device
Database Device Properties
In-Memory Device Properties
Dump Device Properties
Generating DDL for a Device
Deleting a Database, In-Memory, or Dump Device
Engines
Monitor Engines
Displaying Engine CPU Utilization
Engine Statistics and Details
Manage Engine Groups
Creating Engine Groups
Engine Groups Properties
Deleting an Engine Group
Generating DDL for an Engine Group
Execution Classes
Creating Execution Classes
Execution Classes Properties
Modifying Bindings to Execution Classes
Extended Stored Procedures
Creating an Extended Stored Procedure
Replacing an Extended Stored Procedure Definition
Extended Stored Procedures Properties
Granting Execute Permission on an Extended Stored Procedure
Revoking Execute Permission on an Extended Stored Procedure
Deleting an Extended Stored Procedure
Generating DDL for an Extended Stored Procedure
Functions
Manage Scalar Functions
Creating a Scalar Function
Replacing a Scalar User Defined Function Definition
Scalar Function Properties
Granting Execute Permission on a Scalar Function
Revoking Execute Permission on a Scalar Function
Deleting a Scalar Function
Generating DDL for a Scalar Function
Manage SQLJ Functions
Creating a SQLJ Function
Replacing a SQLJ Function Definition
SQLJ Function Properties
Deleting a SQLJ Function
Generating DDL for a SQLJ Function
Networks
Managing Remote Servers
Configuring a Server for Remote Procedure Calls
Adding a Remote Server
Deleting a Remote Server
Remote Server Properties
Testing a Remote Server Connection
Setting Options for a Remote Server
Managing Remote Server Login Mappings
Managing CIS Roles and Logins Mappings
Precomputed Result Sets
Configuring SAP ASE to Use Precomputed Result Sets
Viewing Precomputed Result Sets
Creating a Precomputed Result Set
Deleting a Precomputed Result Set
Altering a Precomputed Result Set
Refreshing Precomputed Result Sets
Truncating a Precomputed Result Set
Granting Permissions on Precomputed Result Sets
Revoking Permissions on Precomputed Result Sets
Granting Precomputed Result Set Permissions to a Specific User
Revoking Precomputed Result Set Permissions from a Specific User
Displaying Information About Precomputed Result Sets
Generating DDL for a Precomputed Result Set
Procedures
Manage Stored Procedures
Creating a Stored Procedure
Replacing a Stored Procedure Definition
Stored Procedure Properties
Granting Execute Permission on a Stored Procedure
Revoking Execute Permission on a Stored Procedure
Deleting a Stored Procedure
Generating DDL for a Stored Procedure
Manage SQLJ Procedures
Creating a SQLJ Procedure
Replacing a SQLJ Procedure Definition
SQLJ Procedure Properties
Deleting a SQLJ Procedure
Generating DDL for a SQLJ Procedure
Processes
Identifying Resource-Intensive Processes
Identifying Blocked Processes and Blocking Processes
Terminating Blocking Processes
Identifying the Lead Blocker in a Chain
Displaying the SQL Query Associated with a Process
Displaying Wait Events for a Process
Process Statistics and Details
Replication Agents
Monitoring RepAgent Threads
Replication Agent Statistics and Details
Rules
Manage Rules
Creating a Rule
Replacing a Rule Definition
Rule Properties
Deleting a Rule
Generating DDL for a Rule
Security
Manage Encryption Keys
Modifying and Deleting a System Encryption Password
Creating a System Encryption Password
Creating a Master Key
Master Key Properties
Modifying, Regenerating, and Deleting a Master Key
Dual Control and Split Knowledge
Creating a Column Encryption Key
Column Encryption Keys Properties
Creating a Key Copy
Modifying and Deleting a Column Encryption Key
Creating a Database Encryption Key
Database Encryption Keys Properties
Granting Encryption Permissions to a Role, User, or Group
Modifying a Database Encryption Key
Deleting an Encryption Key
Generate DDL for an Encryption Key
Manage Login Profiles
Creating a Login Profile
Login Profile Properties
Removing Roles Granted to a Login Profile
Granting Roles to a Login Profile
Deleting a Login Profile
Displaying Logins Assigned to a Login Profile
Transferring Login Attributes to a Login Profile
Manage Logins
Creating a Login
Login Properties
Managing Users Mapped to Logins
Removing Roles from a Login
Granting Roles to a Login
Configuring Login Password Properties
Changing a Login Password
Displaying Login Account Properties
Assigning Login Profiles to a Login
Deleting a Login
Manage Groups
Creating a Group
Adding or Removing Users to or from a Group
Group Properties
Setting Command Permissions for a Group
Granting Object Permissions to a Group
Revoking Object Permissions from a Group
Granting Privileges to a Group
Revoking Privileges from a Group
Deleting a Group
Generate DDL for a Group
Manage Users
Creating a User
Transferring Ownership of a Database Object
Users Properties
Granting Object Permissions to a User
Revoking Object Permissions from a User
Granting Privileges to a User
Revoking Privileges from a User
Setting Command Permissions for a User
Deleting a User
Manage Roles
Expiring a Role Password
Creating a Role
Restoring System Roles
Role Properties
Revoking Object Permission from a Role
Granting Object Permissions to a Role
Revoking Privileges from a Role
Granting Privileges to a Role
Creating Role Hierarchy
Managing Mutually Exclusive Roles
Removing Login Profiles Assigned to a Role
Assigning Login Profiles to a Role
Removing Logins Assigned to a Role
Assigning Logins to a Role
Setting Command Permissions for a Role
Segments
Monitor Segments
Determining the Space Used by a Table on a Segment
Extending a Segment in SAP ASE
Segment Statistics and Details
Manage Segments
Displaying Segments
Creating a Segment
Segment Properties
Removing a Threshold from a Segment
Adding a Threshold to a Segment
Removing a Database Device from a Segment
Adding a Database Device to a Segment
Deleting a Segment
Generating DDL for a Segment
Statistics
Interpreting Statistics
Updating Statistics on a Table
Updating Statistics on Specific Columns
Updating Statistics on an Index
Updating Statistics for a Data Partition
Updating Statistics on an Index Partition
Deleting Statistics from a Table
Deleting Statistics from a Column
Deleting Statistics from a Data Partition
SQL Activity
Monitoring SQL Queries
Executing SQL Statements
Tables
Creating a User or Proxy Table
Creating a Column
Creating an Index
Restoring Table Data
Creating a Foreign Key
Creating a Check Constraint
Checking Table Consistency
Binding Defaults and Rules to a Column
Placing a Table on a Segment
Setting the Table Locking Scheme
Creating a Unique Constraint or Primary Key
Manage Table Compression
Identifying Table Compression Candidates
Initiating a Compression Estimate
Applying Compression Settings
Manage Index Compression
Setting Index Compression on an Index
Setting Index Compression on a Local Index Partition
Setting Index Compression on a Table
Manage Triggers
Creating a Trigger
Trigger Properties
Replacing a Trigger Definition
Incrementally Transferring Data
Enabling Incremental Transfer
Incrementally Transferring Data In
Incrementally Transferring Data Out
Bulk Copying Data
Bulk Copying Data Into or Out of Tables
Setting Table or Column Permissions
Granting Table Permissions
Revoking Table Permissions
Granting Column Permissions
Revoking Column Permissions
Manage Partitions
Partition Locking
Enabling Partition Locking
Enabling Semantic-based Partitioning
Using a Hash Partition
Using a Range Partition
Using a List Partition
Using a Round-Robin Partition
Splitting a Partition
Merging Partitions
Moving a Partition
Deleting a Partition
Reorganize Tables and Table Objects
Reorganizing Tables at the Database Level
Reorganizing Tables
Reorganizing Table Partitions
Reorganizing Indexes
Reorganizing Index Partitions
Status Messages
Table Properties
Column Properties
Index Properties
Foreign Key Properties
Check Constraint Properties
Partition Properties
Deleting a Table
Deleting an Index
Thread Pools
Monitor Threads
Identifying the Threads in a Thread Pool
Thread Statistics and Details
Manage Thread Pools
Creating a Thread Pool
Thread Pool Properties
Transactions
Identifying a Transactionās Process
Transaction Statistics and Details
User-Defined Datatypes
Adding a User-Defined Datatype
User-Defined Datatypes Properties
Deleting a User-Defined Datatype
Views
Creating a View
Replacing a View Definition
View Properties
Granting Permissions on Views
Revoking Permissions on Views
Deleting a View
Troubleshoot SAP Control Center for SAP ASE
Data Display Problems
Cannot Monitor SAP ASE or Display Statistics Chart
Data on Screens or Charts Is Missing
Database Objects Are Not Updated
Error: No Result Set for this Query
Error: No Data Was Found For Statistic
Error: Unable to Format the Date String
Properties for Engine Groups Incorrectly Displayed
Same Name Engine Groups Are Not Selectable
"Number of Transactions" KPI Is Not Updated
Cannot Find Error Information For Monitor View
Display Large Number of Objects in Administration Console
Data Collection and Alert Problems
Collection Job for SAP ASE Fails
Alerts Are Configured But Do Not Fire
Data Collections Fail to Complete
Alerts Are Not Generated
Authentication and Access Problems
Cannot Log In
SAP Control Center Fails to Start
Browser Refresh (F5) Causes Logout
Invalid Connection Profile
Cannot Authenticate Server Configured with a Multibyte Character Set
Features Are Not Enabled Although You Have sa_role
Resetting the Online Help
Performance Problems
SAP ASE is Responding Slowly
Memory Warnings at Startup
SCC Out of Memory Errors
Performance Statistics Do Not Cover Enough Time
Collect Diagnostic Data
Preparing to Collect Diagnostic Data
Collecting Field Diagnostic Data
Collecting Optimizer Diagnostic Data
Upload Diagnostic Data
Uploading Diagnostic Data Via FTP
Submitting Diagnostic Data via E-mail Message
Deleting a Diagnostic Data File
Glossary: SAP Control Center for SAP ASE
Utility Guide SAP Adaptive Server Enterprise 16.0
Types of Utilities
Threaded Versions of Utilities
Installation or Configuration Utilities
Utilities for Languages, Character Sets, and Sort Orders
Utilities to Start Servers
Database Creation and Manipulation Utilities
Utilities to Gather Information
Tuning Utility
Utility to Manage a Cluster
Utility Commands Reference
auditinit
backupserver
bcp
Usage for bcp
Copying Tables with Indexes or Triggers Using bcp
Using bcp with Compressed Data
buildmaster
certauth
certpk12
certreg
charset
cobpre
cpre
dataserver
Usage for dataserver
Dependencies and Conditions of dataserver -b and -w Options
Potential Issues of Using dataserver -f and -w Options Together
ddlgen
Usage for ddlgen
Hiding Passwords in ddlgen
ddlgen and Encryption
ddlgen for Encrypted Columns
Encrypted Columns and Specifying the -XOD Flag in ddlgen
ddlgen Support for Key Copies
EKC Encryption Key Copy Filter and ddlgen
Create Table DDL
defncopy
dscp
dsedit
extractjava
installjava
Usage for installjava
Cases When Adding New JARs Causes Exceptions
Updating JARs and Classes
Locks
isql
Usage for isql
Interactive isql Commands
isql Session Commands
Prompt Labels and Double Wildcards in an isql Session
Command History in isql
langinstall
optdiag
Usage for optdiag
Byte Ordering and Binary optdiag Files
optdiag Input Mode
preupgrade
Usage for preupgrade
The preupgrade -D Parameter
pwdcrypt
qptune
qrmutil
showserver
sqldbgr
Usage for sqldbgr
Error Messages in sqldbgr
sqlloc
sqllocres
sqlsrvr
Usage for sqlsrvr
Starting an SAP ASE Server
startsrvr Dependencies and Conditions with -b and -w
sqlupgrade
sqlupgraderes
srvbuild
Usage for srvbuild
Using LDAP with srvbuild in a 64-bit Environment
srvbuildres
startserver
Usage for startserver
The Runserver File
sybatch
sybcluster
syconfig
sybdiag
Usage for sybdiag
Viewing sybdiag Output
Configuration Options for sybdiag
sybdumptran
Usage for sybdumptran
sybmigrate
sybrestore
sybtsmpasswd
updatease
xpserver
Using bcp to Transfer Data to and from SAP ASE
Methods for Moving Data
Import and Export Data with bcp
bcp Modes
bcp Requirements
bcp Permissions
Before You Transfer
Copy Data to Partitions Using bcp
Improve bcp Performance
Fast, Fast-logged, and Slow bcp
Slow bcp
Fast bcp
Fast-logged bcp
Copying Tables with Indexes
Locking Scheme and Fast bcp
Space Requirements for Copying
Summary of Steps for Fast and Fast-logged bcp
Bulk Copying Data into Partitioned Tables
Copying Data Randomly Into Partitions
Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
Reducing Logging by Increasing Page Allocations
Using Parallel Bulk Copy to Copy Data into a Specific Partition
bcp in and Locks
Parallel Bulk Copy Methods
Parallel Bulk Copy Syntax
Using Parallel Bulk Copy on Round-robin Partitioned Tables
Parallel Bulk Copy and IDENTITY Columns
Retaining Sort Order
Specifying the Value of a Tableās IDENTITY Column
Bulk Copying Encrypted Data
bcp Options
Using the Default Formats
Native Format
Character Format
Change Terminators from the Command Line
Change the Defaults in Interactive bcp
Respond to bcp Prompts
File Storage Type
Prefix Length
Field length
Field and Row Terminators
Choose Terminators
Format Files
Examples of Copying Out Data Interactively
Examples of Copying In Data Interactively
bcp and Alternate Languages
Support for Initialization Strings
bcp and Row-Level Access Rules
Copy In and Batch Files
Improve Recoverability
Batches and Partitioned Tables
Copy Out and Text and Image Data
Specify a Network Packet Size
Copy In and Error Files
Copy Out and Error Files
Data Integrity for Defaults, Rules, and Triggers
How bcp Differs from Other Utilities
Using dataserver Build Servers
Building a New Master Device
Environments When Using dataserver
Specifying Device and Logical Page Sizes When Building a New SAP ASE Server
Starting an Existing a SAP ASE Server
Upgrading to a Server With Larger Page Sizes
Viewing the Current Server Limits
Using dscp to View and Edit Server Entries
Starting dscp
Working with Server Entries
Adding and Modifying Server Entries
Adding a Server Entry
Modifying or Deleting a Server Entry
Copy Server Entries
List and View Contents of Server Entries
Delete Server Entries
Exiting dscp
Using dsedit to View and Edit Server Entries
Add, View, and Edit Server Entries
Using dsedit in UNIX
Starting dsedit in UNIX
Open an Editing Session in UNIX
Modify Server Entries in UNIX
Adding a New Server Entry in UNIX
Viewing or Modifying a Server Entry in UNIX
Add or Edit Network Transport Addresses
TCP/IP Addresses
SPX/IPX Addresses
Copying a Server Entry to Another Interfaces File in UNIX
Copying Server Entries Within the Current Session
Copying Server Entries Between Sessions
Using dsedit in Windows
Starting dsedit in Windows
Open an Editing Session in Windows
Opening a Session in Windows
Opening Additional Sessions in Windows
Switching Between Sessions in Windows
Modify Server Entries in Windows
Adding a Server Entry
Modifying a Server Attribute
Renaming a Server Entry
Deleting a Server Entry
Copying Server Entries Within the Current Session in Windows
Copying Server Entries Between Sessions in Windows
Troubleshooting dsedit
Using Interactive isql from the Command Line
Starting isql
Stopping isql
Using Transact-SQL in isql
Formatting isql Output
Correcting isql Input
set Options that Affect Output
Changing the Command Terminator
Performance Statistics Interaction with Command Terminator Values
Input and Output Files
UNIX command line redirection
Using Interactive SQL in Graphics Mode
Starting Interactive SQL
The Main Interactive SQL Window
Plan Dialog Tab
The Interactive SQL Toolbar
Open Multiple Windows
Keyboard Shortcuts
Display Data Using Interactive SQL
Edit Table Values in Interactive SQL
Copying Rows from the Interactive SQL Result Set
Editing Rows from the Interactive SQL Result Set
Inserting Rows into the Database from the Interactive SQL Result Set
Deleting Rows from the Database Using Interactive SQL
SQL Statements in Interactive SQL
Canceling an Interactive SQL Command
Combining Multiple Statements
Looking Up Tables, Columns, and Procedures
Recall Commands
Logging Commands
Configure Interactive SQL
General Dialog Box
Result Dialog Box
Import/Export Dialog Box
Messages Dialog Tab
Editor Dialog Box
Query Editor Dialog Box
Processing Command Files
Saving SQL Statements to a File
Executing Command Files
Saving, Loading, and Running Command Files
The SQL Escape Syntax in Interactive SQL
Interactive SQL Commands
Interactive sybcluster Commands Reference
Commands Active Before Connecting to a Cluster
Commands Active After Connecting to a Cluster
add backupserver
add instance
connect
create backupserver
create cluster
create xpserver
deploy plugin
diagnose cluster
diagnose instance
disconnect
drop backupserver
drop cluster
drop instance
drop xpserver
exit
help
localize
quit
set backupserver
set cluster
set instance
set xpserver port
show agents
show backupserver config
show cluster
show instance
show membership mode
show session
show xpserver
shutdown cluster
shutdown instance
start cluster
start instance
upgrade server
use
Using sybmigrate to Migrate Data
What sybmigrate Does
What sybmigrate Does Not Do
Before You Begin
Permissions
Changing Target Login Accounts
Platforms
Environment Settings
Migrating Proxy Tables
Migration process
Overview of the Migration Process
Pre-migration Considerations
Configuration and Tuning for Higher Performance
Configuration Considerations for SAP ASE
Possible Errors to Avoid
Auto-select Dependent Objects for Migration
Migrating an Archive Database
Upgrading an SAP ASE Server with an Archive Database
Downgrading an SAP ASE Server with an Archive Database
GUI Mode
Setting Up Source Databases for Migration
Begin the Migration
Validating the Migration
Migration and Validation Progress
Resource File Mode
Using sybmigrate with Encrypted Columns
Post-migration Activities
Migrate Databases in the Replication Server Domain
Preparing for Migration
Postmigration Procedures
Restoring Primary Databases
Restoring the RSSD
Amending System Tables When the Logical Page Size Changes
Restoring Replicate Databases
Logs
Migrating Databases That Support Wide Data
Limitations
Stopping High Availability
Other Limitations
Troubleshooting and Error Messages
Using sybrestore to Restore Databases
Before You Begin
sybrestore Checks
Compatibility Geometry Check
sybrestore Syntax
Restoring a Database in Noninteractive Mode
Restoring a Database in Interactive Mode
Interactive Menu Options
Logging sybrestore Output
Providing a Mapping Directory
Restoring a Database to a Point In Time
Example of Restoring a Database to a Point In Time
Restoring User and System Databases
Master Database Restore
Prerequisites for Restoring a Master Database
Configuration and Resource Files
Creating or Editing the Restore Utility Configuration File
Creating or Editing Resource Files
Resource File Examples
Restoring a Master Database
Transact-SQL Users Guide 16.0
SQL Building Blocks
Tables, Columns, and Rows
Queries, Data Modification, and Commands
Relational Operations
Compiled Objects
Save or Restore Source Text
Verify and Encrypt Source Text
Replacing Object Definitions
Compliance to ANSI Standards
Federal Information Processing Standards (FIPS) Flagger
Chained Transactions and Isolation Levels
Identifier Compliance to ANSI Standards
SQL Standard-Style Comments
Right Truncation of Character Strings
Permissions Required for update and delete Statements
Arithmetic Errors
Synonymous Keywords
Treatment of Nulls
Data and Language Characters
Naming Convention Identifiers
Multibyte Character Sets
Delimited Identifiers
Uniqueness and Qualification Conventions
Remote Servers
Expressions in SAP ASE
Arithmetic Operators
Bitwise Operators
The String Concatenation Operator
The Comparison Operators
Nonstandard Operators
Character Expression Comparisons
Empty Strings
Quotation Marks
Relational and Logical Expressions
Transact-SQL Extensions
compute Clause
Control-of-Flow Language
Stored Procedures
Extended Stored Procedures
Triggers
Defaults and Rules
Error Handling and set Options
Additional SAP ASE Extensions to SQL
SAP ASE Login Accounts
isql Utility
Default Databases
Network-Based Security Services with isql
Displaying SQL Text
Databases and Tables
Databases
Create a User Database
The on Clause
The log on Clause
for load Option
Choose a Database
Permissions Within Databases
Initialize Databases Asynchronously
Determine If There is Space to be Initialized
Restrictions for Initializing Databases Asynchronously
Drop Databases
Change the Database Size
Enforce Data Integrity in Databases
quiesce database Command
Tables
Designing and Creating a Table
Table Names
Create the User-Defined Datatypes
Choose Columns That Accept Null Values
Sample Table Design Sketch
Define the Sample Table
Create Tables in Different Databases
Create New Tables from Query Results: select into
Check for Errors
Temporary Tables Usage
Unique Temporary Table Names
Manipulate Temporary Tables in Stored Procedures
General Rules for Temporary Tables
Deferred Table Creation
Deferred Table Creation at the Database Level
Create Deferred Tables
Explicitly Materialize Deferred Tables
Identify Deferred Tables
Roll Back for Deferred Tables
Command Behavior in Deferred Tables
IDENTITY Columns Usage
Create IDENTITY Columns with User-Defined Datatypes
Reference IDENTITY Columns
Refer to IDENTITY Columns with syb_identity
Automatically Create āhiddenā IDENTITY Columns
Using select into with IDENTITY Columns
Select an IDENTITY Column into a New Table
Select the IDENTITY Column More Than Once
Add a New IDENTITY Column with select into
Define a Column for Which the Value Must Be Computed
IDENTITY Columns Selected into Tables with Unions or Joins
Allow Null Values in a Column
Constraints and Rules Used with Null Values
Defaults and Null Values
Nulls Require Variable-Length Datatypes
text, unitext, and image Columns
Alter Existing Tables
Objects Using select * Do Not List Changes to Table
Use alter table on Remote Tables
Add Columns
Add Columns Appends Column IDs
Add NOT NULL Columns
Add Constraints
Drop Columns
Drop Columns Renumbers the Column ID
Drop Columns Without Performing a Data Copy
Restrictions for no datacopy Parameter
Drop Constraints
Modify Columns
Convert Datatypes
Modifying Tables and Using Bulk Copy
Decreased Column Length May Truncate Data
Modify datetime Columns
Modify the NULL Default Value of a Column
Check Columns That Have Precision or Scale
Modify text, unitext, and image Columns
Add IDENTITY Columns
Drop IDENTITY Columns
Modify IDENTITY Columns
Data Copying
Change exp_row_size
Modifying Locking Schemes and Table Schema
Add, Drop, or Modify Columns with User-Defined Datatypes
Errors and Warnings from alter table
Errors and Warnings Generated by alter table modify
Scripts Generated by if exists()...alter table
Rename Tables and Other Objects
Rename Dependent Objects
Drop Tables
Manage Identity Gaps in Tables
Parameters for Controlling Identity Gaps
Comparison of identity burning set factor and identity_gap
Set the Table-Specific Identity Gap
Change the Table-Specific Identity Gap
Display Table-Specific Identity Gap Information
Gaps from Other Causes
IDENTITY Column Maximum Value
Define Integrity Constraints for Tables
Table and Column Level Constraints
Create Error Messages for Constraints
Check Constraints
Default Column Values
unique and primary key Constraints
Referential Integrity Constraints
Table and Column Level Referential Integrity Constraints
Using Create Schema for Cross-Referencing Constraints
General Rules for Creating Referential Integrity Constraints
Designing Applications That Use Referential Integrity
Computed Columns
Computed Columns Usage
Computed Columns Example
Indexes on Computed Columns
Deterministic Property
Effects of Deterministic Property on Computed Columns
Effects of Deterministic Property on Materialized Computed Columns
Effects of Deterministic Property on Virtual Computed Columns
Effects of Deterministic Property on Function-Based Indexes
Examples of Nondeterministic Computed Columns
Retrieve Information About Databases and Tables
Help on Databases
Help on Database Objects
sp_help Usage on Database Objects
Use sp_helpconstraint to Find Table Constraint Information
Determining Much Space a Table Uses
List Tables, Columns, and Datatypes
Find an Object Name and ID
SQL-Derived Tables
SQL-Derived Tables and Optimization
SQL-Derived Table Syntax
Derived Column Lists
Correlated SQL-Derived Tables Are Not Supported
SQL-Derived Tables Usage
Nesting
Subqueries Using SQL-Derived Tables
Unions in Derived-Table Expressions
Unions in Subqueries
Rename Columns with SQL-Derived Tables
Constant Expressions
Aggregate Functions
Joins with SQL-Derived Tables
Create a Table From a SQL-Derived Table
Views with SQL-Derived Tables
Correlated Attributes
Partition Tables and Indexes
Partitioning Types
Range Partitioning
Hash Partitioning
List Partitioning
Round-Robin Partitioning
Partition Pruning
Composite Partitioning Keys
Indexes and Partitions
Global Indexes
Local Indexes
Guarantee a Unique Index
Create and Manage Partitions
Partitioning Tasks
Create a Range-Partitioned Table
Restrictions on Partition Keys and Bound Values for Range-Partitioned Tables
Create a Hash-Partitioned Table
Create a List-Partitioned Table
Create a Round-RobināPartitioned Table
Create Partitioned Indexes
Create a Partitioned Table From an Existing Table
Change Data Partitions
Split, Merge, and Move Partitions
Partition Schemes Available for Splitting or Merging
Split Partitions
Merge Partitions
Move Partitions
Effect of Split or Merged Partitions on Indexes
Add Partitions to a Partitioned Table
Change the Partitioning Type or Key
Unpartition Round-RobināPartitioned Tables
partition Parameter Usage
Change Partition-Key Columns
Configure Partitions
update, delete, and insert in Partitioned Tables
Update Values in Partition-Key Columns
Display Information About Partitions
Function Usage
Truncate a Partition
Using Partitions to Load Table Data
Update Partition Statistics
Improved Concurrency for Partition-Level Online Operations
Partition-Level Online Operation Syntax
Concurrency with Partition-Level Online Operations
Partition-Level Online Operations with Global Index
Virtually Hashed Tables
Structure of a Virtually Hashed Table
Create a Virtually Hashed Table
Limitations for Virtually Hashed Tables
Commands that Support Virtually Hashed Tables
Query Processor Support
Monitor Counter Support
System Procedure Support
Create Indexes on Tables
Guidelines for Using Indexes
Methods of Creating Indexes
Create Indexes
Issue create index in Parallel
Configuring enhanced parallel create index
Enhanced Parallel create index Usage
View Parallel create index Commands with showplan
Function-Based Indexes
Create Indexes Without Blocking Access to Data
Unique Indexes
IDENTITY Columns in Nonunique Indexes
Ascending and Descending Index-Column Values
Using fillfactor, max_rows_per_page, and reservepagegap
Indexes on Computed Columns
Clustered or Nonclustered Index Usage
Create Clustered Indexes on Segments
Index Options
ignore_dup_key Option
ignore_dup_row and allow_dup_row
sorted_data Option
on segment_name Option
Drop Indexes
Identifying the Indexes on a Table
Update Statistics for Indexes
Datatypes
System-Supplied Datatypes
Exact Numeric Types: Integers
Exact Numeric Types: Decimal Numbers
Approximate Numeric Datatypes
Money Datatypes
Date and Time Datatypes
Character Datatypes
unichar Datatype
Relational Expressions
Join Operators
Union Operators
Clauses and Modifiers
text Datatype
unitext Datatype
Binary Datatypes
image Datatype
bit Datatype
timestamp Datatype
sysname and longsysname Datatype
LOB Locators in Transact-SQL Statements
Implicitly Create a Locator
Explicitly Create a Locator
Convert the Locator Value to the LOB Value
Locator Scope
Convert Between Datatypes
Mixed-Mode Arithmetic and Datatype Hierarchy
Working with money Datatypes
Determine Precision and Scale
User-Defined Datatypes
Length, Precision, and Scale
Null Type
Associate Rules and Defaults with User-Defined Datatypes
Create User-Defined Datatype with IDENTITY Property
Create IDENTITY Columns from User-Defined Datatypes
Drop a User-Defined Datatype
Datatype Entry Rules
char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
Date and Time
Enter Times
Enter Dates
Date Formats
Search Dates and Times
binary, varbinary, and image
money and smallmoney
float, real, and double precision
decimal and numeric
Integer Types and Their Unsigned Counterparts
timestamp
Get Information About Datatypes
Queries: Selecting Data from a Table
select Syntax
Check for Identifiers in a select Statement
Choose Columns Using the select Clause
Choose all Columns Using select *
Choose Specific Columns
Rearrange the Column Order
Rename Columns in Query Results
Expressions
Quoted Strings in Column Headings
Character Strings in Query Results
Computed Values in the select List
Arithmetic Operator Precedence
Select Text, Unitext, and Image Values
readtext Usage
select List Summary
select for update
Use select for update in Cursors and DML
Concurrency Issues
Eliminate Duplicate Query Results with Distinct
Specify Tables with the from Clause
Select Rows Using the where Clause
Comparison Operators in where Clauses
Ranges (between and not between)
Lists (in and not in)
Matching Character Strings: like
not like Usage
Different Results Using not like and ^
Use Wildcard Characters as Literal Characters
Interaction of Wildcard Characters and Square Brackets
Use Trailing Blanks and %
Use Wildcard Characters in Columns
āUnknownā Values: NULL
SQL Standard for NULL Concatenation
Test a Column for Null Values
Difference Between False and Unknown
Substitute a Value for NULLs
Expressions that Evaluate to NULL
Concatenate Strings and NULL
System-Generated NULLs
Connect Conditions with Logical Operators
Logical Operator Precedence
Multiple select Items in a Nested exists Query
Use a Column Alias in Nested select Statements
Subqueries: Queries Within Other Queries
Subquery Restrictions
Qualify Column Names
Subqueries with Correlation Names
Multiple Levels of Nesting
Using an Asterisk in Nested select Statements
Use Table-Name Qualifiers
Use Nested Queries with group by
Usage and Examples of Asterisks in select Statements
Subqueries in update, delete, and insert Statements
Subqueries in Conditional Statements
Subqueries Instead of Expressions
Types of Subqueries
Expression Subqueries
Use Scalar Aggregate Functions to Guarantee a Single Value
Use group by and having in Expression Subqueries
Use distinct with Expression Subqueries
Quantified Predicate Subqueries
Subqueries with any and all
> all Means Greater Than All Values
= all Means Equal to Every Value
> any Means Greater Than at Least One Value
= any Means Equal to Some Value
Subqueries Used with in
Subqueries Used with not in
Subqueries Using not in with NULL
Subqueries Used with exists
Subqueries Used with not exists
Find Intersection and Difference with exists
Subqueries Using SQL Derived Tables
Correlated Subqueries
Correlated Subqueries with Correlation Names
Correlated Subqueries with Comparison Operators
Correlated Subqueries in a having Clause
Aggregates, Grouping, and Sorting
Aggregate Functions and Datatypes
count versus count (*)
Aggregate Functions with distinct
Null Values and the Aggregate Functions
Using Statistical Aggregates
Organize Query Results into Groups: the group by Clause
group by and SQL Standards
Nest Groups with group by
Reference Other Columns in Queries Using group by
Expressions and group by
group by in Nested Aggregates
Null Values and group by
where Clause and group by
group by and all
Aggregates Without group by
Select Groups of Data: the having Clause
Interactions between having, group by, and where Clauses
having Without group by
Sort Query Results: the order by Clause
order by and group by
order by and group by Used with select distinct
Summarize Groups of Data: the compute Clause
Row Aggregates and compute
Rules for compute Clauses
Specify More Than One Column After compute
Use More Than One compute Clause
Apply an Aggregate to More Than One Column
Use Different Aggregates in the Aame compute Clause
Generate Totals: compute Without by
Combine Queries: the union Operator
Guidelines for union Queries
Joins: Retrieve Data from Several Tables
Join Syntax
Joins and the Relational Model
How Joins are Structured
The from Clause
The where Clause
Join Operators
Datatypes in Join Columns
Joins and Text and Image Columns
How Joins are Processed
Equijoins and Natural Joins
Joins with Additional Conditions
Joins Not Based on Equality
Self-Joins and Correlation Names
The Not-Equal Join
Not-Equal Joins and Subqueries
Join More Than Two Tables
Star Joins
Outer Joins
Inner and Outer Tables
Outer Join Restrictions
Views Used with Outer Joins
ANSI Inner and Outer Joins
Correlation Name and Column Referencing Rules for ANSI Joins
ANSI Inner Joins
The Join Table of an Inner Join
The on Clause of an ANSI Inner Join
ANSI outer joins
Placement of the Predicate in the on or where Clause
Nested ANSI Outer Joins
Transact-SQL Outer Joins
Outer Joins and Aggregate Extended Columns
Relocated Joins
Configuring Relocated Joins
How Null Values Affect Joins
Determine Which Table Columns to Join
Managing Data
Referential Integrity
Transactions
Sample Databases
Add New Data
Add New Rows with Values
Insert Data into Specific Columns
Restrict Column Data: Rules
The NULL Character String
Insert NULLs into Columns That Do Not Allow Them
Add Rows Without Values in All Columns
Change a Columnās Value to NULL
SAP ASE-generated values for IDENTITY columns
Explicitly Insert Data into an IDENTITY Column
Retrieve IDENTITY Column Values with @@identity
Reserve a Block of IDENTITY Column Values
Maximum Value of the IDENTITY Column
Modify the Maximum Value of the IDENTITY Column
Creating a New Table with a Larger Precision
Renumbering the Table IDENTITY Columns with bcp
Add New Rows with select
Use Computed Columns
Insert Data into Some Columns
Insert Data from the Same Table
Create Nonmaterialized, Non-Null Columns
Add Nonmaterialized Columns
Tables That Already Have Nonmaterialized Columns
Nonmaterialized Column Storage
Alter Nonmaterialized Columns
Limitations for Nonmaterialized Columns
Change Existing Data
Use the set Clause with Update
Assign Variables in the set Clause
Use the where Clause with update
Use the from Clause with update
Perform updates with joins
Update IDENTITY Columns
Change text, unitext, and image data
Truncate Trailing Zeros
Transfer Data Incrementally
Mark Tables for Incremental Transfer
Transfer Tables from a Destination File
Convert SAP ASE Datatypes to SAP IQ
Store Transfer Information
Exceptions and Errors
Sample Incremental Transfer
Replacing Data with New Rows
Delete Data
Use the from Clause with delete
Delete from IDENTITY Columns
Delete All Rows from a Table
truncate table Syntax
Views: Limit Access to Data
Advantages of Views
Security
Logical Data Independence
Create Views
create view Syntax
select Statement Usage with create view
View Definition with Projection
View Definition with a Computed Column
View Definition with an Aggregate or Built-In Function
View Definition with a Join
Views Used with Outer Joins
Views Derived From Other Views
Distinct Views
Views That Include IDENTITY Columns
Validate a Viewās Selection Criteria
Views Derived from Other Views
Retrieve Data Through Views
View Resolution
Redefine Views
Rename Views
Alter or Drop Underlying Objects
Modify Data Through Views
Restrictions on Updating Views
Drop Views
Use Views as Security Mechanisms
Get Information About Views
Defining Defaults and Rules for Data
Create Defaults
Bind Defaults
Unbind Defaults
How Defaults Affect NULL Values
Drop Defaults
Create Rules
Bind Rules
Rules Bound to Columns
Rules Bound to User-Defined Datatypes
Precedence of Rules
Rules and NULL Values
Unbind Rules
Drop Rules
Retrieve Information About Defaults and Rules
Share Inline Defaults
Create an Inline Shared Default
Unbind a Shared Inline Default
Limitations for Shared Inline Defaults
Precomputed Result Sets
Benefits of Precomputed Result Sets
Configuring SAP ASE for Precomputed Result Sets
Creating Precomputed Result Sets
Identifying Precomputed Result Sets
Refreshing Precomputed Result Sets
Altering Precomputed Result Sets
Dropping or Truncating Precomputed Result Sets
Configuring Staleness
Querying Precomputed Result Sets
Rewriting Queries
Replicating Precomputed Result Sets
Restrictions for Precomputed Result Sets
Batches and Control-of-Flow Language
Rules Associated with Batches
Examples of Using Batches
Batches Submitted as Files
Control-of-Flow Language Usage
if...else
case Expression
case Expression for Alternative Representation
case and Division by Zero
rand Functions in case Expressions
case Expression Results
case Expressions and set ansinull
case Expression Requires at Least one Non-Null Result
Determining the Result Set
case and Value Comparisons
coalesce
nullif
begin...end
while and break...continue
declare and Local Variables
goto
return
print
raiserror
Create Messages for print and raiserror
waitfor
Comments
Slash-Asterisk Style Comments
Double-Hyphen Style Comments
Local Variables
Local Variables and select Statements
Local Variables and update Statements
Local Variables and Subqueries
Local Variables and while Loops and ifā¦else Blocks
Variables and Null Values
Global Variables
Transactions and Global Variables
Check for Errors with @@error
Check IDENTITY Values with @@identity
Check the Transaction Nesting Level with @@trancount
Check the Transaction State with @@transtate
Check the Nesting Level with @@nestlevel
Check the Status From the Last Fetch
Transact-SQL Functions
Built-In Functions
System Functions
String Functions
Concatenating Expressions
Concatenation Operators and LOB Locators
Nest String Functions
Limits on String Functions
Text and Image Functions
readtext on unitext Columns Usage
Aggregate Functions
Aggregate Functions Used with the group by Clause
Aggregate Functions and Null Values
Vector and Scalar Aggregates
Aggregate Functions as Row Aggregates
Statistical Aggregate Functions
Formulas for Computing Standard Deviations
Mathematical Functions
Date Functions
Datatype Conversion Functions
convert Function Usage for Explicit Conversions
Datatype Conversion Guidelines and Constraints
Convert Character Data to a Noncharacter Type
Convert from One Character Type to Another
Convert Numbers to a Character Type
Convert to or from unitext
Rounding During Conversion To and From Money Types
Convert Date and Time Information
Convert Between Numeric Types
Convert Between Binary and Integer Types
Convert Between Binary and Numeric or Decimal Types
Convert Image Columns to Binary Types
Convert Other Types to bit
Convert Hexadecimal Data
Convert bigtime and bigdatetime Data
Convert NULL Value
Change the Date Format
Conversion Error Handling
Security Functions
XML Functions
User-Created Functions
Stored Procedures
Examples
Permissions
Performance
Create and Execute Stored Procedures
Deferred Name Resolution Usage
Parameters
Default Parameters
Default Parameters Usage
NULL as the Default Parameter
Wildcard Characters in the Default Parameter
Using Multiple Parameters
LOB Datatypes in Stored Procedures
Procedure Groups
with recompile in create procedure
with recompile in execute
Nesting Procedures
Temporary Tables in Stored Procedures
Set Options in Stored Procedures
Query Optimization Settings
Maximum Number of Arguments
Maximum Size for Expressions, Variables, and Arguments
Execution of Stored Procedures
Execute Procedures After a Time Delay
Execute Procedures Remotely
Execute a Procedure with execute as owner or execute as caller
Example with execute as Omitted
Example of Procedure with execute as
Deferred Compilation in Stored Procedures
Information Returned From Stored Procedures
Return Status
Reserved Return Status Values
User-Generated Return Values
Check Roles in Procedures
Return Parameters
Pass Values in Parameters
The Output Keyword
Restrictions Associated with Stored Procedures
Qualify Names Inside Procedures
Rename Stored Procedures
Rename Objects Referenced by Procedures
Stored Procedures as Security Mechanisms
Dropping Stored Procedures
System Procedures
Execute System Procedures
Permissions on System Procedures
Types of System Procedures
Other SAP ASE-Supplied Stored Procedures
Get Information About Stored Procedures
Get a Report with sp_help
View the Source Text of a Procedure with sp_helptext
Identify Dependent Objects with sp_depends
Use sp_depends with deferred_name_resolution
Identify Permissions with sp_helprotect
Extended Stored Procedures Usage
XP Server
CIS RPC Mechanism
sybesp_dll_version
Dynamic Link Library Support
Open Server API
ESPs and Permissions
ESPs and Performance
Create Functions for ESPs
Files for ESP Development
Open Server Data Structures
Open Server Return Codes
Outline of a Simple ESP Function
ESP Function Example
Building the DLL
Registering ESPs
create procedure Usage
sp_addextendedproc Usage
Remove ESPs
Renaming ESPs
Execute ESPs
System ESPs
Get Information About ESPs
ESP Exceptions and Messages
Cursors: Accessing Data
Types of Cursors
Cursor Scope
Cursor Scans and the Cursor Result Set
Make Cursors Updatable
Determine Which Columns Can Be Updated
How SAP ASE Processes Cursors
Monitor Cursor Statements
declare cursor
cursor_scrollability
Cursor Sensitivity
read_only Option
Open Cursors
Fetch Data Rows Using Cursors
fetch Syntax
into Clause Usage
Check Cursor Status
Get Multiple Rows With Each Fetch
Check the Number of Rows Fetched
Update and Delete Rows Using Cursors
Update Cursor Result Set Rows
Delete Cursor Result Set Rows
Close and Deallocate Cursors
Cursor Examples
Cursors in Stored Procedures
Cursors and Locking
Cursor-Locking Options
Transaction Support for Updatable Cursors
Get Information About Cursors
Browse Mode Versus Cursors
Triggers: Enforce Referential Integrity
Use Triggers Versus Integrity Constraints
Create Triggers
create trigger Syntax
Use Triggers to Maintain Referential Integrity
Test Data Modifications Against the Trigger Test Tables
Insert Trigger Example
Delete Trigger Examples
Update Trigger Examples
Multirow Considerations
Insert Trigger Example Using Multiple Rows
Delete Trigger Example Using Multiple Rows
Update Trigger Example Using Multiple Rows
Conditional Insert Trigger Example Using Multiple Rows
Roll Back Triggers
Global Login Triggers
Nesting Triggers
Trigger Self-Recursion
Rules Associated with Triggers
Triggers and Permissions
Trigger Restrictions
Implicit and Explicit Null Values
Triggers and Performance
set Commands in Triggers
Renaming and triggers
Disable Triggers
Drop Triggers
Multiple Triggers
Changing the Order of When a Trigger Is Fired
Order of Triggers in Merge Statements
Transactional Behavior with Multiple Triggers
Disabling and Reenabling Triggers
Get Information About Triggers
sp_help
sp_helptext
sp_depends
instead of Triggers
Inserted and Deleted Logical Tables
Triggers and Transactions
Nesting
Recursion
instead of insert Triggers
instead of update Trigger
instead of delete Trigger
Searched and Positioned update and delete
Get Information About instead of Triggers
In-Row Off-Row LOB
In-Row LOB Columns Compression
Migrate Off-Row LOB Data to In-Row Storage
In-Row LOB Columns and Bulk Copy
Methods for Migrating Existing Data
Set Up the mymsgs Example Table
Migrate Using Update Statement
Use reorg rebuild
Migrate Using alter table with Data Copy
Guidelines for Selecting the In-Row LOB Length
Identifying In-Row LOB Length Selection
Downgrading Tables Containing In-Row LOB Columns
Transactions: Maintain Data Consistency and Recovery
Transactions and Consistency
Transactions and Recovery
Transaction Usage
Allow Data Definition Commands in Transactions
System Procedures That Are Not Allowed in Transactions
Begin and Commit Transactions
Roll Back and Save Transactions
Transaction States
Nested Transactions
Example of a Transaction
Transaction Mode and Isolation Level
Choose a Transaction Mode
Transaction Modes and Nested Transactions
Find the Status of the Current Transaction Mode
Choose an Isolation Level
Default Isolation Levels for SAP ASE and ANSI SQL
Dirty Reads
Repeatable Reads
Find the Status of the Current Isolation Level
Change the Isolation Level for a Query
Isolation Level Precedences
Cursors and Isolation Levels
Stored Procedures and Isolation Levels
Triggers and Isolation Levels
Compliance with SQL Standards
Use the Lock Table Command to Improve Performance
Transactions in Stored Procedures and Triggers
Errors and Transaction Rollbacks
Transaction Modes and Stored Procedures
Run System Procedures in Chained Mode
Set Transaction Modes for Stored Procedures
Use Cursors in Transactions
Issues to Consider When Using Transactions
Backup and Recovery of Transactions
Locking Commands and Options
wait/nowait Option of the Lock Table Command
Session-Level Lock-Wait Limit
Server-Wide Lock-Wait Limit
Information on the Number of Lock-Wait Timeouts
Readpast Locking for Queue Processing
Incompatible Locks During readpast Queries
Allpages-Locked Tables and readpast Queries
Effects of Isolation Levels Select Queries with readpast
Data Modification Commands with readpast and Isolation Levels
text, unitext, and image columns and readpast
The pubs2 Database
Tables in the pubs2 Database
publishers Table
authors Table
titles Table
titleauthor Table
salesdetail Table
sales Table
stores Table
roysched Table
discounts Table
blurbs Table
au_pix Table
Diagram of the pubs2 Database
The pubs3 Database
Tables in the pubs3 Database
publishers Table
authors Table
titles Table
titleauthor Table
salesdetail Table
sales Table
stores Table
store_employees Table
roysched Table
discounts Table
blurbs Table
Diagram of the pubs3 Database
System Administration Guide 16.0: Volume 1
Overview of System Administration
Roles Required for System Administration Tasks
Database Owner
Database Object Owner
Performing System Administration Tasks
System Tables
Querying the System Tables
Keys in System Tables
Updating System Tables
System Procedures
Using System Procedures
System Procedure Tables
Creating Stored Procedures
System Extended Stored Procedures
Creating System ESPs
Logging Error Messages
Connecting to SAP ASE
The interfaces File
Directory Services
LDAP as a Directory Service
Multiple Directory Services
LDAP Directory Services Versus the SAP Interfaces File
LDAP Performance
Security Features Available in SAP ASE
System and Optional Databases
Overview of System Databases
The master Database
Controlling Object Creation in the master Database
Backing Up Master and Keeping Copies of System Tables
model Database
sybsystemprocs Database
tempdb database
Creating Temporary Tables
sybsecurity Database
sybsystemdb Database
sybmgmtdb Database
pubs2 and pubs3 Sample Databases
Maintaining the Sample Databases
pubs2 Image Data
dbccdb Database
sybdiag Database
Determining the Version of the Installation Scripts
System Administration for Beginners
Logical Page Sizes
Using āTestā Servers
Planning Resources
Achieving Performance Goals
Considerations When Installing SAP Products
Allocating Physical Resources
Dedicated Versus Shared Servers
Decision-Support and OLTP Applications
Advance Resource Planning
Operating System Configuration
Backup and Recovery
Keep Up-To-Date Backups of the master Database
Keep Offline Copies of System Tables
Automating Backup Procedures
Verify Data Consistency Before Backing Up a Database
Monitor the Log Size
Ongoing Maintenance and Troubleshooting
Starting and Stopping SAP ASE
Viewing and Pruning the Error Log
Keeping Records
Contact Information
Configuration Information
Maintenance Schedules
System Information
Disaster Recovery Plan
Additional Resources
Managing and Monitoring SAP ASE
SAP Control Center for SAP ASE
Configuration History Tracking
Configuring SAP ASE to Track Configuration Changes
Changes Captured
Querying ch_events
Setting Configuration Parameters
Modifying Configuration Parameters
Required Roles for Modifying Configuration Parameters
Unit Specification Using sp_configure
Global Versus Session Settings
Getting Help Information on Configuration Parameters
Using sp_configure
sp_configure Syntax Elements
Issue sp_configure with the Configuration File
Configuration File Naming Recommendations
Read or Write the Configuration File with sp_configure
Edit the Configuration File
Permissions for Configuration Files
Backing Up Configuration Files
Verify the Name of the Configuration File Currently in Use
Start SAP ASE Using a Configuration File
Configuration File Errors
The Parameter Hierarchy
User-Defined Subsets of the Parameter Hierarchy: Display Levels
The Effect of the Display Level on sp_configure Output
Performance Tuning with sp_configure and sp_sysmon
Using Configuration Parameters in a Clustered Environment
sp_configure Output
sysconfigures and syscurconfigs Tables
Example syscurconfigs and sysconfigures Query
Named Cache Configuration Parameter Group
Dump Configuration Parameter Group
Configuration Parameters
Alphabetical Listing of Configuration Parameters
abstract plan cache
abstract plan dump
abstract plan load
abstract plan replace
abstract plan sharing
additional network memory
aggresive task stealing
allocate max shared memory
allow backward scans
allow nested triggers
allow procedure grouping
allow remote access
allow resource limits
allow sendmsg
allow sql server async i/o
allow updates to system tables
average cap size
audit queue size
auditing
automatic cluster takeover
builtin date strings
caps per ccb
capture compression statistics
capture missing statistics
check password for digit
CIPC large message pool size
CIPC regular message pool size
cis bulk insert array size
cis bulk insert batch size
cis connect timeout
cis cursor rows
cis idle connection timeout
cis packet size
cis rpc handling
cluster heartbeat interval
cluster heartbeat retries
cluster redundancy level
cluster vote timeout
column default cache size
compression info pool size
compression memory size
configuration file
cost of a logical io
cost of a physical io
cost of a cpu unit
cpu accounting flush interval
cpu grace time
current audit table
deadlock checking period
deadlock pipe active
deadlock pipe max messages
deadlock retries
default character set id
default database size
default exp_row_size percent
default fill factor percent
default language id
default network packet size
Requesting a Larger Packet Size at Login
default sortorder id
default unicode sortorder
default XML sortorder
deferred name resolution
disable character set conversions
disable disk mirroring
disable jsagent core dump
disable varbinary truncation
disk i/o structures
DMA object pool size
dtm detach timeout period
dtm lock timeout period
dump history filename
dump on conditions
dynamic allocation on demand
dynamic SQL plan pinning
early row send increment
enable async database init
enable backupserver HA
enable cis
enable compression
enable concurrent dump tran
enable console logging
enable DTM
enforce dump configuration
enable dump history
enable encrypted columns
enable enterprise java beans
enable file access
enable full-text search
enable functionality group
enable inline default sharing
enable HA
enable housekeeper GC
enable hp posix async i/o
enable HugePages
enable i/o fencing
enable ISM
enable java
enable job scheduler
enable js restart logging
enable large chunk elc
enable large pool for load
enable ldap user auth
enable literal autoparam
engine local cache percent
enable logins during recovery
enable merge join
enable metrics capture
enable monitoring
enable pam user auth
enable pci
enable permissive unicode
enable plan sharing
enable predicated privileges
enable query tuning mem limit
enable query tuning time limit
enable rapidlog
enable real time messaging
enable rep agent threads
enable row level access control
enable semantic partitioning
enable sort-merge join and JTC
enable sql debugger
enable ssl
enable stmt cache monitoring
enable surrogate processing
enable unicode conversion
enable unicode normalization
enable utility lvl 0 scan wait
enable webservices
enable xact coordination
enable xml
engine memory log size
errorlog pipe active
errorlog pipe max messages
esp execution priority
esp execution stacksize
esp unload dll
event buffers per engine
event log computer name (Windows only)
event logging
executable codesize + overhead
extended cache size
FIPS login password encryption
global async prefetch limit
global cache partition number
heap memory per user
histogram tuning factor
housekeeper free write percent
i/o accounting flush interval
i/o batch size
i/o polling process count
identity burning set factor
identity grab size
identity reservation size
idle migration timeout
job scheduler interval
job scheduler tasks
js heartbeat interval
js job output width
kernel mode
kernel resource memory
large allocation auto tune
license information
lock address spinlock ratio
lock hashtable size
lock scheme
lock shared memory
lock spinlock ratio
lock table spinlock ratio
lock timeout pipe active
lock timeout pipe max messages
lock wait period
log audit logon failure
log audit logon success
max async i/os per engine
On the Linux Platform
max async i/os per server
max buffers per lava operator
Differences Between number of sort buffers and max data buffers per lava sort
max cis remote connections
max concurrently recovered db
max js restart attempts
max memory
If SAP ASE Cannot Start
max native threads per engine
max nesting level
max network packet size
Choosing Packet Sizes
max network peek depth
max number network listeners
max online engines
max online Q engines
max parallel degree
max pci slots
max query parallel degree
max repartition degree
max resource granularity
max scan parallel degree
max SQL text monitored
max transfer history
max utility parallel degree
maximum dump conditions
maximum failed logins
maximum job output
memory alignment boundary
memory dump compression level
memory per worker process
messaging memory
metrics elap max
metrics exec max
metrics lio max
metrics pio max
min pages for parallel scan
minimum password length
mnc_full_index_filter
msg confidentiality reqd
msg integrity reqd
net password encryption reqd
network polling mode
In-Line Network Polling
number of alarms
number of aux scan descriptors
Monitoring and Estimating Scan Descriptor Usage
number of backup connections
number of ccbs
number of checkpoint tasks
number of devices
Setting the number of devices on UNIX
number of disk tasks
number of dtx participants
Optimizing the Number of DTX Participants for Your System
number of dump threads
number of early send rows
number of engines at startup
number of histogram steps
number of index trips
number of java sockets
number of large i/o buffers
number of locks
number of mailboxes
number of messages
number of network tasks
number of oam trips
number of open databases
Optimizing the number of open databases
number of open indexes
Optimizing number of open indexes
number of open objects
Optimizing number of open objects
number of open partitions
number of pre-allocated extents
Using a Value of 32 for the number of pre-allocated extents
number of Q engines at startup
number of remote connections
number of remote logins
number of remote sites
number of sort buffers
number of user connections
number of worker processes
o/s file descriptors
object lockwait timing
open index hash spinlock ratio
open index spinlock ratio
open object spinlock ratio
optimization goal
optimize temp table resolution
optimization timeout limit
optimizer level
page lock promotion HWM
page lock promotion LWM
page lock promotion PCT
page utilization percent
partition groups
partition spinlock ratio
pci memory size
per object statistics active
percent database for history
percent database for output
percent history free
percent output free
performance monitoring option
permission cache entries
plan text pipe active
plan text pipe max messages
print deadlock information
print recovery information
procedure cache size
procedure deferred compilation
process wait events
prod-consumer overlap factor
quorum heartbeat interval
quorum heartbeat retries
quoted identifier enhancements
rapidlog buffer size
rapidlog max files
read committed with lock
recovery interval in minutes
recovery prefetch size
remote server pre-read packets
restricted decrypt permission
row lock promotion HWM
row lock promotion LWM
row lock promotion PCT
rtm thread idle wait period
runnable process search count
runnable process search count versus idle timeout
sampling percent
secure default login
select for update
select on syscomments.text
send doneinproc tokens
session migration timeout
session tempdb log cache size
shared memory starting address
size of auto identity column
size of global fixed heap
size of process object heap
size of shared class heap
size of unilib cache
solaris async i/o mode
sproc optimize timeout limit
SQL batch capture
SQL Perfmon Integration
sql server clock tick length
sql text pipe active
sql text pipe max messages
stack guard size
stack size
start mail session
start xp server during boot
startup delay
statement cache size
statement pipe active
statement pipe max messages
statement statistics active
streamlined dynamic SQL
strict dtm enforcement
suppress js max task message
suspend audit when device full
syb_sendmsg port number
sysstatistics flush interval
systemwide password expiration
tape retention in days
tcp no delay
text prefetch size
threshold event max messages
threshold event monitoring
time slice
total data cache size
total logical memory
total physical memory
transfer utility memory size
txn to pss ratio
Optimizing the txn to pss ratio for your system
unified login required
update statistics hashing
upgrade version
use security services
user log cache queue size
user log cache size
user log cache spinlock ratio
utility statistics hashing
wait event timing
wait on uncommitted insert
workload manager cache size
xact coordination interval
xp_cmdshell context
Disk Resource Issues
Device Allocation and Object Placement
Commands for Managing Disk Resources
Considerations in Storage Management Decisions
Recovery
Performance
Status and Defaults at Installation
System Tables That Manage Storage
The sysdevices Table
The sysusages Table
The syssegments Table
The sysindexes Table
The syspartitions Table
Managing Remote Servers
Adding Remote Logins
Map Usersā Server IDs
Map Remote Logins to Particular Local Names
Map All Remote Logins to One Local Name
Keeping Remote Login Names for Local Servers
Example of Remote User Login Mapping
Password Checking for Remote Users
Effects of Using the Untrusted Mode
Getting Information About Remote Logins
Configuration Parameters for Remote Logins
Initializing Database Devices
Using the disk init command
Getting Information about Devices
Dropping devices
Designating Default Devices
Choosing Default and Nondefault Devices
Increasing the Size of Devices with disk resize
Insufficient Disk Space
Setting Database Options
Database Option Descriptions
Viewing the Options on a Database
Displaying Currently Set Switches with sysoptions
Configuring Character Sets, Sort Orders, and Languages
Advantages of Internationalized Systems
A Sample Internationalized System
Elements of an Internationalized System
Selecting the Character Set for Your Server
Unicode
Configuration Parameters
Functions
Using unichar Columns
Using unitext
Open Client Interoperability
Java Interoperability
Selecting the Server Default Character Set
Selecting the Sort Order
Different Types of Sort Orders
Selecting the Default Sort Order
Chinese Pinyin Sort Order
Selecting Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Selecting the Default Unicode Sort Order
Select a Language for System Messages
A Spanish-Version Server
A US-based company in Japan
A Japan-Based Company with Multinational Clients
Changing the character set, sort order, or message language
Changing the default character set
Changing the sort order with a resources file
Change the Default Sort Order
Reconfiguring the Character Set, Sort Order, or Message Language
Example: Converting a Unicode Database to UTF-8
Migrating Selected Columns to unichar
Migrating to or from unitext
Before Changing the Character Set or Sort Order
Set the Userās Default Language
Manage Suspect Partitions
Installing Date Strings for Unsupported Languages
Server Versus Client Date Interpretation
Internationalization and localization files
Character sets directory structure
Types of localization files
Software Messages Directory Structure
Global variables for Languages and Character Sets
Configuring Client/Server Character Set Conversions
Supported Character Set Conversions
Conversion for Native Character Sets
Conversion in a Unicode System
SAP ASE Direct Conversions
Unicode Conversions
Allowing Unicode noncharacters
Choosing a Conversion Type
Enabling and Disabling Character Set Conversion
Characters That Cannot Be Converted
Error handling in character set conversion
Conversions and Changes to Data Lengths
Specify the Character Set for Utility Programs
Display and file character set command line options
Diagnosing System Problems
How SAP ASE Uses Error Messages
Error Log Format
Error Messages and Message Numbers
Variables in Error Message Text
SAP ASE error logging
Severity Levels
Severity Levels 10 ā 18
Level 10: Status Information
Level 11: Specified Database Object Not Found
Level 12: Wrong Datatype Encountered
Level 13: User Transaction Syntax Error
Level 14: Insufficient Permission to Execute Command
Level 15: Syntax Error in SQL Statement
Level 16: Miscellaneous User Error
Level 17: Insufficient Resources
Level 18: Nonfatal Internal Error Detected
Severity Levels 19 ā 26
Level 19: SAP ASE Fatal Error in Resource
Level 20: SAP ASE Fatal Error in Current Process
Level 21: SAP ASE Fatal Error in Database Processes
Level 22: SAP ASE Fatal Error: Table Integrity Suspect
Level 23: Fatal Error: Database Integrity Suspect
Level 24: Hardware Error or System Table Corruption
Level 25: SAP ASE Internal Error
Level 26: Rule Error
Backup Server Error Logging
Killing Processes
Using kill with statusonly
Using sp_lock to Examine Blocking Processes
Using Shared Memory Dumps
Configuring Shared Memory Dump Conditions
System-Wide Default Settings
Housekeeper functionality
Housekeeper wash
Housekeeper chores
Housekeeper Garbage Collection
Configure SAP ASE Priority Level
Configuring enable housekeeper GC
Using The reorg Command
Shutting Down Servers
Shutting Down SAP ASE
Shutting down a Backup Server
Using nowait on a Backup Server
Learning about known problems
System Administration Guide 16.0: Volume 2
Limiting Access to Server Resources
Resource Limits
Plan Resource Limits
Enable Resource Limits
Define Time Ranges
Determe the Time Ranges You Need
Modifying a Named Time Range
Dropping a Named Time Range
When Do Time Range Changes Take Effect?
Identify Users and Limits
Identifying Heavy-Usage Users
Identifying Heavy-Usage Applications
Choosing a Limit Type
Determining Time of Enforcement
Determining the Scope of Resource Limits
Understanding Limit Types
Limiting I/O Cost
Identify I/O Costs
Calculate the I/O Cost of a Cursor
Scope of the io_cost Limit Type
Limiting Elapsed Time
Scope of the elapsed_time Limit Type
Limiting the Size of the Result Set
Scope of the row_count Limit Type
Setting Limits for tempdb Space Usage
Limiting Idle Time
Creating a Resource Limit
Resource Limit Examples
Getting Information on Existing Limits
Modifying Resource Limits
Dropping Resource Limits
Resource Limit Precedence
Mirroring Database Devices
Determining Which Devices to Mirror
Mirroring Using Minimal Physical Disk Space
Mirroring for Nonstop Recovery
Conditions That Do Not Disable Mirroring
Disk Mirroring Commands
Initializing Mirrors
Unmirroring a Device
Effects on System Tables
Restarting Mirrors
waitfor mirrorexit
Mirroring the Master Device
Getting Information About Devices and Mirrors
Disk Mirroring Tutorial
Disk Resizing and Mirroring
Configuring Memory
How SAP ASE Allocates Memory
Disk Space Allocation
How SAP ASE Allocates Buffer Pools
Heap Memory
Calculating Heap Memory
Memory Management in SAP ASE
Determining the Amount of Memory SAP ASE Needs
Determine the SAP ASE Memory Configuration
If You Are Upgrading
Determining the Amount of Memory SAP ASE Can Use
Configuration Parameters That Affect Memory Allocation
Dynamically Allocating Memory
If SAP ASE Cannot Start
Dynamically Decreasing Memory Configuration Parameters
Configuring Thread Pools
Determining the Total Number of Threads
Tuning the syb_blocking_pool
System Procedures for Configuring Memory
Viewing the Configuration Parameters for Memory
Memory Available for Dynamic Growth
Using sp_helpconfig
Using sp_monitorconfig
Configuration Parameters That Control SAP ASE Memory
SAP ASE Executable Code Size
Data and Procedure Caches
Determining the Procedure Cache Size
Determining the Default Data Cache Size
Monitoring Cache Space
Modify the ELC Size
Kernel Resource Memory
User Connections
Open Databases, Open Indexes, and Open Objects
Number of Locks
Database Devices and Disk I/O Structures
Parameters That Use Memory
Parallel Processing
Remote Servers
Referential Integrity
Parameters That Affect Memory
The Statement Cache
Setting the Statement Cache
Performing Ad Hoc Query Processing
Statement Matching Criteria
Caching Conditions
Statement Cache Sizing
Monitoring the Statement Cache
Aggregating Metrics from Syntactically Similar Queries
Purging the Statement Cache
Printing Statement Summaries
Displaying the SQL Plan for Cached Statements
Configuring Data Caches
The SAP ASE Data Cache
Cache Configuration Commands and System Procedures
Viewing Information About Data Caches
Configuring Data Caches
Creating a New Cache
Insufficient Space for New Cache
Adding Memory to an Existing Named Cache
Decreasing the Size of a Cache
Deleting a Cache
Explicitly Configuring the Default Cache
Changing the Cache Type
Improving the Recovery Log Scan During load database and load tran
Configuring a Cache Replacement Policy
Dividing a Data Cache into Memory Pools
Matching Log I/O Size for Log Caches
Binding Objects to Caches
Getting Information About Cache Bindings
Checking Cache Overhead
Effects of Overhead on Total Cache Space
Dropping Cache Bindings
Changing the Wash Area for a Memory Pool
When the Wash Area Is Too Small
When the Wash Area is Too Large
Setting the Housekeeper to Avoid Washes for Cache
Changing the Asynchronous Prefetch Limit for a Pool
Changing the Size of Memory Pools
Moving Space from the Memory Pool
Moving Space from Other Memory Pools
Adding Cache Partitions to Reduce Spinlock
Dropping a Memory Pool
When Pools Cannot Be Dropped Due to Page Use
Cache Binding Effects on Memory and Query Plans
Configuring Data Caches Using the Configuration File
Cache and Pool Entries in the Configuration File
Cache Configuration Guidelines
Configuration File Errors
Managing Multiprocessor Servers
SAP ASE Kernels
Target Architecture
Kernel Modes
Switching Kernel Modes
Tasks
Using Threads to Run Tasks
Configuring an SMP Environment
Thread Pools
Dynamic Thread Assignment
Managing Engines
Configuring Engines in Process Mode
Configuring Engines in Threaded Mode
Choosing the Right Number of Engines
Starting and Stopping Engines
Monitoring Engine Status
Starting and Stopping Engines with sp_engine
Relationship Between Network Connections and Engines
Logical Process Management and dbcc engine(offline)
Managing User Connections
Configuration Parameters That Affect SMP Systems
Configuring Spinlock Ratio Parameters
Round-Robin Assignment
Sequential Assignment
Creating and Managing User Databases
Permissions for Managing User Databases
Using the create database Command
Assigning Space and Devices to Databases
Default Database Size and Devices
Estimating the Required Space
Placing a Transaction Log on a Separate Device
Estimating the Transaction Log Size
Default Log Size and Device
Moving the Transaction Log to Another Device
Shrinking Log Space
Using dump and load database When Shrinking Log Space
Shrinking a Log Before a dump and load database
Using dump and load transaction When Shrinking Log Space
Shrinking Log Space
Calculating the Transaction Log Growth Rate
Database Recovery with the for load Parameter
Using the with override Option with create database
Changing Database Ownership
Altering Databases
Using alter database
Using the drop database Command
System Tables That Manage Space Allocation
The sysusages Table
The segmap Column
The lstart, size, and vstart Columns
SAP ASE Support for Replication by Column Value
Getting Information about Database Storage
Using sp_helpdb to Find Database Device Names and Options
Checking the Amount of Space Used
Checking Space Used in a Database
Checking Summary Information for a Table
Checking Information for a Table and Its Indexes
Querying System Table for Space Usage Information
Database Mount and Unmount
Manifest File
Operations That Copy and Move Databases
Performance Considerations
Device Verification
Mounting and Unmounting Databases
Unmounting a Database
Mounting a Database
Moving Databases from One SAP ASE to Another
System Restrictions
quiesce database Extension
Distributed Transaction Management
Configuration Considerations
Behavior for Transaction Manager-Coordinated Transactions
Enhanced Transaction Manager for SAP ASE Versions 15.0.3 or Later
RPC and CIS Transactions
SYB2PC Transactions
Enabling DTM Features
Configuring Transaction Resources
Calculating the Number of Required Transaction Descriptors
Setting the Number of Transaction Descriptors
Using SAP ASE Coordination Services
Overview of Transaction Coordination Services
Hierarchical Transaction Coordination
X/Open XA-Compliant Behavior in DTP Environments
Requirements and Behavior
Ensuring Sufficient Resources for Updates
number of dtx participants Parameter
Optimizing the number of dtx participants
Using Transaction Coordination Services on Remote Servers
Set the strict dtm enforcement Parameter
Monitoring Coordinated Transactions and Participants
DTM Administration and Troubleshooting
Transactions and Threads of Control
Lock Manager Support for Detached Transactions
Getting Information About Distributed Transactions
Transaction Identification in systransactions
Transaction Keys
Viewing active transactions with sp_transactions
Identify Local, Remote, and External Transactions
Identify the Transaction Coordinator
View the Transaction Thread of Control
Understanding Transaction State Information
Limiting sp_transactions Output to Specific States
Transaction Failover Information
Determining the Commit Node and gtrid with sp_transactions
Commit and Parent Nodes
Global Transaction ID
Executing External Transactions
Crash Recovery Procedures for Distributed Transactions
Transactions Coordinated with MSDTC During Crash Recovery
Transactions Coordinated by SAP ASE or X/Open XA During Crash Recovery
Transactions Coordinated with SYB2PC During Crash Recovery
Heuristically Completing Transactions
Completing Prepared Transactions
Maintaining a Transaction's Commit Status
Manually Clearing the Commit Status
Completing Transactions That Are Not Prepared
Determining the Commit Status for SAP ASE Transactions
Troubleshooting for Transactions Coordinated by External Transaction Managers
SAP ASE Implicit Rollback in External Transactions
Support for OData
OData Server Architecture
OData Server Limitations
Unsupported OData Protocol Features
Security Considerations for OData Server
Configuring OData Server
Setting Up an HTTP Server for OData
Create an OData Producer Service Model
OData Server Sample Files
Starting and Stopping OData Server
Creating and Using Segments
System-Defined Segments
Segment Usage in SAP ASE
Controlling Space Usage
Use Segments to Allocate Database Objects
Separating Tables, Indexes, and Logs
Splitting Tables
Moving a Table to Another Device
Creating Segments
Changing the Scope of Segments
Extending the Scope of Segments
Automatically Extending the Scope of a Segment
Reducing the Scope of a Segment
Assigning Database Objects to Segments
Creating New Objects on Segments
Placing Existing Objects on Segments
Placing Text Pages on a Separate Device
Creating Clustered Indexes on Segments
Dropping Segments
Getting Information About Segments
sp_helpsegment
sp_helpdb
sp_help and sp_helpindex
Segments and System Tables
A Segment Tutorial
Using the reorg Command
reorg Command and Its Parameters
Running reorg rebuild Concurrently
Using the optdiag Utility to Assess the Need for a reorg
Moving Forwarded Rows to Home Pages
Use reorg compact to Remove Row Forwarding
Reclaiming Unused Space from Deletions and Updates
Reclaming Space Without the reorg Command
Reclaiming Unused Space and Undoing Row Forwarding
Rebuilding a Table
Prerequisites for Running reorg rebuild
Changing Space Management Settings Before Using reorg rebuild
Using the reorg rebuild Command on Indexes
Rebuilding Indexes with reorg rebuild index_name partition_name
Space Requirements for Rebuilding an Index
Status Messages
resume and time Options for Reorganizing Large Tables
Incremental Reorganization
Checking the Reorganization Status
Clearing reorg defrag Information from sysattributes
Logging Behavior
Checking Database Consistency
Page and Object Allocation
Understanding the Object Allocation Map (OAM)
Understanding Page Linkage
dbcc Checks
dbcc Command Output
Checking Database and Table Consistency
dbcc checkstorage
Understanding the dbcc checkstorage Operation
Performance and Scalability
dbcc checktable
dbcc checkindex
dbcc checkdb
Checking Page Allocation
dbcc checkalloc
dbcc indexalloc
dbcc tablealloc
dbcc textalloc
Correcting Allocation Errors Using the fix | nofix Options
Generate Reports with dbcc tablealloc and dbcc indexalloc
Checking Consistency of System Tables
Strategies for Using Consistency Checking Commands
Using Large I/O and Asynchronous Prefetch
Scheduling Database Maintenance at Your Site
Database Use
Backup Schedule
Size of Tables and Importance of Data
Errors Generated by Database Consistency Problems
Reporting on Aborted checkstorage and checkverify Operations
Aborting with Error 100032
Comparison of Soft and Hard Faults
Soft Faults
Hard Faults
Verifying Faults with dbcc checkverify
Scheduling dbcc checkverify
Executing dbcc checkverify
Preparing to Use dbcc checkstorage
Planning Resources
Planning Workspace Size
Number of Concurrent Workspaces
Automatic Workspace Expansion
Configuring Worker Processes
Setting a Named Cache for dbcc
Configuring an 8-page I/O Buffer Pool
Disk Space for dbccdb
Segments for Workspaces
Creating the dbccdb Database
Updating the dbcc_config Table
Viewing the Current Configuration Values
Default Configuration Values
Deleting Configuration Values
dbccdb Maintenance Tasks
Reevaluating and Updating the dbccdb Configuration
Cleaning Up dbccdb
Performing Consistency Checks on dbccdb
Generating Reports from dbccdb
Reporting a Summary of dbcc checkstorage Operations
Upgrading Compiled Objects with dbcc upgrade_object
Finding Compiled Object Errors Before Production
Reserved Word Errors
Missing, Truncated, or Corrupted Source Text
Temporary Table References
Resolving select * Potential Problem Areas
Using Database Dumps in Upgrades
Upgrading Compiled Objects in Database Dumps
Developing a Backup and Recovery Plan
Tracking Database Changes
Getting Information About the Transaction Log
Determining When Log Records Are Committed
Changes to Logging Behavior
Risks of Using delayed_commit
Enabling set delayed_commit
Designating Responsibility for Backups
Checkpoints: Synchronizing a Database and Its Log
Setting the Recovery Interval
Automatic Checkpoint Procedure
Truncating the Log After Automatic Checkpoints
Free Checkpoints
Manually Requesting a Checkpoint
Automatic Recovery After a System Failure or Shutdown
Fast Recovery
SAP ASE Start-up Sequence
Bringing Engines Back Online
Parallel Recovery
Database Recovery
Specifying the Recovery Order
Changing or Deleting the Recovery Position of a Database
Listing the User-Assigned Recovery Order of Databases
Parallel Checkpoints
Recovery State
Tuning for Fast Recovery
The sybdumptran Utility
Fault Isolation During Recovery
Persistence of Offline Pages
Configuring Recovery Fault Isolation
Isolating Suspect Pages
Raising the Number of Suspect Pages Allowed
Getting Information About Offline Databases and Pages
Bringing Offline Pages Online
Index-Level Fault Isolation for Data-Only-Locked Tables
Side Effects of Offline Pages
Recovery Strategies Using Recovery Fault Isolation
Reload Strategy
Repair Strategy
Assessing the Extent of Corruption
Using the dump and load Commands
dump database: Making Routine Database Dumps
dump transaction: Making Routine Transaction Log Dumps
dump tran with no_truncate: Copying the Log After Device Failure
load database: Restoring the Entire Database
load transaction: Applying Changes to the Database
online database: Making the Database Available to Users
Dumping and Loading Databases Across Platforms
Dumping a Database
Loading a Database
Restrictions for Dumping and Loading Databases and Transactions
Improving Recovery Prefetch
Performance Notes
Moving a Database to Another SAP ASE
Upgrading a User Database
Using the Special Load Options to Identify Dump Files
Restoring a Database from Backups
Suspending and Resuming Updates to Databases
Guidelines for using quiesce database
Maintaining Server Roles in a Primary and Secondary Relationship
Starting the Secondary Server with the -q Option
āin quiesceā Database Log Record Value Updated
Updating the Dump Sequence Number
Backing up Primary Devices with quiesce database
Recovery of Databases for Warm Standby Method
Making Archived Copies During the Quiescent State
The mount and unmount Commands
Using Backup Server for Backup and Recovery
Requirements for Communicating with Backup Server
Mounting a New Volume
Starting and Stopping Backup Server
Configuring Your Server for Remote Access
Choosing Backup Media
Protecting Backup Tapes from Being Overwritten
Dumping to Files or Disks
Creating Logical Device Names for Local Dump Devices
Adding a Backup Device
Scheduling backups of user databases
Other Times to Back Up a Database
Scheduling Backups of master
Dump the master Database After Each Change
Save Scripts and System Tables
Truncate the master Database Transaction Log
Avoid Volume Changes and Recovery
Scheduling Backups of the model Database
Truncate the model Databaseās Transaction Log
Schedule Backups of the sybsystemprocs Database
Configuring SAP ASE for Simultaneous Loads
Gather Backup Statistics
Backing Up and Restoring User Databases
Specifying the Database and Dump Device
Rules for Specifying Database Names
Rules for Specifying Dump Devices
Tape Device Determination by Backup Server
Tape Device Configuration File
Compressing a Dump
Backup Server Dump Files and Compressed Dumps
Loading Compressed Dumps
Cyclic Redundancy Checks for dump database
Dump History File
Backups for the Dump Configuration Files
Performing Cumulative Dumps
Dump and Load Sequences
Partially Logged Operations and Cumulative Dumps
Restrictions
Specifying a Remote Backup Server
Remote Dump Host Control
Specifying Tape Density, Block Size, and Capacity
Overriding the Default Density
Overriding the Default Block Size
Specifying a Larger Block Size Value
Specifying Tape Capacity for Dump Commands
Nonrewinding Tape Functionality for Backup Server
Tape Operations
Dump Version Compatibility
Apply Source Database Attributes to the Target Database
Generate SQL for a Different Target Database
Specifying the Volume Name
Loading from a Multifile Volume
Identifying a Dump
Improving Dump or Load Performance
Compatibility with Prior Versions
Reducing load database Time
Concurrent dump database and dump transaction Commands
Configure SAP ASE to Run Concurrent Dumps
Labels Stored in Integer Format
Configure Local and Remote Backup Servers
Setting Shared Memory Usage
Configuring Shared Memory Dumps
Setting the Maximum Number of Stripes
Setting the Maximum Number of Network Connections
Setting the Maximum Number of Service Threads
Automatic Physical Database Rearrangement on Load
Specify Additional Dump Devices with the stripe on Clause
Dumps to, and Loads from, Multiple Devices
Using Fewer Devices to Load Than to Dump
Specifying the Characteristics of Individual Devices
Tape Handling Options
Prevent Dump Files from Being Overwritten
Reinitializing a Volume Before a Dump
Dumping and Loading Databases with Password Protection
Overriding the Default Message Destination
Bringing Databases Online with standby_access
Getting Information About Dump Files
Requesting Dump Header Information
Determining the Database, Device, File Name, and Date
Copying the Log After a Device Failure
Responding to Volume Change Requests
Volume Change Prompts for Dumps
Volume Change Prompts for Loads
Recovering a Database: Step-By-Step Instructions
Getting a Current Dump of the Transaction Log
Examining the Space Usage
Dropping the Databases
Re-creating the Databases
Loading the Database
Loading the Transaction Logs
Loading a Transaction Log to a Point in Time
Bringing the Databases Online
Replicated Databases
Loading Database Dumps from Older Versions
Upgrading a Dump to the Current Version of SAP ASE
The Database Offline Status Bit
Version Identifiers and Automatic Upgrade
Cache Bindings and Loading Databases
Databases and Cache Bindings
Database Objects and Cache Bindings
Checking on Cache Bindings
Cross-Database Constraints and Loading Databases
Restoring the System Databases
Recovering the master Database
Recovery Procedure
Finding Copies of System Tables
Building a New Master Device
Replacing the Master Device
Rebuilding the Configuration Area
Starting SAP ASE in Master-Recover Mode
Re-creating Device Allocations for master
Checking Your Backup Server sysservers Information
Verifying That Your Backup Server Is Running
Loading a Backup of master
Updating the number of devices Configuration Parameter
Restarting SAP ASE in Master-Recover Mode
Checking System Tables to Verify Current Backup of master
Restarting SAP ASE
Restoring Server User IDs
Restoring the model Database
Checking SAP ASE
Backing Up master
Recovering the model Database
Recovering the sybsystemprocs Database
Restoring sybsystemprocs with installmaster
Restoring sybsystemprocs with load database
Reducing the Size of tempdb
Reset tempdb to Default Size
Restoring System Tables with disk reinit and disk refit
Restoring sysdevices with disk reinit
Restoring sysusages and sysdatabase with disk refit
Archive Database Access
Components of an Archive Database
The Database Dump
The Modified Pages Section
The sysaltusages Table and the Scratch Database
Working With an Archive Database
DDLGen Support for Archive Database Access
Configuring an Archive Database
Sizing the Modified Pages Section
Increasing the Amount of Space Allocated to the Modified Pages Section
Materializing an Archive Database
Using load database with norecovery
Using Logical Devices with an Archive Database
load database Limitations with an Archive Database
Bringing an Archive Database Online
Loading a Transaction Log into an Archive Database
Dropping an Archive Database
SQL Commands for Archive Databases
dbcc Commands for Archive Databases
Issuing a Typical Archive Database Command Sequence
Compressed Dumps for an Archive Database
Creating a Compression Memory Pool
Upgrading and Downgrading an SAP ASE with Archive Databases
Limitations for Downgrading an SAP ASE with an Archive Database
Compatibility Issues for a Compressed Dump
Archive Database Limitations
Shrinking Databases
Shrinking a Database
How SAP ASE Shrinks the Database
Shrink Operations on Databases That Contain Text or Image Data
Shrink Database Backlink Performance Improvements
Restarting Partially Completed Shrink Operations
Moving Data Before Shrinking the Database
Restrictions for Moving the Transaction Log
Locks Held During Data Movement
Determine the Status of a Shrink Operation
Upgrading or Downgrading Shrunken Databases
Restrictions
Expanding Databases Automatically
Layouts for Disks, Devices, Databases, and Segments
Threshold Action Procedures
Installing Automatic Database Expansion Procedures
Running sp_dbextend
Validating Current Thresholds
Configuring a Database for Automatic Expansion
Restrictions and Limitations
Managing Free Space with Thresholds
Monitoring Free Space with the Last-Chance Threshold
Controlling How Often sp_thresholdaction Executes
Rollback Records and the Last-Chance Threshold
Calculating the Space for Rollback Records
Using lct_admin to Determine the Free Log Space
Determining the Current Space for Rollback Records
Effect of Rollback Records on the Last-Chance Threshold
User-Defined Thresholds
Last-Chance Threshold and User Log Caches for Shared Log and Data Segments
Using lct_admin abort to Abort Suspended Transactions
Add Space to the Master Databaseās Transaction Log
Automatically Aborting or Suspending Processes
Using abort tran on log full to Abort Transactions
Waking Suspended Processes
Adding, Changing, and Deleting Thresholds
Displaying Information About Existing Thresholds
Thresholds and System Tables
Creating Free-Space Thresholds
Changing or Specifying a New Free-Space Threshold
Dropping a Threshold
Creating a Free-Space Threshold for the Log Segment
Usage Scenario: Testing and Adjusting the New Threshold
Creating Additional Thresholds on Data and Log Segments
Determining Threshold Placement
Creating Threshold Procedures
Parameters for Threshold Procedures
Generating Error Log Messages
sp_thresholdaction Procedures that Include a dump transaction
A Simple Threshold Procedure
A More Complex Procedure
Placement for Threshold Procedures
Disabling Free-Space Accounting for Data Segments
Transaction Log Space Management
Transaction Log Space
Automating Transaction Log Management
Rescue Scenario Use Case
Monitoring Use Case
Monitoring and Control Use Case
Analyzing and Managing Transaction Log Space
Viewing the Span of a Transaction
Viewing the Oldest Active Transactions
Truncating a Log that Is Not on A Separate Segment
Truncating the Log in Early Development Environments
Truncating a Log that Has No Free Space
Dangers of Using with truncate_only and with no_log
Provide Sufficient Log Space
Querying the syslogshold Table
Migration Technology Guide 15.5
About this book
Migration Strategy
Preupgrade considerations
Understanding optimization goals
Optimization criteria
Resource recommendations for Adaptive Server 15.0
Incorporating statistics in Adaptive Server 15.0
Recommended testing before upgrade
Migrating to Adaptive Server 15.0 features
Upgrading, and using new features immediately
Upgrading, and using new features later
Upgrading, but not using new features
Troubleshooting
Query processing tips
Information to capture before contacting Technical Support
701 errors
Performance problems with a limited number of queries
System-wide performance issues
Uploading diagnostics to Technical Support
QPTune
Setting up your system
Using QPTune to fix missing statistics
Starting QPTune to fix missing statistics
Collecting statistics
Fixing statistics
Using undo_fix_stats
Using QPTune to tune queries or applications
Starting QPTune to tune queries or applications
Simple start
Custom start
Collecting metrics
Comparing metrics
Applying the best results
Configuration file
Examples
Upgrade issues
Localization
QPTune GUI
Environment and system requirements
Starting the QPTune GUI
Fixing missing statistics
Tuning Task
QPTune reference information
Running the Query Processor in Compatibility Mode
Enabling compatibility mode
Feature support in compatibility mode
Additional trace flag for diagnostics
New stored procedure sp_compatmode
Changes to @@qpmode global variable
Diagnostic tool
Performance and Tuning Series: Basics 16.0
Performance and Tuning Series: Improving Performance with Statistical Analysis 16.0
Performance and Tuning Series: Locking and Concurrency Control 16.0
Performance and Tuning Series: Monitoring Adaptive Server with sp_sysmon 16.0
Performance and Tuning Series: Monitoring Tables 16.0
Performance and Tuning Series: Physical Database Tuning 16.0
Performance and Tuning Series: Query Processing and Abstract Plans 16.0
Glossary 16.0
Quick Reference Guide 15.7
Quick Reference Guide
Datatypes
Standards and compliance
Datatypes and encrypted columns
Adaptive Server global variables
Reserved words
Transact-SQL reserved words
ANSI SQL reserved words
Potential ANSI SQL reserved words
Functions
XML functions
Commands
Interactive dbsql commands
System procedures
Catalog stored procedures
Extended stored procedures
dbcc stored procedures
System tables
DBCC tables
Monitoring tables
sybpcidb tables
Utilities
System Tables Diagram 16.0
Monitoring Tables Diagram 16.0
Troubleshooting: Error Messages Advanced Resolutions 15.0
About this book
Introduction
Understanding error message severity levels
Notifying the System Administrator
Variables in error message text
Finding object names in error message text
Finding the Adaptive Server version
Understanding the field order in the version string
Creating error messages
Reporting errors
Sybase Technical Support checklist
Sending error log fragments
Reproducing problems
Parser Errors (100s, 7380)
Error 102
Error 107
Error 195
Error 7380
Sequencer Errors (200s, 7783, 7788, 11000s, 14200)
Error 207
Error 208
Error 213
Error 216
Error 225
Error 226
Error 229
Error 232
Error 233
Error 241
Error 247
Error 257
Error 259
Error 265
Error 266
Error 268
Error 277
Error 7783
Error 7788
Error 11018
Error 11068
Error 11072
Error 14200
Query Processor Errors (300s, 400s, 500s)
Error 311
Error 313
Error 314
Error 403
Error 414
Error 428
Error 511
Error 512
Error 515
Error 530
Error 539
Error 540
Error 546
Error 547
Error 551
Error 584
Access Method Errors (600s)
Error 601
Error 603
Error 605
Error 611
Error 614
Error 622
Error 623
Error 624
Error 625
Error 629
Error 631
Error 644
Error 678
Error 691
Error 692
Error 693
Error 694
Error 695
Error 696
Error 697
Memory Manager Errors (700s)
Error 701
Error 702
Error 703
Error 706
Error 707
Error 709
Error 714
Error 715
Error 717
Error 718
Error 719
Error 720
Error 721
Buffer Manager Errors (800s)
Error 803
Error 804
Error 806
Error 813
Error 820
Error 821
Error 822
Error 823
Error 832
Error 834
Error 835
Error 840
Error 842
Error 847
Error 849
Error 852
Error 855
Error 861
Error 863
Error 881
Error 890
Open Database Manager Errors (900s)
Error 903
Error 905
Error 906
Error 908
Error 911
Error 913
Error 916
Error 921
Error 924
Error 925
Error 926
Error 930
Error 935
Error 940
Error 941
Error 945
Error 950
Error 965
Abstract Plan Manager Errors (1000s)
Error 1024
Page Manager Errors (1100s)
Error 1105
Error 1108
Error 1120
Error 1124
Error 1127
Error 1129
Error 1131
Error 1133
Error 1141
Error 1142
Error 1143
Error 1159
Error 1161
Lock Manager Errors (1200s)
Error 1203
Error 1204
Error 1205
Error 1243
Error 1244
Error 1249
Error 1251
Error 1265
Error 1279
Sort Manager Errors (1500s)
Error 1501
Error 1505
Error 1506
Error 1508
Error 1509
Error 1510
Error 1514
Error 1530
Error 1531
Initialization Errors (1600s)
Error 1601
Error 1602
Error 1603
Error 1605
Error 1608
Error 1613
Error 1621
Error 1622
Error 1623
Create Utilities Errors (1700 - 1900s, 2100s, 2700s, 12800s)
Error 1702
Error 1708
Error 1732
Error 1803
Error 1808
Error 1809
Error 1810
Error 1813
Error 1820
Error 1902
Error 1903
Error 1916
Error 1928
Error 2110
Error 2714
Error 2729
Error 2753
Error 2762
Error 12818
Error 12842
Error 12881
High Availability Errors (2200s)
Error 2243
Character Set Conversion Errors (2400s)
Error 2401
Error 2402
Error 2409
dbcc Errors (2500s, 7900s, 12000s, 15000s)
Error 2501
Error 2502
Error 2503
Error 2507
Error 2509
Error 2510
Error 2511
Error 2513
Error 2514
Error 2517
Error 2520
Error 2521
Error 2524
Error 2525
Error 2529
Error 2540
Error 2546
Error 2547
Error 2550
Error 2558
Error 2559
Error 2572
Error 2573
Error 2574
Error 2575
Error 2578
Error 2582
Error 2583
Error 2591
Error 2596
Error 7901
Error 7902
Error 7928
Error 7930
Error 7939
Error 7940
Error 7949
Error 7989
Error 9961
Error 12964
Error 15056
Error 15080
Error 15082
Error 15084
insert Errors (2600s)
Error 2601
Error 2610
Error 2615
Error 2619
Error 2620
Error 2626
Error 2628
Error 2630
Error 2631
Procedure Manager Errors (2800s)
Error 2805
Error 2806
Error 2811
Error 2812
Error 2824
Error 2835
Error 2844
dump and load Errors (3000s - 3200s, 4200s - 4300s)
Error 3019
Error 3020
Error 3021
Error 3105
Error 3120
Error 3143
Error 3144
Error 3161
Error 3162
Error 3201
Error 3203
Error 3211
Error 3212
Error 3216
Error 3225
Error 3230
Error 3233
Error 3240
Error 4204
Error 4205
Error 4207
Error 4216
Error 4221
Error 4222
Error 4305
Error 4322
commit and abort Errors (3300s)
Error 3301
Error 3307
Error 3321
Error 3322
Recovery Errors (3400s, 12500s)
Error 3401
Error 3403
Error 3404
Error 3414
Error 3429
Error 3434
Error 3445
Error 3446
Error 3447
Error 3452
Error 3454
Error 3462
Error 3470
Error 12546
Error 12547
Error 12551
Error 12583
Error 12587
Exception Handling Errors (3600s)
Error 3604
Error 3621
Error 3624
Error 3626
Error 3641
Error 3642
Error 3643
Error 3644
Error 3646
Error 3648
drop Errors (3700s)
Error 3701
Error 3702
Error 3703
Transaction Errors (3900s)
Error 3904
Error 3905
Error 3906
Error 3908
Error 3917
Error 3949
dataserver Errors (4000s)
Error 4001
Error 4002
Error 4020
View Resolution Manager Errors (4400s)
Error 4430
truncate table Errors (4700s)
Error 4716
Bulk Copy Utility Errors (4800s)
Error 4801
Error 4806
alter table Errors (4900s)
Error 4951
Error 4953
Error 4954
Error 4956
Error 4964
alter database Errors (5000s)
Error 5006
Error 5013
Error 5018
Error 5034
Disk Errors (5100s)
Error 5115
Error 5123
Error 5142
Transaction Coordinator Errors (5600s)
Error 5602
Open Client Errors (5700s)
Error 5701
Error 5704
Configuration Errors (5800s, 10800s)
Error 5806
Error 5808
Error 5824
Error 5846
Error 5847
Error 5848
Error 5849
Error 5850
Error 5851
Error 5852
Error 5853
Error 5854
Error 5857
Error 5859
Error 5861
Error 5863
Error 5865
Error 5866
Error 5867
Error 5868
Error 5893
Error 10841
Error 10865
Process Kill Errors (6100s)
Error 6103
Error 6107
Timestamp Errors (6900s)
Error 6901
Error 6902
Distributed Database Network Errors (7200s)
Error 7201
Error 7205
Error 7207
Error 7211
Error 7212
Error 7214
Error 7215
Error 7218
Error 7220
Error 7221
Error 7223
Error 7227
Error 7234
Error 7235
Text Manager Errors (7100s)
Error 7101
Error 7105
Error 7114
Error 7130
Error 7134
Threshold Manager Errors (7400s)
Error 7401
Error 7402
Error 7403
Error 7404
Error 7406
Error 7407
Error 7408
Error 7409
Error 7410
Error 7411
Error 7412
Error 7413
Error 7414
Error 7415
Error 7417
Error 7418
Error 7438
Auditing Errors (7600s)
Error 7618
Remote Procedure Call Errors (8000s)
Error 8006
Error 8009
Descriptor Manager Errors (8200s)
Error 8201
Error 8203
Error 8204
Error 8207
Error 8210
Error 8211
Error 8219
Error 8239
Error 8241
sysindexes Manager Errors (8400s)
Error 8402
Error 8419
Process Status Structure Errors (8600s)
Error 8601
Site Buffer Manager Errors (8700s)
Error 8704
Disk Manager Errors (9000s)
Error 9004
Replication Agent Manager Errors (9100s - 9200s)
Error 9122
Error 9287
Error 9289
Error 9290
Component Integration Services Errors (11200s)
Error 11201
Error 11202
Error 11203
Configurable Shared Memory Dump Manager (12000s, 12300s)
Error 12036
Error 12326
Error 12328
Error 12329
Error 12330
Error 12333
Error 12334
Error 12335
Fault Isolation Utility Errors (12700s)
Error 12716
Error 12717
Partition (14100s) and Partition Key Manager (14300s) Errors
Error 14100
Error 14108
Error 14120
Error 14124
Error 14126
Error 14313
mount database Errors (14500s)
Error 14503
Error 14504
Error 14511
Error 14513
Error 14560
Error 14561
Anchor Manager Errors (14600s)
Error 14605
Error 14618
Error 14619
Error 14620
Error 14621
Error 14622
Error 14623
XML Utility Manager Errors (14900s)
Error 14901
Message Service Errors (15100s)
Error 15101
Error 15105
Web Services Errors (15200s)
Error 15219
Encryption Errors (15400s)
Error 15402
Error 15403
Error 15412
Error 15413
Error 15417
Statistics Errors (15600s)
Error 15600
Error 15601
System Procedure Errors (17000s, 18000s)
Error 17461
Error 17715
Error 17716
Error 17737
Error 17870
Error 17871
Error 17872
Error 17873
Error 17874
Error 17875
Error 17903
Error 17904
Error 17905
Error 17906
Error 17910
Error 18031
Error 18032
Error 18033
Error 18123
Error 18750
Kernel Errors
Asynchronous I/O not available
Buffer mismatch
Could not create shared memory
Current process infected
dopen error
dstart I/O request repeatedly delayed
Failed to open device
Feature is not licensed
File already in use
Memory too fragmented
Memory usage in procedure headers
Network information message
No more alarms available
Open objects parameter may be too low
os_attach_region errors
os_create_region errors
Read/write errors
Server is unnamed
Stack guardword corrupted
time slice error
t_rcvconnect error
udunmirror errors
No more engines can be offlined
Reference Manual: Building Blocks 16.0
About These Topics
System and User-Defined Datatypes
Datatype Categories
Exact Numeric Datatypes
Integer Types
Decimal Datatypes
Approximate Numeric Datatypes
Understanding Approximate Numeric Datatypes
Range, Precision, and Storage Size
Entering Approximate Numeric Data
NaN and Inf Values
Money Datatypes
Accuracy
Range and Storage Size
Entering Monetary Values
timestamp Datatype
Creating a timestamp Column
Date and Time Datatypes
Range and Storage Requirements
Entering Date and Time Data
Entering the Date
Entering the Time
Displaying Formats for datetime, smalldatetime, and date Values
Display Formats for bigdatetime and bigtime
Displaying Formats for time Value
Finding Values That Match a Pattern
Manipulating Dates
Standards and Compliance
Character Datatypes
unichar and univarchar
Length and Storage Size
Determining Column Length with System Functions
Entering Character Data
Entering Unicode Characters
Example of Treatment of Blanks
Manipulating Character Data
Standards and Compliance for Character Datatypes
Binary Datatypes
Valid binary and varbinary Entries
Entries of More than the Maximum Column Size
Treatment of Trailing Zeros
Platform Dependence
bit Datatype
sysname and longsysname Datatypes
text, image, and unitext Datatypes
Data Structures Used for Storing text, unitext, and image Data
Initialize text, unitext, and image Columns
Define unitext Columns
Save Space by Allowing NULL
Obtain Information from sysindexes
Using readtext and writetext
Determine How Much Space a Column Uses
Restrictions on text, image, and unitext Columns
Selecting text, unitext, and image Data
Converting text and image Datatypes
Converting to or from Unitext
Pattern Matching in text Data
Duplicate Rows
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Declaring a LOB Datatype
Creating a LOB Parameter
Examples for Using LOB Datatypes
Standards and Compliance
Range and Storage Size
Datatypes of Columns, Variables, or Parameters
Declaring Datatypes for a Column in a Table
Declaring Datatypes for Local Variable in a Batch or Procedure
Declaring Datatypes for a Parameter in a Stored Procedure
Determine the Datatype of Numeric Literals
Determine the Datatype of Character Literals
Datatypes of Mixed-Mode Expressions
Determine the Datatype Hierarchy
Determine Precision and Scale
Datatype Conversions
Automatic Conversion of Fixed-Length NULL Columns
Handling Overflow and Truncation Errors
Datatypes and Encrypted Columns
User-Defined Datatypes
Standards and Compliance
Transact-SQL Functions
abs
acos
allocinfo
ascii
asehostname
asin
atan
atn2
avg
audit_event_name
authmech
biginttohex
bintostr
cache_usage
case
cast
Usage for cast
Conversions Involving Java Classes
Implicit Conversion
Explicit Conversion
ceiling
char
Usage for char
Reformatting Output With char
char_length
charindex
coalesce
col_length
col_name
compare
Usage for compare
Maximum Row and Column Length for APL and DOL
convert
Usage for convert
Conversions Involving Java classes
Implicit Conversion
Explicit Conversion
cos
cot
count
count_big
create_locator
current_bigdatetime
current_bigtime
current_date
current_time
curunreservedpgs
data_pages
datachange
Usage for datachange
Restrictions for datachange
datalength
dateadd
datediff
datename
datepart
day
db_attr
db_id
db_instanceid
db_name
db_recovery_status
dbencryption_status
defrag_status
degrees
derived_stat
difference
dol_downgrade_check
exp
floor
get_appcontext
get_internal_date
getdate
getutcdate
has_role
hash
hashbytes
hextobigint
hextoint
host_id
host_name
instance_id
identity_burn_max
index_col
index_colorder
index_name
inttohex
isdate
is_quiesced
is_sec_service_on
is_singleusermode
isnull
isnumeric
instance_name
lc_id
lc_name
lct_admin
left
len
license_enabled
list_appcontext
locator_literal
locator_valid
lockscheme
log
log10
loginfo
lower
lprofile_id
lprofile_name
ltrim
max
migrate_instance_id
min
month
mut_excl_roles
newid
next_identity
nullif
object_attr
object_id
object_name
object_owner_id
pagesize
partition_id
partition_name
partition_object_id
password_random
patindex
pi
power
proc_role
pssinfo
radians
rand
rand2
replicate
reserve_identity
reserved_pages
return_lob
reverse
right
rm_appcontext
role_contain
role_id
role_name
round
row_count
rtrim
sdc_intempdbconfig
set_appcontext
setdata
shrinkdb_status
show_cached_plan_in_xml
show_cached_text
show_cached_text_long
show_condensed_text
show_dynamic_params_in_xml
show_plan
show_role
show_sec_services
sign
sin
sortkey
Usage for sortkey
Collation Tables
Collation Names and IDs
soundex
space
spaceusage
spid_instance_id
square
sqrt
stddev
stdev
stdevp
stddev_pop
stddev_samp
str
str_replace
strtobin
stuff
substring
sum
suser_id
suser_name
syb_quit
syb_sendmsg
sys_tempdbid
tan
tempdb_id
textptr
textvalid
to_unichar
tran_dumpable_status
tsequal
Usage for tsequal
Adding a Timestamp to a New Table for Browsing
uhighsurr
ulowsurr
upper
uscalar
used_pages
user
user_id
user_name
valid_name
valid_user
var
var_pop
var_samp
variance
varp
workload_metric
xa_bqual
xa_gtrid
xact_connmigrate_check
xact_owner_instance
xmlextract
xmlparse
xmlrepresentation
xmltable
xmltest
xmlvalidate
year
Global Variables
Using Global Variables in a Clustered Environment
Expressions, Identifiers, and Wildcard Characters
Expressions
Size of Expressions
Arithmetic and Character Expressions
Relational and Logical Expressions
Operator Precedence
Arithmetic Operators
Bitwise Operators
String Concatenation Operator
Comparison Operators
Nonstandard Operators
Using any, all, and in
Negating and Testing
Ranges
Using Nulls in Expressions
Comparisons That Return TRUE
Difference Between FALSE and UNKNOWN
Using āNULLā as a Character String
NULL Compared to the Empty String
Connecting Expressions
Using Parentheses in Expressions
Comparing Character Expressions
Using the Empty String
Including Quotation Marks in Character Expressions
Using the Continuation Character
Identifiers
Short Identifiers
Tables Beginning With # (Temporary Tables)
Case Sensitivity and Identifiers
Uniqueness of Object Names
Using Delimited Identifiers
Enabling Quoted Identifiers
Identifying Tables or Columns by Their Qualified Object Name
Using Delimited Identifiers Within an Object Name
Omitting the Owner Name
Referencing Your Own Objects in the Current Database
Referencing Objects Owned by the Database Owner
Using Qualified Identifiers Consistently
Determining Whether an Identifier is Valid
Renaming Database Objects
Using Multibyte Character Sets
like Pattern Matching
Using not like
Pattern Matching with Wildcard Characters
Case and Accent Insensitivity
Using Wildcard Characters
The Percent Sign (%) Wildcard Character
The Underscore (_) Wildcard Character
Bracketed ([ ]) Characters
The Caret (^) Wildcard Character
Using Multibyte Wildcard Characters
Using Wildcard Characters as Literal Characters
Using Square Brackets ( [ ] ) as Escape Characters
Using the escape Clause
Using Wildcard Characters With datetime Data
Reserved Words
Transact-SQL Reserved Words
ANSI SQL Reserved Words
Potential ANSI SQL Reserved Words
SQLSTATE Codes and Messages
SQLSTATE Warnings
Exceptions
Cardinality Violations
Data Exceptions
Integrity Constraint Violations
Invalid Cursor States
Syntax Errors and Access Rule Violations
Transaction Rollbacks
with check option Violation
Reference Manual: Commands 16.0
Commands
alter database
alter database Restrictions
Using alter database for Archive Databases
Altering In-Memory and Relaxed Durability Databases
Backing Up master After Allocating More Space
Placing the Log on a Separate Device
Altering Databases for Compression
In-row LOB Columns
Shrinking Log Space
Getting Help on Space Usage
The system and default Segments
Using alter database to Awaken Sleeping Processes
Using the alter database for proxy_update Parameter
Fully Encrypting Databases
alter encryption key
alter login
alter index
alter login profile
alter precomputed result set
alter...modify owner
alter role
Changing Passwords for Roles
Mutually Exclusive Roles
alter table
Restrictions for alter table
alter table and Encrypted Columns
Altering a Tableās Compression
Interactions Between Compression and Other alter table Parameters
Altering the Compression Level for a Table Using Large Objects
Getting Information About Tables
Specifying Ascending or Descending Ordering in Indexes
Using Cross-Database Referential Integrity Constraints
Changing Defaults
Setting Space Management Properties for Indexes
Conversion of max_rows_per_page to exp_row_size
Using reservepagegap
Partitioning Tables for Improved Performance
Using Computed Columns
Adding IDENTITY Columns
Altering Table Schema
Restrictions for Modifying a Table Schema
Restrictions for Modifying text and image Columns
Modifying Tables With Unitext Columns
Changing Locking Schemes
Adding Java-SQL Columns
Restrictions for Shared-Disk Clusters
alter thread pool
begin...end
begin transaction
break
checkpoint
close
commit
compute Clause
compute Clause Restrictions
compute Results Appear as a New Row or Rows
Case-Sensitivity
connect to...disconnect
continue
create archive database
create database
Restrictions for create database
Temporary Databases
Creating Compressed Databases
Creating Databases With In-Row LOBs
Creating In-Memory and Relaxed Durability Databases
New Databases Created from model
Ensuring Database Recoverability
Using the for load Option
Getting Information About Databases
Using with default_location and for proxy_update
create default
create default Restrictions
Datatype Compatibility
Getting Information about Defaults
Defaults and Rules
Defaults and Nulls
Specifying a Default Value in create table
Objects Dependent on Replaced Defaults
create encryption key
create existing table
Datatype Conversions
Changes by Server Class
Remote Procedures
Encrypted Columns
create function
Objects Dependent on Replaced Functions
create function (SQLJ)
create index
Creating Indexes Efficiently
Creating Clustered Indexes
Creating Indexes on Compressed Table
Creating Indexes on Encrypted Columns
Specifying Ascending or Descending Ordering in Indexes
Space Requirements for Indexes
Duplicate Rows
Using Unique Constraints in Place of Indexes
Using the sorted_data Option to Speed Sorts
Specifying the Number of Histogram Steps
Space Management Properties
Index Options and Locking Modes
Using the sorted_data Option on Data-Only-Locked Tables
Getting Information About Tables and Indexes
Creating Indexes on Computed Columns
Creating Partitioned Indexes
Creating Function-Based Indexes
create index and Stored Procedures
create login
create login profile
create plan
create precomputed result set
create procedure
create procedure Restrictions
execute as Stored Procedure
System Procedures
Nested Procedures
Procedure Return Status
Object Identifiers
Temporary Tables and Procedures
Setting Options in Procedures
Extended Stored Procedures
Objects Dependent on Replaced Procedures
Getting Information About Procedures
create procedure (SQLJ)
create proxy_table
create role
create rule
create rule Restrictions
Binding Rules
create schema
create service
create table
Restrictions for create table
Creating Compressed Tables
Restrictions for Compression
Using Indexes
Renaming a Table or Its Columns
Restrictions on Compressing Tables That Use Large Object (LOB) Data
Column Definitions
Temporary Tables
Defining Integrity Constraints
Unique and Primary-Key Constraints
Referential Integrity Constraints
Using Cross-Database Referential Integrity Constraints
check Constraints
IDENTITY Columns
Specifying a Locking Scheme
Getting Information About Tables
Creating Tables with Partitions
Creating Tables With Computed Columns
Creating Tables with Encrypted Columns
Limitations When Creating Virtually Hashed Tables
Creating Tables for In-Memory and Relaxed Durability Databases
Restrictions for Shared-Disk Clusters
Space Management Properties
Using reservepagegap
Java-SQL Columns
Determining Values for hash_factor
create thread pool
create trigger
Triggers and Referential Integrity
The deleted and inserted Logical Tables
Trigger Restrictions
Triggers and Performance
Setting Options Within Triggers
Dropping a Trigger
Actions That Do Not Cause Triggers to Fire
Nesting Triggers and Trigger Recursion
Restrictions for instead of
Getting Information About Triggers
Triggers and Transactions
Inserting and Updating Triggers
instead of and for Triggers
create view
Restrictions on Views
View Resolution
Modifying Data Through Views
IDENTITY Columns and Views
group by Clauses and Views
distinct Clauses and Views
Creating Views from SQL-Derived Tables
Objects Dependent on Replaced Views
dbcc
Using dbcc quorum (clusters only)
Restrictions on dbcc checkstorage for Shared-Disk Clusters
Using dbcc complete_xact
Checking Performed by dbcc checkcatalog
Using dbcc checktable
deallocate cursor
deallocate locator
declare
declare cursor
Using Scrollable Cursors
Cursor select Statements
Cursor Scope
Result Set
Updatable Cursors
Releasing Locks at Cursor Close
delete
delete Restrictions
Deleting All Rows from a Table
delete and Transactions
Using the where current of Parameter
Using readpast
delete statistics
disk init
Using dsync with disk init
Creating Devices for In-Memory and Relaxed Durability Databases
disk mirror
disk refit
disk reinit
Using dsync with Disk Reinit
disk remirror
disk resize
disk unmirror
drop database
drop default
drop encryption key
drop function
drop function (SQLJ)
drop index
drop login
drop login profile
drop precomputed result set
drop procedure
drop role
drop rule
drop service
drop table
Restrictions for drop table
Dropping Tables with Cross-Database Referential Integrity Constraints
drop thread pool
drop trigger
drop view
dump configuration
dump database
Commands and System Procedures Used to Back Up Databases
Scheduling Dumps
Specifying Dump Devices
Restrictions for dump database
Dumping Databases with Devices That Are Mirrored
Dumping the System Databases
Dump Files
Volume Names
Changing Dump Volumes
Appending to or Overwriting a Volume
File Names and Archive Names
dump database Performance
Compressed Dumps for an Archive Database
Compatibility Issues for a Compressed Dump
Encrypted Columns and dump database
dump transaction
dump transaction Restrictions
Copying the Log After Device Failure
Dumping Databases Without Separate Log Segments
Dumping Only Complete Transactions
Dumping Without the Log
Scheduling Dumps
Using Thresholds to Automate dump transaction
Specifying Dump Devices
Determining Tape Device Characteristics
Backup Servers
Dump Files
Volume Names
Changing Dump Volumes
Appending To or Overwriting a Volume
Dumping Logs Stored on Mirrored Devices
Fully Recoverable DDL and dump transaction
execute
fetch
Status Information
fetch Restrictions
Using Scrollable Cursors with fetch_direction
Multiple Rows per Fetch
Rules for Positioning the Scrollable Cursor
goto label
grant
grant all Object Creation Privileges
Using the with grant option Parameter
Users and User Groups
Using the grant Command's granted by Option
Privileges for grant
Grant Access to Roles
Granting Default Permissions on System Tables
Granting Permissions for update statistics, delete statistics, and truncate table
Granting Proxies and Session Authorizations
Granting a Privilege to a Role
grant role
group by and having Clauses
How group by and having Queries with Aggregates Work
Standard group by and having Queries
Transact-SQL Extensions to group by and having
group by and having Clauses and Sort Orders
How group by Works With the Optimizer
if...else
insert
The Column List
Validating Column Values
Treatment of Blanks
Inserting Rows Selected from Another Table
Inserting Rows in Bulk
Transactions and insert
Inserting Values into IDENTITY Columns
Inserting Data Through Views
Partitoning Tables for Improved Insert Performance
kill
load database
Commands and System Procedures to Restore Databases
Restrictions for load database
Locking Out Users During Loads
Upgrading Database and Transaction Log Dumps
Specifying Dump Devices
Backup Servers
Volume Names
Changing Dump Volumes
Restoring the System Databases
Disk Mirroring
Materializing an Archive Database
Using load database with norecovery
Using Logical Devices with an Archive Database
load database Limitations with an Archive Database
load database and Encrypted Columns
Loading Compressed Data
load transaction
load transaction Restrictions
Restoring a Database
Recovering a Database to a Specified Time
Locking Users Out During Loads
Upgrading Database and Transaction Log Dumps
Specifying Dump Devices
Backup Servers
Volume Names
Changing Dump Volumes
Disk Mirroring
Loading a Transaction Log into an Archive Database
lock table
merge
mount
online database
open
order by clause
order by Clause Restrictions
Behavior of order by When Identical Table Column Name and Column Alias Name Exist
Collating Sequences
Sort Rules
Descending Scans
prepare transaction
print
quiesce database
Encrypted Columns and quiesce database
quiesce database in a Clustered Environment
raiserror
readtext
Using the readpast Option
Using readtext with unitext Columns
reconfigure
refresh precomputed result set
remove java
reorg
return
revoke
Using the revoke Command's granted by Option
Revoking set proxy and set session authorization
Revoking Default Permissions on System Tables
Revoking Permissions for update statistics, delete statistics, and truncate table
Using the cascade Option
revoke role
rollback
rollback trigger
save transaction
select
Using select into
Converting the NULL Properties of a Target Column with select...into
Specifying a Compression Level
Parameter Interactions with Data Compression
Using select for update
Specifying in-row LOB Columns
Specifying a Lock Scheme Using select...into
Specifying a Partition Strategy Using select...into
Using index, prefetch, and lru | mru
Using Encrypted Columns
Using parallel
Using readpast
Expanded select * Syntax
Using select with Variables, Global Variables, and Constants
set
set Options That Can Be Grouped Together
Compile-Time Changes for Some set Parameters
Aggregate Behavior
Comparison Behavior
Roles and set Options
In-Memory and Relaxed-Durability Databases
Setting Compression for a Session
Using Predicated Privileges
Distributed Transactions, CIS, and set Options
Using Proxies
Using lock wait
Repeatable-Reads Transaction Isolation Level
Using Simulated Statistics
Global Variables Affected by set Options
Using fipsflagger with Java in the Database
Restrictions for set tracefile
set Options That Save Diagnostic Information to a Trace File
Restrictions for show_sqltext
Exporting set Options from a Login Trigger
Delimited Identifiers
Bracketed Identifiers
setuser
shutdown
Specifying a Wait Time
transfer table
truncate lob
truncate precomputed result set
truncate table
union operator
unmount
update
Using update with Transactions
Using Joins in Updates
Using update with Character Data
Using update with Cursors
Updating IDENTITY Columns
Updating Data Through Views
Using index, prefetch, or lru | mru
Using readpast
Using Variables in update Statements
update all statistics
update index statistics
update statistics
Types of Scans Performed During update statistics
update statistics and Sampling
create index and Stored Procedures
Using Hash-Based Statistics
update table statistics
use
waitfor
where clause
while
writetext
Interactive SQL Commands
clear
configure
connect
disconnect
exit
input
output
parameters
read
set connection
start logging
stop logging
system
Reference Manual: Procedures 16.0
System Procedures
Permissions on System Procedures
Auditing System Procedures
Executing System Procedures
Entering Parameter Values
Messages
System Procedure Tables
sp_activeroles
sp_add_qpgroup
sp_add_resource_limit
sp_add_time_range
sp_addalias
sp_addauditrecord
sp_addaudittable
sp_addengine
sp_addexeclass
sp_addextendedproc
sp_addexternlogin
sp_addgroup
sp_addlanguage
System Table Changes
Dates for Languages Added with sp_addlanguage
sp_addlogin
sp_addmessage
sp_addobjectdef
sp_addremotelogin
sp_addsegment
sp_addserver
sp_addthreshold
Creating Additional Thresholds
Executing Threshold Procedures
Changing or Deleting Thresholds
Disabling Free-Space Accounting
The Last-Chance Threshold
Creating Threshold Procedures
sp_addtype
sp_addumpdevice
sp_adduser
sp_altermessage
sp_audit
sp_audit and Security
sp_autoconnect
sp_autoformat
sp_bindcache
sp_bindefault
sp_bindexeclass
sp_bindmsg
sp_bindrule
sp_cacheconfig
Data Cache Memory
Creating Cache for In-Memory or Relaxed Durability Databases
Changing Existing Caches
Using Cache Partitions
Dropping Caches
sp_cachestrategy
Overrides
sp_changedbowner
sp_changegroup
sp_checknames
sp_checkreswords
Handling Reported Instances of Reserved Words
Changing Identifiers
Using sp_rename to Change Identifiers
Changing Other Identifiers
Using Delimited Identifiers
sp_checksource
sp_chgattribute
sp_cleanpwdchecks
sp_clearpsexe
sp_clearstats
sp_client_addr
sp_cluster
sp_clusterlockusage
sp_cmp_all_qplans
sp_cmp_qplans
sp_commonkey
sp_companion
sp_compatmode
sp_config_dump
sp_confighistory
sp_configure
The sp_configure number of checkpoint tasks Parameter
The sp_configure max concurrently recovered db Parameter
Setting Configuration Parameters for Clusters Using sp_configure
sp_copy_all_qplans
sp_copy_qplan
sp_countmetadata
sp_cursorinfo
sp_dbextend
sp_dboption
Full Logging and sp_dboption
Shrinking the Log
Allowing Wide Rows Using sp_dboption
Asynchronous Log Service (ALS) Options
Considerations for Using enforce dump tran sequence
Database Options and sp_dboption
sp_dbrecovery_order
sp_dbremap
sp_defaultloc
sp_deletesmobj
sp_depends
Java Methods
sp_deviceattr
sp_diskdefault
sp_displayaudit
sp_displaylevel
sp_displaylogin
sp_displayroles
sp_downgrade
sp_dropalias
sp_drop_all_qplans
sp_drop_qpgroup
sp_drop_qplan
sp_drop_resource_limit
sp_drop_time_range
sp_dropdevice
sp_dropengine
sp_dropexeclass
sp_dropextendedproc
sp_dropexternlogin
sp_dropglockpromote
sp_ dropglockpromote_ptn
sp_dropgroup
sp_dropkey
sp_droplanguage
sp_droplogin
sp_dropmessage
sp_dropobjectdef
sp_dropremotelogin
sp_droprowlockpromote
sp_droprowlockpromote_ptn
sp_dropsegment
sp_dropserver
sp_dropthreshold
sp_droptype
sp_dropuser
sp_dump_history
sp_dump_info
sp_dumpoptimize
Thresholds and sp_dumpoptimize
sp_encryption
sp_engine
Using sp_engine āofflineā Versus sp_engine āshutdownā
sp_errorlog
sp_estspace
Estimating the Extra Space Required by a Column
sp_export_qpgroup
sp_extendsegment
sp_extengine
sp_extrapwdchecks
sp_familylock
sp_find_qplan
sp_fixindex
sp_flushstats
sp_forceonline_db
sp_forceonline_object
sp_forceonline_page
sp_foreignkey
sp_freedll
sp_getmessage
sp_grantlogin
sp_ha_admin
sp_help
Rules for Finding Objects
Precomputed Result Sets and sp_help
sp_help_resource_limit
sp_help_qpgroup
sp_help_qplan
sp_helpapptrace
sp_helpartition
Accuracy of Results and sp_helpartition
sp_helpcache
sp_helpcomputedcolumn
sp_helpconfig
Planning Metadata Cache Configuration with sp_helpconfig
Estimate Memory Requirements for compression info pool size
Using sp_helpconfig with sybdiagdb (SAP Product Support Only)
sp_helpconstraint
sp_helpdb
sp_helpdefrag
sp_helpdevice
sp_helpextendedproc
sp_helpexternlogin
sp_helpgroup
sp_helpindex
sp_helpjava
sp_helpjoins
sp_helpkey
sp_helplanguage
sp_helplog
sp_helpmaplogin
sp_helpobjectdef
sp_helpremotelogin
sp_helprotect
sp_helpsegment
sp_helpserver
sp_helpsort
sp_helptext
sp_helpthread
sp_helpthreshold
sp_helptrigger
sp_helpuser
sp_hidetext
sp_import_qpgroup
sp_indsuspect
sp_jreconfig
sp_ldapadmin
sp_listener
sp_listsuspect_db
sp_listsuspect_object
sp_listsuspect_page
sp_lmconfig
sp_lock
sp_locklogin
sp_logdevice
sp_logging_rate
sp_loginconfig
sp_logininfo
sp_logiosize
sp_logintrigger
sp_maplogin
sp_merge_dup_inline_default
sp_metrics
sp_modify_resource_limit
sp_modify_time_range
sp_modifylogin
sp_modifystats
sp_modifythreshold
Crossing a Threshold
The Last-Chance Threshold
Create Threshold Procedures with sp_modifythreshold
Execute Threshold Procedures with sp_modifythreshold
Disable Free-Space Accounting
sp_monitor
sp_monitorconfig
sp_monitor_server
sp_object_stats
sp_objectsegment
sp_opt_querystats
sp_optgoal
sp_options
sp_passthru
Return Parameters and sp_passthru
sp_password
sp_passwordpolicy
Login Password Complexity Checks and sp_passwordpolicy
High-Availability and Password Policy Options
sp_pciconfig
sp_placeobject
sp_plan_dbccdb
sp_poolconfig
Wash Percentage and sp_poolconfig
Local Asynchronous Prefetch Percentage and sp_poolconfig
sp_post_xpload
Handling Suspect Partitions in Cross-Platform Dump and Load Operations
sp_primarykey
sp_processmail
sp_procxmode
sp_querysmobj
sp_recompile
sp_refit_admin
sp_remoteoption
sp_remotesql
sp_rename
sp_rename_qpgroup
sp_renamedb
sp_reportstats
sp_restore_system_role
sp_revokelogin
sp_role
sp_securityprofile
sp_sendmsg
sp_serveroption
sp_set_qplan
sp_setlangalias
sp_setpglockpromote
sp_setpglockpromote_ptn
sp_setpsexe
sp_setrowlockpromote
sp_setrowlockpromote_ptn
sp_setsuspect_granularity
sp_setsuspect_threshold
sp_setup_table_transfer
sp_shmdumpconfig
sp_show_options
sp_showcontrolinfo
sp_showexeclass
sp_showoptstats
sp_showplan
sp_showpsexe
sp_spaceusage
Interpreting PctBloatUsedPages and PctBloatReservedPages Values
Output Columns from sp_spaceusage
sp_spaceused
sp_ssladmin
Using lsciphers and setciphers to Set Cipher Suites
sp_syntax
sp_sysmon
sp_tab_suspectptn
sp_tempdb
sp_tempdb_markdrop
sp_thresholdaction
sp_tran_dumpable_status
sp_transactions
sp_unbindcache
sp_unbindcache_all
sp_unbindefault
sp_unbindexeclass
sp_unbindmsg
sp_unbindrule
sp_version
sp_volchanged
When Backup Server Detects a Problem
Changing Tape Volumes on UNIX
sp_webservices
sp_who
sp_xact_loginfo
sp_xmlschema
Catalog Stored Procedures
Specifying Optional Parameters
Pattern Matching
System Procedure Tables
ODBC Datatypes
sp_column_privileges
sp_columns
sp_databases
sp_datatype_info
sp_fkeys
sp_pkeys
sp_server_info
sp_special_columns
sp_sproc_columns
sp_statistics
sp_stored_procedures
sp_table_privileges
sp_tables
System Extended Stored Procedures
xp_cmdshell
xp_deletemail
xp_enumgroups
xp_findnextmsg
xp_logevent
xp_readmail
xp_sendmail
xp_startmail
xp_stopmail
dbcc Stored Procedures
Specifying the Object Name and Date
Specifying the Object Name
Specifying the Date
sp_dbcc_alterws
sp_dbcc_configreport
sp_dbcc_createws
sp_dbcc_deletedb
sp_dbcc_deletehistory
sp_dbcc_differentialreport
sp_dbcc_evaluatedb
sp_dbcc_exclusions
sp_dbcc_faultreport
sp_dbcc_fullreport
sp_dbcc_help_fault
sp_dbcc_patch_finishtime
sp_dbcc_recommendations
sp_dbcc_runcheck
sp_dbcc_statisticsreport
sp_dbcc_summaryreport
sp_dbcc_updateconfig
Reference Manual: Tables 16.0
System Tables
Locations of System Tables
System Tables in master
System Tables in sybsecurity
System Table in sybsystemdb
System Tables in All Databases
The sybdiagdb Database
The syblicenseslog Table
Using System Tables in the Cluster Edition
timestamp Columns
Changed Identity Values
Controlling Fake-Table Materialization
Rules for Using System Tables
Permissions on System Tables
Locking Schemes Used for System Tables
Reserved Columns
Updating System Tables
Triggers on System Tables
ch_events
sysdams
syblicenseslog
sysalternates
sysaltusages
sysattributes
sysauditoptions
sysaudits_01 ā sysaudits_08
syscacheinfo
syscachepoolinfo
syscharsets
syscolumns
syscomments
sysconfigures
sysconstraints
syscoordinations
syscurconfigs
sysdatabases
sysdepends
sysdevices
sysencryptkeys
sysengines
sysgams
sysindexes
sysinstances
sysjars
syskeys
syslanguages
syslisteners
syslocks
sysloginroles
syslogins
syslogs
syslogshold
sysmessages
sysmonitors
sysobjects
sysoptions
syspartitionkeys
syspartitions
syspoolinfo
sysprocedures
sysprocesses
sysprotects
sysquerymetrics
sysqueryplans
sysreferences
sysremotelogins
sysresourcelimits
sysroles
syssecmechs
syssegments
sysservers
syssessions
sysslices
syssrvroles
sysstatistics
systabstats
systhresholds
systimeranges
systransactions
systypes
sysusages
sysusermessages
sysusers
sysxtypes
dbccdb Tables
dbccdb Workspaces
dbccdb Log
dbcc_config
dbcc_counters
dbcc_exclusions
dbcc_fault_params
dbcc_faults
dbcc_operation_log
dbcc_operation_results
dbcc_types
Monitoring Tables
monCachedObject
monCachePool
monCachedProcedures
monCachedStatement
monCIPC
monCIPCEndpoints
monCIPCLinks
monCIPCMesh
monCLMObjectActivity
monClusterCacheManager
monCMSFailover
monDataCache
monDBRecovery
monDBRecoveryLRTypes
monDeadLock
monDeviceIO
monDeviceSpaceUsage
monEngine
monErrorLog
monFailoverRecovery
monInmemoryStorage
monIOController
monIOQueue
monLicense
monLocks
monLockTimeout
monLogicalCluster
monLogicalClusterAction
monLogicalClusterInstance
monLogicalClusterRoute
monMemoryUsage
monNetworkIO
monOpenDatabases
monOpenObjectActivity
monOpenPartitionActivity
monPCIBridge
monPCIEngine
monPCISlots
monPCM
monProcedureCache
monProcedureCacheMemoryUsage
monProcedureCacheModuleUsage
monProcess
monProcessActivity
monProcessLookup
monProcessMigration
monProcessNetIO
monProcessObject
monProcessProcedures
monProcessSQLText
monProcessStatement
monProcessWaits
monProcessWorkerThread
monRepCoordinator
monRepLogActivity
monRepScanners
monRepScannersTotalTime
monRepSchemaCache
monRepSenders
monSpinlockActivity
monSQLRepActivity
monSQLRepMisses
monState
monStatementCache
monSysExecutionTime
monSysLoad
monSysPlanText
monSysSQLText
monSysStatement
monSysWaits
monSysWorkerThread
monTableColumns
monTableCompression
monTableParameters
monTables
monTableTransfer
monTask
monTempdbActivity
monThread
monThreadPool
monThresholdEvent
monWaitClassInfo
monWaitEventInfo
monWorkload
monWorkloadPreview
monWorkloadProfile
monWorkloadRaw
monWorkQueue
sybpcidb Tables
pca_jre_arguments
pca_jre_directives
pci_arguments
pci_directives
pci_slotinfo
pci_slot_syscalls
Active Messaging Users Guide 15.7
Introduction
Active Messaging concepts
Automatic decisions in real time
Messaging models
JMS
WebSphere MQ messaging models
Message format
JMS message properties
MQ message topics
Message selectors
Understanding Active Messaging
Sending and receiving messages from a queue
Publishing and consuming messages from a JMS topic
Working with message properties
Previewing the messaging interface
MQ overview
Securing channels with SSL
MQ publish/subscribe
Syntax for topics
Publisher and subscriber identities
MQ publish/subscribe examples
Working with MQ cluster queue objects
Working with remote queue objectsļæ½
Working with text messaging
Text messages and JMS
Text messages and MQ
Adaptive Server Cluster Edition support
Login redirection
Extended high availability
Active Messaging support for the threaded kernel
Internationalization support
Transactional message behavior
Transactional messaging set option
MQ security
Connecting to the MQ queue manager
Installing MQ client on Adaptive Server host machines
MQ authorizations
Querying MQ information
SQL Reference
Message-related global variables
<msgheader> and <msgproperties> documents
Adaptive Server-specific message properties
Keywords
Stored procedures
Built-in functions
Syntax segments
sp_configure 'enable real time messaging'
sp_engine
sp_msgadmin
msgconsume
msgpropcount
msgproplist
msgpropname
msgproptype
msgpropvalue
msgpublish
msgrecv
msgsend
msgsubscribe
msgunsubscribe
endpoint
option_string
sizespec
timespec
Samples
Sybase directories
Using code samples with SQL
Using code samples with Java/JDBC
Glossary
Component Integration Services Users Guide 16.0
Introduction to Component Integration Services
Component Integration Services Concepts
Proxy Tables
Using the create table Command
Using the create existing table Command
Datatype Conversions
Using the create proxy_table Command
Remote Procedures as Proxy Tables
Server Limits
Cascading Proxy Tables
Proxy Databases
User Proxy Databases
User Proxy Database Schema Synchronization
System Proxy Databases
System Proxy Database Creation
Schema Synchronization When Current Database Has a System Proxy Database
Stored Procedure Execution Within a System Proxy Database
File System Access
Directory Access
Recursion Through Subordinate Directories
File Access
Remote Servers
Connection Management
Connecting to Remote Servers Without the Interfaces File
LDAP Directory Services
Secure Communication with SSL
Using Trusted Roots Files
Secure Communication Using Kerberos
Configuring Kerberos security services
Configuring the Remote SAP ASE Kerberos Principal Name
Configuring Component Integration Services Remote Procedure Calls
Security Issues
Using Encrypted Columns in CIS
Remote Server Logins
Connecting to Backup Server and XP Server
Mapping External Logins
Configuring Failover for Remote Server Connections
Remote Server Capabilities
Query Processing
RPC handling and Component Integration Services
Site Handler and Outbound RPCs
Configuring Component Integration Services for Outbound RPCs
Text Parameters for RPCs
Text Parameter Support for XJS/390
Distributed Transaction Management
DTM-Enabled Servers
Pre-DTM servers
strict DTM enforcement
Enable Component Integration Services
Transactional RPCs
Restrictions on Transaction Management
SAP ASE to SAP ASE update statistics
Updating Statistics on Non-SAP ASE Backends
Java in the Database
Constraints on Java Class Columns
Java Abstract Datatypes (ADTs)
Java Class Definitions
Datatypes
Unicode support
Datatype Conversions
text and image Datatypes
Limits of @@textsize
Odd Bytes Padded
Converting text and image Datatypes
Pattern Matching with text and unitext Data
Entering text and image Values
readtext using bytes
Restriction for text, image, and unitext with bulk copy
Considerations for Using text, unitext, and image data with Server Classes
Configuration and Tuning
Using sp_configure
sysconfigures Table
Changing the Configuration Parameters
Using Global Variables to Determine Status
CIS Support for HANA Server
Configuring CIS for HANA
Creating SAP HANA as an ODBC Data Source on Windows
Adding SAP HANA to the SAP ASE Interfaces File
Configuring the PCI Bridge and PCA/ODBC
Adding Server Class HANAODBC
Datatype Mapping Between SAP ASE and HANA
Restrictions
SQL Reference
dbcc Commands
dbcc Options
Trace Flags
Functions
Aggregate Functions
Datatype Conversion Functions
Date Functions
Mathematical Functions
Security Functions
String Functions
System Functions
Text and Image Functions
Transact-SQLCommands
alter table
case
connect to...disconnect
create existing table
create index
create table
delete
drop index
fetch
insert
readtext
select
truncate table
update
update statistics
writetext
Passthrough Mode
The connect to Command
The sp_autoconnect System Procedure
The sp_passthru System Procedure
The sp_remotesql System Procedure
Quoted Identifier Support
Delimited Identifier Support
auto identity Option
Triggers
Tutorial
Adding a Remote Server
Creating Server Entries in System Tables
Adding an Alternate Login and Password
Verifying Connectivity
Performing a Join Between Two Remote Tables
Troubleshooting
Problems Accessing Component Integration Services
Problems Using Component Integration Services
Unable to Access Remote Server
Unable to Access Remote Objects
Problem Retrieving Data from Remote Objects
If You Need Help
Compression Users Guide 16.0
Data Compression Overview
Enabling Data Compression
Selecting Data into Compressed Tables
Administering Compressed Databases
Session-Level Data Compression
Copy, Dump, and Load Compressed Data
Limits for Database Compression
Levels of Data Compression
Row-Level Compression
Page-Level Compression
Creating Databases for Data Compression
Altering the Compression Level of a Database
Creating a Compressed Table
Disabling Compression
Altering the Compression Level of a Table or Partition
Index Compression
Enabling Index Compression
Creating an Index Compressed Table
Creating a Compressed Index
Changing the Index Compression State
Datatypes Available for Compression
Compressed Data Storage Strategies
Compressed Columns with Large Objects
Creating a Compressed Database with LOB Datatypes
Creating Compressed Tables with LOB Datatypes
Altering Tables with Compressed LOB Datatypes
Administering Compressed Databases
Session-Level Data Compression
Copy, Dump, and Load Compressed Data
Limits for Database Compression
Database Encryption 16.0
Overview of Encryption
Full Database Encryption
Column Encryption
Protect Data with Encryption Keys
Creating the Database Encryption Key
Dropping a Database Encryption Key
Changing a Database Encryption Key
Creating Column Encryption Keys
Dropping Column Encryption Keys
Changing the Column Encryption Key
Key Protection
Grant Access to Keys
Separate Keys from Data
Key Encryption
Protect Encryption Keys with the Master Key
Protect Encryption Keys with the System-Encryption Password
Protect Keys with User-Specified Passwords
Protect Encryption Keys with Dual Control
Database-Level Master and Dual Master Keys
Creating the Master and Dual Master Keys
Creating Master Key Copies
Setting Passwords for the Master and Dual Master Keys
Altering Passwords and Key Encryption Keys for Master Key Copies
Regenerate Master Keys
Dropping Master Keys and Key Copies
Recovering the Master Key and Dual Master Key
Starting SAP ASE in Unattended Start-Up mode
Configure Unattended Start-Up Mode
Create the Master Key Start-Up File
How SAP ASE Uses the Master Key Start-Up File
Secure External Passwords and Hidden Text
Service Keys
Creating Service Keys
Dropping Service Keys
Modify Service Keys
Changing the syb_extpasswdkey
Changing the syb_syscommkey
Service Keys with External Passwords
SSL Passwords
LDAP Passwords
Replication Agent Passwords
Service Keys Encrypted with the Master Key
Database Encryption
Create an Encrypted Database
Encrypt an Existing Database
Encryption Status and Progress
Performance Considerations
Suspend the Encryption Process
The quiesce database Command and Fully Encrypted Databases
Resume the Encryption Process
Decrypt an Encrypted Database
Recover Fully Encrypted Databases
Back Up (Dump) a Fully Encrypted Database
Back Up the Database Encryption Key
Restore (Load) Backups of Fully Encrypted Databases
Loading Behavior of Encrypted Databases
Dropping a Database That is Being Encrypted
Mounting and Unmounting a Fully Encrypted Database
Archive Databases and Full Encryption
Column Encryption
Encrypting Columns on New Tables
Specifying Encryption on select into
Encrypting Columns in Existing Tables
Index Creation and Constraints on Encrypted Columns
Domain Creation and Access Rules on Encrypted Columns
Decrypt Permission
Revoking Decryption Permission
Restrict Decrypt Permission
Default Values Returned Instead of Decrypted Data
Defining Decrypt Defaults
Permissions and Decrypt Default
Columns with Decrypt Default Values
Decrypt Default Columns and Query Qualifications
decrypt default and Implicit Grants
decrypt default and insert, update, and delete Statements
Removing Decrypt Defaults
Length of Encrypted Columns
Encrypted Columns Audits
Event Names and Numbers
Passwords Masked in Command Text Auditing
Auditing Actions of the Key Custodian
Performance Considerations
Indexes on Encrypted Columns
Sort Orders and Encrypted Columns
Joins on Encrypted Columns
Search Arguments and Encrypted Columns
Movement of Encrypted Data as Cipher Text
Access Encrypted Data
Encrypted Columns Process
Permissions for Decryption
Drop Encryption
Role of the Key Custodian
Users, Roles, and Data Access
Key Protection Using User-Specified Passwords
Change a Keyās Protection Method
Create Key Copies
Change Passwords on Key Copies
Access Encrypted Data with a User Password
Application Transparency Using Login Passwords on Key Copies
Login Password Change and Key Copies
Dropping a Key Copy
Key Recovery from Lost Passwords
Loss of Password on Key Copy
Loss of Login Password
Loss of Password on Base Key
Key Recovery Commands
Ownership Change of Encryption Keys
In-Memory Database Users Guide 15.7
In-Memory Databases
Cache and buffer support
Durability levels
Temporary databases and in-memory temporary databases
Multidatabase transactions and database types
Template databases
Altering the database to use a new template
Minimally logged commands
Limits for in-memory and relaxed-durability databases
Changed system procedures
Managing In-Memory and Relaxed-Durability Databases
Specifying named caches for in-memory databases
Verifying changes to the configuration file
Changing static configuration parameters for in-memory databases
Creating in-memory devices
Creating in-memory databases
Creating disk-resident databases with relaxed durability
Administering in-memory databases
Resizing in-memory storage caches
Deleting in-memory storage caches
Increasing the size of in-memory databases
Dumping and loading in-memory databases
Configuring number of backup connections
Dropping in-memory databases
Dropping in-memory devices
Minimally Logged DML
Types of DML logging settings
Database-level logging
Table-level logging
Session-level logging
Additional minimal logging rules
Transactional semantics
Logging concurrent transactions
Minimal logging with ddl in tran set to true
Effect of referential integrity constraints
Multistatement transactions in minimally logged mode
Stored procedures and minimally logged DML
Including set dml_logging in a trigger
Using deferred updates
Obtaining diagnostic information
Performance and Tuning for In-Memory Databases
Configuring in-memory storage cache
Cache layout
sp_sysmon output for in-memory databases
Monitoring the default data cache performance
Organizing physical data for in-memory devices
Performance optimization for low-durability databases
Tuning checkpoint intervals
Minimally logged DML
Dumping and loading in-memory databases
Tuning for spinlock contention and network connections
Improving contention for lock manager hashtable spinlock ratios
Determining the number of network connections
Java in Adaptive Server Enterprise 15.7
An Introduction to Java in the Database
Advantages of Java in the database
Capabilities of Java in the database
Invoking Java methods in the database
Storing Java classes as datatypes
Storing and querying XML in the database
Java components
Functional changes in Adaptive Server 15.0.3 and later
Changes in class distribution
The PCA/JVM runs in headless mode
Changes in memory management
Changes in ClassLoader behavior
Standards
Java in the database: questions and answers
What are the key features?
How are Java instructions stored in the database?
How is Java executed in the database?
Which Java Virtual Machines (JVMs) are supported?
What is headless mode?
What about JDBC?
How can Java and SQL be used together?
What is the Java API?
Which Java classes are supported in the Java API?
Can user-defined classes be installed in the database?
Can data be accessed using Java?
Can the same classes be used on the client and the server?
How to use Java classes in SQL
Where can information about Java in the database be found?
What you cannot do with Java in the database
Managing the Java Environment
Components of the Java environment
The JVM pluggable component
Pluggable component adapter JVM (PCA/JVM)
Pluggable component interface (PCI) and the PCI Bridge
The PCI memory pool
The sybpcidb database
How configuration values are organized in sybpcidb
When to change configuration values
Server-level options
Configuration options for the PCI Bridge
Configuration options for the PCA/JVM
Changing configuration values in a running server
Changing configuration values by restarting Adaptive Server
Changing configuration values before the JVM is initialized
Changing configuration values after the JVM is initialized
Restoring default configuration values to sybpcidb
Using monitor tables to display information about the PCI Bridge
Preparing for and Maintaining Java in the Database
The Java runtime environment
Java classes in the database
Sybase runtime Java classes
User-defined Java classes
JDBC drivers
The JVM
Enabling Java
Installing Java classes in the database
Using installjava
Installing uncompressed JARs
Retaining the JAR file
Updating installed classes
Referencing other Java-SQL classes
Viewing information about installed classes and JARs
Downloading installed classes and JARs
Removing classes and JARs
Retaining classes
Using Java Classes in SQL
General concepts
Java considerations
Java-SQL names
Using Java classes as datatypes
Creating and altering tables with Java-SQL columns
Altering partitioned tables
Selecting, inserting, updating, and deleting Java objects
Invoking Java methods in SQL
Sample methods
Exceptions in Java-SQL methods
Representing Java instances
Assignment properties of Java-SQL data items
Datatype mapping between Java and SQL fields
Character sets for data and identifiers
Subtypes in Java-SQL data
Widening conversions
Narrowing conversions
Runtime versus compile-time datatypes
Treatment of nulls in Java-SQL data
References to fields and methods of null instances
Null values as arguments to Java-SQL methods
Null values when using the SQL convert function
Java-SQL string data
Zero-length strings
Type and void methods
Java void instance methods
Java void static methods
Equality and ordering operations
Evaluation order and Java method calls
Columns
Variables and parameters
Deterministic Java functions in expressions
Static variables in Java-SQL classes
Changes for static variables for Adaptive Server 15.0.3 and later
Changes for static variables for the Cluster Edition
Java classes in multiple databases
Scope
Cross-database references
Inter-class transfers
Passing inter-class arguments
Temporary and work databases
Java classes
Data Access Using JDBC
Overview
JDBC concepts and terminology
Differences between client- and server-side JDBC
Permissions
Using JDBC to access data
Overview of the JDBCExamples class
The main( ) and serverMain( ) methods
Using main( )
Using serverMain( )
Obtaining a JDBC connection: the Connecter( ) method
Routing the action to other methods: the doAction( ) method
Executing imperative SQL operations: the doSQL( ) method
Executing an update statement: the updater( ) method
Executing a select statement: the selecter( ) method
Calling a SQL stored procedure: the caller( ) method
Error handling in the native JDBC driver
The JDBCExamples class
The main( ) method
The serverMain( ) method
The connecter( ) method
The doAction( ) method
The doSQL( ) method
The updater( ) method
The selecter( ) method
The caller( ) method
SQLJ Functions and Stored Procedures
Overview
Compliance with SQLJ Part 1 specifications
General issues
Security and permissions
SQLJ Examples
Invoking Java methods in Adaptive Server
Using Sybase Central to manage SQLJ functions and procedures
SQLJ user-defined functions
Handling null argument values
Handling nulls when creating the function
Handling nulls in the function call
Deleting a SQLJ function name
SQLJ stored procedures
Modifying SQL data
Using input and output parameters
Returning result sets
Deleting a SQLJ stored procedure name
Viewing information about SQLJ functions and procedures
Advanced topics
Mapping Java and SQL datatypes
Using the command main method
SQLJ and Sybase implementation: a comparison
SQLJExamples class
Debugging Java in the Database
Supported Java debuggers
Setting up Java debugging
Configuring the server to support debugging
Attaching the remote debugger to the JVM debug agent
File and Network Access Using Java
File access using java.io
User identity and permissions
Specifying directories for file I/O: UNIX platforms
Mask syntax
Examples
Specifying directories for file I/O: Windows platforms
Mask syntax
Examples
File I/O changes
Rules for opening existing files
UNIX platforms
Windows platforms
Rules for creating files with a file open operation
Final file check
File access using java.net
Examples
Using socket classes
Using the URL classes
Additional Topics
JDK requirement for Java classes in the server
Assignments
Assignment rules at compile-time
Assignment rules at runtime
Allowed conversions
Transferring Java-SQL objects to clients
Suggestions for improving performance
Minimize the number of calls from SQL to the JVM
Use the java.lang.Thread class with care
Determine if you are running within the PCA/JVM
Avoid SQL loops in a multi-engine environment
Controlling access to native methods in the PCA/JVM
Unsupported Java API packages, classes, and methods
Restricted Java packages, classes, and methods
Unsupported java.sql methods and interfaces
Invoking SQL from Java
Special considerations
Transact-SQL commands from Java methods
Datatype mapping between Java and SQL
Java-SQL identifiers
Java-SQL class and package names
Java-SQL column declarations
Java-SQL variable declarations
Java-SQL column references
Java-SQL member references
Java-SQL method calls
Glossary
Job Scheduler Users Guide 16.0
Unified Agent and Agent Management Console Users Guide 2.0.2
About this book
Overview
What is Unified Agent?
Services provided
Agent Management Console
Installing and Configuring Unified Agent and Agent Management Console
Pre-installation tasks
Installing Unified Agent
Starting the JINI server
Starting and stopping Unified Agent
Starting Unified Agent as a service on UNIX platforms
Starting Unified Agent as a service on Windows platforms
Installing the Agent Management Console
Configuring Unified Agent
Post-configuration tasks
Security
Unified Agent security
Encryption
Authentication
Login modules
Security module control flags
Authorization
Role mappings
Permissions
Agent Management Console Features and Functionality
Managing look-up services
Creating a network lookup profile
Discovering Unified Agents
Deleting a network look-up profile
Changing a network look-up profile
Specifying a network plug-in name filter
Managing Unified Agents
Manually adding an agent
Connecting to an agent
Adding credentials
Disconnecting from an agent
Restarting an agent
Retrieving the agent log
Viewing and changing agent properties
Managing discovery adaptors
Creating a discovery adaptor
Deleting a discovery adaptor
Viewing and changing discovery adaptor properties
Setting discovery adaptor password
Managing security modules
Creating a security module
Deleting a security module
Ordering the security module authentication
Viewing and changing security module properties
Setting a security module password
Managing role mappings
Creating a role mapping
Managing agent services
Starting an agent service
Restarting an agent service
Stopping an agent service
Viewing agent service properties
Managing agent plug-ins
Loading an agent plug-in
Unloading an agent plug-in
Reloading an agent plug-in
Viewing agent plug-in properties
Server-based plug-ins
Pinging the server
Starting the server
Restarting the server
Stopping the server
Retrieving the server log
Managing attributes
Viewing attributes
Updating attribute values
Viewing properties and changing permissions
Managing operations
Viewing operations
Password Encryption and Security Configuration
Password encryption utility
Enabling Rivest-Shamir-Adleman (RSA) encryption
Adaptive Server agent plug-in server password encryption
Pluggable Authentication Module (PAM) configuration
SNMP Agent Plug-in
Overview
Terminology
Sybase Adaptive Server MIB
Unified Agent SNMP services and plug-ins
UAF SNMP Service
UAF SNMP Service MIBs
Adaptive Server-to-SNMP client architecture
Security
Security for connections from Adaptive Server
Security for connections from SNMP
Configuring Adaptive Server for the SNMP Agent Plug-in
TDS services
UAF SNMP Agent Service
Adaptive Server runtime
Using the Adaptive Server SNMP Agent Plug-in
Viewing the SNMP information from NET-SNMP
Sybase MIB
Tabular Data Stream (TDS) Service
What is TDS?
Using the TDS service
UAF services
uaf_list_service_operations
uaf_list_services
uaf_list_service_operation_arguments
uaf_invoke_service_operation
uaf_list_service_attributes
uaf_get_service_attribute
uaf_set_service_attribute
UAF plug-ins
uaf_list_plugins
uaf_list_plugin_operations
uaf_list_plugin_operation_arguments
uaf_invoke_plugin_operation
uaf_list_plugin_attributes
uaf_get_plugin_attribute
uaf_set_plugin_attribute
TDS listener client examples
Setting up examples for the Adaptive Server client
Examples for configuring the Adaptive Server client
Examples for using the Adaptive Server client
Examples for configuring the Adaptive Server client
Reporting functionality and error recovery
Using Backup Server with IBM Tivoli Storage Manager 16.0
Using SAP Failover in a High Availability System 16.0
Web Services Users Guide 15.7 ESD #2
Understanding Adaptive Server Enterprise Web Services
Overview
Adaptive Server Enterprise Web Services
Advantages of ASE Web Services
Stored procedures and functions
SQL
Security
LDAP
User-defined Web services
Web services standards
XML
Example
XML document structure
WSDL
SOAP
SOAP message structure
Understanding the ASE Web Services Engine
Producer of Web services
Producer components
Producer Web methods
User-defined Web services
Consumer of Web services
Consumer components
SDS server
SOAP stack
Proxy tables
Web Services engine as a consumer versus producer
Installing and Configuring ASE Web Services
Installing Web Services
Configuring Web Services
Configuring during installation
Configuring after installation
Licensing
Configuration files
Security
Configuring SSL
Installing a certificate for Microsoft .NET
Using ASE Web Services
Using the ASE Web Services Engine
Starting and stopping the ASE Web Services Engine
Conditions
Verification
ASE Web Services methods
execute
login
logout
Using sp_webservices
add
help
list
modify
remove
Invoking a Web service
Using user-defined Web services
Commands for user-defined Web services
create service
drop service
Using sp_webservices with user-defined Web services
addalias
deploy
dropalias
listudws
listalias
undeploy
Security for user-defined Web services
Auditing for user-defined Web services
Auditing sp_webservices ādeployā
Auditing sp_webservices āundeployā
ASE Web Services logging
Rolling over log files
Using Sybase Central
Sample Applications
Apache sample client
Creating the sample client
Using runexecute
Microsoft .NET sample client
Creating the sample client
Using Execute.exe
Troubleshooting
Troubleshooting issues
Remote server class definition setting
Unmapped RPC/encoded Web method
Truncated document/literal results
Starting ASE Web Services Engine
Locating WSDL
Specifying entries in ws.properties
Windows NT command-line arguments
Run or stop scripts fail
Null passwords
Specifying SOAP endpoints with SSL
Abnormal termination of sp_webservices āaddā
Web Services proxy table restrictions
sysattributes table entry
Diagnostic tools
Detailed logging
Enabling JDBC-level tracing
Messages
Installation Contents
ASE Web Services directory tree
Configuration Properties
ws.properties
myres.properties
Specifying properties file entries
SOAP and Adaptive Server Enterprise Datatype Mapping
Datatype mapping
SOAP-to-ASE datatype mappings
ASE-to-SOAP datatype mappings for the create service command
Glossary
XA Interface Integration Guide for CICS, Encina, and TUXEDO 15.7
The Sybase XA Environment
Definitions
Overview of the X/Open DTP model
Components of the model
How the components communicate
How the components interact
Recovery
The Sybase XA environment
Components of the Sybase XA environment
Connections in the Sybase XA environment
Identifying connections via LRMs
Where is the connection information stored?
Establishing connections
Distributing work across LRMs
Configuring the XA Environment
Configuring Adaptive Server
Open string parameters for the DTM XA Interface
Open string parameters
dtm_tm_role required for username
Log file and trace flag parameters
Labels for logfile entries
xa_open() function behavior
XA configuration file for DTM XA Interface
Environment variable for specifying the configuration file
[all] section for defining common LRM parameters
Parameter definitions for [all] section
Editing the XA configuration file
Additional capabilities, properties, and options
Using the DTM XA Interface with CICS
Building the switch-load file
Compiling the switch-load file on IBM RISC System/6000 AIX
Compiling the switch-load file on HP9000 Series 800 HP-UX
Compiling the switch-load file on Sun Solaris 2.x (SPARC)
Adding a Sybase stanza to the CICS region XAD definition
Using the DTM XA Interface with Encina
Assigning an open string with monadmin create rm
Initializing LRMs with mon_RegisterRmi
Linking applications with DTM XA Interface libraries
Establishing connections
Using the DTM XA Interface with TUXEDO
Linking
Setting up the UBBCONFIG file
Creating the TUXEDO configuration file
Building the TMS
Building the COBOL runtime environment
Application Programming Guidelines
X/Open DTP versus traditional Sybase transaction processing
Managing transactions and connections
Managing transactions
Managing connections
The current connection
Nontransactional connections
Deallocating cursor function with Client-Library
Dynamic SQL
Obtaining a Client-Library connection handle
Multiple-thread environment issues
Caveats of thread use
Embedded SQL thread-safe code
Tightly coupled transactions
Linking with CT Library
Sample embedded SQL COBOL fragment
Sample embedded SQL C fragment
XML Services 15.7
Introduction to XML Services
XML capabilities
Overview
XML in the database
A sample XML document
HTML display of Order data
XML document types
XML Query Functions
XML query functions
Example sections
xmlextract
xmltest
xmlparse
xmlrepresentation
xmlvalidate
option_strings: general format
Option values for query functions.
XML Language and XML Query Language
Character set support
URI support
Namespace support
XML schema support
Predefined entities in XML documents
Predefined entities in XPath queries
White space
Empty elements
XML Query Language
XPath-supported syntax and tokens
XPath operators
XPath basic operators
XPath set operators
XPath comparison operators
XPath functions
General guidelines and examples
Functions
Parenthesized expressions
Parentheses and subscripts
Parentheses and unions
for xml Mapping Function
for xml clause
for xml subqueries
for xml schema and for xml all
XML Mappings
SQLX options
SQLX option definitions
SQLX data mapping
Mapping duplicate column names and unnamed columns
Mapping SQL names to XML names
Mapping SQL values to XML values
Numeric values
Character values
Binary values
XML Support for I18N
Overview
Unicode datatypes
Surrogate pairs
Numeric character representation
Client-server conversions
Character sets and XML data
I18N in for xml
Option strings
Numeric Character Representation in for xml
header option
Exceptions
Examples
Example 1
Example 2
Example 3
Example 4
Example 5
Example 6
Example 7
I18N in xmlparse
Options
Sort ordering in xmlparse
I18N in xmlextract
NCR option
Sort ordering in xmlextract
Sort ordering in XML Services
I18n in xmlvalidate
NCR option
xmltable()
Introduction
xmltable and derived table syntax
xmltable
The sample_docs Example Table
sample_docs table columns and rows
Sample_docs table columns
sample_docs table rows
sample_docs tables
Table script (for publishers table)
Publishers table representation
Titles table representation
XML Services and External File System Access
Getting Started
Enabling XML services and External File System Access
Character set conversions with external file systems
Examples
Setting up your XML documents and creating the proxy table
Example: extracting the book title from the XML documents
Example: importing XML documents or XML query results to an Adaptive Server table
Example: storing parsed XML documents in the file system
Example: 'xmlerror' option capabilities with External File Access
Example: specifying the 'xmlerror=messageā option in xmlextract
Example: parsing XML and non-XML documents with the 'xmlerror=message' option
Example: using the option 'xmlerror=null' for non-XML documents
Migrating Between the Java-based XQL Processor and the Native XML Processor
Introduction
Migrating documents and queries
Migrating documents between the Java-based XQL processor and the native XML processor
Migrating text documents between the Java-based XQL processor and the native XML processor
Migrating documents from regenerated copies
Regenerating text documents from the Java-based XQL processor
Regenerating text documents from the native XML processor
Migrating queries between the native XML processor and the Java-based XQL processor
Sample Application for xmltable()
Sample table
Using the depts document
The depts document structure
Creating SQL tables from the depts document
Normalizing the data from the depts document
Generating tables using select
Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX
Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux
Release Bulletin SAP Adaptive Server Enterprise 16.0 Solaris
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows
Release Bulletin SAP Control Center 3.3
Product Summary
Installation and Upgrade
Installation and Implementation of SAP Control Center
Choosing an Installer
Supported Server Versions
Supported Product Modules and Release Documents
Known Issues
Known Issues for Installation, Upgrade, and Deployment
Known Issues for SAP Control Center
Known Issues for SAPĀ® Adaptive ServerĀ® Enterprise
Known Issues for Data Assurance
Known Issues for Replication
Known Issues for SAP Sybase Event Stream Processor
Known Issues for SAP Sybase IQ
Known Issues for Accessibility
Documentation Changes
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
SAP Control Center Accessibility Information
Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Making Input/Output Completion Port API Available
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
The System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux
Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Preparing to Install SAP ASE
Managing Java in the Database During Installations and Upgrades
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Set Up sybase User in Windows
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Adding a Server to the Interfaces File
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading SAP ASE on Windows
Testing the SAP ASE Upgrade
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Control Center 3.3
About SAP Control Center
Installation Task Flows for SAP Control Center
Planning Your Installation
Obtaining a License
System Requirements
SAP Control Center Network Ports
Installation Considerations
Preparing to Roll Back from an Upgrade
Preinstallation Tasks
Installing SAP Control Center
Installing with the SAP Installer
Installing with a Response File
Creating a Response File
Installing in Unattended (Silent) Mode
Uninstalling
Upgrading SAP Control Center
Upgrading a Singleton SAP Control Center
Upgrading Shared-Disk Instances
Installing JDBC Drivers for Third-Party Replicate Databases
Starting and Stopping SAP Control Center
Registering the ODBC Driver in Windows
Starting and Stopping SAP Control Center in Windows
Starting and Stopping SAP Control Center in UNIX
Getting Started After Installing
Configuring the SSL Certificate
Setting Passwords or Disabling Default Login Accounts
Encrypting a Password
Enabling Incremental Backups
Configuring SAP Control Center
Troubleshooting Installation
Configuration Guide for UNIX Adaptive Server Enterprise 16.0
About SAP ASE
System-Specific Issues
System User Roles
Environment Variables
SAP ASE Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
sybmgmtdb Database
Using Operating System Files as Database Devices
The directio Parameter
The dsync Parameter
Determine the Size of a Database Device
Support for Raw Partitions or Files
Preparation of a Raw Partition Device
Choosing a Raw Partition
Client/Server Communication
About Changing SAP ASE Configuration
Languages Other Than US English
SAP ASE Specifications
Database Specifications
Table Specifications
Procedure Specifications
Query Specifications
Maximum Column Sizes
Database Requirements for Varying Page Sizes
Data Limits for Tables According to Page Size
Start and Stop Servers
Start Servers
Server Start-up Parameters
RUN_server_name File
Using the startserver Command
Start Servers When the Operating System Restarts
Creating a System Restart Script for HP-UX
Creating a System Restart Script for IBM RS/6000
Creating a System Restart Script for Sun Solaris and Linux
Starting XP Server After Initial Installation
Stop Servers
Stopping SAP ASE
Stopping Backup Server
Using the kill Command
Shutdown and Shared Memory Files
Huge Pages on Linux
Configure the Operating System
Verifying Environment Variables
Using the stty Setting
Restore Correct Permissions
File Descriptors and User Connections
File Descriptors and User Connections for HP-UX
File Descriptors and User Connections for AIX
File Descriptors and User Connections for Linux
File Descriptors and User Connections for Sun Solaris
Displaying Current Soft and Hard Limits
Increasing the Soft Limit
Increasing the Hard Limit
Enable Asynchronous Disk I/O
Enabling Asynchronous Disk I/O on Linux
Enabling Asynchronous Disk I/O on IBM AIX
Enabling Asynchronous Disk I/O HP-UX
Enabling Asynchronous I/O for File System Devices
Enabling Asynchronous I/O for File Systems
Adjust the Client Connection Timeout Period
Adjusting the Client Connection Timeout for HP-UX
Adjusting the Client Connection Timeout for IBM RS/6000
Adjusting the Client Connection Timeout for Linux
Check for Hardware Errors
Monitor the Use of Operating System Resources
Monitor Operating System Resources for HP-UX
Monitor Operating System Resources for IBM RS/6000
Monitor Operating System Resources for Sun Solaris and Linux
Check Database Integrity
Configuring New Servers with srvbuild
Optimize the SAP ASE Configuration
SAP ASE Default Configuration
Default Settings
Set Up Communications Across the Network
How SAP ASE Determines Which Directory Service Entry to Use
How a Client Uses Directory Services
Create a Directory Services Entry
Supported Directory Drivers
Contents of the interfaces File
interfaces File Format
Components of an interfaces File Entry
Create a Master interfaces File
Using dsedit or dscp to Create a Master interfaces File
Using a Text Editor to Create a Master interfaces File
Configure the interfaces File for Multiple Networks
Configuring the Server for Multiple Network Handlers
Configure Client Connections
Manage One Network-Independent DSQUERY Name
Using Different DSQUERY Names
Configuring for Query Port Backup
IPv6 Support
IPv6 Infrastructure
Troubleshoot
Troubleshooting when the Server Fails to Start
Troubleshooting an Error when Executing an ESP
Use the Lightweight Directory Access Protocol as a Directory Service
LDAP Directory Services Versus the SAP Interfaces File
The libtcl*.cfg File
Enabling LDAP Directory Services
Keywords for the LDAP URL Variables
Adding a Server to the Directory Services
Multiple Directory Services
Encrypting the Password
Performance
Migrating from the interfaces File to LDAP
Localization Support
Language Modules
Default Character Sets
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Names
Load Character Sets
Language Definition Files Sort Order
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders for Character Sets
Language Modules
Installing a New Language Module
Message Languages
Localization Directories
About the locales Directory
About the charsets Directory
Format of locales.dat File Entries
How Client Applications Use locales.dat
Changing SAP ASE Localization Configuration
Configuring SAP ASE for Other Character Sets
Editing the locales.dat File
Changing Backup Server Localization Configuration
SAP ASE Error Logging
Set Error Log Paths
Set the SAP ASE Error Log Path
Manage Messages
Log User-Defined Messages
Log Auditing Events
Manage Database Devices
Device Requirements
Create Files for Database Devices
Database Management System Auditing
Audit System Devices and Databases
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Configuration Guide for Windows Adaptive Server Enterprise 16.0
About SAP ASE
System-Specific Issues
User Roles
Environment Variables
SAP ASE Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
Using Operating System Files as Database Devices
The dsync Parameter
The directio Parameter
Client/Server Communication
About Changing SAP ASE Configurations
Languages Other Than US English
SAP ASE Specifications
Database Specifications
Table Specifications
Query Specifications
Procedure Specifications
Extended-Limit Capabilities
Start and Stop Servers
Server Start-up Parameters
Specifying Additional Start-up Parameters
Starting and Stopping Servers Using Unified Agent
Start and Stop Servers Using the Control Panel
Starting Servers as an Automatic Service
Setting Up SAP ASE as an Automatic Service
Starting, Stopping, and Pausing Servers Manually
Stopping Backup Server
Stopping SAP ASE
Monitor Servers
Monitoring Servers with the Control Panel
SAP ASE Configurations
Default SAP ASE Configuration
Default SAP ASE Parameter Settings
Default Backup and XP Server Settings
Change SAP ASE Configurations
Starting Server Config
Configuring SAP ASE
Setting SAP ASE Parameters
Changing the Default Backup Server
Changing the Default XP Server
Configuring Backup Server
Configuring Job Scheduler and Self Management
Optimize the SAP ASE Configuration
Network Communications Using sql.ini
Client Connections to SAP ASE
Determine the Address to Listen for Client Connections
Client Access to SAP ASE
Enabling Client Access to a Server
Changing the Server Entries in sql.ini
Components in the sql.ini File
Server Name
Network Driver
Service Type
Server Address
Address Format
IP Address
Named Pipes Format
Windows Sockets Format
Increasing Windows Sockets Connections
Modifying an Existing TcpNumConnections Value
Adding a TcpNumConnections Value
Using Multiple TCP/IP Network Interface Cards
Controlling the Connection Timeout
Increasing the TcpKeepTries Value
NWLink IPX/SPX Format
Available NWLink IPX/SPX Connection Formats
Selecting Valid Connection Formats
Share Network Configuration Information
Creating a Master sql.ini File
Windows Registry as a Directory Service
Using Windows Registry as a Directory Service
Verify Server Connections
Configure ODBC Connections
Configuring the ODBC Driver
IPv6 Support
IPv6 Infrastructure
Lightweight Directory Access Protocol in SAP ASE
LDAP Directory Services versus the SAP Interfaces File
The libtcl.cfg File
Enabling LDAP Directory Services
Adding a Server to the Directory Services
Adding a Server Entry to the Directory Service Using dsedit
Multiple Directory Services
Encrypting the Password
Performance with LDAP
Migrating from the sql.ini File to LDAP
Localization Support
Language Modules
Default Character Sets for Servers
Changing the Default Character Set for Servers
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders
Language Modules
Installing a New Language Module
Message Languages
Localization
Localization Directories
charsets and locales Directories
Format of locales.dat File Entries
Client Application Use of locales.dat
Editing the locales.dat File
Changing SAP ASE and Backup Server Localization Configuration
Completing SAP ASE Localization Changes
Completing Backup Server Localization Changes
Configuring SAP ASE for Other Character Sets
Language-Specific Sort Orders
SAP ASE Character Set Names
charset Utility
Log Error Messages and Events
SAP ASE Error Logging
Windows Event Logging
Setting Up Windows Event Logging
Enable and Disable Windows Event Logging
Enabling or Disabling Event Logging Using Server Config Utility
Enabling or Disabling Event Logging Using sp_configure
Windows Event Log Information
Manage Logs
Set Error Log Paths
Setting the SAP ASE Error Log Path
Setting the Backup Server Error Log Path
Manage Messages
Log User-Defined Messages
New Messages
Existing Messages
Log Auditing Events
Log User-Defined Events
Using a Remote Log
Central Logging Site
Log Messages from Multiple SAP ASEs
Set Up a Local Central Logging Site
Creating a Registry key
Defining a Registry Key
View Messages
Viewing Messages in the Windows Event Log
Viewing Messages in the SAP ASE Error Log
Security Services with Windows LAN Manager
How Login Authentication Works
Administering Security Services Using LAN Manager
Modify Configuration Files Required for a Unified Login
Set Up Drivers for Network-Based Security
Entries for Network Drivers
Entries for Directory Services
Entries for Security Drivers
Editing the libtcl.cfg File
Checking the LAN Manager's Local Name
Specifying Security Information for SAP ASE
Identify Users and Servers to LAN Manager
Configure SAP ASE for LAN Manager Security
Enabling and Disabling External Security Services
Manage Unified Login
Requiring Unified Login
Establishing a Secure Default Login
Map LAN Manager Login Names to Server Names
Data Integrity Check
Ensure Adequate Memory for Security Services
Add Logins to Support Unified Login
Adding Logins
Define the Connection to a Server for Security Services
Specifying the Principal Name
Specifying Network-Based User Authentication
Specifying the Name Assigned to LAN Manager
Determining the Status of Security Services
Configuration Parameters Used in Security Services
Data Integrity Check
Message Sequence Check
Detect Interception or Replay
Specify a Login
Control User Authentication
Manage Login Security on an Windows Computer
SAP ASE Security
Combined SAP ASE and Windows Login Security
Trusted Connections and Combined Login Security
Login Security Modes
Standard Mode
Integrated Mode
Mixed Mode
Manage the Login Security Features
Permit Trusted Connections
Windows Registry Parameters
Default Login
Default Domain
SetHostName
Character Mappings
Modify the Parameter Values
Administer Login Security Using System Procedures
Assigning Trusted Connection Permissions
Display the Current Registry Values
Display Permissions and User Names
Revoke Permissions Granted with sp_grantlogin
Configuring Login Security
Creating Windows Users and Groups
Configuring Mapping and Default Domain Values
Setting Login Security Mode
Adding Network Login Names to syslogins
Assigning Roles
Change Login Security Options
Enabling Standard Login Security Mode
Enabling Integrated or Mixed Login Security Mode
Manage SAP ASE Databases
Manage Database Devices
Device Requirements
Creating .dat Files for Database Devices
Back Up and Restore Data
Backing Up Data with a Tape Drive
Windows Tape Drive Names
Set the Maximum Capacity for a Tape Drive
Backing Up Data Using a Hard Disk
Dumping Across a Network
Examples of Backing Up and Restoring User Databases
Back Up and Restore to a Database and Device
Back Up and Restore on a Remote Backup Server
Backup File Names
Additional Dump Devices
Tape Handling Options
Get Information About Files
Backing Up and Restoring System Databases
Optimize SAP ASE Performance and Tuning
Using Dedicated SAP ASE Operation
Disk Drives and SAP ASE Performance
Monitor Disk Usage
Monitoring SAP ASE Statistics
Database Management System Auditing
Audit System Devices and Databases
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Troubleshoot Network Connections
Running Server Ping
Troubleshoot Connection Failures
Using Returned Messages to Diagnose a Failure
Troubleshooting a Connection Failure to SAP ASE
Failure to Load Net-Library DLLs
Troubleshooting Failure of Other Applications
Before Calling Technical Support
SAP ASE Registry Keys
\SOFTWARE\SYBASE\Server\server_name
\SOFTWARE\SYBASE\SQLServer\server_name\parameter
\SOFTWARE\SYBASE\SQLServer
\SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
New Features Summary SAP Adaptive Server Enterprise 16.0
Version 16.0
Increased Data Availability with Partition Locking
CIS Support for HANA Server
Relaxed Query Limits
Query Plan Optimization with Star Joins
Query Performance Improvements
Full-Text Auditing
Auditing for Authorization Checks Inside Stored Procedures
Replacing Object Definitions
Query Plan and Execution Statistics in HTML
Index Compression
SAP JVM Support
Full Database Encryption
Scalability Enhancements and Features
Monitoring Threshold-Based Events
Multiple Triggers
Residual Data Removal
Configuration History Tracking
Cyclic Redundancy Checks for dump database
Calculating the Transaction Log Growth Rate
System Changes for SAP ASE Version 16.0
Version 15.7 SP100
Adaptive Server 15.7 SP100 Feature and Platform Matrix
Shrinking Databases
Enhancements to Backup and Restore
Aggregating Metrics from Syntactically Similar Queries
Updates to Precomputed Result Sets
Improved Data Load Performance
Incremental Reorganization
Creating Indexes Without Blocking Access to Data
Query Plan and Execution Statistics in HTML
Gathering Hash-Based Statistics with create index
Query Plan Optimization with Bloom Filters
Support for Replication by Column Value
Support for Multiple Scanner Threads
Sybase Central Adaptive Server Plug-in
Running Adaptive Server on VMware vSphere
Support for OData
Support for NTLM and MIT Kerberos on Windows 64-bit
Properties Added to Responses File
Automatic Physical Database Rearrangement
System Changes for Adaptive Server Version 15.7 SP100
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Permission Changes for Commands and Functions
Version 15.7 ESD #4
15.7 ESD #4.2
Improved Rollback Reporting
15.7 ESD #4
Remote Backup Server Maximum Name Length
Support for Query Plan Pinning
AF_UNIX Support
Changes to sp_addthreshold and Roles
System Changes for Adaptive Server Version 15.7 ESD #4
Utilities
Configuration Parameters
Version 15.7 ESD #3
sybrestore Utility
System Changes for Adaptive Server Version 15.7 ESD #3
Commands
Functions
System Stored Procedures
Monitoring Table Changes
Version 15.7 ESD #2
Granular Permissions
Predicated Privileges
Deferred Table Creation
Online Utilities
Merging and Splitting Partitions
Maximum Size of Query in the Statement Cache
Enhancements to show_cached_plan_in_xml
Fast-Logged Bulk Copy
Precomputed Result Sets
Concurrent dump database and dump transaction Commands
Hash-Based Update Statistics
Enhancements to dump and load
alter table drop column without datacopy
Expanded Maximum Database Size
User-Defined Optimization Goal
Shared Query Plans
Initializing Databases Asynchronously
In-Row Large Object Compression
Configuring Shared Memory Dumps
System Changes for Adaptive Server Version 15.7 ESD #2
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Version 15.7 ESD #1
Proxy Table Support for In-row LOB Columns
Support for System Procedures in Replicated Master Database
Increased Number of Parameters
Multiple Listeners on Windows
Windows Supports Adaptive Server High Availability
New and Changed Configuration Parameters
Version 15.7
Application Functionality Configuration Group
New Adaptive Server Kernel
Compressing Data in Adaptive Server
New Security Features
End-to-End CIS Kerberos Authentication
Dual Control of Encryption Keys and Unattended Startup
Securing Logins, Roles, and Password Management Extensions
Login Profiles
Employee Lifecycle Management
External Passwords and Hidden Text
Abstract Plans in Cached Statements
Shrink Log Space
Displaying Currently Set Switches with sysoptions
Changes for Large Objects
In-Row Off-Row LOB
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Using LOB Locators in Transact-SQL Statements
Extension to where Clause for Large Objects
Showing Cached Plans in XML
Padding a Character Field Using str
Changes to select for update
Creating Nonmaterialized, Non-null Columns
Sharing Inline Defaults
Retain Monitoring Data
Analyze Dynamic Parameters
Monitor Lock Timeouts
Truncate Trailing Zeros
Fully Recoverable DDL
Transfer Rows from Source to Target Table Using merge
View Statistics and Histograms with sp_showoptstats
Changes to Cursors
Release Cursor Locks at Cursor Close
Enhanced Transaction Support for Cursors
Monitor Cursor Statements
Nested select Statement Enhancements
Changes to Commands and System Procedures in Chained Transaction
Expanded Variable-Length Rows
Changes to like Pattern Matching
Changes to Quoted Identifiers
Allowing Unicode Noncharacters
Reduce Query Processing Latency
The sybdiag Utility
The Optimizer Diagnostic Utility
System Changes for Adaptive Server Version 15.7
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
New Monitoring Tables
Changes to Monitoring Tables
Global Variables
Version 15.5 Cluster Edition
Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
Multiple simultaneous failover
Adding space to an archive database
Distributed transaction management in the shared-disk cluster
System Changes for Adaptive Server Version 15.5 Cluster Edition
Changed commands
Monitoring Tables
Configuration Parameters
Functions
Version 15.5
Adaptive Server 15.5 Feature and Platform Matrix
In-Memory and Relaxed-Durability Databases
Faster Compression for Backups
Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
Deferred Name Resolution for User-Defined Stored Procedures
FIPS 140-2 Login Password Encryption
Incremental Data Transfer
bigdatetime and bigtime Datatypes
Creating and Managing tempdb Groups
System Changes for Adaptive Server Version 15.5
Datatypes
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Utilities
Auditing
Version 15.0.3
SQL Statement Replication
Security Enhancements
LDAPS User Authentication Enhancement
Automatic LDAP User Authentication and Failback
Login Mapping of External Authentication
Using SSL to Specify a Common Name
Concurrent Kerberos Authentication
Virtually Hashed Tables
Huge Pages
Upgrading During a High Availability Configuration
Reinstalling System Stored Procedures
Distributed Transaction Management (DTM)
Adaptive Server Plug-in Updates
The Java Interface
System Changes for Adaptive Server Version 15.0.3
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Version 15.0.2
Encrypted Columns
Archive Database Access
Finding Slow-Running Queries
Deferred Compilation
Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Statistical Aggregate Functions
Standard Deviation and Variance
Eager and Lazy Aggregation
Vector and Scalar Aggregation
Improved Performance for Data Insertion
Using Asynchronous Writes During a Page Split
Improving Throughput of tempdb Transactions
Post-commit Optimization
Changes to the Query Processor
Deferred Compilation
Non-binary Character Set Histogram Interpolation
Expression Histogramming Selectivity Estimates
Viewing Current Optimizer Settings
New Security Features
PAM Support in 64-bit Adaptive Server on AIX
Global Login Triggers Set Automatically
SSL Support
Improved Password Security
Auditing Enhancements
Hiding System Stored Procedure and Command Password Parameters
Monitoring Failed Login Attempts
High Availability Considerations
Installing and Editing Monitoring Tables
Monitoring Tables for the Statement Cache
Row-Level Locking for System Tables
The xmltable() Function
Relocated Joins
User-Defined SQL Functions
instead of Triggers
System Changes for Adaptive Server Version 15.0.2
Trace Flags
Commands
Changes to the set Command
Utilities
System Stored Procedures
System Tables
Configuration Parameters
Functions
Global Variables
Version 15.0.1
Changes to Abstract Plans
New Query-Level Settings
Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
Extending the Optimizer Criteria Set Syntax
Literal Parameterization
System Changes for Adaptive Server Version 15.0.1
Functions
Configuration Parameters
Commands
Monitoring Tables
Version 15.0
Partition Support
Row-Locked System Catalogs
Query Processor
Large Identifiers
Computed Columns
Differences Between Computed Columns and Function-Based Indexes
Differences Between Materialized and Not Materialized Computed Columns
Scrollable Cursors
unitext Datatype Support
big int Datatype Support
Unsigned Integer Datatype Support
Integer Identity
Enhancements to XML Services
Adaptive Server Plug-in Enhancements
Interactive SQL
User-Defined Web Services
Very Large Storage Support
Automatic Running of update statistics
SySAM License Management
Query Processing Metrics (qp Metrics)
Updates to Abstract Plans
showplan Changes
Secure Socket Layer Uses FIPS 140-2
System Changes for Adaptive Server Version 15.0
Utilities
Reserved Words
Global Variables
Configuration Parameters
Functions
Commands
System Stored Procedures
System Tables
Monitoring Tables
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
New Features Guide SAP Adaptive Server Enterprise 16.0
Overview of Version 16.0
Increased Data Availability with Partition Locking
Partition Locks
Partition Lock Name
Enabling Partition Locking
View Partition Locks with sp_lock
View Partition Locks with sp_familylock
View Partition Locks with monLocks and monDeadLock
Deadlocks and Lock Timeouts
Partition Lock Promotion
Setting Partition Lock Promotion Thresholds
Dropping Partition Lock Promotion Thresholds
Lock Compatibility and Lock Sufficiency
Partition Lock Compatibility
Partition Lock Sufficiency
Schema Lock Compatibility
Schema Lock Sufficiency
Improved Concurrency for Partition-Level Online Operations
Partition-Level Online Operation Syntax
Concurrency with Partition-Level Online Operations
Partition-Level Online Operations with Global Index
Schema Locks
Component Integration Services Support for HANA Server
Configuring CIS for HANA
Creating SAP HANA as an ODBC Data Source on Windows
Adding SAP HANA to the SAP ASE Interfaces File
Configuring the PCI Bridge and PCA/ODBC
Adding Server Class HANAODBC
Datatype Mapping Between SAP ASE and HANA
Restrictions
Relaxed Query Limits
Query Plan Optimization with Star Joins
Star Join Hint
Star Join Query Plans Under the use fact_table Hint
Query Performance Improvements
Dynamic Thread Assignment
SORT Operator Performance Improvement
Hash Join Operator Performance Improvement
Full-Text Auditing
Auditing for Authorization Checks Inside Stored Procedures
Replacing Object Definitions
Install Script Changes
Data and Log Segment Changes
Query Plan and Execution Statistics in HTML
Option for Prefix of Generated File
Index Compression
Enabling Index Compression
Creating an Index Compressed Table
Creating a Compressed Index
Changing the Compression State
SAP JVM Support
Full Database Encryption
Full Database Encryption Versus Encrypted Columns
Creating the Database Encryption Key
Changing a Database Encryption Key
Dropping a Database Encryption Key
Create an Encrypted Database
Encrypt an Existing Database
Encryption Status and Progress
Performance Considerations
Suspend the Encryption Process
The quiesce database Command and Fully Encrypted Databases
Resume the Encryption Process
Decrypt an Encrypted Database
Recover Fully Encrypted Databases
Back Up (Dump) a Fully Encrypted Database
Back Up the Database Encryption Key
Restore (Load) Backups of Fully Encrypted Databases
Loading Behavior of Encrypted Databases
Dropping a Database That is Being Encrypted
Mounting and Unmounting a Fully Encrypted Database
Archive Databases and Full Encryption
Full Database Encryption and System Changes
Scalability Enhancements and Features
Run-Time Logging Enhancements
Lock Management Enhancements
Metadata and Latch Management Enhancements
Monitoring Threshold-Based Events
Multiple Triggers
Creating Multiple Triggers
Changing the Order of When a Trigger is Fired
Order of Triggers in Merge Statements
Transactional Behavior with Multiple Triggers
Disabling and Reenabling Triggers
@@trigger_name Global Variable
Residual Data Removal
Configuration History Tracking
Configuring SAP ASE to Track Configuration Changes
Changes Captured
Querying ch_events to View Changes
Cyclic Redundancy Checks for dump database
Calculating the Transaction Log Growth Rate
System Changes
Configuration Parameters
New Configuration Parameters
Changed Configuration Parameters
Built-In Functions
dbencryption_status
Commands
alter database for Full Database Encryption
alter index
alter table for Index Compression
alter table for Multiple Triggers
alter table for Residual Data Removal
create archive database for Full Database Encryption
create database for Full Database Encryption
create default
create encryption key
create function
create function (SQLJ)
create index
create procedure
create procedure (SQLJ)
create rule
create table for Index Compression
create table for Residual Data Removal
create trigger for Multiple Triggers
create trigger for or replace
create view
drop encryption key
drop trigger
dump database
kill
load database
select
select into
set
System Procedures
Changed System Procedures
sp_audit
sp_chgattribute
sp_clusterlockusage
sp_dboption
sp_depends
sp_encryption
sp_familylock
sp_helpdb
sp_lock
New System Procedures
sp_confighistory
sp_ dropglockpromote_ptn
sp_droprowlockpromote_ptn
sp_helptrigger
sp_jsconfigure
sp_logging_rate
sp_setpglockpromote_ptn
sp_setrowlockpromote_ptn
System Tables
Changed System Tables
New System Tables
ch_events
Changed Monitoring Tables
New Monitoring Tables
monThresholdEvent
Utilities
ddlgen
sybmigrate
sybrestore
Global Variables
Security Administration Guide SAP Adaptive Server Enterprise 16.0
SAP Control Center 3.3 for SAP Adaptive Server Enterprise
About SAP Control Center for SAP Adaptive Server Enterprise
New Features in SAP Control Center for SAP Adaptive Server Enterprise
User Interface Overview
Toolbar Icons
Status Icons
Display and Copy Options in SAP Adaptive Server Enterprise Monitors
Common Display Options
Keyboard Shortcuts
Displaying the Versions of SCC Components
Style and Syntax Conventions
SAP Control Center Accessibility Information
Get Started
Quick Start for an Evaluation
Get Started in a Production Environment
Deploying an Instance from a Shared Disk Installation
Enabling and Disabling Shared-Disk Mode
Shared-Disk Mode
sccinstance Command
Launching SAP Control Center
Registering the ODBC Driver in Windows
Starting and Stopping SAP Control Center in Windows
Starting and Stopping SAP Control Center in UNIX
Configuring Memory Usage
Changing a Memory Option on the Command Line
Changing a Memory Option for an SAP Control Center Windows Service
Changing a Memory Option for an SCC UNIX Service
scc Command
Logging in to SAP Control Center
Logging out of SAP Control Center
Setting Up Security
Security
Configuring Authentication for Windows
Configuring a Pluggable Authentication Module (PAM) for UNIX
Configuring an LDAP Authentication Module
LDAP Configuration Properties
Mapping SAP Control Center Roles to LDAP or OS Groups
Encrypting a Password
Configuring Ports
Configuring the E-mail Server
Configuring the Automatic Logout Timer
Configuring Retrieval Thresholds for the Administration Console
User Authorization
Assigning a Role to a Login or a Group
Removing a Role from a Login or a Group
Adding a Group
Removing a Group
Adding a Login Account to a Group
Removing a Login Account from a Group
Adding a Login Account to the System
Removing a Login Account from the System
Modifying a User Profile
Logins, Roles, and Groups
Configure
Configuring SAP Adaptive Server Enterprise for Monitoring
Registering an SAP ASE Server
Importing Resources for Batch Registration
Registering the Agent for an SAP ASE Server
Authenticating a Login Account for a Managed Resource
Role Assignment in SAP Control Center for SAP ASE
Encrypted Authentication for SAP ASE
Setting Up Statistics Collection
About Statistics
SAP ASE Data Collections
Key Performance Indicators for SAP ASE
Creating an Alert
SAP ASE Alerts
Alert Types, Severities, and States for SAP ASE
Alert-Triggered Scripts
Alert-Triggered Script Examples
Substitution Parameters for Scripts
Setting Display Options for SAP ASE Performance Data
Optional Configuration Steps
Manage and Monitor
Displaying Resource Availability: the Heat Chart
Graphing Performance Counters: the Statistics Chart
Manage SAP Control Center
Administration Console
Browsing and Managing Resources
Searching and Filtering Resources
Searching for Objects in SAP ASE
Manage Message Rows for Search Requests
Configuring Retrieval Thresholds for the Administration Console
Job Scheduling
Executing and Stopping a Data Collection Job
Deleting a Data Collection Job
Resuming and Suspending a Data Collection Job
Adding a New Schedule to a Job
Viewing or Deleting a Schedule
Modifying the Data Collection Interval for a Job
Resuming and Suspending the Scheduler
Viewing the Job Execution History
Alerts
SAP ASE Alerts
Alert Types, Severities, and States for SAP ASE
Creating an SAP ASE Alert
Displaying SAP ASE Alerts
Modifying an Alert
Deleting an Alert
Alert Subscriptions
Adding or Modifying an Alert Subscription
Unsubscribing from an Alert
Enabling and Disabling Alert Subscription
Alert Notifications
Displaying Alert History and Resolutions
Resolving Alerts
Alert-Triggered Scripts
Substitution Parameters for Scripts
Testing an Alert-Triggered Script
Alert-Triggered Script Examples
Resources
Unregistering a Resource
Adding a Resource to a Perspective
Removing a Resource from a Perspective
Modifying a Resourceās Name and Connection Properties
Searching for Resources in the Resource Explorer
Perspectives
Creating a Perspective
Removing a Perspective
Renaming a Perspective
Views
Managing a View
Arranging View Layout in a Perspective
Instances
Enabling and Disabling Shared-Disk Mode
Deploying an Instance from a Shared Disk Installation
Refreshing or Converting an Instance
Removing an Instance
Shared-Disk Mode
sccinstance Command
Repository
Scheduling Backups of the Repository
Modifying the Backup Schedule
Forcing an Immediate Backup
Restoring the Repository from Backups
Configuring Repository Purging
Logging
Viewing the SAP ASE Component Log
Viewing SAP Control Center Server Logs
Viewing the SAP Control Center Client Log
Changing the Logging Level
Logging or Message Levels
Changing Logging Configuration
SAP Control Center Console
Console Commands
help Command
info Command
shutdown command
status Command
Setting SAP ASE Parameters in the Configuration File
Configuration Parameters for SAP ASE
Manage and Monitor the SAP ASE Environment
Managing an SAP ASE server
Executing SQL Statements
Registering the Agent for an SAP ASE Server
Authenticating the Unified Agent
Authenticating the SCC Agent
Starting an SAP ASE Server
Stopping an SAP ASE Server
Configuring Retrieval Thresholds for the Administration Console
SAP ASE Error Log
Viewing the SAP ASE Error Log
Searching the Error Log for Messages
Managing Flag Definitions
Importing Flag Definitions
Exporting Flag Definitions
Server Configuration
Displaying Configuration Values
Modifying Server Configuration Parameters
Server Configuration Statistics and Details
Server Monitor Settings
Server Properties
Activating a Role
Managing Permissions
Enabling Granular Permissions
Replacing Compiled Object Definitions
Displaying the Performance Overview
Performance Overview Statistics and Details
Caches
Monitor Caches
Monitoring SAP ASE Data Caches
Modifying Data Cache Sizes
Adding Data Cache Buffer Pools
Data Cache Statistics and Details
Monitoring the SAP ASE Procedure Cache
Procedure Cache Statistics and Details
Monitoring the SAP ASE Statement Cache
Setting the Statement Cache Size
Statement Cache Statistics and Details
Monitoring SAP ASE In-memory Storage
In-memory Storage Statistics and Details
Manage Caches
Creating a Cache
Cache Properties
Managing Binding Options
Managing Buffer Pools
Managing Cache Configurations
Generating DDL for a Cache
Deleting a Cache
Clusters
Monitor Clusters
Cluster Instances
Monitoring Cluster Instances in Cluster Configurations
Cluster Instances Statistics and Details
Cluster Interconnect
Displaying the Cluster Overview
Cluster Interconnect Statistics and Details
Monitoring Interprocess Communication in Cluster Configurations
Workload Management
Monitoring Workloads in Cluster Configurations
Workload Management Statistics and Details
Manage Clusters
Starting the SCC agent for a Cluster
Starting the Unified Agent for a Cluster
Preparing to Create a Cluster
Creating a Cluster
Registering a Cluster
Registering the Agent and Starting a Cluster
Displaying Cluster Configuration Values
Starting a Cluster
Stopping a Cluster
Dropping a Cluster
Viewing a Cluster Log
Cluster Properties
Manage Logical Clusters
Adding a Logical Cluster
Designating a Failover Logical Cluster
Designating a Failback Logical Cluster
Logical Cluster States
Changing the State of a Logical Cluster
Deleting a Logical Cluster
Generating a DDL Script for a Logical Cluster
Logical Cluster Properties
Manage Cluster Instances
Displaying Instance Configuration Values
Starting an Instance
Adding an Instance to a Cluster
Stopping an Instance
Deleting an Instance
Instance Properties
Viewing an Instance Log
Manage Load Profiles
Adding a Load Profile
Deleting a Load Profile
Generating a DDL Script for a Load Profile
Load Profile Properties
Manage Routes
Adding a Route
Deleting a Route
Route Properties
Manage Auxiliary Servers
Configuring a Backup Server
Deleting a Backup Server
Backup Server Properties
Configuring an XP Server
Deleting an XP Server
XP Server Properties
Databases
Monitor Databases
Determining the Backup Status of a Database
Displaying Resources Used by a Database
Modifying Database Sizes
Database Statistics and Details
Displaying Information About Segments Used by a Database
Manage Databases
Creating a User Database
Creating a Proxy Database
Creating a Temporary Database
Creating an Archive Database
Creating an In-Memory Database
Creating an In-Memory Temporary Database
Creating an Encrypted Database
Encrypting an Existing Database
Suspending the Encryption Process
Resuming the Encryption Process
Decrypting an Encrypted Database
Suspending the Decryption Process
Resuming the Decryption Process
Creating a Temporary Database Group
Shrinking a Database
Backing Up (Dumping) a Database
Viewing Available Dump Configurations
Creating a Dump Configuration
Backing Up a Database Using a Dump Configuration
Dump Configuration Properties
Deleting a Dump Configuration
Backing Up a Database or Transaction Log to Multiple Stripes
Backing Up a Database Incrementally
Backing Up a Database Incrementally Using a Dump Configuration
Viewing Dump Records
Purging Dump Records from Dump History
Generating Database-Creation SQL for a Target Database
Generating Database-Creation SQL from a Dump Image
Backing Up Server Configuration Files
Scheduling a Database Backup
Requirements and Permissions for Scheduling Backups
Creating a Schedule for Backups
Schedule Properties
Deleting a Schedule
Scheduling a Backup Job in the Backup Wizard
Creating a New Scheduled Backup Job
Properties of a Scheduled Backup Job
Manage a Scheduled Backup Job
Enabling Scheduled Jobs
Deleting a Backup Job from the Schedule
Disabling Scheduled Jobs
Running a Scheduled Job Now
Rescheduling a Backup Job
Terminating a Scheduled Job in Progress
Viewing the Execution History of a Scheduled Backup Job
Job History Properties
Viewing the Contents of the Execution History Log
Deleting the Execution History of a Scheduled Backup Job
Job Scheduler Administration
Set Up an Alert for When a Backup Job Fails
Restoring (Loading) a Database
Generating a Database Load Sequence
Generating a Database Load Sequence for a Target Database from Dump History
Restoring a Database from a Cumulative Dump
Restoring a Database from a SQL Script
Restoring a Database from a Point in Time
Viewing Database Statistics
Checkpointing Databases
Checking Database Consistency
Placing a Database in Quiesce-Hold
Placing a Database in Quiesce-Release
Mounting an SAP ASE Database
Unmounting an SAP ASE Database
Database Properties
Changing Database Ownership
Modifying Database Storage Allocations
Modifying the Transaction Log Cache and the Log I/O Buffer Size
Changing Database Options
Generating DDL for a Database
Deleting a Database
Defaults
Creating a Default
Defaults Properties
Replacing a Default Definition
Deleting a Default
Devices
Monitor Devices
Determining Device I/O Response and I/O per Second
Modifying Device Sizes
Device Statistics and Details
Manage Devices
Displaying a Device Object
Creating a Database Device
Creating an In-Memory Device
Creating a Dump Device
Database Device Properties
In-Memory Device Properties
Dump Device Properties
Generating DDL for a Device
Deleting a Database, In-Memory, or Dump Device
Engines
Monitor Engines
Displaying Engine CPU Utilization
Engine Statistics and Details
Manage Engine Groups
Creating Engine Groups
Engine Groups Properties
Deleting an Engine Group
Generating DDL for an Engine Group
Execution Classes
Creating Execution Classes
Execution Classes Properties
Modifying Bindings to Execution Classes
Extended Stored Procedures
Creating an Extended Stored Procedure
Replacing an Extended Stored Procedure Definition
Extended Stored Procedures Properties
Granting Execute Permission on an Extended Stored Procedure
Revoking Execute Permission on an Extended Stored Procedure
Deleting an Extended Stored Procedure
Generating DDL for an Extended Stored Procedure
Functions
Manage Scalar Functions
Creating a Scalar Function
Replacing a Scalar User Defined Function Definition
Scalar Function Properties
Granting Execute Permission on a Scalar Function
Revoking Execute Permission on a Scalar Function
Deleting a Scalar Function
Generating DDL for a Scalar Function
Manage SQLJ Functions
Creating a SQLJ Function
Replacing a SQLJ Function Definition
SQLJ Function Properties
Deleting a SQLJ Function
Generating DDL for a SQLJ Function
Networks
Managing Remote Servers
Configuring a Server for Remote Procedure Calls
Adding a Remote Server
Deleting a Remote Server
Remote Server Properties
Testing a Remote Server Connection
Setting Options for a Remote Server
Managing Remote Server Login Mappings
Managing CIS Roles and Logins Mappings
Precomputed Result Sets
Configuring SAP ASE to Use Precomputed Result Sets
Viewing Precomputed Result Sets
Creating a Precomputed Result Set
Deleting a Precomputed Result Set
Altering a Precomputed Result Set
Refreshing Precomputed Result Sets
Truncating a Precomputed Result Set
Granting Permissions on Precomputed Result Sets
Revoking Permissions on Precomputed Result Sets
Granting Precomputed Result Set Permissions to a Specific User
Revoking Precomputed Result Set Permissions from a Specific User
Displaying Information About Precomputed Result Sets
Generating DDL for a Precomputed Result Set
Procedures
Manage Stored Procedures
Creating a Stored Procedure
Replacing a Stored Procedure Definition
Stored Procedure Properties
Granting Execute Permission on a Stored Procedure
Revoking Execute Permission on a Stored Procedure
Deleting a Stored Procedure
Generating DDL for a Stored Procedure
Manage SQLJ Procedures
Creating a SQLJ Procedure
Replacing a SQLJ Procedure Definition
SQLJ Procedure Properties
Deleting a SQLJ Procedure
Generating DDL for a SQLJ Procedure
Processes
Identifying Resource-Intensive Processes
Identifying Blocked Processes and Blocking Processes
Terminating Blocking Processes
Identifying the Lead Blocker in a Chain
Displaying the SQL Query Associated with a Process
Displaying Wait Events for a Process
Process Statistics and Details
Replication Agents
Monitoring RepAgent Threads
Replication Agent Statistics and Details
Rules
Manage Rules
Creating a Rule
Replacing a Rule Definition
Rule Properties
Deleting a Rule
Generating DDL for a Rule
Security
Manage Encryption Keys
Modifying and Deleting a System Encryption Password
Creating a System Encryption Password
Creating a Master Key
Master Key Properties
Modifying, Regenerating, and Deleting a Master Key
Dual Control and Split Knowledge
Creating a Column Encryption Key
Column Encryption Keys Properties
Creating a Key Copy
Modifying and Deleting a Column Encryption Key
Creating a Database Encryption Key
Database Encryption Keys Properties
Granting Encryption Permissions to a Role, User, or Group
Modifying a Database Encryption Key
Deleting an Encryption Key
Generate DDL for an Encryption Key
Manage Login Profiles
Creating a Login Profile
Login Profile Properties
Removing Roles Granted to a Login Profile
Granting Roles to a Login Profile
Deleting a Login Profile
Displaying Logins Assigned to a Login Profile
Transferring Login Attributes to a Login Profile
Manage Logins
Creating a Login
Login Properties
Managing Users Mapped to Logins
Removing Roles from a Login
Granting Roles to a Login
Configuring Login Password Properties
Changing a Login Password
Displaying Login Account Properties
Assigning Login Profiles to a Login
Deleting a Login
Manage Groups
Creating a Group
Adding or Removing Users to or from a Group
Group Properties
Setting Command Permissions for a Group
Granting Object Permissions to a Group
Revoking Object Permissions from a Group
Granting Privileges to a Group
Revoking Privileges from a Group
Deleting a Group
Generate DDL for a Group
Manage Users
Creating a User
Transferring Ownership of a Database Object
Users Properties
Granting Object Permissions to a User
Revoking Object Permissions from a User
Granting Privileges to a User
Revoking Privileges from a User
Setting Command Permissions for a User
Deleting a User
Manage Roles
Expiring a Role Password
Creating a Role
Restoring System Roles
Role Properties
Revoking Object Permission from a Role
Granting Object Permissions to a Role
Revoking Privileges from a Role
Granting Privileges to a Role
Creating Role Hierarchy
Managing Mutually Exclusive Roles
Removing Login Profiles Assigned to a Role
Assigning Login Profiles to a Role
Removing Logins Assigned to a Role
Assigning Logins to a Role
Setting Command Permissions for a Role
Segments
Monitor Segments
Determining the Space Used by a Table on a Segment
Extending a Segment in SAP ASE
Segment Statistics and Details
Manage Segments
Displaying Segments
Creating a Segment
Segment Properties
Removing a Threshold from a Segment
Adding a Threshold to a Segment
Removing a Database Device from a Segment
Adding a Database Device to a Segment
Deleting a Segment
Generating DDL for a Segment
Statistics
Interpreting Statistics
Updating Statistics on a Table
Updating Statistics on Specific Columns
Updating Statistics on an Index
Updating Statistics for a Data Partition
Updating Statistics on an Index Partition
Deleting Statistics from a Table
Deleting Statistics from a Column
Deleting Statistics from a Data Partition
SQL Activity
Monitoring SQL Queries
Executing SQL Statements
Tables
Creating a User or Proxy Table
Creating a Column
Creating an Index
Restoring Table Data
Creating a Foreign Key
Creating a Check Constraint
Checking Table Consistency
Binding Defaults and Rules to a Column
Placing a Table on a Segment
Setting the Table Locking Scheme
Creating a Unique Constraint or Primary Key
Manage Table Compression
Identifying Table Compression Candidates
Initiating a Compression Estimate
Applying Compression Settings
Manage Index Compression
Setting Index Compression on an Index
Setting Index Compression on a Local Index Partition
Setting Index Compression on a Table
Manage Triggers
Creating a Trigger
Trigger Properties
Replacing a Trigger Definition
Incrementally Transferring Data
Enabling Incremental Transfer
Incrementally Transferring Data In
Incrementally Transferring Data Out
Bulk Copying Data
Bulk Copying Data Into or Out of Tables
Setting Table or Column Permissions
Granting Table Permissions
Revoking Table Permissions
Granting Column Permissions
Revoking Column Permissions
Manage Partitions
Partition Locking
Enabling Partition Locking
Enabling Semantic-based Partitioning
Using a Hash Partition
Using a Range Partition
Using a List Partition
Using a Round-Robin Partition
Splitting a Partition
Merging Partitions
Moving a Partition
Deleting a Partition
Reorganize Tables and Table Objects
Reorganizing Tables at the Database Level
Reorganizing Tables
Reorganizing Table Partitions
Reorganizing Indexes
Reorganizing Index Partitions
Status Messages
Table Properties
Column Properties
Index Properties
Foreign Key Properties
Check Constraint Properties
Partition Properties
Deleting a Table
Deleting an Index
Thread Pools
Monitor Threads
Identifying the Threads in a Thread Pool
Thread Statistics and Details
Manage Thread Pools
Creating a Thread Pool
Thread Pool Properties
Transactions
Identifying a Transactionās Process
Transaction Statistics and Details
User-Defined Datatypes
Adding a User-Defined Datatype
User-Defined Datatypes Properties
Deleting a User-Defined Datatype
Views
Creating a View
Replacing a View Definition
View Properties
Granting Permissions on Views
Revoking Permissions on Views
Deleting a View
Troubleshoot SAP Control Center for SAP ASE
Data Display Problems
Cannot Monitor SAP ASE or Display Statistics Chart
Data on Screens or Charts Is Missing
Database Objects Are Not Updated
Error: No Result Set for this Query
Error: No Data Was Found For Statistic
Error: Unable to Format the Date String
Properties for Engine Groups Incorrectly Displayed
Same Name Engine Groups Are Not Selectable
"Number of Transactions" KPI Is Not Updated
Cannot Find Error Information For Monitor View
Display Large Number of Objects in Administration Console
Data Collection and Alert Problems
Collection Job for SAP ASE Fails
Alerts Are Configured But Do Not Fire
Data Collections Fail to Complete
Alerts Are Not Generated
Authentication and Access Problems
Cannot Log In
SAP Control Center Fails to Start
Browser Refresh (F5) Causes Logout
Invalid Connection Profile
Cannot Authenticate Server Configured with a Multibyte Character Set
Features Are Not Enabled Although You Have sa_role
Resetting the Online Help
Performance Problems
SAP ASE is Responding Slowly
Memory Warnings at Startup
SCC Out of Memory Errors
Performance Statistics Do Not Cover Enough Time
Collect Diagnostic Data
Preparing to Collect Diagnostic Data
Collecting Field Diagnostic Data
Collecting Optimizer Diagnostic Data
Upload Diagnostic Data
Uploading Diagnostic Data Via FTP
Submitting Diagnostic Data via E-mail Message
Deleting a Diagnostic Data File
Glossary: SAP Control Center for SAP ASE
Utility Guide SAP Adaptive Server Enterprise 16.0
Types of Utilities
Threaded Versions of Utilities
Installation or Configuration Utilities
Utilities for Languages, Character Sets, and Sort Orders
Utilities to Start Servers
Database Creation and Manipulation Utilities
Utilities to Gather Information
Tuning Utility
Utility to Manage a Cluster
Utility Commands Reference
auditinit
backupserver
bcp
Usage for bcp
Copying Tables with Indexes or Triggers Using bcp
Using bcp with Compressed Data
buildmaster
certauth
certpk12
certreg
charset
cobpre
cpre
dataserver
Usage for dataserver
Dependencies and Conditions of dataserver -b and -w Options
Potential Issues of Using dataserver -f and -w Options Together
ddlgen
Usage for ddlgen
Hiding Passwords in ddlgen
ddlgen and Encryption
ddlgen for Encrypted Columns
Encrypted Columns and Specifying the -XOD Flag in ddlgen
ddlgen Support for Key Copies
EKC Encryption Key Copy Filter and ddlgen
Create Table DDL
defncopy
dscp
dsedit
extractjava
installjava
Usage for installjava
Cases When Adding New JARs Causes Exceptions
Updating JARs and Classes
Locks
isql
Usage for isql
Interactive isql Commands
isql Session Commands
Prompt Labels and Double Wildcards in an isql Session
Command History in isql
langinstall
optdiag
Usage for optdiag
Byte Ordering and Binary optdiag Files
optdiag Input Mode
preupgrade
Usage for preupgrade
The preupgrade -D Parameter
pwdcrypt
qptune
qrmutil
showserver
sqldbgr
Usage for sqldbgr
Error Messages in sqldbgr
sqlloc
sqllocres
sqlsrvr
Usage for sqlsrvr
Starting an SAP ASE Server
startsrvr Dependencies and Conditions with -b and -w
sqlupgrade
sqlupgraderes
srvbuild
Usage for srvbuild
Using LDAP with srvbuild in a 64-bit Environment
srvbuildres
startserver
Usage for startserver
The Runserver File
sybatch
sybcluster
syconfig
sybdiag
Usage for sybdiag
Viewing sybdiag Output
Configuration Options for sybdiag
sybdumptran
Usage for sybdumptran
sybmigrate
sybrestore
sybtsmpasswd
updatease
xpserver
Using bcp to Transfer Data to and from SAP ASE
Methods for Moving Data
Import and Export Data with bcp
bcp Modes
bcp Requirements
bcp Permissions
Before You Transfer
Copy Data to Partitions Using bcp
Improve bcp Performance
Fast, Fast-logged, and Slow bcp
Slow bcp
Fast bcp
Fast-logged bcp
Copying Tables with Indexes
Locking Scheme and Fast bcp
Space Requirements for Copying
Summary of Steps for Fast and Fast-logged bcp
Bulk Copying Data into Partitioned Tables
Copying Data Randomly Into Partitions
Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
Reducing Logging by Increasing Page Allocations
Using Parallel Bulk Copy to Copy Data into a Specific Partition
bcp in and Locks
Parallel Bulk Copy Methods
Parallel Bulk Copy Syntax
Using Parallel Bulk Copy on Round-robin Partitioned Tables
Parallel Bulk Copy and IDENTITY Columns
Retaining Sort Order
Specifying the Value of a Tableās IDENTITY Column
Bulk Copying Encrypted Data
bcp Options
Using the Default Formats
Native Format
Character Format
Change Terminators from the Command Line
Change the Defaults in Interactive bcp
Respond to bcp Prompts
File Storage Type
Prefix Length
Field length
Field and Row Terminators
Choose Terminators
Format Files
Examples of Copying Out Data Interactively
Examples of Copying In Data Interactively
bcp and Alternate Languages
Support for Initialization Strings
bcp and Row-Level Access Rules
Copy In and Batch Files
Improve Recoverability
Batches and Partitioned Tables
Copy Out and Text and Image Data
Specify a Network Packet Size
Copy In and Error Files
Copy Out and Error Files
Data Integrity for Defaults, Rules, and Triggers
How bcp Differs from Other Utilities
Using dataserver Build Servers
Building a New Master Device
Environments When Using dataserver
Specifying Device and Logical Page Sizes When Building a New SAP ASE Server
Starting an Existing a SAP ASE Server
Upgrading to a Server With Larger Page Sizes
Viewing the Current Server Limits
Using dscp to View and Edit Server Entries
Starting dscp
Working with Server Entries
Adding and Modifying Server Entries
Adding a Server Entry
Modifying or Deleting a Server Entry
Copy Server Entries
List and View Contents of Server Entries
Delete Server Entries
Exiting dscp
Using dsedit to View and Edit Server Entries
Add, View, and Edit Server Entries
Using dsedit in UNIX
Starting dsedit in UNIX
Open an Editing Session in UNIX
Modify Server Entries in UNIX
Adding a New Server Entry in UNIX
Viewing or Modifying a Server Entry in UNIX
Add or Edit Network Transport Addresses
TCP/IP Addresses
SPX/IPX Addresses
Copying a Server Entry to Another Interfaces File in UNIX
Copying Server Entries Within the Current Session
Copying Server Entries Between Sessions
Using dsedit in Windows
Starting dsedit in Windows
Open an Editing Session in Windows
Opening a Session in Windows
Opening Additional Sessions in Windows
Switching Between Sessions in Windows
Modify Server Entries in Windows
Adding a Server Entry
Modifying a Server Attribute
Renaming a Server Entry
Deleting a Server Entry
Copying Server Entries Within the Current Session in Windows
Copying Server Entries Between Sessions in Windows
Troubleshooting dsedit
Using Interactive isql from the Command Line
Starting isql
Stopping isql
Using Transact-SQL in isql
Formatting isql Output
Correcting isql Input
set Options that Affect Output
Changing the Command Terminator
Performance Statistics Interaction with Command Terminator Values
Input and Output Files
UNIX command line redirection
Using Interactive SQL in Graphics Mode
Starting Interactive SQL
The Main Interactive SQL Window
Plan Dialog Tab
The Interactive SQL Toolbar
Open Multiple Windows
Keyboard Shortcuts
Display Data Using Interactive SQL
Edit Table Values in Interactive SQL
Copying Rows from the Interactive SQL Result Set
Editing Rows from the Interactive SQL Result Set
Inserting Rows into the Database from the Interactive SQL Result Set
Deleting Rows from the Database Using Interactive SQL
SQL Statements in Interactive SQL
Canceling an Interactive SQL Command
Combining Multiple Statements
Looking Up Tables, Columns, and Procedures
Recall Commands
Logging Commands
Configure Interactive SQL
General Dialog Box
Result Dialog Box
Import/Export Dialog Box
Messages Dialog Tab
Editor Dialog Box
Query Editor Dialog Box
Processing Command Files
Saving SQL Statements to a File
Executing Command Files
Saving, Loading, and Running Command Files
The SQL Escape Syntax in Interactive SQL
Interactive SQL Commands
Interactive sybcluster Commands Reference
Commands Active Before Connecting to a Cluster
Commands Active After Connecting to a Cluster
add backupserver
add instance
connect
create backupserver
create cluster
create xpserver
deploy plugin
diagnose cluster
diagnose instance
disconnect
drop backupserver
drop cluster
drop instance
drop xpserver
exit
help
localize
quit
set backupserver
set cluster
set instance
set xpserver port
show agents
show backupserver config
show cluster
show instance
show membership mode
show session
show xpserver
shutdown cluster
shutdown instance
start cluster
start instance
upgrade server
use
Using sybmigrate to Migrate Data
What sybmigrate Does
What sybmigrate Does Not Do
Before You Begin
Permissions
Changing Target Login Accounts
Platforms
Environment Settings
Migrating Proxy Tables
Migration process
Overview of the Migration Process
Pre-migration Considerations
Configuration and Tuning for Higher Performance
Configuration Considerations for SAP ASE
Possible Errors to Avoid
Auto-select Dependent Objects for Migration
Migrating an Archive Database
Upgrading an SAP ASE Server with an Archive Database
Downgrading an SAP ASE Server with an Archive Database
GUI Mode
Setting Up Source Databases for Migration
Begin the Migration
Validating the Migration
Migration and Validation Progress
Resource File Mode
Using sybmigrate with Encrypted Columns
Post-migration Activities
Migrate Databases in the Replication Server Domain
Preparing for Migration
Postmigration Procedures
Restoring Primary Databases
Restoring the RSSD
Amending System Tables When the Logical Page Size Changes
Restoring Replicate Databases
Logs
Migrating Databases That Support Wide Data
Limitations
Stopping High Availability
Other Limitations
Troubleshooting and Error Messages
Using sybrestore to Restore Databases
Before You Begin
sybrestore Checks
Compatibility Geometry Check
sybrestore Syntax
Restoring a Database in Noninteractive Mode
Restoring a Database in Interactive Mode
Interactive Menu Options
Logging sybrestore Output
Providing a Mapping Directory
Restoring a Database to a Point In Time
Example of Restoring a Database to a Point In Time
Restoring User and System Databases
Master Database Restore
Prerequisites for Restoring a Master Database
Configuration and Resource Files
Creating or Editing the Restore Utility Configuration File
Creating or Editing Resource Files
Resource File Examples
Restoring a Master Database
Transact-SQL Users Guide 16.0
SQL Building Blocks
Tables, Columns, and Rows
Queries, Data Modification, and Commands
Relational Operations
Compiled Objects
Save or Restore Source Text
Verify and Encrypt Source Text
Replacing Object Definitions
Compliance to ANSI Standards
Federal Information Processing Standards (FIPS) Flagger
Chained Transactions and Isolation Levels
Identifier Compliance to ANSI Standards
SQL Standard-Style Comments
Right Truncation of Character Strings
Permissions Required for update and delete Statements
Arithmetic Errors
Synonymous Keywords
Treatment of Nulls
Data and Language Characters
Naming Convention Identifiers
Multibyte Character Sets
Delimited Identifiers
Uniqueness and Qualification Conventions
Remote Servers
Expressions in SAP ASE
Arithmetic Operators
Bitwise Operators
The String Concatenation Operator
The Comparison Operators
Nonstandard Operators
Character Expression Comparisons
Empty Strings
Quotation Marks
Relational and Logical Expressions
Transact-SQL Extensions
compute Clause
Control-of-Flow Language
Stored Procedures
Extended Stored Procedures
Triggers
Defaults and Rules
Error Handling and set Options
Additional SAP ASE Extensions to SQL
SAP ASE Login Accounts
isql Utility
Default Databases
Network-Based Security Services with isql
Displaying SQL Text
Databases and Tables
Databases
Create a User Database
The on Clause
The log on Clause
for load Option
Choose a Database
Permissions Within Databases
Initialize Databases Asynchronously
Determine If There is Space to be Initialized
Restrictions for Initializing Databases Asynchronously
Drop Databases
Change the Database Size
Enforce Data Integrity in Databases
quiesce database Command
Tables
Designing and Creating a Table
Table Names
Create the User-Defined Datatypes
Choose Columns That Accept Null Values
Sample Table Design Sketch
Define the Sample Table
Create Tables in Different Databases
Create New Tables from Query Results: select into
Check for Errors
Temporary Tables Usage
Unique Temporary Table Names
Manipulate Temporary Tables in Stored Procedures
General Rules for Temporary Tables
Deferred Table Creation
Deferred Table Creation at the Database Level
Create Deferred Tables
Explicitly Materialize Deferred Tables
Identify Deferred Tables
Roll Back for Deferred Tables
Command Behavior in Deferred Tables
IDENTITY Columns Usage
Create IDENTITY Columns with User-Defined Datatypes
Reference IDENTITY Columns
Refer to IDENTITY Columns with syb_identity
Automatically Create āhiddenā IDENTITY Columns
Using select into with IDENTITY Columns
Select an IDENTITY Column into a New Table
Select the IDENTITY Column More Than Once
Add a New IDENTITY Column with select into
Define a Column for Which the Value Must Be Computed
IDENTITY Columns Selected into Tables with Unions or Joins
Allow Null Values in a Column
Constraints and Rules Used with Null Values
Defaults and Null Values
Nulls Require Variable-Length Datatypes
text, unitext, and image Columns
Alter Existing Tables
Objects Using select * Do Not List Changes to Table
Use alter table on Remote Tables
Add Columns
Add Columns Appends Column IDs
Add NOT NULL Columns
Add Constraints
Drop Columns
Drop Columns Renumbers the Column ID
Drop Columns Without Performing a Data Copy
Restrictions for no datacopy Parameter
Drop Constraints
Modify Columns
Convert Datatypes
Modifying Tables and Using Bulk Copy
Decreased Column Length May Truncate Data
Modify datetime Columns
Modify the NULL Default Value of a Column
Check Columns That Have Precision or Scale
Modify text, unitext, and image Columns
Add IDENTITY Columns
Drop IDENTITY Columns
Modify IDENTITY Columns
Data Copying
Change exp_row_size
Modifying Locking Schemes and Table Schema
Add, Drop, or Modify Columns with User-Defined Datatypes
Errors and Warnings from alter table
Errors and Warnings Generated by alter table modify
Scripts Generated by if exists()...alter table
Rename Tables and Other Objects
Rename Dependent Objects
Drop Tables
Manage Identity Gaps in Tables
Parameters for Controlling Identity Gaps
Comparison of identity burning set factor and identity_gap
Set the Table-Specific Identity Gap
Change the Table-Specific Identity Gap
Display Table-Specific Identity Gap Information
Gaps from Other Causes
IDENTITY Column Maximum Value
Define Integrity Constraints for Tables
Table and Column Level Constraints
Create Error Messages for Constraints
Check Constraints
Default Column Values
unique and primary key Constraints
Referential Integrity Constraints
Table and Column Level Referential Integrity Constraints
Using Create Schema for Cross-Referencing Constraints
General Rules for Creating Referential Integrity Constraints
Designing Applications That Use Referential Integrity
Computed Columns
Computed Columns Usage
Computed Columns Example
Indexes on Computed Columns
Deterministic Property
Effects of Deterministic Property on Computed Columns
Effects of Deterministic Property on Materialized Computed Columns
Effects of Deterministic Property on Virtual Computed Columns
Effects of Deterministic Property on Function-Based Indexes
Examples of Nondeterministic Computed Columns
Retrieve Information About Databases and Tables
Help on Databases
Help on Database Objects
sp_help Usage on Database Objects
Use sp_helpconstraint to Find Table Constraint Information
Determining Much Space a Table Uses
List Tables, Columns, and Datatypes
Find an Object Name and ID
SQL-Derived Tables
SQL-Derived Tables and Optimization
SQL-Derived Table Syntax
Derived Column Lists
Correlated SQL-Derived Tables Are Not Supported
SQL-Derived Tables Usage
Nesting
Subqueries Using SQL-Derived Tables
Unions in Derived-Table Expressions
Unions in Subqueries
Rename Columns with SQL-Derived Tables
Constant Expressions
Aggregate Functions
Joins with SQL-Derived Tables
Create a Table From a SQL-Derived Table
Views with SQL-Derived Tables
Correlated Attributes
Partition Tables and Indexes
Partitioning Types
Range Partitioning
Hash Partitioning
List Partitioning
Round-Robin Partitioning
Partition Pruning
Composite Partitioning Keys
Indexes and Partitions
Global Indexes
Local Indexes
Guarantee a Unique Index
Create and Manage Partitions
Partitioning Tasks
Create a Range-Partitioned Table
Restrictions on Partition Keys and Bound Values for Range-Partitioned Tables
Create a Hash-Partitioned Table
Create a List-Partitioned Table
Create a Round-RobināPartitioned Table
Create Partitioned Indexes
Create a Partitioned Table From an Existing Table
Change Data Partitions
Split, Merge, and Move Partitions
Partition Schemes Available for Splitting or Merging
Split Partitions
Merge Partitions
Move Partitions
Effect of Split or Merged Partitions on Indexes
Add Partitions to a Partitioned Table
Change the Partitioning Type or Key
Unpartition Round-RobināPartitioned Tables
partition Parameter Usage
Change Partition-Key Columns
Configure Partitions
update, delete, and insert in Partitioned Tables
Update Values in Partition-Key Columns
Display Information About Partitions
Function Usage
Truncate a Partition
Using Partitions to Load Table Data
Update Partition Statistics
Improved Concurrency for Partition-Level Online Operations
Partition-Level Online Operation Syntax
Concurrency with Partition-Level Online Operations
Partition-Level Online Operations with Global Index
Virtually Hashed Tables
Structure of a Virtually Hashed Table
Create a Virtually Hashed Table
Limitations for Virtually Hashed Tables
Commands that Support Virtually Hashed Tables
Query Processor Support
Monitor Counter Support
System Procedure Support
Create Indexes on Tables
Guidelines for Using Indexes
Methods of Creating Indexes
Create Indexes
Issue create index in Parallel
Configuring enhanced parallel create index
Enhanced Parallel create index Usage
View Parallel create index Commands with showplan
Function-Based Indexes
Create Indexes Without Blocking Access to Data
Unique Indexes
IDENTITY Columns in Nonunique Indexes
Ascending and Descending Index-Column Values
Using fillfactor, max_rows_per_page, and reservepagegap
Indexes on Computed Columns
Clustered or Nonclustered Index Usage
Create Clustered Indexes on Segments
Index Options
ignore_dup_key Option
ignore_dup_row and allow_dup_row
sorted_data Option
on segment_name Option
Drop Indexes
Identifying the Indexes on a Table
Update Statistics for Indexes
Datatypes
System-Supplied Datatypes
Exact Numeric Types: Integers
Exact Numeric Types: Decimal Numbers
Approximate Numeric Datatypes
Money Datatypes
Date and Time Datatypes
Character Datatypes
unichar Datatype
Relational Expressions
Join Operators
Union Operators
Clauses and Modifiers
text Datatype
unitext Datatype
Binary Datatypes
image Datatype
bit Datatype
timestamp Datatype
sysname and longsysname Datatype
LOB Locators in Transact-SQL Statements
Implicitly Create a Locator
Explicitly Create a Locator
Convert the Locator Value to the LOB Value
Locator Scope
Convert Between Datatypes
Mixed-Mode Arithmetic and Datatype Hierarchy
Working with money Datatypes
Determine Precision and Scale
User-Defined Datatypes
Length, Precision, and Scale
Null Type
Associate Rules and Defaults with User-Defined Datatypes
Create User-Defined Datatype with IDENTITY Property
Create IDENTITY Columns from User-Defined Datatypes
Drop a User-Defined Datatype
Datatype Entry Rules
char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
Date and Time
Enter Times
Enter Dates
Date Formats
Search Dates and Times
binary, varbinary, and image
money and smallmoney
float, real, and double precision
decimal and numeric
Integer Types and Their Unsigned Counterparts
timestamp
Get Information About Datatypes
Queries: Selecting Data from a Table
select Syntax
Check for Identifiers in a select Statement
Choose Columns Using the select Clause
Choose all Columns Using select *
Choose Specific Columns
Rearrange the Column Order
Rename Columns in Query Results
Expressions
Quoted Strings in Column Headings
Character Strings in Query Results
Computed Values in the select List
Arithmetic Operator Precedence
Select Text, Unitext, and Image Values
readtext Usage
select List Summary
select for update
Use select for update in Cursors and DML
Concurrency Issues
Eliminate Duplicate Query Results with Distinct
Specify Tables with the from Clause
Select Rows Using the where Clause
Comparison Operators in where Clauses
Ranges (between and not between)
Lists (in and not in)
Matching Character Strings: like
not like Usage
Different Results Using not like and ^
Use Wildcard Characters as Literal Characters
Interaction of Wildcard Characters and Square Brackets
Use Trailing Blanks and %
Use Wildcard Characters in Columns
āUnknownā Values: NULL
SQL Standard for NULL Concatenation
Test a Column for Null Values
Difference Between False and Unknown
Substitute a Value for NULLs
Expressions that Evaluate to NULL
Concatenate Strings and NULL
System-Generated NULLs
Connect Conditions with Logical Operators
Logical Operator Precedence
Multiple select Items in a Nested exists Query
Use a Column Alias in Nested select Statements
Subqueries: Queries Within Other Queries
Subquery Restrictions
Qualify Column Names
Subqueries with Correlation Names
Multiple Levels of Nesting
Using an Asterisk in Nested select Statements
Use Table-Name Qualifiers
Use Nested Queries with group by
Usage and Examples of Asterisks in select Statements
Subqueries in update, delete, and insert Statements
Subqueries in Conditional Statements
Subqueries Instead of Expressions
Types of Subqueries
Expression Subqueries
Use Scalar Aggregate Functions to Guarantee a Single Value
Use group by and having in Expression Subqueries
Use distinct with Expression Subqueries
Quantified Predicate Subqueries
Subqueries with any and all
> all Means Greater Than All Values
= all Means Equal to Every Value
> any Means Greater Than at Least One Value
= any Means Equal to Some Value
Subqueries Used with in
Subqueries Used with not in
Subqueries Using not in with NULL
Subqueries Used with exists
Subqueries Used with not exists
Find Intersection and Difference with exists
Subqueries Using SQL Derived Tables
Correlated Subqueries
Correlated Subqueries with Correlation Names
Correlated Subqueries with Comparison Operators
Correlated Subqueries in a having Clause
Aggregates, Grouping, and Sorting
Aggregate Functions and Datatypes
count versus count (*)
Aggregate Functions with distinct
Null Values and the Aggregate Functions
Using Statistical Aggregates
Organize Query Results into Groups: the group by Clause
group by and SQL Standards
Nest Groups with group by
Reference Other Columns in Queries Using group by
Expressions and group by
group by in Nested Aggregates
Null Values and group by
where Clause and group by
group by and all
Aggregates Without group by
Select Groups of Data: the having Clause
Interactions between having, group by, and where Clauses
having Without group by
Sort Query Results: the order by Clause
order by and group by
order by and group by Used with select distinct
Summarize Groups of Data: the compute Clause
Row Aggregates and compute
Rules for compute Clauses
Specify More Than One Column After compute
Use More Than One compute Clause
Apply an Aggregate to More Than One Column
Use Different Aggregates in the Aame compute Clause
Generate Totals: compute Without by
Combine Queries: the union Operator
Guidelines for union Queries
Joins: Retrieve Data from Several Tables
Join Syntax
Joins and the Relational Model
How Joins are Structured
The from Clause
The where Clause
Join Operators
Datatypes in Join Columns
Joins and Text and Image Columns
How Joins are Processed
Equijoins and Natural Joins
Joins with Additional Conditions
Joins Not Based on Equality
Self-Joins and Correlation Names
The Not-Equal Join
Not-Equal Joins and Subqueries
Join More Than Two Tables
Star Joins
Outer Joins
Inner and Outer Tables
Outer Join Restrictions
Views Used with Outer Joins
ANSI Inner and Outer Joins
Correlation Name and Column Referencing Rules for ANSI Joins
ANSI Inner Joins
The Join Table of an Inner Join
The on Clause of an ANSI Inner Join
ANSI outer joins
Placement of the Predicate in the on or where Clause
Nested ANSI Outer Joins
Transact-SQL Outer Joins
Outer Joins and Aggregate Extended Columns
Relocated Joins
Configuring Relocated Joins
How Null Values Affect Joins
Determine Which Table Columns to Join
Managing Data
Referential Integrity
Transactions
Sample Databases
Add New Data
Add New Rows with Values
Insert Data into Specific Columns
Restrict Column Data: Rules
The NULL Character String
Insert NULLs into Columns That Do Not Allow Them
Add Rows Without Values in All Columns
Change a Columnās Value to NULL
SAP ASE-generated values for IDENTITY columns
Explicitly Insert Data into an IDENTITY Column
Retrieve IDENTITY Column Values with @@identity
Reserve a Block of IDENTITY Column Values
Maximum Value of the IDENTITY Column
Modify the Maximum Value of the IDENTITY Column
Creating a New Table with a Larger Precision
Renumbering the Table IDENTITY Columns with bcp
Add New Rows with select
Use Computed Columns
Insert Data into Some Columns
Insert Data from the Same Table
Create Nonmaterialized, Non-Null Columns
Add Nonmaterialized Columns
Tables That Already Have Nonmaterialized Columns
Nonmaterialized Column Storage
Alter Nonmaterialized Columns
Limitations for Nonmaterialized Columns
Change Existing Data
Use the set Clause with Update
Assign Variables in the set Clause
Use the where Clause with update
Use the from Clause with update
Perform updates with joins
Update IDENTITY Columns
Change text, unitext, and image data
Truncate Trailing Zeros
Transfer Data Incrementally
Mark Tables for Incremental Transfer
Transfer Tables from a Destination File
Convert SAP ASE Datatypes to SAP IQ
Store Transfer Information
Exceptions and Errors
Sample Incremental Transfer
Replacing Data with New Rows
Delete Data
Use the from Clause with delete
Delete from IDENTITY Columns
Delete All Rows from a Table
truncate table Syntax
Views: Limit Access to Data
Advantages of Views
Security
Logical Data Independence
Create Views
create view Syntax
select Statement Usage with create view
View Definition with Projection
View Definition with a Computed Column
View Definition with an Aggregate or Built-In Function
View Definition with a Join
Views Used with Outer Joins
Views Derived From Other Views
Distinct Views
Views That Include IDENTITY Columns
Validate a Viewās Selection Criteria
Views Derived from Other Views
Retrieve Data Through Views
View Resolution
Redefine Views
Rename Views
Alter or Drop Underlying Objects
Modify Data Through Views
Restrictions on Updating Views
Drop Views
Use Views as Security Mechanisms
Get Information About Views
Defining Defaults and Rules for Data
Create Defaults
Bind Defaults
Unbind Defaults
How Defaults Affect NULL Values
Drop Defaults
Create Rules
Bind Rules
Rules Bound to Columns
Rules Bound to User-Defined Datatypes
Precedence of Rules
Rules and NULL Values
Unbind Rules
Drop Rules
Retrieve Information About Defaults and Rules
Share Inline Defaults
Create an Inline Shared Default
Unbind a Shared Inline Default
Limitations for Shared Inline Defaults
Precomputed Result Sets
Benefits of Precomputed Result Sets
Configuring SAP ASE for Precomputed Result Sets
Creating Precomputed Result Sets
Identifying Precomputed Result Sets
Refreshing Precomputed Result Sets
Altering Precomputed Result Sets
Dropping or Truncating Precomputed Result Sets
Configuring Staleness
Querying Precomputed Result Sets
Rewriting Queries
Replicating Precomputed Result Sets
Restrictions for Precomputed Result Sets
Batches and Control-of-Flow Language
Rules Associated with Batches
Examples of Using Batches
Batches Submitted as Files
Control-of-Flow Language Usage
if...else
case Expression
case Expression for Alternative Representation
case and Division by Zero
rand Functions in case Expressions
case Expression Results
case Expressions and set ansinull
case Expression Requires at Least one Non-Null Result
Determining the Result Set
case and Value Comparisons
coalesce
nullif
begin...end
while and break...continue
declare and Local Variables
goto
return
print
raiserror
Create Messages for print and raiserror
waitfor
Comments
Slash-Asterisk Style Comments
Double-Hyphen Style Comments
Local Variables
Local Variables and select Statements
Local Variables and update Statements
Local Variables and Subqueries
Local Variables and while Loops and ifā¦else Blocks
Variables and Null Values
Global Variables
Transactions and Global Variables
Check for Errors with @@error
Check IDENTITY Values with @@identity
Check the Transaction Nesting Level with @@trancount
Check the Transaction State with @@transtate
Check the Nesting Level with @@nestlevel
Check the Status From the Last Fetch
Transact-SQL Functions
Built-In Functions
System Functions
String Functions
Concatenating Expressions
Concatenation Operators and LOB Locators
Nest String Functions
Limits on String Functions
Text and Image Functions
readtext on unitext Columns Usage
Aggregate Functions
Aggregate Functions Used with the group by Clause
Aggregate Functions and Null Values
Vector and Scalar Aggregates
Aggregate Functions as Row Aggregates
Statistical Aggregate Functions
Formulas for Computing Standard Deviations
Mathematical Functions
Date Functions
Datatype Conversion Functions
convert Function Usage for Explicit Conversions
Datatype Conversion Guidelines and Constraints
Convert Character Data to a Noncharacter Type
Convert from One Character Type to Another
Convert Numbers to a Character Type
Convert to or from unitext
Rounding During Conversion To and From Money Types
Convert Date and Time Information
Convert Between Numeric Types
Convert Between Binary and Integer Types
Convert Between Binary and Numeric or Decimal Types
Convert Image Columns to Binary Types
Convert Other Types to bit
Convert Hexadecimal Data
Convert bigtime and bigdatetime Data
Convert NULL Value
Change the Date Format
Conversion Error Handling
Security Functions
XML Functions
User-Created Functions
Stored Procedures
Examples
Permissions
Performance
Create and Execute Stored Procedures
Deferred Name Resolution Usage
Parameters
Default Parameters
Default Parameters Usage
NULL as the Default Parameter
Wildcard Characters in the Default Parameter
Using Multiple Parameters
LOB Datatypes in Stored Procedures
Procedure Groups
with recompile in create procedure
with recompile in execute
Nesting Procedures
Temporary Tables in Stored Procedures
Set Options in Stored Procedures
Query Optimization Settings
Maximum Number of Arguments
Maximum Size for Expressions, Variables, and Arguments
Execution of Stored Procedures
Execute Procedures After a Time Delay
Execute Procedures Remotely
Execute a Procedure with execute as owner or execute as caller
Example with execute as Omitted
Example of Procedure with execute as
Deferred Compilation in Stored Procedures
Information Returned From Stored Procedures
Return Status
Reserved Return Status Values
User-Generated Return Values
Check Roles in Procedures
Return Parameters
Pass Values in Parameters
The Output Keyword
Restrictions Associated with Stored Procedures
Qualify Names Inside Procedures
Rename Stored Procedures
Rename Objects Referenced by Procedures
Stored Procedures as Security Mechanisms
Dropping Stored Procedures
System Procedures
Execute System Procedures
Permissions on System Procedures
Types of System Procedures
Other SAP ASE-Supplied Stored Procedures
Get Information About Stored Procedures
Get a Report with sp_help
View the Source Text of a Procedure with sp_helptext
Identify Dependent Objects with sp_depends
Use sp_depends with deferred_name_resolution
Identify Permissions with sp_helprotect
Extended Stored Procedures Usage
XP Server
CIS RPC Mechanism
sybesp_dll_version
Dynamic Link Library Support
Open Server API
ESPs and Permissions
ESPs and Performance
Create Functions for ESPs
Files for ESP Development
Open Server Data Structures
Open Server Return Codes
Outline of a Simple ESP Function
ESP Function Example
Building the DLL
Registering ESPs
create procedure Usage
sp_addextendedproc Usage
Remove ESPs
Renaming ESPs
Execute ESPs
System ESPs
Get Information About ESPs
ESP Exceptions and Messages
Cursors: Accessing Data
Types of Cursors
Cursor Scope
Cursor Scans and the Cursor Result Set
Make Cursors Updatable
Determine Which Columns Can Be Updated
How SAP ASE Processes Cursors
Monitor Cursor Statements
declare cursor
cursor_scrollability
Cursor Sensitivity
read_only Option
Open Cursors
Fetch Data Rows Using Cursors
fetch Syntax
into Clause Usage
Check Cursor Status
Get Multiple Rows With Each Fetch
Check the Number of Rows Fetched
Update and Delete Rows Using Cursors
Update Cursor Result Set Rows
Delete Cursor Result Set Rows
Close and Deallocate Cursors
Cursor Examples
Cursors in Stored Procedures
Cursors and Locking
Cursor-Locking Options
Transaction Support for Updatable Cursors
Get Information About Cursors
Browse Mode Versus Cursors
Triggers: Enforce Referential Integrity
Use Triggers Versus Integrity Constraints
Create Triggers
create trigger Syntax
Use Triggers to Maintain Referential Integrity
Test Data Modifications Against the Trigger Test Tables
Insert Trigger Example
Delete Trigger Examples
Update Trigger Examples
Multirow Considerations
Insert Trigger Example Using Multiple Rows
Delete Trigger Example Using Multiple Rows
Update Trigger Example Using Multiple Rows
Conditional Insert Trigger Example Using Multiple Rows
Roll Back Triggers
Global Login Triggers
Nesting Triggers
Trigger Self-Recursion
Rules Associated with Triggers
Triggers and Permissions
Trigger Restrictions
Implicit and Explicit Null Values
Triggers and Performance
set Commands in Triggers
Renaming and triggers
Disable Triggers
Drop Triggers
Multiple Triggers
Changing the Order of When a Trigger Is Fired
Order of Triggers in Merge Statements
Transactional Behavior with Multiple Triggers
Disabling and Reenabling Triggers
Get Information About Triggers
sp_help
sp_helptext
sp_depends
instead of Triggers
Inserted and Deleted Logical Tables
Triggers and Transactions
Nesting
Recursion
instead of insert Triggers
instead of update Trigger
instead of delete Trigger
Searched and Positioned update and delete
Get Information About instead of Triggers
In-Row Off-Row LOB
In-Row LOB Columns Compression
Migrate Off-Row LOB Data to In-Row Storage
In-Row LOB Columns and Bulk Copy
Methods for Migrating Existing Data
Set Up the mymsgs Example Table
Migrate Using Update Statement
Use reorg rebuild
Migrate Using alter table with Data Copy
Guidelines for Selecting the In-Row LOB Length
Identifying In-Row LOB Length Selection
Downgrading Tables Containing In-Row LOB Columns
Transactions: Maintain Data Consistency and Recovery
Transactions and Consistency
Transactions and Recovery
Transaction Usage
Allow Data Definition Commands in Transactions
System Procedures That Are Not Allowed in Transactions
Begin and Commit Transactions
Roll Back and Save Transactions
Transaction States
Nested Transactions
Example of a Transaction
Transaction Mode and Isolation Level
Choose a Transaction Mode
Transaction Modes and Nested Transactions
Find the Status of the Current Transaction Mode
Choose an Isolation Level
Default Isolation Levels for SAP ASE and ANSI SQL
Dirty Reads
Repeatable Reads
Find the Status of the Current Isolation Level
Change the Isolation Level for a Query
Isolation Level Precedences
Cursors and Isolation Levels
Stored Procedures and Isolation Levels
Triggers and Isolation Levels
Compliance with SQL Standards
Use the Lock Table Command to Improve Performance
Transactions in Stored Procedures and Triggers
Errors and Transaction Rollbacks
Transaction Modes and Stored Procedures
Run System Procedures in Chained Mode
Set Transaction Modes for Stored Procedures
Use Cursors in Transactions
Issues to Consider When Using Transactions
Backup and Recovery of Transactions
Locking Commands and Options
wait/nowait Option of the Lock Table Command
Session-Level Lock-Wait Limit
Server-Wide Lock-Wait Limit
Information on the Number of Lock-Wait Timeouts
Readpast Locking for Queue Processing
Incompatible Locks During readpast Queries
Allpages-Locked Tables and readpast Queries
Effects of Isolation Levels Select Queries with readpast
Data Modification Commands with readpast and Isolation Levels
text, unitext, and image columns and readpast
The pubs2 Database
Tables in the pubs2 Database
publishers Table
authors Table
titles Table
titleauthor Table
salesdetail Table
sales Table
stores Table
roysched Table
discounts Table
blurbs Table
au_pix Table
Diagram of the pubs2 Database
The pubs3 Database
Tables in the pubs3 Database
publishers Table
authors Table
titles Table
titleauthor Table
salesdetail Table
sales Table
stores Table
store_employees Table
roysched Table
discounts Table
blurbs Table
Diagram of the pubs3 Database
System Administration Guide 16.0: Volume 1
Overview of System Administration
Roles Required for System Administration Tasks
Database Owner
Database Object Owner
Performing System Administration Tasks
System Tables
Querying the System Tables
Keys in System Tables
Updating System Tables
System Procedures
Using System Procedures
System Procedure Tables
Creating Stored Procedures
System Extended Stored Procedures
Creating System ESPs
Logging Error Messages
Connecting to SAP ASE
The interfaces File
Directory Services
LDAP as a Directory Service
Multiple Directory Services
LDAP Directory Services Versus the SAP Interfaces File
LDAP Performance
Security Features Available in SAP ASE
System and Optional Databases
Overview of System Databases
The master Database
Controlling Object Creation in the master Database
Backing Up Master and Keeping Copies of System Tables
model Database
sybsystemprocs Database
tempdb database
Creating Temporary Tables
sybsecurity Database
sybsystemdb Database
sybmgmtdb Database
pubs2 and pubs3 Sample Databases
Maintaining the Sample Databases
pubs2 Image Data
dbccdb Database
sybdiag Database
Determining the Version of the Installation Scripts
System Administration for Beginners
Logical Page Sizes
Using āTestā Servers
Planning Resources
Achieving Performance Goals
Considerations When Installing SAP Products
Allocating Physical Resources
Dedicated Versus Shared Servers
Decision-Support and OLTP Applications
Advance Resource Planning
Operating System Configuration
Backup and Recovery
Keep Up-To-Date Backups of the master Database
Keep Offline Copies of System Tables
Automating Backup Procedures
Verify Data Consistency Before Backing Up a Database
Monitor the Log Size
Ongoing Maintenance and Troubleshooting
Starting and Stopping SAP ASE
Viewing and Pruning the Error Log
Keeping Records
Contact Information
Configuration Information
Maintenance Schedules
System Information
Disaster Recovery Plan
Additional Resources
Managing and Monitoring SAP ASE
SAP Control Center for SAP ASE
Configuration History Tracking
Configuring SAP ASE to Track Configuration Changes
Changes Captured
Querying ch_events
Setting Configuration Parameters
Modifying Configuration Parameters
Required Roles for Modifying Configuration Parameters
Unit Specification Using sp_configure
Global Versus Session Settings
Getting Help Information on Configuration Parameters
Using sp_configure
sp_configure Syntax Elements
Issue sp_configure with the Configuration File
Configuration File Naming Recommendations
Read or Write the Configuration File with sp_configure
Edit the Configuration File
Permissions for Configuration Files
Backing Up Configuration Files
Verify the Name of the Configuration File Currently in Use
Start SAP ASE Using a Configuration File
Configuration File Errors
The Parameter Hierarchy
User-Defined Subsets of the Parameter Hierarchy: Display Levels
The Effect of the Display Level on sp_configure Output
Performance Tuning with sp_configure and sp_sysmon
Using Configuration Parameters in a Clustered Environment
sp_configure Output
sysconfigures and syscurconfigs Tables
Example syscurconfigs and sysconfigures Query
Named Cache Configuration Parameter Group
Dump Configuration Parameter Group
Configuration Parameters
Alphabetical Listing of Configuration Parameters
abstract plan cache
abstract plan dump
abstract plan load
abstract plan replace
abstract plan sharing
additional network memory
aggresive task stealing
allocate max shared memory
allow backward scans
allow nested triggers
allow procedure grouping
allow remote access
allow resource limits
allow sendmsg
allow sql server async i/o
allow updates to system tables
average cap size
audit queue size
auditing
automatic cluster takeover
builtin date strings
caps per ccb
capture compression statistics
capture missing statistics
check password for digit
CIPC large message pool size
CIPC regular message pool size
cis bulk insert array size
cis bulk insert batch size
cis connect timeout
cis cursor rows
cis idle connection timeout
cis packet size
cis rpc handling
cluster heartbeat interval
cluster heartbeat retries
cluster redundancy level
cluster vote timeout
column default cache size
compression info pool size
compression memory size
configuration file
cost of a logical io
cost of a physical io
cost of a cpu unit
cpu accounting flush interval
cpu grace time
current audit table
deadlock checking period
deadlock pipe active
deadlock pipe max messages
deadlock retries
default character set id
default database size
default exp_row_size percent
default fill factor percent
default language id
default network packet size
Requesting a Larger Packet Size at Login
default sortorder id
default unicode sortorder
default XML sortorder
deferred name resolution
disable character set conversions
disable disk mirroring
disable jsagent core dump
disable varbinary truncation
disk i/o structures
DMA object pool size
dtm detach timeout period
dtm lock timeout period
dump history filename
dump on conditions
dynamic allocation on demand
dynamic SQL plan pinning
early row send increment
enable async database init
enable backupserver HA
enable cis
enable compression
enable concurrent dump tran
enable console logging
enable DTM
enforce dump configuration
enable dump history
enable encrypted columns
enable enterprise java beans
enable file access
enable full-text search
enable functionality group
enable inline default sharing
enable HA
enable housekeeper GC
enable hp posix async i/o
enable HugePages
enable i/o fencing
enable ISM
enable java
enable job scheduler
enable js restart logging
enable large chunk elc
enable large pool for load
enable ldap user auth
enable literal autoparam
engine local cache percent
enable logins during recovery
enable merge join
enable metrics capture
enable monitoring
enable pam user auth
enable pci
enable permissive unicode
enable plan sharing
enable predicated privileges
enable query tuning mem limit
enable query tuning time limit
enable rapidlog
enable real time messaging
enable rep agent threads
enable row level access control
enable semantic partitioning
enable sort-merge join and JTC
enable sql debugger
enable ssl
enable stmt cache monitoring
enable surrogate processing
enable unicode conversion
enable unicode normalization
enable utility lvl 0 scan wait
enable webservices
enable xact coordination
enable xml
engine memory log size
errorlog pipe active
errorlog pipe max messages
esp execution priority
esp execution stacksize
esp unload dll
event buffers per engine
event log computer name (Windows only)
event logging
executable codesize + overhead
extended cache size
FIPS login password encryption
global async prefetch limit
global cache partition number
heap memory per user
histogram tuning factor
housekeeper free write percent
i/o accounting flush interval
i/o batch size
i/o polling process count
identity burning set factor
identity grab size
identity reservation size
idle migration timeout
job scheduler interval
job scheduler tasks
js heartbeat interval
js job output width
kernel mode
kernel resource memory
large allocation auto tune
license information
lock address spinlock ratio
lock hashtable size
lock scheme
lock shared memory
lock spinlock ratio
lock table spinlock ratio
lock timeout pipe active
lock timeout pipe max messages
lock wait period
log audit logon failure
log audit logon success
max async i/os per engine
On the Linux Platform
max async i/os per server
max buffers per lava operator
Differences Between number of sort buffers and max data buffers per lava sort
max cis remote connections
max concurrently recovered db
max js restart attempts
max memory
If SAP ASE Cannot Start
max native threads per engine
max nesting level
max network packet size
Choosing Packet Sizes
max network peek depth
max number network listeners
max online engines
max online Q engines
max parallel degree
max pci slots
max query parallel degree
max repartition degree
max resource granularity
max scan parallel degree
max SQL text monitored
max transfer history
max utility parallel degree
maximum dump conditions
maximum failed logins
maximum job output
memory alignment boundary
memory dump compression level
memory per worker process
messaging memory
metrics elap max
metrics exec max
metrics lio max
metrics pio max
min pages for parallel scan
minimum password length
mnc_full_index_filter
msg confidentiality reqd
msg integrity reqd
net password encryption reqd
network polling mode
In-Line Network Polling
number of alarms
number of aux scan descriptors
Monitoring and Estimating Scan Descriptor Usage
number of backup connections
number of ccbs
number of checkpoint tasks
number of devices
Setting the number of devices on UNIX
number of disk tasks
number of dtx participants
Optimizing the Number of DTX Participants for Your System
number of dump threads
number of early send rows
number of engines at startup
number of histogram steps
number of index trips
number of java sockets
number of large i/o buffers
number of locks
number of mailboxes
number of messages
number of network tasks
number of oam trips
number of open databases
Optimizing the number of open databases
number of open indexes
Optimizing number of open indexes
number of open objects
Optimizing number of open objects
number of open partitions
number of pre-allocated extents
Using a Value of 32 for the number of pre-allocated extents
number of Q engines at startup
number of remote connections
number of remote logins
number of remote sites
number of sort buffers
number of user connections
number of worker processes
o/s file descriptors
object lockwait timing
open index hash spinlock ratio
open index spinlock ratio
open object spinlock ratio
optimization goal
optimize temp table resolution
optimization timeout limit
optimizer level
page lock promotion HWM
page lock promotion LWM
page lock promotion PCT
page utilization percent
partition groups
partition spinlock ratio
pci memory size
per object statistics active
percent database for history
percent database for output
percent history free
percent output free
performance monitoring option
permission cache entries
plan text pipe active
plan text pipe max messages
print deadlock information
print recovery information
procedure cache size
procedure deferred compilation
process wait events
prod-consumer overlap factor
quorum heartbeat interval
quorum heartbeat retries
quoted identifier enhancements
rapidlog buffer size
rapidlog max files
read committed with lock
recovery interval in minutes
recovery prefetch size
remote server pre-read packets
restricted decrypt permission
row lock promotion HWM
row lock promotion LWM
row lock promotion PCT
rtm thread idle wait period
runnable process search count
runnable process search count versus idle timeout
sampling percent
secure default login
select for update
select on syscomments.text
send doneinproc tokens
session migration timeout
session tempdb log cache size
shared memory starting address
size of auto identity column
size of global fixed heap
size of process object heap
size of shared class heap
size of unilib cache
solaris async i/o mode
sproc optimize timeout limit
SQL batch capture
SQL Perfmon Integration
sql server clock tick length
sql text pipe active
sql text pipe max messages
stack guard size
stack size
start mail session
start xp server during boot
startup delay
statement cache size
statement pipe active
statement pipe max messages
statement statistics active
streamlined dynamic SQL
strict dtm enforcement
suppress js max task message
suspend audit when device full
syb_sendmsg port number
sysstatistics flush interval
systemwide password expiration
tape retention in days
tcp no delay
text prefetch size
threshold event max messages
threshold event monitoring
time slice
total data cache size
total logical memory
total physical memory
transfer utility memory size
txn to pss ratio
Optimizing the txn to pss ratio for your system
unified login required
update statistics hashing
upgrade version
use security services
user log cache queue size
user log cache size
user log cache spinlock ratio
utility statistics hashing
wait event timing
wait on uncommitted insert
workload manager cache size
xact coordination interval
xp_cmdshell context
Disk Resource Issues
Device Allocation and Object Placement
Commands for Managing Disk Resources
Considerations in Storage Management Decisions
Recovery
Performance
Status and Defaults at Installation
System Tables That Manage Storage
The sysdevices Table
The sysusages Table
The syssegments Table
The sysindexes Table
The syspartitions Table
Managing Remote Servers
Adding Remote Logins
Map Usersā Server IDs
Map Remote Logins to Particular Local Names
Map All Remote Logins to One Local Name
Keeping Remote Login Names for Local Servers
Example of Remote User Login Mapping
Password Checking for Remote Users
Effects of Using the Untrusted Mode
Getting Information About Remote Logins
Configuration Parameters for Remote Logins
Initializing Database Devices
Using the disk init command
Getting Information about Devices
Dropping devices
Designating Default Devices
Choosing Default and Nondefault Devices
Increasing the Size of Devices with disk resize
Insufficient Disk Space
Setting Database Options
Database Option Descriptions
Viewing the Options on a Database
Displaying Currently Set Switches with sysoptions
Configuring Character Sets, Sort Orders, and Languages
Advantages of Internationalized Systems
A Sample Internationalized System
Elements of an Internationalized System
Selecting the Character Set for Your Server
Unicode
Configuration Parameters
Functions
Using unichar Columns
Using unitext
Open Client Interoperability
Java Interoperability
Selecting the Server Default Character Set
Selecting the Sort Order
Different Types of Sort Orders
Selecting the Default Sort Order
Chinese Pinyin Sort Order
Selecting Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Selecting the Default Unicode Sort Order
Select a Language for System Messages
A Spanish-Version Server
A US-based company in Japan
A Japan-Based Company with Multinational Clients
Changing the character set, sort order, or message language
Changing the default character set
Changing the sort order with a resources file
Change the Default Sort Order
Reconfiguring the Character Set, Sort Order, or Message Language
Example: Converting a Unicode Database to UTF-8
Migrating Selected Columns to unichar
Migrating to or from unitext
Before Changing the Character Set or Sort Order
Set the Userās Default Language
Manage Suspect Partitions
Installing Date Strings for Unsupported Languages
Server Versus Client Date Interpretation
Internationalization and localization files
Character sets directory structure
Types of localization files
Software Messages Directory Structure
Global variables for Languages and Character Sets
Configuring Client/Server Character Set Conversions
Supported Character Set Conversions
Conversion for Native Character Sets
Conversion in a Unicode System
SAP ASE Direct Conversions
Unicode Conversions
Allowing Unicode noncharacters
Choosing a Conversion Type
Enabling and Disabling Character Set Conversion
Characters That Cannot Be Converted
Error handling in character set conversion
Conversions and Changes to Data Lengths
Specify the Character Set for Utility Programs
Display and file character set command line options
Diagnosing System Problems
How SAP ASE Uses Error Messages
Error Log Format
Error Messages and Message Numbers
Variables in Error Message Text
SAP ASE error logging
Severity Levels
Severity Levels 10 ā 18
Level 10: Status Information
Level 11: Specified Database Object Not Found
Level 12: Wrong Datatype Encountered
Level 13: User Transaction Syntax Error
Level 14: Insufficient Permission to Execute Command
Level 15: Syntax Error in SQL Statement
Level 16: Miscellaneous User Error
Level 17: Insufficient Resources
Level 18: Nonfatal Internal Error Detected
Severity Levels 19 ā 26
Level 19: SAP ASE Fatal Error in Resource
Level 20: SAP ASE Fatal Error in Current Process
Level 21: SAP ASE Fatal Error in Database Processes
Level 22: SAP ASE Fatal Error: Table Integrity Suspect
Level 23: Fatal Error: Database Integrity Suspect
Level 24: Hardware Error or System Table Corruption
Level 25: SAP ASE Internal Error
Level 26: Rule Error
Backup Server Error Logging
Killing Processes
Using kill with statusonly
Using sp_lock to Examine Blocking Processes
Using Shared Memory Dumps
Configuring Shared Memory Dump Conditions
System-Wide Default Settings
Housekeeper functionality
Housekeeper wash
Housekeeper chores
Housekeeper Garbage Collection
Configure SAP ASE Priority Level
Configuring enable housekeeper GC
Using The reorg Command
Shutting Down Servers
Shutting Down SAP ASE
Shutting down a Backup Server
Using nowait on a Backup Server
Learning about known problems
System Administration Guide 16.0: Volume 2
Limiting Access to Server Resources
Resource Limits
Plan Resource Limits
Enable Resource Limits
Define Time Ranges
Determe the Time Ranges You Need
Modifying a Named Time Range
Dropping a Named Time Range
When Do Time Range Changes Take Effect?
Identify Users and Limits
Identifying Heavy-Usage Users
Identifying Heavy-Usage Applications
Choosing a Limit Type
Determining Time of Enforcement
Determining the Scope of Resource Limits
Understanding Limit Types
Limiting I/O Cost
Identify I/O Costs
Calculate the I/O Cost of a Cursor
Scope of the io_cost Limit Type
Limiting Elapsed Time
Scope of the elapsed_time Limit Type
Limiting the Size of the Result Set
Scope of the row_count Limit Type
Setting Limits for tempdb Space Usage
Limiting Idle Time
Creating a Resource Limit
Resource Limit Examples
Getting Information on Existing Limits
Modifying Resource Limits
Dropping Resource Limits
Resource Limit Precedence
Mirroring Database Devices
Determining Which Devices to Mirror
Mirroring Using Minimal Physical Disk Space
Mirroring for Nonstop Recovery
Conditions That Do Not Disable Mirroring
Disk Mirroring Commands
Initializing Mirrors
Unmirroring a Device
Effects on System Tables
Restarting Mirrors
waitfor mirrorexit
Mirroring the Master Device
Getting Information About Devices and Mirrors
Disk Mirroring Tutorial
Disk Resizing and Mirroring
Configuring Memory
How SAP ASE Allocates Memory
Disk Space Allocation
How SAP ASE Allocates Buffer Pools
Heap Memory
Calculating Heap Memory
Memory Management in SAP ASE
Determining the Amount of Memory SAP ASE Needs
Determine the SAP ASE Memory Configuration
If You Are Upgrading
Determining the Amount of Memory SAP ASE Can Use
Configuration Parameters That Affect Memory Allocation
Dynamically Allocating Memory
If SAP ASE Cannot Start
Dynamically Decreasing Memory Configuration Parameters
Configuring Thread Pools
Determining the Total Number of Threads
Tuning the syb_blocking_pool
System Procedures for Configuring Memory
Viewing the Configuration Parameters for Memory
Memory Available for Dynamic Growth
Using sp_helpconfig
Using sp_monitorconfig
Configuration Parameters That Control SAP ASE Memory
SAP ASE Executable Code Size
Data and Procedure Caches
Determining the Procedure Cache Size
Determining the Default Data Cache Size
Monitoring Cache Space
Modify the ELC Size
Kernel Resource Memory
User Connections
Open Databases, Open Indexes, and Open Objects
Number of Locks
Database Devices and Disk I/O Structures
Parameters That Use Memory
Parallel Processing
Remote Servers
Referential Integrity
Parameters That Affect Memory
The Statement Cache
Setting the Statement Cache
Performing Ad Hoc Query Processing
Statement Matching Criteria
Caching Conditions
Statement Cache Sizing
Monitoring the Statement Cache
Aggregating Metrics from Syntactically Similar Queries
Purging the Statement Cache
Printing Statement Summaries
Displaying the SQL Plan for Cached Statements
Configuring Data Caches
The SAP ASE Data Cache
Cache Configuration Commands and System Procedures
Viewing Information About Data Caches
Configuring Data Caches
Creating a New Cache
Insufficient Space for New Cache
Adding Memory to an Existing Named Cache
Decreasing the Size of a Cache
Deleting a Cache
Explicitly Configuring the Default Cache
Changing the Cache Type
Improving the Recovery Log Scan During load database and load tran
Configuring a Cache Replacement Policy
Dividing a Data Cache into Memory Pools
Matching Log I/O Size for Log Caches
Binding Objects to Caches
Getting Information About Cache Bindings
Checking Cache Overhead
Effects of Overhead on Total Cache Space
Dropping Cache Bindings
Changing the Wash Area for a Memory Pool
When the Wash Area Is Too Small
When the Wash Area is Too Large
Setting the Housekeeper to Avoid Washes for Cache
Changing the Asynchronous Prefetch Limit for a Pool
Changing the Size of Memory Pools
Moving Space from the Memory Pool
Moving Space from Other Memory Pools
Adding Cache Partitions to Reduce Spinlock
Dropping a Memory Pool
When Pools Cannot Be Dropped Due to Page Use
Cache Binding Effects on Memory and Query Plans
Configuring Data Caches Using the Configuration File
Cache and Pool Entries in the Configuration File
Cache Configuration Guidelines
Configuration File Errors
Managing Multiprocessor Servers
SAP ASE Kernels
Target Architecture
Kernel Modes
Switching Kernel Modes
Tasks
Using Threads to Run Tasks
Configuring an SMP Environment
Thread Pools
Dynamic Thread Assignment
Managing Engines
Configuring Engines in Process Mode
Configuring Engines in Threaded Mode
Choosing the Right Number of Engines
Starting and Stopping Engines
Monitoring Engine Status
Starting and Stopping Engines with sp_engine
Relationship Between Network Connections and Engines
Logical Process Management and dbcc engine(offline)
Managing User Connections
Configuration Parameters That Affect SMP Systems
Configuring Spinlock Ratio Parameters
Round-Robin Assignment
Sequential Assignment
Creating and Managing User Databases
Permissions for Managing User Databases
Using the create database Command
Assigning Space and Devices to Databases
Default Database Size and Devices
Estimating the Required Space
Placing a Transaction Log on a Separate Device
Estimating the Transaction Log Size
Default Log Size and Device
Moving the Transaction Log to Another Device
Shrinking Log Space
Using dump and load database When Shrinking Log Space
Shrinking a Log Before a dump and load database
Using dump and load transaction When Shrinking Log Space
Shrinking Log Space
Calculating the Transaction Log Growth Rate
Database Recovery with the for load Parameter
Using the with override Option with create database
Changing Database Ownership
Altering Databases
Using alter database
Using the drop database Command
System Tables That Manage Space Allocation
The sysusages Table
The segmap Column
The lstart, size, and vstart Columns
SAP ASE Support for Replication by Column Value
Getting Information about Database Storage
Using sp_helpdb to Find Database Device Names and Options
Checking the Amount of Space Used
Checking Space Used in a Database
Checking Summary Information for a Table
Checking Information for a Table and Its Indexes
Querying System Table for Space Usage Information
Database Mount and Unmount
Manifest File
Operations That Copy and Move Databases
Performance Considerations
Device Verification
Mounting and Unmounting Databases
Unmounting a Database
Mounting a Database
Moving Databases from One SAP ASE to Another
System Restrictions
quiesce database Extension
Distributed Transaction Management
Configuration Considerations
Behavior for Transaction Manager-Coordinated Transactions
Enhanced Transaction Manager for SAP ASE Versions 15.0.3 or Later
RPC and CIS Transactions
SYB2PC Transactions
Enabling DTM Features
Configuring Transaction Resources
Calculating the Number of Required Transaction Descriptors
Setting the Number of Transaction Descriptors
Using SAP ASE Coordination Services
Overview of Transaction Coordination Services
Hierarchical Transaction Coordination
X/Open XA-Compliant Behavior in DTP Environments
Requirements and Behavior
Ensuring Sufficient Resources for Updates
number of dtx participants Parameter
Optimizing the number of dtx participants
Using Transaction Coordination Services on Remote Servers
Set the strict dtm enforcement Parameter
Monitoring Coordinated Transactions and Participants
DTM Administration and Troubleshooting
Transactions and Threads of Control
Lock Manager Support for Detached Transactions
Getting Information About Distributed Transactions
Transaction Identification in systransactions
Transaction Keys
Viewing active transactions with sp_transactions
Identify Local, Remote, and External Transactions
Identify the Transaction Coordinator
View the Transaction Thread of Control
Understanding Transaction State Information
Limiting sp_transactions Output to Specific States
Transaction Failover Information
Determining the Commit Node and gtrid with sp_transactions
Commit and Parent Nodes
Global Transaction ID
Executing External Transactions
Crash Recovery Procedures for Distributed Transactions
Transactions Coordinated with MSDTC During Crash Recovery
Transactions Coordinated by SAP ASE or X/Open XA During Crash Recovery
Transactions Coordinated with SYB2PC During Crash Recovery
Heuristically Completing Transactions
Completing Prepared Transactions
Maintaining a Transaction's Commit Status
Manually Clearing the Commit Status
Completing Transactions That Are Not Prepared
Determining the Commit Status for SAP ASE Transactions
Troubleshooting for Transactions Coordinated by External Transaction Managers
SAP ASE Implicit Rollback in External Transactions
Support for OData
OData Server Architecture
OData Server Limitations
Unsupported OData Protocol Features
Security Considerations for OData Server
Configuring OData Server
Setting Up an HTTP Server for OData
Create an OData Producer Service Model
OData Server Sample Files
Starting and Stopping OData Server
Creating and Using Segments
System-Defined Segments
Segment Usage in SAP ASE
Controlling Space Usage
Use Segments to Allocate Database Objects
Separating Tables, Indexes, and Logs
Splitting Tables
Moving a Table to Another Device
Creating Segments
Changing the Scope of Segments
Extending the Scope of Segments
Automatically Extending the Scope of a Segment
Reducing the Scope of a Segment
Assigning Database Objects to Segments
Creating New Objects on Segments
Placing Existing Objects on Segments
Placing Text Pages on a Separate Device
Creating Clustered Indexes on Segments
Dropping Segments
Getting Information About Segments
sp_helpsegment
sp_helpdb
sp_help and sp_helpindex
Segments and System Tables
A Segment Tutorial
Using the reorg Command
reorg Command and Its Parameters
Running reorg rebuild Concurrently
Using the optdiag Utility to Assess the Need for a reorg
Moving Forwarded Rows to Home Pages
Use reorg compact to Remove Row Forwarding
Reclaiming Unused Space from Deletions and Updates
Reclaming Space Without the reorg Command
Reclaiming Unused Space and Undoing Row Forwarding
Rebuilding a Table
Prerequisites for Running reorg rebuild
Changing Space Management Settings Before Using reorg rebuild
Using the reorg rebuild Command on Indexes
Rebuilding Indexes with reorg rebuild index_name partition_name
Space Requirements for Rebuilding an Index
Status Messages
resume and time Options for Reorganizing Large Tables
Incremental Reorganization
Checking the Reorganization Status
Clearing reorg defrag Information from sysattributes
Logging Behavior
Checking Database Consistency
Page and Object Allocation
Understanding the Object Allocation Map (OAM)
Understanding Page Linkage
dbcc Checks
dbcc Command Output
Checking Database and Table Consistency
dbcc checkstorage
Understanding the dbcc checkstorage Operation
Performance and Scalability
dbcc checktable
dbcc checkindex
dbcc checkdb
Checking Page Allocation
dbcc checkalloc
dbcc indexalloc
dbcc tablealloc
dbcc textalloc
Correcting Allocation Errors Using the fix | nofix Options
Generate Reports with dbcc tablealloc and dbcc indexalloc
Checking Consistency of System Tables
Strategies for Using Consistency Checking Commands
Using Large I/O and Asynchronous Prefetch
Scheduling Database Maintenance at Your Site
Database Use
Backup Schedule
Size of Tables and Importance of Data
Errors Generated by Database Consistency Problems
Reporting on Aborted checkstorage and checkverify Operations
Aborting with Error 100032
Comparison of Soft and Hard Faults
Soft Faults
Hard Faults
Verifying Faults with dbcc checkverify
Scheduling dbcc checkverify
Executing dbcc checkverify
Preparing to Use dbcc checkstorage
Planning Resources
Planning Workspace Size
Number of Concurrent Workspaces
Automatic Workspace Expansion
Configuring Worker Processes
Setting a Named Cache for dbcc
Configuring an 8-page I/O Buffer Pool
Disk Space for dbccdb
Segments for Workspaces
Creating the dbccdb Database
Updating the dbcc_config Table
Viewing the Current Configuration Values
Default Configuration Values
Deleting Configuration Values
dbccdb Maintenance Tasks
Reevaluating and Updating the dbccdb Configuration
Cleaning Up dbccdb
Performing Consistency Checks on dbccdb
Generating Reports from dbccdb
Reporting a Summary of dbcc checkstorage Operations
Upgrading Compiled Objects with dbcc upgrade_object
Finding Compiled Object Errors Before Production
Reserved Word Errors
Missing, Truncated, or Corrupted Source Text
Temporary Table References
Resolving select * Potential Problem Areas
Using Database Dumps in Upgrades
Upgrading Compiled Objects in Database Dumps
Developing a Backup and Recovery Plan
Tracking Database Changes
Getting Information About the Transaction Log
Determining When Log Records Are Committed
Changes to Logging Behavior
Risks of Using delayed_commit
Enabling set delayed_commit
Designating Responsibility for Backups
Checkpoints: Synchronizing a Database and Its Log
Setting the Recovery Interval
Automatic Checkpoint Procedure
Truncating the Log After Automatic Checkpoints
Free Checkpoints
Manually Requesting a Checkpoint
Automatic Recovery After a System Failure or Shutdown
Fast Recovery
SAP ASE Start-up Sequence
Bringing Engines Back Online
Parallel Recovery
Database Recovery
Specifying the Recovery Order
Changing or Deleting the Recovery Position of a Database
Listing the User-Assigned Recovery Order of Databases
Parallel Checkpoints
Recovery State
Tuning for Fast Recovery
The sybdumptran Utility
Fault Isolation During Recovery
Persistence of Offline Pages
Configuring Recovery Fault Isolation
Isolating Suspect Pages
Raising the Number of Suspect Pages Allowed
Getting Information About Offline Databases and Pages
Bringing Offline Pages Online
Index-Level Fault Isolation for Data-Only-Locked Tables
Side Effects of Offline Pages
Recovery Strategies Using Recovery Fault Isolation
Reload Strategy
Repair Strategy
Assessing the Extent of Corruption
Using the dump and load Commands
dump database: Making Routine Database Dumps
dump transaction: Making Routine Transaction Log Dumps
dump tran with no_truncate: Copying the Log After Device Failure
load database: Restoring the Entire Database
load transaction: Applying Changes to the Database
online database: Making the Database Available to Users
Dumping and Loading Databases Across Platforms
Dumping a Database
Loading a Database
Restrictions for Dumping and Loading Databases and Transactions
Improving Recovery Prefetch
Performance Notes
Moving a Database to Another SAP ASE
Upgrading a User Database
Using the Special Load Options to Identify Dump Files
Restoring a Database from Backups
Suspending and Resuming Updates to Databases
Guidelines for using quiesce database
Maintaining Server Roles in a Primary and Secondary Relationship
Starting the Secondary Server with the -q Option
āin quiesceā Database Log Record Value Updated
Updating the Dump Sequence Number
Backing up Primary Devices with quiesce database
Recovery of Databases for Warm Standby Method
Making Archived Copies During the Quiescent State
The mount and unmount Commands
Using Backup Server for Backup and Recovery
Requirements for Communicating with Backup Server
Mounting a New Volume
Starting and Stopping Backup Server
Configuring Your Server for Remote Access
Choosing Backup Media
Protecting Backup Tapes from Being Overwritten
Dumping to Files or Disks
Creating Logical Device Names for Local Dump Devices
Adding a Backup Device
Scheduling backups of user databases
Other Times to Back Up a Database
Scheduling Backups of master
Dump the master Database After Each Change
Save Scripts and System Tables
Truncate the master Database Transaction Log
Avoid Volume Changes and Recovery
Scheduling Backups of the model Database
Truncate the model Databaseās Transaction Log
Schedule Backups of the sybsystemprocs Database
Configuring SAP ASE for Simultaneous Loads
Gather Backup Statistics
Backing Up and Restoring User Databases
Specifying the Database and Dump Device
Rules for Specifying Database Names
Rules for Specifying Dump Devices
Tape Device Determination by Backup Server
Tape Device Configuration File
Compressing a Dump
Backup Server Dump Files and Compressed Dumps
Loading Compressed Dumps
Cyclic Redundancy Checks for dump database
Dump History File
Backups for the Dump Configuration Files
Performing Cumulative Dumps
Dump and Load Sequences
Partially Logged Operations and Cumulative Dumps
Restrictions
Specifying a Remote Backup Server
Remote Dump Host Control
Specifying Tape Density, Block Size, and Capacity
Overriding the Default Density
Overriding the Default Block Size
Specifying a Larger Block Size Value
Specifying Tape Capacity for Dump Commands
Nonrewinding Tape Functionality for Backup Server
Tape Operations
Dump Version Compatibility
Apply Source Database Attributes to the Target Database
Generate SQL for a Different Target Database
Specifying the Volume Name
Loading from a Multifile Volume
Identifying a Dump
Improving Dump or Load Performance
Compatibility with Prior Versions
Reducing load database Time
Concurrent dump database and dump transaction Commands
Configure SAP ASE to Run Concurrent Dumps
Labels Stored in Integer Format
Configure Local and Remote Backup Servers
Setting Shared Memory Usage
Configuring Shared Memory Dumps
Setting the Maximum Number of Stripes
Setting the Maximum Number of Network Connections
Setting the Maximum Number of Service Threads
Automatic Physical Database Rearrangement on Load
Specify Additional Dump Devices with the stripe on Clause
Dumps to, and Loads from, Multiple Devices
Using Fewer Devices to Load Than to Dump
Specifying the Characteristics of Individual Devices
Tape Handling Options
Prevent Dump Files from Being Overwritten
Reinitializing a Volume Before a Dump
Dumping and Loading Databases with Password Protection
Overriding the Default Message Destination
Bringing Databases Online with standby_access
Getting Information About Dump Files
Requesting Dump Header Information
Determining the Database, Device, File Name, and Date
Copying the Log After a Device Failure
Responding to Volume Change Requests
Volume Change Prompts for Dumps
Volume Change Prompts for Loads
Recovering a Database: Step-By-Step Instructions
Getting a Current Dump of the Transaction Log
Examining the Space Usage
Dropping the Databases
Re-creating the Databases
Loading the Database
Loading the Transaction Logs
Loading a Transaction Log to a Point in Time
Bringing the Databases Online
Replicated Databases
Loading Database Dumps from Older Versions
Upgrading a Dump to the Current Version of SAP ASE
The Database Offline Status Bit
Version Identifiers and Automatic Upgrade
Cache Bindings and Loading Databases
Databases and Cache Bindings
Database Objects and Cache Bindings
Checking on Cache Bindings
Cross-Database Constraints and Loading Databases
Restoring the System Databases
Recovering the master Database
Recovery Procedure
Finding Copies of System Tables
Building a New Master Device
Replacing the Master Device
Rebuilding the Configuration Area
Starting SAP ASE in Master-Recover Mode
Re-creating Device Allocations for master
Checking Your Backup Server sysservers Information
Verifying That Your Backup Server Is Running
Loading a Backup of master
Updating the number of devices Configuration Parameter
Restarting SAP ASE in Master-Recover Mode
Checking System Tables to Verify Current Backup of master
Restarting SAP ASE
Restoring Server User IDs
Restoring the model Database
Checking SAP ASE
Backing Up master
Recovering the model Database
Recovering the sybsystemprocs Database
Restoring sybsystemprocs with installmaster
Restoring sybsystemprocs with load database
Reducing the Size of tempdb
Reset tempdb to Default Size
Restoring System Tables with disk reinit and disk refit
Restoring sysdevices with disk reinit
Restoring sysusages and sysdatabase with disk refit
Archive Database Access
Components of an Archive Database
The Database Dump
The Modified Pages Section
The sysaltusages Table and the Scratch Database
Working With an Archive Database
DDLGen Support for Archive Database Access
Configuring an Archive Database
Sizing the Modified Pages Section
Increasing the Amount of Space Allocated to the Modified Pages Section
Materializing an Archive Database
Using load database with norecovery
Using Logical Devices with an Archive Database
load database Limitations with an Archive Database
Bringing an Archive Database Online
Loading a Transaction Log into an Archive Database
Dropping an Archive Database
SQL Commands for Archive Databases
dbcc Commands for Archive Databases
Issuing a Typical Archive Database Command Sequence
Compressed Dumps for an Archive Database
Creating a Compression Memory Pool
Upgrading and Downgrading an SAP ASE with Archive Databases
Limitations for Downgrading an SAP ASE with an Archive Database
Compatibility Issues for a Compressed Dump
Archive Database Limitations
Shrinking Databases
Shrinking a Database
How SAP ASE Shrinks the Database
Shrink Operations on Databases That Contain Text or Image Data
Shrink Database Backlink Performance Improvements
Restarting Partially Completed Shrink Operations
Moving Data Before Shrinking the Database
Restrictions for Moving the Transaction Log
Locks Held During Data Movement
Determine the Status of a Shrink Operation
Upgrading or Downgrading Shrunken Databases
Restrictions
Expanding Databases Automatically
Layouts for Disks, Devices, Databases, and Segments
Threshold Action Procedures
Installing Automatic Database Expansion Procedures
Running sp_dbextend
Validating Current Thresholds
Configuring a Database for Automatic Expansion
Restrictions and Limitations
Managing Free Space with Thresholds
Monitoring Free Space with the Last-Chance Threshold
Controlling How Often sp_thresholdaction Executes
Rollback Records and the Last-Chance Threshold
Calculating the Space for Rollback Records
Using lct_admin to Determine the Free Log Space
Determining the Current Space for Rollback Records
Effect of Rollback Records on the Last-Chance Threshold
User-Defined Thresholds
Last-Chance Threshold and User Log Caches for Shared Log and Data Segments
Using lct_admin abort to Abort Suspended Transactions
Add Space to the Master Databaseās Transaction Log
Automatically Aborting or Suspending Processes
Using abort tran on log full to Abort Transactions
Waking Suspended Processes
Adding, Changing, and Deleting Thresholds
Displaying Information About Existing Thresholds
Thresholds and System Tables
Creating Free-Space Thresholds
Changing or Specifying a New Free-Space Threshold
Dropping a Threshold
Creating a Free-Space Threshold for the Log Segment
Usage Scenario: Testing and Adjusting the New Threshold
Creating Additional Thresholds on Data and Log Segments
Determining Threshold Placement
Creating Threshold Procedures
Parameters for Threshold Procedures
Generating Error Log Messages
sp_thresholdaction Procedures that Include a dump transaction
A Simple Threshold Procedure
A More Complex Procedure
Placement for Threshold Procedures
Disabling Free-Space Accounting for Data Segments
Transaction Log Space Management
Transaction Log Space
Automating Transaction Log Management
Rescue Scenario Use Case
Monitoring Use Case
Monitoring and Control Use Case
Analyzing and Managing Transaction Log Space
Viewing the Span of a Transaction
Viewing the Oldest Active Transactions
Truncating a Log that Is Not on A Separate Segment
Truncating the Log in Early Development Environments
Truncating a Log that Has No Free Space
Dangers of Using with truncate_only and with no_log
Provide Sufficient Log Space
Querying the syslogshold Table
Migration Technology Guide 15.5
About this book
Migration Strategy
Preupgrade considerations
Understanding optimization goals
Optimization criteria
Resource recommendations for Adaptive Server 15.0
Incorporating statistics in Adaptive Server 15.0
Recommended testing before upgrade
Migrating to Adaptive Server 15.0 features
Upgrading, and using new features immediately
Upgrading, and using new features later
Upgrading, but not using new features
Troubleshooting
Query processing tips
Information to capture before contacting Technical Support
701 errors
Performance problems with a limited number of queries
System-wide performance issues
Uploading diagnostics to Technical Support
QPTune
Setting up your system
Using QPTune to fix missing statistics
Starting QPTune to fix missing statistics
Collecting statistics
Fixing statistics
Using undo_fix_stats
Using QPTune to tune queries or applications
Starting QPTune to tune queries or applications
Simple start
Custom start
Collecting metrics
Comparing metrics
Applying the best results
Configuration file
Examples
Upgrade issues
Localization
QPTune GUI
Environment and system requirements
Starting the QPTune GUI
Fixing missing statistics
Tuning Task
QPTune reference information
Running the Query Processor in Compatibility Mode
Enabling compatibility mode
Feature support in compatibility mode
Additional trace flag for diagnostics
New stored procedure sp_compatmode
Changes to @@qpmode global variable
Diagnostic tool
Performance and Tuning Series: Basics 16.0
Performance and Tuning Series: Improving Performance with Statistical Analysis 16.0
Performance and Tuning Series: Locking and Concurrency Control 16.0
Performance and Tuning Series: Monitoring Adaptive Server with sp_sysmon 16.0
Performance and Tuning Series: Monitoring Tables 16.0
Performance and Tuning Series: Physical Database Tuning 16.0
Performance and Tuning Series: Query Processing and Abstract Plans 16.0
Glossary 16.0
Quick Reference Guide 15.7
Quick Reference Guide
Datatypes
Standards and compliance
Datatypes and encrypted columns
Adaptive Server global variables
Reserved words
Transact-SQL reserved words
ANSI SQL reserved words
Potential ANSI SQL reserved words
Functions
XML functions
Commands
Interactive dbsql commands
System procedures
Catalog stored procedures
Extended stored procedures
dbcc stored procedures
System tables
DBCC tables
Monitoring tables
sybpcidb tables
Utilities
System Tables Diagram 16.0
Monitoring Tables Diagram 16.0
Troubleshooting: Error Messages Advanced Resolutions 15.0
About this book
Introduction
Understanding error message severity levels
Notifying the System Administrator
Variables in error message text
Finding object names in error message text
Finding the Adaptive Server version
Understanding the field order in the version string
Creating error messages
Reporting errors
Sybase Technical Support checklist
Sending error log fragments
Reproducing problems
Parser Errors (100s, 7380)
Error 102
Error 107
Error 195
Error 7380
Sequencer Errors (200s, 7783, 7788, 11000s, 14200)
Error 207
Error 208
Error 213
Error 216
Error 225
Error 226
Error 229
Error 232
Error 233
Error 241
Error 247
Error 257
Error 259
Error 265
Error 266
Error 268
Error 277
Error 7783
Error 7788
Error 11018
Error 11068
Error 11072
Error 14200
Query Processor Errors (300s, 400s, 500s)
Error 311
Error 313
Error 314
Error 403
Error 414
Error 428
Error 511
Error 512
Error 515
Error 530
Error 539
Error 540
Error 546
Error 547
Error 551
Error 584
Access Method Errors (600s)
Error 601
Error 603
Error 605
Error 611
Error 614
Error 622
Error 623
Error 624
Error 625
Error 629
Error 631
Error 644
Error 678
Error 691
Error 692
Error 693
Error 694
Error 695
Error 696
Error 697
Memory Manager Errors (700s)
Error 701
Error 702
Error 703
Error 706
Error 707
Error 709
Error 714
Error 715
Error 717
Error 718
Error 719
Error 720
Error 721
Buffer Manager Errors (800s)
Error 803
Error 804
Error 806
Error 813
Error 820
Error 821
Error 822
Error 823
Error 832
Error 834
Error 835
Error 840
Error 842
Error 847
Error 849
Error 852
Error 855
Error 861
Error 863
Error 881
Error 890
Open Database Manager Errors (900s)
Error 903
Error 905
Error 906
Error 908
Error 911
Error 913
Error 916
Error 921
Error 924
Error 925
Error 926
Error 930
Error 935
Error 940
Error 941
Error 945
Error 950
Error 965
Abstract Plan Manager Errors (1000s)
Error 1024
Page Manager Errors (1100s)
Error 1105
Error 1108
Error 1120
Error 1124
Error 1127
Error 1129
Error 1131
Error 1133
Error 1141
Error 1142
Error 1143
Error 1159
Error 1161
Lock Manager Errors (1200s)
Error 1203
Error 1204
Error 1205
Error 1243
Error 1244
Error 1249
Error 1251
Error 1265
Error 1279
Sort Manager Errors (1500s)
Error 1501
Error 1505
Error 1506
Error 1508
Error 1509
Error 1510
Error 1514
Error 1530
Error 1531
Initialization Errors (1600s)
Error 1601
Error 1602
Error 1603
Error 1605
Error 1608
Error 1613
Error 1621
Error 1622
Error 1623
Create Utilities Errors (1700 - 1900s, 2100s, 2700s, 12800s)
Error 1702
Error 1708
Error 1732
Error 1803
Error 1808
Error 1809
Error 1810
Error 1813
Error 1820
Error 1902
Error 1903
Error 1916
Error 1928
Error 2110
Error 2714
Error 2729
Error 2753
Error 2762
Error 12818
Error 12842
Error 12881
High Availability Errors (2200s)
Error 2243
Character Set Conversion Errors (2400s)
Error 2401
Error 2402
Error 2409
dbcc Errors (2500s, 7900s, 12000s, 15000s)
Error 2501
Error 2502
Error 2503
Error 2507
Error 2509
Error 2510
Error 2511
Error 2513
Error 2514
Error 2517
Error 2520
Error 2521
Error 2524
Error 2525
Error 2529
Error 2540
Error 2546
Error 2547
Error 2550
Error 2558
Error 2559
Error 2572
Error 2573
Error 2574
Error 2575
Error 2578
Error 2582
Error 2583
Error 2591
Error 2596
Error 7901
Error 7902
Error 7928
Error 7930
Error 7939
Error 7940
Error 7949
Error 7989
Error 9961
Error 12964
Error 15056
Error 15080
Error 15082
Error 15084
insert Errors (2600s)
Error 2601
Error 2610
Error 2615
Error 2619
Error 2620
Error 2626
Error 2628
Error 2630
Error 2631
Procedure Manager Errors (2800s)
Error 2805
Error 2806
Error 2811
Error 2812
Error 2824
Error 2835
Error 2844
dump and load Errors (3000s - 3200s, 4200s - 4300s)
Error 3019
Error 3020
Error 3021
Error 3105
Error 3120
Error 3143
Error 3144
Error 3161
Error 3162
Error 3201
Error 3203
Error 3211
Error 3212
Error 3216
Error 3225
Error 3230
Error 3233
Error 3240
Error 4204
Error 4205
Error 4207
Error 4216
Error 4221
Error 4222
Error 4305
Error 4322
commit and abort Errors (3300s)
Error 3301
Error 3307
Error 3321
Error 3322
Recovery Errors (3400s, 12500s)
Error 3401
Error 3403
Error 3404
Error 3414
Error 3429
Error 3434
Error 3445
Error 3446
Error 3447
Error 3452
Error 3454
Error 3462
Error 3470
Error 12546
Error 12547
Error 12551
Error 12583
Error 12587
Exception Handling Errors (3600s)
Error 3604
Error 3621
Error 3624
Error 3626
Error 3641
Error 3642
Error 3643
Error 3644
Error 3646
Error 3648
drop Errors (3700s)
Error 3701
Error 3702
Error 3703
Transaction Errors (3900s)
Error 3904
Error 3905
Error 3906
Error 3908
Error 3917
Error 3949
dataserver Errors (4000s)
Error 4001
Error 4002
Error 4020
View Resolution Manager Errors (4400s)
Error 4430
truncate table Errors (4700s)
Error 4716
Bulk Copy Utility Errors (4800s)
Error 4801
Error 4806
alter table Errors (4900s)
Error 4951
Error 4953
Error 4954
Error 4956
Error 4964
alter database Errors (5000s)
Error 5006
Error 5013
Error 5018
Error 5034
Disk Errors (5100s)
Error 5115
Error 5123
Error 5142
Transaction Coordinator Errors (5600s)
Error 5602
Open Client Errors (5700s)
Error 5701
Error 5704
Configuration Errors (5800s, 10800s)
Error 5806
Error 5808
Error 5824
Error 5846
Error 5847
Error 5848
Error 5849
Error 5850
Error 5851
Error 5852
Error 5853
Error 5854
Error 5857
Error 5859
Error 5861
Error 5863
Error 5865
Error 5866
Error 5867
Error 5868
Error 5893
Error 10841
Error 10865
Process Kill Errors (6100s)
Error 6103
Error 6107
Timestamp Errors (6900s)
Error 6901
Error 6902
Distributed Database Network Errors (7200s)
Error 7201
Error 7205
Error 7207
Error 7211
Error 7212
Error 7214
Error 7215
Error 7218
Error 7220
Error 7221
Error 7223
Error 7227
Error 7234
Error 7235
Text Manager Errors (7100s)
Error 7101
Error 7105
Error 7114
Error 7130
Error 7134
Threshold Manager Errors (7400s)
Error 7401
Error 7402
Error 7403
Error 7404
Error 7406
Error 7407
Error 7408
Error 7409
Error 7410
Error 7411
Error 7412
Error 7413
Error 7414
Error 7415
Error 7417
Error 7418
Error 7438
Auditing Errors (7600s)
Error 7618
Remote Procedure Call Errors (8000s)
Error 8006
Error 8009
Descriptor Manager Errors (8200s)
Error 8201
Error 8203
Error 8204
Error 8207
Error 8210
Error 8211
Error 8219
Error 8239
Error 8241
sysindexes Manager Errors (8400s)
Error 8402
Error 8419
Process Status Structure Errors (8600s)
Error 8601
Site Buffer Manager Errors (8700s)
Error 8704
Disk Manager Errors (9000s)
Error 9004
Replication Agent Manager Errors (9100s - 9200s)
Error 9122
Error 9287
Error 9289
Error 9290
Component Integration Services Errors (11200s)
Error 11201
Error 11202
Error 11203
Configurable Shared Memory Dump Manager (12000s, 12300s)
Error 12036
Error 12326
Error 12328
Error 12329
Error 12330
Error 12333
Error 12334
Error 12335
Fault Isolation Utility Errors (12700s)
Error 12716
Error 12717
Partition (14100s) and Partition Key Manager (14300s) Errors
Error 14100
Error 14108
Error 14120
Error 14124
Error 14126
Error 14313
mount database Errors (14500s)
Error 14503
Error 14504
Error 14511
Error 14513
Error 14560
Error 14561
Anchor Manager Errors (14600s)
Error 14605
Error 14618
Error 14619
Error 14620
Error 14621
Error 14622
Error 14623
XML Utility Manager Errors (14900s)
Error 14901
Message Service Errors (15100s)
Error 15101
Error 15105
Web Services Errors (15200s)
Error 15219
Encryption Errors (15400s)
Error 15402
Error 15403
Error 15412
Error 15413
Error 15417
Statistics Errors (15600s)
Error 15600
Error 15601
System Procedure Errors (17000s, 18000s)
Error 17461
Error 17715
Error 17716
Error 17737
Error 17870
Error 17871
Error 17872
Error 17873
Error 17874
Error 17875
Error 17903
Error 17904
Error 17905
Error 17906
Error 17910
Error 18031
Error 18032
Error 18033
Error 18123
Error 18750
Kernel Errors
Asynchronous I/O not available
Buffer mismatch
Could not create shared memory
Current process infected
dopen error
dstart I/O request repeatedly delayed
Failed to open device
Feature is not licensed
File already in use
Memory too fragmented
Memory usage in procedure headers
Network information message
No more alarms available
Open objects parameter may be too low
os_attach_region errors
os_create_region errors
Read/write errors
Server is unnamed
Stack guardword corrupted
time slice error
t_rcvconnect error
udunmirror errors
No more engines can be offlined
Reference Manual: Building Blocks 16.0
About These Topics
System and User-Defined Datatypes
Datatype Categories
Exact Numeric Datatypes
Integer Types
Decimal Datatypes
Approximate Numeric Datatypes
Understanding Approximate Numeric Datatypes
Range, Precision, and Storage Size
Entering Approximate Numeric Data
NaN and Inf Values
Money Datatypes
Accuracy
Range and Storage Size
Entering Monetary Values
timestamp Datatype
Creating a timestamp Column
Date and Time Datatypes
Range and Storage Requirements
Entering Date and Time Data
Entering the Date
Entering the Time
Displaying Formats for datetime, smalldatetime, and date Values
Display Formats for bigdatetime and bigtime
Displaying Formats for time Value
Finding Values That Match a Pattern
Manipulating Dates
Standards and Compliance
Character Datatypes
unichar and univarchar
Length and Storage Size
Determining Column Length with System Functions
Entering Character Data
Entering Unicode Characters
Example of Treatment of Blanks
Manipulating Character Data
Standards and Compliance for Character Datatypes
Binary Datatypes
Valid binary and varbinary Entries
Entries of More than the Maximum Column Size
Treatment of Trailing Zeros
Platform Dependence
bit Datatype
sysname and longsysname Datatypes
text, image, and unitext Datatypes
Data Structures Used for Storing text, unitext, and image Data
Initialize text, unitext, and image Columns
Define unitext Columns
Save Space by Allowing NULL
Obtain Information from sysindexes
Using readtext and writetext
Determine How Much Space a Column Uses
Restrictions on text, image, and unitext Columns
Selecting text, unitext, and image Data
Converting text and image Datatypes
Converting to or from Unitext
Pattern Matching in text Data
Duplicate Rows
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Declaring a LOB Datatype
Creating a LOB Parameter
Examples for Using LOB Datatypes
Standards and Compliance
Range and Storage Size
Datatypes of Columns, Variables, or Parameters
Declaring Datatypes for a Column in a Table
Declaring Datatypes for Local Variable in a Batch or Procedure
Declaring Datatypes for a Parameter in a Stored Procedure
Determine the Datatype of Numeric Literals
Determine the Datatype of Character Literals
Datatypes of Mixed-Mode Expressions
Determine the Datatype Hierarchy
Determine Precision and Scale
Datatype Conversions
Automatic Conversion of Fixed-Length NULL Columns
Handling Overflow and Truncation Errors
Datatypes and Encrypted Columns
User-Defined Datatypes
Standards and Compliance
Transact-SQL Functions
abs
acos
allocinfo
ascii
asehostname
asin
atan
atn2
avg
audit_event_name
authmech
biginttohex
bintostr
cache_usage
case
cast
Usage for cast
Conversions Involving Java Classes
Implicit Conversion
Explicit Conversion
ceiling
char
Usage for char
Reformatting Output With char
char_length
charindex
coalesce
col_length
col_name
compare
Usage for compare
Maximum Row and Column Length for APL and DOL
convert
Usage for convert
Conversions Involving Java classes
Implicit Conversion
Explicit Conversion
cos
cot
count
count_big
create_locator
current_bigdatetime
current_bigtime
current_date
current_time
curunreservedpgs
data_pages
datachange
Usage for datachange
Restrictions for datachange
datalength
dateadd
datediff
datename
datepart
day
db_attr
db_id
db_instanceid
db_name
db_recovery_status
dbencryption_status
defrag_status
degrees
derived_stat
difference
dol_downgrade_check
exp
floor
get_appcontext
get_internal_date
getdate
getutcdate
has_role
hash
hashbytes
hextobigint
hextoint
host_id
host_name
instance_id
identity_burn_max
index_col
index_colorder
index_name
inttohex
isdate
is_quiesced
is_sec_service_on
is_singleusermode
isnull
isnumeric
instance_name
lc_id
lc_name
lct_admin
left
len
license_enabled
list_appcontext
locator_literal
locator_valid
lockscheme
log
log10
loginfo
lower
lprofile_id
lprofile_name
ltrim
max
migrate_instance_id
min
month
mut_excl_roles
newid
next_identity
nullif
object_attr
object_id
object_name
object_owner_id
pagesize
partition_id
partition_name
partition_object_id
password_random
patindex
pi
power
proc_role
pssinfo
radians
rand
rand2
replicate
reserve_identity
reserved_pages
return_lob
reverse
right
rm_appcontext
role_contain
role_id
role_name
round
row_count
rtrim
sdc_intempdbconfig
set_appcontext
setdata
shrinkdb_status
show_cached_plan_in_xml
show_cached_text
show_cached_text_long
show_condensed_text
show_dynamic_params_in_xml
show_plan
show_role
show_sec_services
sign
sin
sortkey
Usage for sortkey
Collation Tables
Collation Names and IDs
soundex
space
spaceusage
spid_instance_id
square
sqrt
stddev
stdev
stdevp
stddev_pop
stddev_samp
str
str_replace
strtobin
stuff
substring
sum
suser_id
suser_name
syb_quit
syb_sendmsg
sys_tempdbid
tan
tempdb_id
textptr
textvalid
to_unichar
tran_dumpable_status
tsequal
Usage for tsequal
Adding a Timestamp to a New Table for Browsing
uhighsurr
ulowsurr
upper
uscalar
used_pages
user
user_id
user_name
valid_name
valid_user
var
var_pop
var_samp
variance
varp
workload_metric
xa_bqual
xa_gtrid
xact_connmigrate_check
xact_owner_instance
xmlextract
xmlparse
xmlrepresentation
xmltable
xmltest
xmlvalidate
year
Global Variables
Using Global Variables in a Clustered Environment
Expressions, Identifiers, and Wildcard Characters
Expressions
Size of Expressions
Arithmetic and Character Expressions
Relational and Logical Expressions
Operator Precedence
Arithmetic Operators
Bitwise Operators
String Concatenation Operator
Comparison Operators
Nonstandard Operators
Using any, all, and in
Negating and Testing
Ranges
Using Nulls in Expressions
Comparisons That Return TRUE
Difference Between FALSE and UNKNOWN
Using āNULLā as a Character String
NULL Compared to the Empty String
Connecting Expressions
Using Parentheses in Expressions
Comparing Character Expressions
Using the Empty String
Including Quotation Marks in Character Expressions
Using the Continuation Character
Identifiers
Short Identifiers
Tables Beginning With # (Temporary Tables)
Case Sensitivity and Identifiers
Uniqueness of Object Names
Using Delimited Identifiers
Enabling Quoted Identifiers
Identifying Tables or Columns by Their Qualified Object Name
Using Delimited Identifiers Within an Object Name
Omitting the Owner Name
Referencing Your Own Objects in the Current Database
Referencing Objects Owned by the Database Owner
Using Qualified Identifiers Consistently
Determining Whether an Identifier is Valid
Renaming Database Objects
Using Multibyte Character Sets
like Pattern Matching
Using not like
Pattern Matching with Wildcard Characters
Case and Accent Insensitivity
Using Wildcard Characters
The Percent Sign (%) Wildcard Character
The Underscore (_) Wildcard Character
Bracketed ([ ]) Characters
The Caret (^) Wildcard Character
Using Multibyte Wildcard Characters
Using Wildcard Characters as Literal Characters
Using Square Brackets ( [ ] ) as Escape Characters
Using the escape Clause
Using Wildcard Characters With datetime Data
Reserved Words
Transact-SQL Reserved Words
ANSI SQL Reserved Words
Potential ANSI SQL Reserved Words
SQLSTATE Codes and Messages
SQLSTATE Warnings
Exceptions
Cardinality Violations
Data Exceptions
Integrity Constraint Violations
Invalid Cursor States
Syntax Errors and Access Rule Violations
Transaction Rollbacks
with check option Violation
Reference Manual: Commands 16.0
Commands
alter database
alter database Restrictions
Using alter database for Archive Databases
Altering In-Memory and Relaxed Durability Databases
Backing Up master After Allocating More Space
Placing the Log on a Separate Device
Altering Databases for Compression
In-row LOB Columns
Shrinking Log Space
Getting Help on Space Usage
The system and default Segments
Using alter database to Awaken Sleeping Processes
Using the alter database for proxy_update Parameter
Fully Encrypting Databases
alter encryption key
alter login
alter index
alter login profile
alter precomputed result set
alter...modify owner
alter role
Changing Passwords for Roles
Mutually Exclusive Roles
alter table
Restrictions for alter table
alter table and Encrypted Columns
Altering a Tableās Compression
Interactions Between Compression and Other alter table Parameters
Altering the Compression Level for a Table Using Large Objects
Getting Information About Tables
Specifying Ascending or Descending Ordering in Indexes
Using Cross-Database Referential Integrity Constraints
Changing Defaults
Setting Space Management Properties for Indexes
Conversion of max_rows_per_page to exp_row_size
Using reservepagegap
Partitioning Tables for Improved Performance
Using Computed Columns
Adding IDENTITY Columns
Altering Table Schema
Restrictions for Modifying a Table Schema
Restrictions for Modifying text and image Columns
Modifying Tables With Unitext Columns
Changing Locking Schemes
Adding Java-SQL Columns
Restrictions for Shared-Disk Clusters
alter thread pool
begin...end
begin transaction
break
checkpoint
close
commit
compute Clause
compute Clause Restrictions
compute Results Appear as a New Row or Rows
Case-Sensitivity
connect to...disconnect
continue
create archive database
create database
Restrictions for create database
Temporary Databases
Creating Compressed Databases
Creating Databases With In-Row LOBs
Creating In-Memory and Relaxed Durability Databases
New Databases Created from model
Ensuring Database Recoverability
Using the for load Option
Getting Information About Databases
Using with default_location and for proxy_update
create default
create default Restrictions
Datatype Compatibility
Getting Information about Defaults
Defaults and Rules
Defaults and Nulls
Specifying a Default Value in create table
Objects Dependent on Replaced Defaults
create encryption key
create existing table
Datatype Conversions
Changes by Server Class
Remote Procedures
Encrypted Columns
create function
Objects Dependent on Replaced Functions
create function (SQLJ)
create index
Creating Indexes Efficiently
Creating Clustered Indexes
Creating Indexes on Compressed Table
Creating Indexes on Encrypted Columns
Specifying Ascending or Descending Ordering in Indexes
Space Requirements for Indexes
Duplicate Rows
Using Unique Constraints in Place of Indexes
Using the sorted_data Option to Speed Sorts
Specifying the Number of Histogram Steps
Space Management Properties
Index Options and Locking Modes
Using the sorted_data Option on Data-Only-Locked Tables
Getting Information About Tables and Indexes
Creating Indexes on Computed Columns
Creating Partitioned Indexes
Creating Function-Based Indexes
create index and Stored Procedures
create login
create login profile
create plan
create precomputed result set
create procedure
create procedure Restrictions
execute as Stored Procedure
System Procedures
Nested Procedures
Procedure Return Status
Object Identifiers
Temporary Tables and Procedures
Setting Options in Procedures
Extended Stored Procedures
Objects Dependent on Replaced Procedures
Getting Information About Procedures
create procedure (SQLJ)
create proxy_table
create role
create rule
create rule Restrictions
Binding Rules
create schema
create service
create table
Restrictions for create table
Creating Compressed Tables
Restrictions for Compression
Using Indexes
Renaming a Table or Its Columns
Restrictions on Compressing Tables That Use Large Object (LOB) Data
Column Definitions
Temporary Tables
Defining Integrity Constraints
Unique and Primary-Key Constraints
Referential Integrity Constraints
Using Cross-Database Referential Integrity Constraints
check Constraints
IDENTITY Columns
Specifying a Locking Scheme
Getting Information About Tables
Creating Tables with Partitions
Creating Tables With Computed Columns
Creating Tables with Encrypted Columns
Limitations When Creating Virtually Hashed Tables
Creating Tables for In-Memory and Relaxed Durability Databases
Restrictions for Shared-Disk Clusters
Space Management Properties
Using reservepagegap
Java-SQL Columns
Determining Values for hash_factor
create thread pool
create trigger
Triggers and Referential Integrity
The deleted and inserted Logical Tables
Trigger Restrictions
Triggers and Performance
Setting Options Within Triggers
Dropping a Trigger
Actions That Do Not Cause Triggers to Fire
Nesting Triggers and Trigger Recursion
Restrictions for instead of
Getting Information About Triggers
Triggers and Transactions
Inserting and Updating Triggers
instead of and for Triggers
create view
Restrictions on Views
View Resolution
Modifying Data Through Views
IDENTITY Columns and Views
group by Clauses and Views
distinct Clauses and Views
Creating Views from SQL-Derived Tables
Objects Dependent on Replaced Views
dbcc
Using dbcc quorum (clusters only)
Restrictions on dbcc checkstorage for Shared-Disk Clusters
Using dbcc complete_xact
Checking Performed by dbcc checkcatalog
Using dbcc checktable
deallocate cursor
deallocate locator
declare
declare cursor
Using Scrollable Cursors
Cursor select Statements
Cursor Scope
Result Set
Updatable Cursors
Releasing Locks at Cursor Close
delete
delete Restrictions
Deleting All Rows from a Table
delete and Transactions
Using the where current of Parameter
Using readpast
delete statistics
disk init
Using dsync with disk init
Creating Devices for In-Memory and Relaxed Durability Databases
disk mirror
disk refit
disk reinit
Using dsync with Disk Reinit
disk remirror
disk resize
disk unmirror
drop database
drop default
drop encryption key
drop function
drop function (SQLJ)
drop index
drop login
drop login profile
drop precomputed result set
drop procedure
drop role
drop rule
drop service
drop table
Restrictions for drop table
Dropping Tables with Cross-Database Referential Integrity Constraints
drop thread pool
drop trigger
drop view
dump configuration
dump database
Commands and System Procedures Used to Back Up Databases
Scheduling Dumps
Specifying Dump Devices
Restrictions for dump database
Dumping Databases with Devices That Are Mirrored
Dumping the System Databases
Dump Files
Volume Names
Changing Dump Volumes
Appending to or Overwriting a Volume
File Names and Archive Names
dump database Performance
Compressed Dumps for an Archive Database
Compatibility Issues for a Compressed Dump
Encrypted Columns and dump database
dump transaction
dump transaction Restrictions
Copying the Log After Device Failure
Dumping Databases Without Separate Log Segments
Dumping Only Complete Transactions
Dumping Without the Log
Scheduling Dumps
Using Thresholds to Automate dump transaction
Specifying Dump Devices
Determining Tape Device Characteristics
Backup Servers
Dump Files
Volume Names
Changing Dump Volumes
Appending To or Overwriting a Volume
Dumping Logs Stored on Mirrored Devices
Fully Recoverable DDL and dump transaction
execute
fetch
Status Information
fetch Restrictions
Using Scrollable Cursors with fetch_direction
Multiple Rows per Fetch
Rules for Positioning the Scrollable Cursor
goto label
grant
grant all Object Creation Privileges
Using the with grant option Parameter
Users and User Groups
Using the grant Command's granted by Option
Privileges for grant
Grant Access to Roles
Granting Default Permissions on System Tables
Granting Permissions for update statistics, delete statistics, and truncate table
Granting Proxies and Session Authorizations
Granting a Privilege to a Role
grant role
group by and having Clauses
How group by and having Queries with Aggregates Work
Standard group by and having Queries
Transact-SQL Extensions to group by and having
group by and having Clauses and Sort Orders
How group by Works With the Optimizer
if...else
insert
The Column List
Validating Column Values
Treatment of Blanks
Inserting Rows Selected from Another Table
Inserting Rows in Bulk
Transactions and insert
Inserting Values into IDENTITY Columns
Inserting Data Through Views
Partitoning Tables for Improved Insert Performance
kill
load database
Commands and System Procedures to Restore Databases
Restrictions for load database
Locking Out Users During Loads
Upgrading Database and Transaction Log Dumps
Specifying Dump Devices
Backup Servers
Volume Names
Changing Dump Volumes
Restoring the System Databases
Disk Mirroring
Materializing an Archive Database
Using load database with norecovery
Using Logical Devices with an Archive Database
load database Limitations with an Archive Database
load database and Encrypted Columns
Loading Compressed Data
load transaction
load transaction Restrictions
Restoring a Database
Recovering a Database to a Specified Time
Locking Users Out During Loads
Upgrading Database and Transaction Log Dumps
Specifying Dump Devices
Backup Servers
Volume Names
Changing Dump Volumes
Disk Mirroring
Loading a Transaction Log into an Archive Database
lock table
merge
mount
online database
open
order by clause
order by Clause Restrictions
Behavior of order by When Identical Table Column Name and Column Alias Name Exist
Collating Sequences
Sort Rules
Descending Scans
prepare transaction
print
quiesce database
Encrypted Columns and quiesce database
quiesce database in a Clustered Environment
raiserror
readtext
Using the readpast Option
Using readtext with unitext Columns
reconfigure
refresh precomputed result set
remove java
reorg
return
revoke
Using the revoke Command's granted by Option
Revoking set proxy and set session authorization
Revoking Default Permissions on System Tables
Revoking Permissions for update statistics, delete statistics, and truncate table
Using the cascade Option
revoke role
rollback
rollback trigger
save transaction
select
Using select into
Converting the NULL Properties of a Target Column with select...into
Specifying a Compression Level
Parameter Interactions with Data Compression
Using select for update
Specifying in-row LOB Columns
Specifying a Lock Scheme Using select...into
Specifying a Partition Strategy Using select...into
Using index, prefetch, and lru | mru
Using Encrypted Columns
Using parallel
Using readpast
Expanded select * Syntax
Using select with Variables, Global Variables, and Constants
set
set Options That Can Be Grouped Together
Compile-Time Changes for Some set Parameters
Aggregate Behavior
Comparison Behavior
Roles and set Options
In-Memory and Relaxed-Durability Databases
Setting Compression for a Session
Using Predicated Privileges
Distributed Transactions, CIS, and set Options
Using Proxies
Using lock wait
Repeatable-Reads Transaction Isolation Level
Using Simulated Statistics
Global Variables Affected by set Options
Using fipsflagger with Java in the Database
Restrictions for set tracefile
set Options That Save Diagnostic Information to a Trace File
Restrictions for show_sqltext
Exporting set Options from a Login Trigger
Delimited Identifiers
Bracketed Identifiers
setuser
shutdown
Specifying a Wait Time
transfer table
truncate lob
truncate precomputed result set
truncate table
union operator
unmount
update
Using update with Transactions
Using Joins in Updates
Using update with Character Data
Using update with Cursors
Updating IDENTITY Columns
Updating Data Through Views
Using index, prefetch, or lru | mru
Using readpast
Using Variables in update Statements
update all statistics
update index statistics
update statistics
Types of Scans Performed During update statistics
update statistics and Sampling
create index and Stored Procedures
Using Hash-Based Statistics
update table statistics
use
waitfor
where clause
while
writetext
Interactive SQL Commands
clear
configure
connect
disconnect
exit
input
output
parameters
read
set connection
start logging
stop logging
system
Reference Manual: Procedures 16.0
System Procedures
Permissions on System Procedures
Auditing System Procedures
Executing System Procedures
Entering Parameter Values
Messages
System Procedure Tables
sp_activeroles
sp_add_qpgroup
sp_add_resource_limit
sp_add_time_range
sp_addalias
sp_addauditrecord
sp_addaudittable
sp_addengine
sp_addexeclass
sp_addextendedproc
sp_addexternlogin
sp_addgroup
sp_addlanguage
System Table Changes
Dates for Languages Added with sp_addlanguage
sp_addlogin
sp_addmessage
sp_addobjectdef
sp_addremotelogin
sp_addsegment
sp_addserver
sp_addthreshold
Creating Additional Thresholds
Executing Threshold Procedures
Changing or Deleting Thresholds
Disabling Free-Space Accounting
The Last-Chance Threshold
Creating Threshold Procedures
sp_addtype
sp_addumpdevice
sp_adduser
sp_altermessage
sp_audit
sp_audit and Security
sp_autoconnect
sp_autoformat
sp_bindcache
sp_bindefault
sp_bindexeclass
sp_bindmsg
sp_bindrule
sp_cacheconfig
Data Cache Memory
Creating Cache for In-Memory or Relaxed Durability Databases
Changing Existing Caches
Using Cache Partitions
Dropping Caches
sp_cachestrategy
Overrides
sp_changedbowner
sp_changegroup
sp_checknames
sp_checkreswords
Handling Reported Instances of Reserved Words
Changing Identifiers
Using sp_rename to Change Identifiers
Changing Other Identifiers
Using Delimited Identifiers
sp_checksource
sp_chgattribute
sp_cleanpwdchecks
sp_clearpsexe
sp_clearstats
sp_client_addr
sp_cluster
sp_clusterlockusage
sp_cmp_all_qplans
sp_cmp_qplans
sp_commonkey
sp_companion
sp_compatmode
sp_config_dump
sp_confighistory
sp_configure
The sp_configure number of checkpoint tasks Parameter
The sp_configure max concurrently recovered db Parameter
Setting Configuration Parameters for Clusters Using sp_configure
sp_copy_all_qplans
sp_copy_qplan
sp_countmetadata
sp_cursorinfo
sp_dbextend
sp_dboption
Full Logging and sp_dboption
Shrinking the Log
Allowing Wide Rows Using sp_dboption
Asynchronous Log Service (ALS) Options
Considerations for Using enforce dump tran sequence
Database Options and sp_dboption
sp_dbrecovery_order
sp_dbremap
sp_defaultloc
sp_deletesmobj
sp_depends
Java Methods
sp_deviceattr
sp_diskdefault
sp_displayaudit
sp_displaylevel
sp_displaylogin
sp_displayroles
sp_downgrade
sp_dropalias
sp_drop_all_qplans
sp_drop_qpgroup
sp_drop_qplan
sp_drop_resource_limit
sp_drop_time_range
sp_dropdevice
sp_dropengine
sp_dropexeclass
sp_dropextendedproc
sp_dropexternlogin
sp_dropglockpromote
sp_ dropglockpromote_ptn
sp_dropgroup
sp_dropkey
sp_droplanguage
sp_droplogin
sp_dropmessage
sp_dropobjectdef
sp_dropremotelogin
sp_droprowlockpromote
sp_droprowlockpromote_ptn
sp_dropsegment
sp_dropserver
sp_dropthreshold
sp_droptype
sp_dropuser
sp_dump_history
sp_dump_info
sp_dumpoptimize
Thresholds and sp_dumpoptimize
sp_encryption
sp_engine
Using sp_engine āofflineā Versus sp_engine āshutdownā
sp_errorlog
sp_estspace
Estimating the Extra Space Required by a Column
sp_export_qpgroup
sp_extendsegment
sp_extengine
sp_extrapwdchecks
sp_familylock
sp_find_qplan
sp_fixindex
sp_flushstats
sp_forceonline_db
sp_forceonline_object
sp_forceonline_page
sp_foreignkey
sp_freedll
sp_getmessage
sp_grantlogin
sp_ha_admin
sp_help
Rules for Finding Objects
Precomputed Result Sets and sp_help
sp_help_resource_limit
sp_help_qpgroup
sp_help_qplan
sp_helpapptrace
sp_helpartition
Accuracy of Results and sp_helpartition
sp_helpcache
sp_helpcomputedcolumn
sp_helpconfig
Planning Metadata Cache Configuration with sp_helpconfig
Estimate Memory Requirements for compression info pool size
Using sp_helpconfig with sybdiagdb (SAP Product Support Only)
sp_helpconstraint
sp_helpdb
sp_helpdefrag
sp_helpdevice
sp_helpextendedproc
sp_helpexternlogin
sp_helpgroup
sp_helpindex
sp_helpjava
sp_helpjoins
sp_helpkey
sp_helplanguage
sp_helplog
sp_helpmaplogin
sp_helpobjectdef
sp_helpremotelogin
sp_helprotect
sp_helpsegment
sp_helpserver
sp_helpsort
sp_helptext
sp_helpthread
sp_helpthreshold
sp_helptrigger
sp_helpuser
sp_hidetext
sp_import_qpgroup
sp_indsuspect
sp_jreconfig
sp_ldapadmin
sp_listener
sp_listsuspect_db
sp_listsuspect_object
sp_listsuspect_page
sp_lmconfig
sp_lock
sp_locklogin
sp_logdevice
sp_logging_rate
sp_loginconfig
sp_logininfo
sp_logiosize
sp_logintrigger
sp_maplogin
sp_merge_dup_inline_default
sp_metrics
sp_modify_resource_limit
sp_modify_time_range
sp_modifylogin
sp_modifystats
sp_modifythreshold
Crossing a Threshold
The Last-Chance Threshold
Create Threshold Procedures with sp_modifythreshold
Execute Threshold Procedures with sp_modifythreshold
Disable Free-Space Accounting
sp_monitor
sp_monitorconfig
sp_monitor_server
sp_object_stats
sp_objectsegment
sp_opt_querystats
sp_optgoal
sp_options
sp_passthru
Return Parameters and sp_passthru
sp_password
sp_passwordpolicy
Login Password Complexity Checks and sp_passwordpolicy
High-Availability and Password Policy Options
sp_pciconfig
sp_placeobject
sp_plan_dbccdb
sp_poolconfig
Wash Percentage and sp_poolconfig
Local Asynchronous Prefetch Percentage and sp_poolconfig
sp_post_xpload
Handling Suspect Partitions in Cross-Platform Dump and Load Operations
sp_primarykey
sp_processmail
sp_procxmode
sp_querysmobj
sp_recompile
sp_refit_admin
sp_remoteoption
sp_remotesql
sp_rename
sp_rename_qpgroup
sp_renamedb
sp_reportstats
sp_restore_system_role
sp_revokelogin
sp_role
sp_securityprofile
sp_sendmsg
sp_serveroption
sp_set_qplan
sp_setlangalias
sp_setpglockpromote
sp_setpglockpromote_ptn
sp_setpsexe
sp_setrowlockpromote
sp_setrowlockpromote_ptn
sp_setsuspect_granularity
sp_setsuspect_threshold
sp_setup_table_transfer
sp_shmdumpconfig
sp_show_options
sp_showcontrolinfo
sp_showexeclass
sp_showoptstats
sp_showplan
sp_showpsexe
sp_spaceusage
Interpreting PctBloatUsedPages and PctBloatReservedPages Values
Output Columns from sp_spaceusage
sp_spaceused
sp_ssladmin
Using lsciphers and setciphers to Set Cipher Suites
sp_syntax
sp_sysmon
sp_tab_suspectptn
sp_tempdb
sp_tempdb_markdrop
sp_thresholdaction
sp_tran_dumpable_status
sp_transactions
sp_unbindcache
sp_unbindcache_all
sp_unbindefault
sp_unbindexeclass
sp_unbindmsg
sp_unbindrule
sp_version
sp_volchanged
When Backup Server Detects a Problem
Changing Tape Volumes on UNIX
sp_webservices
sp_who
sp_xact_loginfo
sp_xmlschema
Catalog Stored Procedures
Specifying Optional Parameters
Pattern Matching
System Procedure Tables
ODBC Datatypes
sp_column_privileges
sp_columns
sp_databases
sp_datatype_info
sp_fkeys
sp_pkeys
sp_server_info
sp_special_columns
sp_sproc_columns
sp_statistics
sp_stored_procedures
sp_table_privileges
sp_tables
System Extended Stored Procedures
xp_cmdshell
xp_deletemail
xp_enumgroups
xp_findnextmsg
xp_logevent
xp_readmail
xp_sendmail
xp_startmail
xp_stopmail
dbcc Stored Procedures
Specifying the Object Name and Date
Specifying the Object Name
Specifying the Date
sp_dbcc_alterws
sp_dbcc_configreport
sp_dbcc_createws
sp_dbcc_deletedb
sp_dbcc_deletehistory
sp_dbcc_differentialreport
sp_dbcc_evaluatedb
sp_dbcc_exclusions
sp_dbcc_faultreport
sp_dbcc_fullreport
sp_dbcc_help_fault
sp_dbcc_patch_finishtime
sp_dbcc_recommendations
sp_dbcc_runcheck
sp_dbcc_statisticsreport
sp_dbcc_summaryreport
sp_dbcc_updateconfig
Reference Manual: Tables 16.0
System Tables
Locations of System Tables
System Tables in master
System Tables in sybsecurity
System Table in sybsystemdb
System Tables in All Databases
The sybdiagdb Database
The syblicenseslog Table
Using System Tables in the Cluster Edition
timestamp Columns
Changed Identity Values
Controlling Fake-Table Materialization
Rules for Using System Tables
Permissions on System Tables
Locking Schemes Used for System Tables
Reserved Columns
Updating System Tables
Triggers on System Tables
ch_events
sysdams
syblicenseslog
sysalternates
sysaltusages
sysattributes
sysauditoptions
sysaudits_01 ā sysaudits_08
syscacheinfo
syscachepoolinfo
syscharsets
syscolumns
syscomments
sysconfigures
sysconstraints
syscoordinations
syscurconfigs
sysdatabases
sysdepends
sysdevices
sysencryptkeys
sysengines
sysgams
sysindexes
sysinstances
sysjars
syskeys
syslanguages
syslisteners
syslocks
sysloginroles
syslogins
syslogs
syslogshold
sysmessages
sysmonitors
sysobjects
sysoptions
syspartitionkeys
syspartitions
syspoolinfo
sysprocedures
sysprocesses
sysprotects
sysquerymetrics
sysqueryplans
sysreferences
sysremotelogins
sysresourcelimits
sysroles
syssecmechs
syssegments
sysservers
syssessions
sysslices
syssrvroles
sysstatistics
systabstats
systhresholds
systimeranges
systransactions
systypes
sysusages
sysusermessages
sysusers
sysxtypes
dbccdb Tables
dbccdb Workspaces
dbccdb Log
dbcc_config
dbcc_counters
dbcc_exclusions
dbcc_fault_params
dbcc_faults
dbcc_operation_log
dbcc_operation_results
dbcc_types
Monitoring Tables
monCachedObject
monCachePool
monCachedProcedures
monCachedStatement
monCIPC
monCIPCEndpoints
monCIPCLinks
monCIPCMesh
monCLMObjectActivity
monClusterCacheManager
monCMSFailover
monDataCache
monDBRecovery
monDBRecoveryLRTypes
monDeadLock
monDeviceIO
monDeviceSpaceUsage
monEngine
monErrorLog
monFailoverRecovery
monInmemoryStorage
monIOController
monIOQueue
monLicense
monLocks
monLockTimeout
monLogicalCluster
monLogicalClusterAction
monLogicalClusterInstance
monLogicalClusterRoute
monMemoryUsage
monNetworkIO
monOpenDatabases
monOpenObjectActivity
monOpenPartitionActivity
monPCIBridge
monPCIEngine
monPCISlots
monPCM
monProcedureCache
monProcedureCacheMemoryUsage
monProcedureCacheModuleUsage
monProcess
monProcessActivity
monProcessLookup
monProcessMigration
monProcessNetIO
monProcessObject
monProcessProcedures
monProcessSQLText
monProcessStatement
monProcessWaits
monProcessWorkerThread
monRepCoordinator
monRepLogActivity
monRepScanners
monRepScannersTotalTime
monRepSchemaCache
monRepSenders
monSpinlockActivity
monSQLRepActivity
monSQLRepMisses
monState
monStatementCache
monSysExecutionTime
monSysLoad
monSysPlanText
monSysSQLText
monSysStatement
monSysWaits
monSysWorkerThread
monTableColumns
monTableCompression
monTableParameters
monTables
monTableTransfer
monTask
monTempdbActivity
monThread
monThreadPool
monThresholdEvent
monWaitClassInfo
monWaitEventInfo
monWorkload
monWorkloadPreview
monWorkloadProfile
monWorkloadRaw
monWorkQueue
sybpcidb Tables
pca_jre_arguments
pca_jre_directives
pci_arguments
pci_directives
pci_slotinfo
pci_slot_syscalls
Active Messaging Users Guide 15.7
Introduction
Active Messaging concepts
Automatic decisions in real time
Messaging models
JMS
WebSphere MQ messaging models
Message format
JMS message properties
MQ message topics
Message selectors
Understanding Active Messaging
Sending and receiving messages from a queue
Publishing and consuming messages from a JMS topic
Working with message properties
Previewing the messaging interface
MQ overview
Securing channels with SSL
MQ publish/subscribe
Syntax for topics
Publisher and subscriber identities
MQ publish/subscribe examples
Working with MQ cluster queue objects
Working with remote queue objectsļæ½
Working with text messaging
Text messages and JMS
Text messages and MQ
Adaptive Server Cluster Edition support
Login redirection
Extended high availability
Active Messaging support for the threaded kernel
Internationalization support
Transactional message behavior
Transactional messaging set option
MQ security
Connecting to the MQ queue manager
Installing MQ client on Adaptive Server host machines
MQ authorizations
Querying MQ information
SQL Reference
Message-related global variables
<msgheader> and <msgproperties> documents
Adaptive Server-specific message properties
Keywords
Stored procedures
Built-in functions
Syntax segments
sp_configure 'enable real time messaging'
sp_engine
sp_msgadmin
msgconsume
msgpropcount
msgproplist
msgpropname
msgproptype
msgpropvalue
msgpublish
msgrecv
msgsend
msgsubscribe
msgunsubscribe
endpoint
option_string
sizespec
timespec
Samples
Sybase directories
Using code samples with SQL
Using code samples with Java/JDBC
Glossary
Component Integration Services Users Guide 16.0
Introduction to Component Integration Services
Component Integration Services Concepts
Proxy Tables
Using the create table Command
Using the create existing table Command
Datatype Conversions
Using the create proxy_table Command
Remote Procedures as Proxy Tables
Server Limits
Cascading Proxy Tables
Proxy Databases
User Proxy Databases
User Proxy Database Schema Synchronization
System Proxy Databases
System Proxy Database Creation
Schema Synchronization When Current Database Has a System Proxy Database
Stored Procedure Execution Within a System Proxy Database
File System Access
Directory Access
Recursion Through Subordinate Directories
File Access
Remote Servers
Connection Management
Connecting to Remote Servers Without the Interfaces File
LDAP Directory Services
Secure Communication with SSL
Using Trusted Roots Files
Secure Communication Using Kerberos
Configuring Kerberos security services
Configuring the Remote SAP ASE Kerberos Principal Name
Configuring Component Integration Services Remote Procedure Calls
Security Issues
Using Encrypted Columns in CIS
Remote Server Logins
Connecting to Backup Server and XP Server
Mapping External Logins
Configuring Failover for Remote Server Connections
Remote Server Capabilities
Query Processing
RPC handling and Component Integration Services
Site Handler and Outbound RPCs
Configuring Component Integration Services for Outbound RPCs
Text Parameters for RPCs
Text Parameter Support for XJS/390
Distributed Transaction Management
DTM-Enabled Servers
Pre-DTM servers
strict DTM enforcement
Enable Component Integration Services
Transactional RPCs
Restrictions on Transaction Management
SAP ASE to SAP ASE update statistics
Updating Statistics on Non-SAP ASE Backends
Java in the Database
Constraints on Java Class Columns
Java Abstract Datatypes (ADTs)
Java Class Definitions
Datatypes
Unicode support
Datatype Conversions
text and image Datatypes
Limits of @@textsize
Odd Bytes Padded
Converting text and image Datatypes
Pattern Matching with text and unitext Data
Entering text and image Values
readtext using bytes
Restriction for text, image, and unitext with bulk copy
Considerations for Using text, unitext, and image data with Server Classes
Configuration and Tuning
Using sp_configure
sysconfigures Table
Changing the Configuration Parameters
Using Global Variables to Determine Status
CIS Support for HANA Server
Configuring CIS for HANA
Creating SAP HANA as an ODBC Data Source on Windows
Adding SAP HANA to the SAP ASE Interfaces File
Configuring the PCI Bridge and PCA/ODBC
Adding Server Class HANAODBC
Datatype Mapping Between SAP ASE and HANA
Restrictions
SQL Reference
dbcc Commands
dbcc Options
Trace Flags
Functions
Aggregate Functions
Datatype Conversion Functions
Date Functions
Mathematical Functions
Security Functions
String Functions
System Functions
Text and Image Functions
Transact-SQLCommands
alter table
case
connect to...disconnect
create existing table
create index
create table
delete
drop index
fetch
insert
readtext
select
truncate table
update
update statistics
writetext
Passthrough Mode
The connect to Command
The sp_autoconnect System Procedure
The sp_passthru System Procedure
The sp_remotesql System Procedure
Quoted Identifier Support
Delimited Identifier Support
auto identity Option
Triggers
Tutorial
Adding a Remote Server
Creating Server Entries in System Tables
Adding an Alternate Login and Password
Verifying Connectivity
Performing a Join Between Two Remote Tables
Troubleshooting
Problems Accessing Component Integration Services
Problems Using Component Integration Services
Unable to Access Remote Server
Unable to Access Remote Objects
Problem Retrieving Data from Remote Objects
If You Need Help
Compression Users Guide 16.0
Data Compression Overview
Enabling Data Compression
Selecting Data into Compressed Tables
Administering Compressed Databases
Session-Level Data Compression
Copy, Dump, and Load Compressed Data
Limits for Database Compression
Levels of Data Compression
Row-Level Compression
Page-Level Compression
Creating Databases for Data Compression
Altering the Compression Level of a Database
Creating a Compressed Table
Disabling Compression
Altering the Compression Level of a Table or Partition
Index Compression
Enabling Index Compression
Creating an Index Compressed Table
Creating a Compressed Index
Changing the Index Compression State
Datatypes Available for Compression
Compressed Data Storage Strategies
Compressed Columns with Large Objects
Creating a Compressed Database with LOB Datatypes
Creating Compressed Tables with LOB Datatypes
Altering Tables with Compressed LOB Datatypes
Administering Compressed Databases
Session-Level Data Compression
Copy, Dump, and Load Compressed Data
Limits for Database Compression
Database Encryption 16.0
Overview of Encryption
Full Database Encryption
Column Encryption
Protect Data with Encryption Keys
Creating the Database Encryption Key
Dropping a Database Encryption Key
Changing a Database Encryption Key
Creating Column Encryption Keys
Dropping Column Encryption Keys
Changing the Column Encryption Key
Key Protection
Grant Access to Keys
Separate Keys from Data
Key Encryption
Protect Encryption Keys with the Master Key
Protect Encryption Keys with the System-Encryption Password
Protect Keys with User-Specified Passwords
Protect Encryption Keys with Dual Control
Database-Level Master and Dual Master Keys
Creating the Master and Dual Master Keys
Creating Master Key Copies
Setting Passwords for the Master and Dual Master Keys
Altering Passwords and Key Encryption Keys for Master Key Copies
Regenerate Master Keys
Dropping Master Keys and Key Copies
Recovering the Master Key and Dual Master Key
Starting SAP ASE in Unattended Start-Up mode
Configure Unattended Start-Up Mode
Create the Master Key Start-Up File
How SAP ASE Uses the Master Key Start-Up File
Secure External Passwords and Hidden Text
Service Keys
Creating Service Keys
Dropping Service Keys
Modify Service Keys
Changing the syb_extpasswdkey
Changing the syb_syscommkey
Service Keys with External Passwords
SSL Passwords
LDAP Passwords
Replication Agent Passwords
Service Keys Encrypted with the Master Key
Database Encryption
Create an Encrypted Database
Encrypt an Existing Database
Encryption Status and Progress
Performance Considerations
Suspend the Encryption Process
The quiesce database Command and Fully Encrypted Databases
Resume the Encryption Process
Decrypt an Encrypted Database
Recover Fully Encrypted Databases
Back Up (Dump) a Fully Encrypted Database
Back Up the Database Encryption Key
Restore (Load) Backups of Fully Encrypted Databases
Loading Behavior of Encrypted Databases
Dropping a Database That is Being Encrypted
Mounting and Unmounting a Fully Encrypted Database
Archive Databases and Full Encryption
Column Encryption
Encrypting Columns on New Tables
Specifying Encryption on select into
Encrypting Columns in Existing Tables
Index Creation and Constraints on Encrypted Columns
Domain Creation and Access Rules on Encrypted Columns
Decrypt Permission
Revoking Decryption Permission
Restrict Decrypt Permission
Default Values Returned Instead of Decrypted Data
Defining Decrypt Defaults
Permissions and Decrypt Default
Columns with Decrypt Default Values
Decrypt Default Columns and Query Qualifications
decrypt default and Implicit Grants
decrypt default and insert, update, and delete Statements
Removing Decrypt Defaults
Length of Encrypted Columns
Encrypted Columns Audits
Event Names and Numbers
Passwords Masked in Command Text Auditing
Auditing Actions of the Key Custodian
Performance Considerations
Indexes on Encrypted Columns
Sort Orders and Encrypted Columns
Joins on Encrypted Columns
Search Arguments and Encrypted Columns
Movement of Encrypted Data as Cipher Text
Access Encrypted Data
Encrypted Columns Process
Permissions for Decryption
Drop Encryption
Role of the Key Custodian
Users, Roles, and Data Access
Key Protection Using User-Specified Passwords
Change a Keyās Protection Method
Create Key Copies
Change Passwords on Key Copies
Access Encrypted Data with a User Password
Application Transparency Using Login Passwords on Key Copies
Login Password Change and Key Copies
Dropping a Key Copy
Key Recovery from Lost Passwords
Loss of Password on Key Copy
Loss of Login Password
Loss of Password on Base Key
Key Recovery Commands
Ownership Change of Encryption Keys
In-Memory Database Users Guide 15.7
In-Memory Databases
Cache and buffer support
Durability levels
Temporary databases and in-memory temporary databases
Multidatabase transactions and database types
Template databases
Altering the database to use a new template
Minimally logged commands
Limits for in-memory and relaxed-durability databases
Changed system procedures
Managing In-Memory and Relaxed-Durability Databases
Specifying named caches for in-memory databases
Verifying changes to the configuration file
Changing static configuration parameters for in-memory databases
Creating in-memory devices
Creating in-memory databases
Creating disk-resident databases with relaxed durability
Administering in-memory databases
Resizing in-memory storage caches
Deleting in-memory storage caches
Increasing the size of in-memory databases
Dumping and loading in-memory databases
Configuring number of backup connections
Dropping in-memory databases
Dropping in-memory devices
Minimally Logged DML
Types of DML logging settings
Database-level logging
Table-level logging
Session-level logging
Additional minimal logging rules
Transactional semantics
Logging concurrent transactions
Minimal logging with ddl in tran set to true
Effect of referential integrity constraints
Multistatement transactions in minimally logged mode
Stored procedures and minimally logged DML
Including set dml_logging in a trigger
Using deferred updates
Obtaining diagnostic information
Performance and Tuning for In-Memory Databases
Configuring in-memory storage cache
Cache layout
sp_sysmon output for in-memory databases
Monitoring the default data cache performance
Organizing physical data for in-memory devices
Performance optimization for low-durability databases
Tuning checkpoint intervals
Minimally logged DML
Dumping and loading in-memory databases
Tuning for spinlock contention and network connections
Improving contention for lock manager hashtable spinlock ratios
Determining the number of network connections
Java in Adaptive Server Enterprise 15.7
An Introduction to Java in the Database
Advantages of Java in the database
Capabilities of Java in the database
Invoking Java methods in the database
Storing Java classes as datatypes
Storing and querying XML in the database
Java components
Functional changes in Adaptive Server 15.0.3 and later
Changes in class distribution
The PCA/JVM runs in headless mode
Changes in memory management
Changes in ClassLoader behavior
Standards
Java in the database: questions and answers
What are the key features?
How are Java instructions stored in the database?
How is Java executed in the database?
Which Java Virtual Machines (JVMs) are supported?
What is headless mode?
What about JDBC?
How can Java and SQL be used together?
What is the Java API?
Which Java classes are supported in the Java API?
Can user-defined classes be installed in the database?
Can data be accessed using Java?
Can the same classes be used on the client and the server?
How to use Java classes in SQL
Where can information about Java in the database be found?
What you cannot do with Java in the database
Managing the Java Environment
Components of the Java environment
The JVM pluggable component
Pluggable component adapter JVM (PCA/JVM)
Pluggable component interface (PCI) and the PCI Bridge
The PCI memory pool
The sybpcidb database
How configuration values are organized in sybpcidb
When to change configuration values
Server-level options
Configuration options for the PCI Bridge
Configuration options for the PCA/JVM
Changing configuration values in a running server
Changing configuration values by restarting Adaptive Server
Changing configuration values before the JVM is initialized
Changing configuration values after the JVM is initialized
Restoring default configuration values to sybpcidb
Using monitor tables to display information about the PCI Bridge
Preparing for and Maintaining Java in the Database
The Java runtime environment
Java classes in the database
Sybase runtime Java classes
User-defined Java classes
JDBC drivers
The JVM
Enabling Java
Installing Java classes in the database
Using installjava
Installing uncompressed JARs
Retaining the JAR file
Updating installed classes
Referencing other Java-SQL classes
Viewing information about installed classes and JARs
Downloading installed classes and JARs
Removing classes and JARs
Retaining classes
Using Java Classes in SQL
General concepts
Java considerations
Java-SQL names
Using Java classes as datatypes
Creating and altering tables with Java-SQL columns
Altering partitioned tables
Selecting, inserting, updating, and deleting Java objects
Invoking Java methods in SQL
Sample methods
Exceptions in Java-SQL methods
Representing Java instances
Assignment properties of Java-SQL data items
Datatype mapping between Java and SQL fields
Character sets for data and identifiers
Subtypes in Java-SQL data
Widening conversions
Narrowing conversions
Runtime versus compile-time datatypes
Treatment of nulls in Java-SQL data
References to fields and methods of null instances
Null values as arguments to Java-SQL methods
Null values when using the SQL convert function
Java-SQL string data
Zero-length strings
Type and void methods
Java void instance methods
Java void static methods
Equality and ordering operations
Evaluation order and Java method calls
Columns
Variables and parameters
Deterministic Java functions in expressions
Static variables in Java-SQL classes
Changes for static variables for Adaptive Server 15.0.3 and later
Changes for static variables for the Cluster Edition
Java classes in multiple databases
Scope
Cross-database references
Inter-class transfers
Passing inter-class arguments
Temporary and work databases
Java classes
Data Access Using JDBC
Overview
JDBC concepts and terminology
Differences between client- and server-side JDBC
Permissions
Using JDBC to access data
Overview of the JDBCExamples class
The main( ) and serverMain( ) methods
Using main( )
Using serverMain( )
Obtaining a JDBC connection: the Connecter( ) method
Routing the action to other methods: the doAction( ) method
Executing imperative SQL operations: the doSQL( ) method
Executing an update statement: the updater( ) method
Executing a select statement: the selecter( ) method
Calling a SQL stored procedure: the caller( ) method
Error handling in the native JDBC driver
The JDBCExamples class
The main( ) method
The serverMain( ) method
The connecter( ) method
The doAction( ) method
The doSQL( ) method
The updater( ) method
The selecter( ) method
The caller( ) method
SQLJ Functions and Stored Procedures
Overview
Compliance with SQLJ Part 1 specifications
General issues
Security and permissions
SQLJ Examples
Invoking Java methods in Adaptive Server
Using Sybase Central to manage SQLJ functions and procedures
SQLJ user-defined functions
Handling null argument values
Handling nulls when creating the function
Handling nulls in the function call
Deleting a SQLJ function name
SQLJ stored procedures
Modifying SQL data
Using input and output parameters
Returning result sets
Deleting a SQLJ stored procedure name
Viewing information about SQLJ functions and procedures
Advanced topics
Mapping Java and SQL datatypes
Using the command main method
SQLJ and Sybase implementation: a comparison
SQLJExamples class
Debugging Java in the Database
Supported Java debuggers
Setting up Java debugging
Configuring the server to support debugging
Attaching the remote debugger to the JVM debug agent
File and Network Access Using Java
File access using java.io
User identity and permissions
Specifying directories for file I/O: UNIX platforms
Mask syntax
Examples
Specifying directories for file I/O: Windows platforms
Mask syntax
Examples
File I/O changes
Rules for opening existing files
UNIX platforms
Windows platforms
Rules for creating files with a file open operation
Final file check
File access using java.net
Examples
Using socket classes
Using the URL classes
Additional Topics
JDK requirement for Java classes in the server
Assignments
Assignment rules at compile-time
Assignment rules at runtime
Allowed conversions
Transferring Java-SQL objects to clients
Suggestions for improving performance
Minimize the number of calls from SQL to the JVM
Use the java.lang.Thread class with care
Determine if you are running within the PCA/JVM
Avoid SQL loops in a multi-engine environment
Controlling access to native methods in the PCA/JVM
Unsupported Java API packages, classes, and methods
Restricted Java packages, classes, and methods
Unsupported java.sql methods and interfaces
Invoking SQL from Java
Special considerations
Transact-SQL commands from Java methods
Datatype mapping between Java and SQL
Java-SQL identifiers
Java-SQL class and package names
Java-SQL column declarations
Java-SQL variable declarations
Java-SQL column references
Java-SQL member references
Java-SQL method calls
Glossary
Job Scheduler Users Guide 16.0
Unified Agent and Agent Management Console Users Guide 2.0.2
About this book
Overview
What is Unified Agent?
Services provided
Agent Management Console
Installing and Configuring Unified Agent and Agent Management Console
Pre-installation tasks
Installing Unified Agent
Starting the JINI server
Starting and stopping Unified Agent
Starting Unified Agent as a service on UNIX platforms
Starting Unified Agent as a service on Windows platforms
Installing the Agent Management Console
Configuring Unified Agent
Post-configuration tasks
Security
Unified Agent security
Encryption
Authentication
Login modules
Security module control flags
Authorization
Role mappings
Permissions
Agent Management Console Features and Functionality
Managing look-up services
Creating a network lookup profile
Discovering Unified Agents
Deleting a network look-up profile
Changing a network look-up profile
Specifying a network plug-in name filter
Managing Unified Agents
Manually adding an agent
Connecting to an agent
Adding credentials
Disconnecting from an agent
Restarting an agent
Retrieving the agent log
Viewing and changing agent properties
Managing discovery adaptors
Creating a discovery adaptor
Deleting a discovery adaptor
Viewing and changing discovery adaptor properties
Setting discovery adaptor password
Managing security modules
Creating a security module
Deleting a security module
Ordering the security module authentication
Viewing and changing security module properties
Setting a security module password
Managing role mappings
Creating a role mapping
Managing agent services
Starting an agent service
Restarting an agent service
Stopping an agent service
Viewing agent service properties
Managing agent plug-ins
Loading an agent plug-in
Unloading an agent plug-in
Reloading an agent plug-in
Viewing agent plug-in properties
Server-based plug-ins
Pinging the server
Starting the server
Restarting the server
Stopping the server
Retrieving the server log
Managing attributes
Viewing attributes
Updating attribute values
Viewing properties and changing permissions
Managing operations
Viewing operations
Password Encryption and Security Configuration
Password encryption utility
Enabling Rivest-Shamir-Adleman (RSA) encryption
Adaptive Server agent plug-in server password encryption
Pluggable Authentication Module (PAM) configuration
SNMP Agent Plug-in
Overview
Terminology
Sybase Adaptive Server MIB
Unified Agent SNMP services and plug-ins
UAF SNMP Service
UAF SNMP Service MIBs
Adaptive Server-to-SNMP client architecture
Security
Security for connections from Adaptive Server
Security for connections from SNMP
Configuring Adaptive Server for the SNMP Agent Plug-in
TDS services
UAF SNMP Agent Service
Adaptive Server runtime
Using the Adaptive Server SNMP Agent Plug-in
Viewing the SNMP information from NET-SNMP
Sybase MIB
Tabular Data Stream (TDS) Service
What is TDS?
Using the TDS service
UAF services
uaf_list_service_operations
uaf_list_services
uaf_list_service_operation_arguments
uaf_invoke_service_operation
uaf_list_service_attributes
uaf_get_service_attribute
uaf_set_service_attribute
UAF plug-ins
uaf_list_plugins
uaf_list_plugin_operations
uaf_list_plugin_operation_arguments
uaf_invoke_plugin_operation
uaf_list_plugin_attributes
uaf_get_plugin_attribute
uaf_set_plugin_attribute
TDS listener client examples
Setting up examples for the Adaptive Server client
Examples for configuring the Adaptive Server client
Examples for using the Adaptive Server client
Examples for configuring the Adaptive Server client
Reporting functionality and error recovery
Using Backup Server with IBM Tivoli Storage Manager 16.0
Using SAP Failover in a High Availability System 16.0
Web Services Users Guide 15.7 ESD #2
Understanding Adaptive Server Enterprise Web Services
Overview
Adaptive Server Enterprise Web Services
Advantages of ASE Web Services
Stored procedures and functions
SQL
Security
LDAP
User-defined Web services
Web services standards
XML
Example
XML document structure
WSDL
SOAP
SOAP message structure
Understanding the ASE Web Services Engine
Producer of Web services
Producer components
Producer Web methods
User-defined Web services
Consumer of Web services
Consumer components
SDS server
SOAP stack
Proxy tables
Web Services engine as a consumer versus producer
Installing and Configuring ASE Web Services
Installing Web Services
Configuring Web Services
Configuring during installation
Configuring after installation
Licensing
Configuration files
Security
Configuring SSL
Installing a certificate for Microsoft .NET
Using ASE Web Services
Using the ASE Web Services Engine
Starting and stopping the ASE Web Services Engine
Conditions
Verification
ASE Web Services methods
execute
login
logout
Using sp_webservices
add
help
list
modify
remove
Invoking a Web service
Using user-defined Web services
Commands for user-defined Web services
create service
drop service
Using sp_webservices with user-defined Web services
addalias
deploy
dropalias
listudws
listalias
undeploy
Security for user-defined Web services
Auditing for user-defined Web services
Auditing sp_webservices ādeployā
Auditing sp_webservices āundeployā
ASE Web Services logging
Rolling over log files
Using Sybase Central
Sample Applications
Apache sample client
Creating the sample client
Using runexecute
Microsoft .NET sample client
Creating the sample client
Using Execute.exe
Troubleshooting
Troubleshooting issues
Remote server class definition setting
Unmapped RPC/encoded Web method
Truncated document/literal results
Starting ASE Web Services Engine
Locating WSDL
Specifying entries in ws.properties
Windows NT command-line arguments
Run or stop scripts fail
Null passwords
Specifying SOAP endpoints with SSL
Abnormal termination of sp_webservices āaddā
Web Services proxy table restrictions
sysattributes table entry
Diagnostic tools
Detailed logging
Enabling JDBC-level tracing
Messages
Installation Contents
ASE Web Services directory tree
Configuration Properties
ws.properties
myres.properties
Specifying properties file entries
SOAP and Adaptive Server Enterprise Datatype Mapping
Datatype mapping
SOAP-to-ASE datatype mappings
ASE-to-SOAP datatype mappings for the create service command
Glossary
XA Interface Integration Guide for CICS, Encina, and TUXEDO 15.7
The Sybase XA Environment
Definitions
Overview of the X/Open DTP model
Components of the model
How the components communicate
How the components interact
Recovery
The Sybase XA environment
Components of the Sybase XA environment
Connections in the Sybase XA environment
Identifying connections via LRMs
Where is the connection information stored?
Establishing connections
Distributing work across LRMs
Configuring the XA Environment
Configuring Adaptive Server
Open string parameters for the DTM XA Interface
Open string parameters
dtm_tm_role required for username
Log file and trace flag parameters
Labels for logfile entries
xa_open() function behavior
XA configuration file for DTM XA Interface
Environment variable for specifying the configuration file
[all] section for defining common LRM parameters
Parameter definitions for [all] section
Editing the XA configuration file
Additional capabilities, properties, and options
Using the DTM XA Interface with CICS
Building the switch-load file
Compiling the switch-load file on IBM RISC System/6000 AIX
Compiling the switch-load file on HP9000 Series 800 HP-UX
Compiling the switch-load file on Sun Solaris 2.x (SPARC)
Adding a Sybase stanza to the CICS region XAD definition
Using the DTM XA Interface with Encina
Assigning an open string with monadmin create rm
Initializing LRMs with mon_RegisterRmi
Linking applications with DTM XA Interface libraries
Establishing connections
Using the DTM XA Interface with TUXEDO
Linking
Setting up the UBBCONFIG file
Creating the TUXEDO configuration file
Building the TMS
Building the COBOL runtime environment
Application Programming Guidelines
X/Open DTP versus traditional Sybase transaction processing
Managing transactions and connections
Managing transactions
Managing connections
The current connection
Nontransactional connections
Deallocating cursor function with Client-Library
Dynamic SQL
Obtaining a Client-Library connection handle
Multiple-thread environment issues
Caveats of thread use
Embedded SQL thread-safe code
Tightly coupled transactions
Linking with CT Library
Sample embedded SQL COBOL fragment
Sample embedded SQL C fragment
XML Services 15.7
Introduction to XML Services
XML capabilities
Overview
XML in the database
A sample XML document
HTML display of Order data
XML document types
XML Query Functions
XML query functions
Example sections
xmlextract
xmltest
xmlparse
xmlrepresentation
xmlvalidate
option_strings: general format
Option values for query functions.
XML Language and XML Query Language
Character set support
URI support
Namespace support
XML schema support
Predefined entities in XML documents
Predefined entities in XPath queries
White space
Empty elements
XML Query Language
XPath-supported syntax and tokens
XPath operators
XPath basic operators
XPath set operators
XPath comparison operators
XPath functions
General guidelines and examples
Functions
Parenthesized expressions
Parentheses and subscripts
Parentheses and unions
for xml Mapping Function
for xml clause
for xml subqueries
for xml schema and for xml all
XML Mappings
SQLX options
SQLX option definitions
SQLX data mapping
Mapping duplicate column names and unnamed columns
Mapping SQL names to XML names
Mapping SQL values to XML values
Numeric values
Character values
Binary values
XML Support for I18N
Overview
Unicode datatypes
Surrogate pairs
Numeric character representation
Client-server conversions
Character sets and XML data
I18N in for xml
Option strings
Numeric Character Representation in for xml
header option
Exceptions
Examples
Example 1
Example 2
Example 3
Example 4
Example 5
Example 6
Example 7
I18N in xmlparse
Options
Sort ordering in xmlparse
I18N in xmlextract
NCR option
Sort ordering in xmlextract
Sort ordering in XML Services
I18n in xmlvalidate
NCR option
xmltable()
Introduction
xmltable and derived table syntax
xmltable
The sample_docs Example Table
sample_docs table columns and rows
Sample_docs table columns
sample_docs table rows
sample_docs tables
Table script (for publishers table)
Publishers table representation
Titles table representation
XML Services and External File System Access
Getting Started
Enabling XML services and External File System Access
Character set conversions with external file systems
Examples
Setting up your XML documents and creating the proxy table
Example: extracting the book title from the XML documents
Example: importing XML documents or XML query results to an Adaptive Server table
Example: storing parsed XML documents in the file system
Example: 'xmlerror' option capabilities with External File Access
Example: specifying the 'xmlerror=messageā option in xmlextract
Example: parsing XML and non-XML documents with the 'xmlerror=message' option
Example: using the option 'xmlerror=null' for non-XML documents
Migrating Between the Java-based XQL Processor and the Native XML Processor
Introduction
Migrating documents and queries
Migrating documents between the Java-based XQL processor and the native XML processor
Migrating text documents between the Java-based XQL processor and the native XML processor
Migrating documents from regenerated copies
Regenerating text documents from the Java-based XQL processor
Regenerating text documents from the native XML processor
Migrating queries between the native XML processor and the Java-based XQL processor
Sample Application for xmltable()
Sample table
Using the depts document
The depts document structure
Creating SQL tables from the depts document
Normalizing the data from the depts document
Generating tables using select
SAP Adaptive Server Enterprise 16.0 (Japanese)
New Features Summary SAP Adaptive Server Enterprise 16.0 (Japanese)
New Features Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
Utility Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Japanese)
Users Guide Adaptive Server Enterprise ADO.NET Data Provider (Japanese)
Users Guide Adaptive Server Enterprise ODBC Driver by Sybase for Microsoft Windows and UNIX (Japanese)
Programmers Guide Adaptive Server Enterprise Extension Module for Python (Japanese)
Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Japanese)
Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Japanese)
Programmers Reference jConnect for JDBC 7.07 SP100 (Japanese)
SAP Control Center Release Bulletin (Japanese)
SAP Control Center for Adaptive Server Enterprise (Japanese)
New Features Summary SAP Adaptive Server Enterprise 16.0 (Japanese)
New Features Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Japanese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Japanese)
Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
Utility Guide SAP Adaptive Server Enterprise 16.0 (Japanese)
New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Japanese)
Users Guide Adaptive Server Enterprise ADO.NET Data Provider (Japanese)
Users Guide Adaptive Server Enterprise ODBC Driver by Sybase for Microsoft Windows and UNIX (Japanese)
Programmers Guide Adaptive Server Enterprise Extension Module for Python (Japanese)
Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Japanese)
Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Japanese)
Programmers Reference jConnect for JDBC 7.07 SP100 (Japanese)
SAP Control Center Release Bulletin (Japanese)
SAP Control Center for Adaptive Server Enterprise (Japanese)
SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
New Features Summary SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
New Features Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
Utility Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Simplified Chinese)
Programmers Guide Adaptive Server Enterprise Extension Module for Python (Simplified Chinese)
Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Simplified Chinese)
Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Simplified Chinese)
Programmers Reference jConnect for JDBC 7.07 SP100 (Simplified Chinese)
SAP Control Center Release Bulletin (Simpiified Chinese)
SAP Control Center for Adaptive Server Enterprise (Simplified Chinese)
New Features Summary SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
New Features Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris (Simplified Chinese)
Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows (Simplified Chinese)
Security Administration Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
Utility Guide SAP Adaptive Server Enterprise 16.0 (Simplified Chinese)
New Features Bulletin Open Server 15.7 and SDK 15.7 for Windows, Linux, and UNIX (Simplified Chinese)
Programmers Guide Adaptive Server Enterprise Extension Module for Python (Simplified Chinese)
Programmers Guide Adaptive Server Enterprise Database Driver for Perl (Simplified Chinese)
Programmers Guide Adaptive Server Enterprise Database Driver for PHP (Simplified Chinese)
Programmers Reference jConnect for JDBC 7.07 SP100 (Simplified Chinese)
SAP Control Center Release Bulletin (Simpiified Chinese)
SAP Control Center for Adaptive Server Enterprise (Simplified Chinese)
Adaptive Server Enterprise 15.7 SP121
New Features Guide
Certicom Replacement
Reducing load database Time
Cyclic Redundancy Checks for dump database
SAP JVM Support
Shrink Database Backlink Behavior Change
Enhanced Checking Functionality for Shrinking Databases
sp_monitorconfig Permission Changes
Changes for alter table add | drop partition
Option to Control Wait Behavior for Uncommitted Inserts
Support for Remote Dump Host Control
Support for Parallel Index Creation on Partitioned Table with Empty Partitions
Dump Commands Support for Mirrored Devices
Extended Maximum Variable Length of a Datatype
Diagnostic Enhancements for 'Proc Cache Header' Memory Pool
Configuration Parameters for Diagnostic Tool
Changes to System Tables
Known Issues
Documentation Updates
New Features Guide
Certicom Replacement
Reducing load database Time
Cyclic Redundancy Checks for dump database
SAP JVM Support
Shrink Database Backlink Behavior Change
Enhanced Checking Functionality for Shrinking Databases
sp_monitorconfig Permission Changes
Changes for alter table add | drop partition
Option to Control Wait Behavior for Uncommitted Inserts
Support for Remote Dump Host Control
Support for Parallel Index Creation on Partitioned Table with Empty Partitions
Dump Commands Support for Mirrored Devices
Extended Maximum Variable Length of a Datatype
Diagnostic Enhancements for 'Proc Cache Header' Memory Pool
Configuration Parameters for Diagnostic Tool
Changes to System Tables
Known Issues
Documentation Updates
Adaptive Server Enterprise 15.7 SP110
New Features Guide
Improved Data-Load Performance
Data-Load Optimization on Tables with Multiple Indexes
Viewing Parallel Update Index Queries in showplan
Viewing Queries with UpdateIndex
Restrictions
Downgrade Considerations
Troubleshoot
Remote Dump Host Control
Transaction Log Space Management
Transaction Log Space
loginfo
sp_xact_loginfo
Automating Transaction Log Management
Rescue Scenario Use Case
Monitoring Use Case
Monitoring and Control Use Case
Analyzing and Managing Transaction Log Space
Viewing the Span of a Transaction
Viewing the Oldest Active Transactions
Parallel create index with Hash-Based Statistics for High Domains
EMC PowerPath Device Fencing
SQL Standard for NULL Concatenation
Function Nesting in Expressions Increased to 32
System Changes
Commands
System Procedures
Functions
New Features Guide
Improved Data-Load Performance
Data-Load Optimization on Tables with Multiple Indexes
Viewing Parallel Update Index Queries in showplan
Viewing Queries with UpdateIndex
Restrictions
Downgrade Considerations
Troubleshoot
Remote Dump Host Control
Transaction Log Space Management
Transaction Log Space
loginfo
sp_xact_loginfo
Automating Transaction Log Management
Rescue Scenario Use Case
Monitoring Use Case
Monitoring and Control Use Case
Analyzing and Managing Transaction Log Space
Viewing the Span of a Transaction
Viewing the Oldest Active Transactions
Parallel create index with Hash-Based Statistics for High Domains
EMC PowerPath Device Fencing
SQL Standard for NULL Concatenation
Function Nesting in Expressions Increased to 32
System Changes
Commands
System Procedures
Functions
Adaptive Server Enterprise 15.7 SP100
New Features Summary Adaptive Server Enterprise 15.7 SP100
Version 15.7 SP100
Adaptive Server 15.7 SP100 Feature and Platform Matrix
Shrinking Databases
Enhancements to Backup and Restore
Aggregating Metrics from Syntactically Similar Queries
Updates to Precomputed Result Sets
Improved Data Load Performance
Incremental Reorganization
Creating Indexes Without Blocking Access to Data
Query Plan and Execution Statistics in HTML
Gathering Hash-Based Statistics with create index
Query Plan Optimization with Bloom Filters
Support for Replication by Column Value
Support for Multiple Scanner Threads
Sybase Central Adaptive Server Plug-in
Running Adaptive Server on VMware vSphere
Support for OData
Support for NTLM and MIT Kerberos on Windows 64-bit
Properties Added to Responses File
Automatic Physical Database Rearrangement
System Changes for Adaptive Server Version 15.7 SP100
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Permission Changes for Commands and Functions
Version 15.7 ESD #4
15.7 ESD #4.2
Improved Rollback Reporting
15.7 ESD #4
Remote Backup Server Maximum Name Length
Support for Query Plan Pinning
AF_UNIX Support
Changes to sp_addthreshold and Roles
System Changes for Adaptive Server Version 15.7 ESD #4
Utilities
Configuration Parameters
Version 15.7 ESD #3
sybrestore Utility
System Changes for Adaptive Server Version 15.7 ESD #3
Commands
Functions
System Stored Procedures
Monitoring Table Changes
Version 15.7 ESD #2
Granular Permissions
Predicated Privileges
Deferred Table Creation
Online Utilities
Merging and Splitting Partitions
Maximum Size of Query in the Statement Cache
Enhancements to show_cached_plan_in_xml
Fast-Logged Bulk Copy
Precomputed Result Sets
Concurrent dump database and dump transaction Commands
Hash-Based Update Statistics
Enhancements to dump and load
alter table drop column without datacopy
Expanded Maximum Database Size
User-Defined Optimization Goal
Shared Query Plans
Initializing Databases Asynchronously
In-Row Large Object Compression
Configuring Shared Memory Dumps
System Changes for Adaptive Server Version 15.7 ESD #2
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Version 15.7 ESD #1
Proxy Table Support for In-row LOB Columns
Support for System Procedures in Replicated Master Database
Increased Number of Parameters
Multiple Listeners on Windows
Windows Supports Adaptive Server High Availability
New and Changed Configuration Parameters
Version 15.7
Application Functionality Configuration Group
New Adaptive Server Kernel
Compressing Data in Adaptive Server
New Security Features
End-to-End CIS Kerberos Authentication
Dual Control of Encryption Keys and Unattended Startup
Securing Logins, Roles, and Password Management Extensions
Login Profiles
Employee Lifecycle Management
External Passwords and Hidden Text
Abstract Plans in Cached Statements
Shrink Log Space
Displaying Currently Set Switches with sysoptions
Changes for Large Objects
In-Row Off-Row LOB
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Using LOB Locators in Transact-SQL Statements
Extension to where Clause for Large Objects
Showing Cached Plans in XML
Padding a Character Field Using str
Changes to select for update
Creating Nonmaterialized, Non-null Columns
Sharing Inline Defaults
Retain Monitoring Data
Analyze Dynamic Parameters
Monitor Lock Timeouts
Truncate Trailing Zeros
Fully Recoverable DDL
Transfer Rows from Source to Target Table Using merge
View Statistics and Histograms with sp_showoptstats
Changes to Cursors
Release Cursor Locks at Cursor Close
Enhanced Transaction Support for Cursors
Monitor Cursor Statements
Nested select Statement Enhancements
Changes to Commands and System Procedures in Chained Transaction
Expanded Variable-Length Rows
Changes to like Pattern Matching
Changes to Quoted Identifiers
Allowing Unicode Noncharacters
Reduce Query Processing Latency
The sybdiag Utility
The Optimizer Diagnostic Utility
System Changes for Adaptive Server Version 15.7
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
New Monitoring Tables
Changes to Monitoring Tables
Global Variables
Version 15.5 Cluster Edition
Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
Multiple simultaneous failover
Adding space to an archive database
Distributed transaction management in the shared-disk cluster
System Changes for Adaptive Server Version 15.5 Cluster Edition
Changed commands
Monitoring Tables
Configuration Parameters
Functions
Version 15.5
Adaptive Server 15.5 Feature and Platform Matrix
In-Memory and Relaxed-Durability Databases
Faster Compression for Backups
Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
Deferred Name Resolution for User-Defined Stored Procedures
FIPS 140-2 Login Password Encryption
Incremental Data Transfer
bigdatetime and bigtime Datatypes
Creating and Managing tempdb Groups
System Changes for Adaptive Server Version 15.5
Datatypes
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Utilities
Auditing
Version 15.0.3
SQL Statement Replication
Security Enhancements
LDAPS User Authentication Enhancement
Automatic LDAP User Authentication and Failback
Login Mapping of External Authentication
Using SSL to Specify a Common Name
Concurrent Kerberos Authentication
Virtually Hashed Tables
Huge Pages
Upgrading During a High Availability Configuration
Reinstalling System Stored Procedures
Distributed Transaction Management (DTM)
Adaptive Server Plug-in Updates
The Java Interface
System Changes for Adaptive Server Version 15.0.3
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Version 15.0.2
Encrypted Columns
Archive Database Access
Finding Slow-Running Queries
Deferred Compilation
Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Statistical Aggregate Functions
Standard Deviation and Variance
Eager and Lazy Aggregation
Vector and Scalar Aggregation
Improved Performance for Data Insertion
Using Asynchronous Writes During a Page Split
Improving Throughput of tempdb Transactions
Post-commit Optimization
Changes to the Query Processor
Deferred Compilation
Non-binary Character Set Histogram Interpolation
Expression Histogramming Selectivity Estimates
Viewing Current Optimizer Settings
New Security Features
PAM Support in 64-bit Adaptive Server on AIX
Global Login Triggers Set Automatically
SSL Support
Improved Password Security
Auditing Enhancements
Hiding System Stored Procedure and Command Password Parameters
Monitoring Failed Login Attempts
High Availability Considerations
Installing and Editing Monitoring Tables
Monitoring Tables for the Statement Cache
Row-Level Locking for System Tables
The xmltable() Function
Relocated Joins
User-Defined SQL Functions
instead of Triggers
System Changes for Adaptive Server Version 15.0.2
Trace Flags
Commands
Changes to the set Command
Utilities
System Stored Procedures
System Tables
Configuration Parameters
Functions
Global Variables
Version 15.0.1
Changes to Abstract Plans
New Query-Level Settings
Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
Extending the Optimizer Criteria Set Syntax
Literal Parameterization
System Changes for Adaptive Server Version 15.0.1
Functions
Configuration Parameters
Commands
Monitoring Tables
Version 15.0
Partition Support
Row-Locked System Catalogs
Query Processor
Large Identifiers
Computed Columns
Differences Between Computed Columns and Function-Based Indexes
Differences Between Materialized and Not Materialized Computed Columns
Scrollable Cursors
unitext Datatype Support
big int Datatype Support
Unsigned Integer Datatype Support
Integer Identity
Enhancements to XML Services
Adaptive Server Plug-in Enhancements
Interactive SQL
User-Defined Web Services
Very Large Storage Support
Automatic Running of update statistics
SySAM License Management
Query Processing Metrics (qp Metrics)
Updates to Abstract Plans
showplan Changes
Secure Socket Layer Uses FIPS 140-2
System Changes for Adaptive Server Version 15.0
Utilities
Reserved Words
Global Variables
Configuration Parameters
Functions
Commands
System Stored Procedures
System Tables
Monitoring Tables
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
New Features Guide Adaptive Server Enterprise 15.7 SP100
Change in Release Version Number
Shrinking Databases
Shrinking a Database
How Adaptive Server Shrinks the Database
Shrink Operations on Databases That Contain Text or Image Data
Restarting Partially Completed Shrink Operations
Moving Data Before Shrinking the Database
Restrictions for Moving the Transaction Log
Locks Held During Data Movement
Determine the Status of a Shrink Operation
Upgrading or Downgrading Shrunken Databases
Restrictions
Enhancements to Backup and Restore
Cumulative Dump
Dump and Load Sequences
Partially Logged Operations and Cumulative Dumps
Restrictions
System Changes Supporting Cumulative Dumps
Changes to load database
Apply Source Database Attributes to the Target Database
Generate SQL for a Different Target Database
Restore Databases in Tivoli Storage Manager to Different Target Databases
The sybdumptran Utility
Aggregating Metrics from Syntactically Similar Queries
Updates to Precomputed Result Sets
Improved Data Load Performance
Enable Data Load Optimization
Tables with Indexes
Viewing Queries with bulkInsertRowCount
Batch Insert Optimization
Restrictions
Incremental Reorganization
Running reorg defrag
Checking the Reorganization Status
Clearing reorg defrag Information from sysattributes
Logging Behavior
Restrictions
Creating Indexes Without Blocking Access to Data
Query Plan and Execution Statistics in HTML
set statistics Command Options
Query Plan Tree Structure
Query Timings
Thread Usage
CPU Usage
Wait Distribution
Query Text
Query Detail
Parallel Query Plan Fragments
Writing HTML to an External File
Gathering Hash-Based Statistics with create index
Query Plan Optimization with Bloom Filters
Example of showplan Output for Bloom Filters
Example of Lava Operator Tree for Bloom Filters
Disabling Bloom Filters
Adaptive Server Support for Multiple Scanner Threads
Adaptive Server Support for Replication by Column Value
Sybase Central Adaptive Server Plug-in
Running Adaptive Server on VMware vSphere 5.0
Configure the BIOS Settings
Configure the Guest Operating System
CPU Considerations
Recommendations for Virtual CPUs
CPU Scheduling
Memory Considerations
Resource Management
Hardware-Assisted Memory Virtualization
Linux Huge Pages
Networking
Storage
Automatic Physical Database Rearrangement on Load
Support for OData
OData Server Architecture
OData Server Limitations
Unsupported OData Protocol Features
Security Considerations for OData Server
Configuring OData Server
Setting Up an HTTP Server for OData
Create an OData Producer Service Model
OData Server Sample Files
Starting and Stopping OData Server
MIT Kerberos and NTLM Security Services
Using NT Lan Manager Security Services on Windows 64-bit
Using MIT Kerberos Security Services on Windows 64-bit
Solaris Asynchronous I/O Performance
Properties Added to Responses File
System Changes
New Functions
defrag_status
loginfo
show_condensed_text
shrinkdb_status
Changed Commands
alter database
create index
create materialized view
create precomputed result set
dbcc
dump database
load database
reorg
select
set
update statistics
Procedures
New System Procedures
sp_helpdefrag
sp_dump_info
Changed System Procedures
sp_configure
sp_config_rep_agent
sp_dboption
sp_depends
sp_dump_history
sp_extrapwdchecks
sp_helpdb
sp_helprotect
sp_listener
sp_optgoal
sp_replication_path
sp_showoptstats
sp_sjobcreate and sp_sjobmodify
Tables
New System Tables
sysdams
Changed System Tables
New Monitoring Tables
monSysExecutionTime
monRepCoordinator
monRepSchemaCache
Changed Monitoring Tables
Utilities
New Utilities
sybdumptran
Options for load transaction
Changed Utilities
Configuration Parameters
Changed Configuration Parameters
New Configuration Parameters
Permission Changes for Commands and Functions
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for HP-UX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for IBM AIX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Linux
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Windows
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for HP-UX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for IBM AIX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Making Input/Output Completion Port API Available for Adaptive Server
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for Linux
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Raw Partitions on Linux
Choosing a Raw Partition
Examples for Creating Raw Partitions
Red Hat Raw Device Administration
SuSE Raw Device Administration
Accessing Raw Devices from the Server
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for Windows
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Preparing to Install Adaptive Server
Managing Java in the Database During Installations and Upgrades
Installing Adaptive Server
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Stopping and Starting Services
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Adding a Server to the Interfaces File
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Adaptive Server on Windows
Testing the Adaptive Server Upgrade
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Configuration Guide for UNIX 15.7 ESD #2
About Adaptive Server
System-Specific Issues
System User Roles
Environment Variables
Adaptive Server Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
sybmgmtdb Database
Using Operating System Files as Database Devices
The directio Parameter
The dsync Parameter
Determine the Size of a Database Device
Support for Raw Partitions or Files
Preparation of a Raw Partition Device
Choosing a Raw Partition
Client/Server Communication
About Changing Adaptive Server Configuration
Languages Other Than US English
Adaptive Server Specifications
Database Specifications
Table Specifications
Procedure Specifications
Query Specifications
Maximum Column Sizes
Database Requirements for Varying Page Sizes
Data Limits for Tables According to Page Size
Start and Stop Servers
Start Servers
Server Start-up Parameters
RUN_server_name File
Using the startserver Command
Start Servers When the Operating System Restarts
Creating a System Restart Script for HP-UX
Creating a System Restart Script for IBM RS/6000
Creating a System Restart Script for Sun Solaris and Linux
Starting XP Server After Initial Installation
Stop Servers
Stopping Adaptive Server
Stopping Backup Server
Using the kill Command
Shutdown and Shared Memory Files
Huge Pages on Linux
Configure the Operating System
Verifying Environment Variables
Using the stty Setting
Restore Correct Permissions
File Descriptors and User Connections
File Descriptors and User Connections for HP-UX
File Descriptors and User Connections for AIX
File Descriptors and User Connections for Linux
File Descriptors and User Connections for Sun Solaris
Displaying Current Soft and Hard Limits
Increasing the Soft Limit
Increasing the Hard Limit
Enable Asynchronous Disk I/O
Enabling Asynchronous Disk I/O on Linux
Enabling Asynchronous Disk I/O on IBM AIX
Enabling Asynchronous Disk I/O HP-UX
Enabling Asynchronous I/O for File System Devices
Enabling Asynchronous I/O for File Systems
Adjust the Client Connection Timeout Period
Adjusting the Client Connection Timeout for HP-UX
Adjusting the Client Connection Timeout for IBM RS/6000
Adjusting the Client Connection Timeout for Linux
Check for Hardware Errors
Monitor the Use of Operating System Resources
Monitor Operating System Resources for HP-UX
Monitor Operating System Resources for IBM RS/6000
Monitor Operating System Resources for Sun Solaris and Linux
Check Database Integrity
Configuring New Servers with srvbuild
Adaptive Server Default Configuration
Default Settings
Set Up Communications Across the Network
How Adaptive Server Determines Which Directory Service Entry to Use
How a Client Uses Directory Services
Create a Directory Services Entry
Supported Directory Drivers
Contents of the interfaces File
interfaces File Format
Components of an interfaces File Entry
Create a Master interfaces File
Using dsedit or dscp to Create a Master interfaces File
Using a Text Editor to Create a Master interfaces File
Configure the interfaces File for Multiple Networks
Configuring the Server for Multiple Network Handlers
Configure Client Connections
Manage One Network-Independent DSQUERY Name
Using Different DSQUERY Names
Configuring for Query Port Backup
IPv6 Support
IPv6 Infrastructure
Troubleshoot
Troubleshooting when the Server Fails to Start
Troubleshooting an Error when Executing an ESP
Use the Lightweight Directory Access Protocol as a Directory Service
LDAP Directory Services Versus the Sybase Interfaces File
The libtcl*.cfg File
Enabling LDAP Directory Services
Keywords for the LDAP URL Variables
Adding a Server to the Directory Services
Multiple Directory Services
Encrypting the Password
Performance
Migrating from the interfaces File to LDAP
Localization Support
Language Modules
Default Character Sets
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Names
Load Character Sets
Language Definition Files Sort Order
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders for Character Sets
Language Modules
Installing a New Language Module
Message Languages
Localization Directories
About the locales Directory
About the charsets Directory
Format of locales.dat File Entries
How Client Applications Use locales.dat
Changing Adaptive Server Localization Configuration
Configuring Adaptive Server for Other Character Sets
Editing the locales.dat File
Changing Backup Server Localization Configuration
Adaptive Server Error Logging
Set Error Log Paths
Set the Adaptive Server Error Log Path
Manage Messages
Log User-Defined Messages
Log Auditing Events
Manage Database Devices
Device Requirements
Create Files for Database Devices
Database Management System Auditing
Audit System Devices and Databases
Install Auditing
Preinstallation Recommendations for Auditing Devices
Configuring Adaptive Server for Auditing
Creating a Device for the Audit Database Transaction Log
Enabling Auditing
Deleting a Device Entry
Changing a Device Entry
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Configuration Guide for Windows 15.7 ESD #2
About Adaptive Server
System-Specific Issues
User Roles
Environment Variables
Adaptive Server Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
Using Operating System Files as Database Devices
The dsync Parameter
The directio Parameter
Client/Server Communication
About Changing Adaptive Server Configurations
Languages Other Than US English
Adaptive Server Specifications
Database Specifications
Table Specifications
Query Specifications
Procedure Specifications
Extended-Limit Capabilities
Start and Stop Servers
Server Start-up Parameters
Specifying Additional Start-up Parameters
Starting and Stopping Servers Using Unified Agent
Start and Stop Servers Using the Control Panel
Starting Servers as an Automatic Service
Setting Up Adaptive Server as an Automatic Service
Starting, Stopping, and Pausing Servers Manually
Stopping Backup Server
Stopping Adaptive Server
Monitor Servers
Monitoring Servers with the Control Panel
Adaptive Server Configurations
Default Adaptive Server Configuration
Default Adaptive Server Parameter Settings
Default Backup and XP Server Settings
Change Adaptive Server Configurations
Starting Server Config
Configuring Adaptive Server
Setting Adaptive Server Parameters
Changing the Default Backup Server
Changing the Default XP Server
Configuring Backup Server
Configuring Job Scheduler and Self Management
Network Communications Using sql.ini
Client Connections to Adaptive Server
Determine the Address to Listen for Client Connections
Client Access to Adaptive Server
Enabling Client Access to a Server
Changing the Server Entries in sql.ini
Components in the sql.ini File
Server Name
Network Driver
Service Type
Server Address
Address Format
IP Address
Named Pipes Format
Windows Sockets Format
Increasing Windows Sockets Connections
Modifying an Existing TcpNumConnections Value
Adding a TcpNumConnections Value
Using Multiple TCP/IP Network Interface Cards
Controlling the Connection Timeout
Increasing the TcpKeepTries Value
NWLink IPX/SPX Format
Available NWLink IPX/SPX Connection Formats
Selecting Valid Connection Formats
Share Network Configuration Information
Creating a Master sql.ini File
Windows Registry as a Directory Service
Using Windows Registry as a Directory Service
Verify Server Connections
Configure ODBC Connections
Configuring the ODBC Driver
IPv6 Support
IPv6 Infrastructure
Lightweight Directory Access Protocol in Adaptive Server
LDAP Directory Services versus the Sybase Interfaces File
The libtcl.cfg File
Enabling LDAP Directory Services
Adding a Server to the Directory Services
Adding a Server Entry to the Directory Service Using dsedit
Multiple Directory Services
Encrypting the Password
Performance with LDAP
Migrating from the sql.ini File to LDAP
Localization Support
Language Modules
Default Character Sets for Servers
Changing the Default Character Set for Servers
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders
Language Modules
Installing a New Language Module
Message Languages
Localization
Localization Directories
charsets and locales Directories
Format of locales.dat File Entries
Client Application Use of locales.dat
Editing the locales.dat File
Changing Adaptive Server and Backup Server Localization Configuration
Completing Adaptive Server Localization Changes
Completing Backup Server Localization Changes
Configuring Adaptive Server for Other Character Sets
Language-Specific Sort Orders
Sybase Character Set Names
charset Utility
Log Error Messages and Events
Adaptive Server Error Logging
Windows Event Logging
Setting Up Windows Event Logging
Enable and Disable Windows Event Logging
Enabling or Disabling Event Logging Using Server Config Utility
Enabling or Disabling Event Logging Using sp_configure
Windows Event Log Information
Manage Logs
Set Error Log Paths
Setting the Adaptive Server Error Log Path
Setting the Backup Server Error Log Path
Manage Messages
Log User-Defined Messages
New Messages
Existing Messages
Log Auditing Events
Log User-Defined Events
Using a Remote Log
Central Logging Site
Log Messages from Multiple Adaptive Servers
Set Up a Local Central Logging Site
Creating a Registry key
Defining a Registry Key
View Messages
Viewing Messages in the Windows Event Log
Viewing Messages in the Adaptive Server Error Log
Security Services with Windows LAN Manager
How Login Authentication Works
Administering Security Services Using LAN Manager
Modify Configuration Files Required for a Unified Login
Set Up Drivers for Network-Based Security
Entries for Network Drivers
Entries for Directory Services
Entries for Security Drivers
Editing the libtcl.cfg File
Checking the LAN Manager's Local Name
Specifying Security Information for Adaptive Server
Identify Users and Servers to LAN Manager
Configure Adaptive Server for LAN Manager Security
Enabling and Disabling External Security Services
Manage Unified Login
Requiring Unified Login
Establishing a Secure Default Login
Map LAN Manager Login Names to Server Names
Data Integrity Check
Ensure Adequate Memory for Security Services
Add Logins to Support Unified Login
Adding Logins
Define the Connection to a Server for Security Services
Specifying the Principal Name
Specifying Network-Based User Authentication
Specifying the Name Assigned to LAN Manager
Determining the Status of Security Services
Configuration Parameters Used in Security Services
Data Integrity Check
Message Sequence Check
Detect Interception or Replay
Specify a Login
Control User Authentication
Manage Login Security on an Windows Computer
Adaptive Server Security
Combined Adaptive Server and Windows Login Security
Trusted Connections and Combined Login Security
Login Security Modes
Standard Mode
Integrated Mode
Mixed Mode
Manage the Login Security Features
Permit Trusted Connections
Windows Registry Parameters
Default Login
Default Domain
SetHostName
Character Mappings
Modify the Parameter Values
Administer Login Security Using System Procedures
Assigning Trusted Connection Permissions
Display the Current Registry Values
Display Permissions and User Names
Revoke Permissions Granted with sp_grantlogin
Configuring Login Security
Creating Windows Users and Groups
Configuring Mapping and Default Domain Values
Setting Login Security Mode
Adding Network Login Names to syslogins
Assigning Roles
Change Login Security Options
Enabling Standard Login Security Mode
Enabling Integrated or Mixed Login Security Mode
E-mail Messages and Adaptive Server
Sybmail Messages
Send Messages
Receive Messages
Preparing Windows Mail for Sybmail
Connecting to a Post Office
Creating a Mailbox for Adaptive Server
Creating a Mail Profile for Adaptive Server
Create an Adaptive Server Login for Sybmail
Configuring Sybmail and Extended Stored Procedures
Manage a Mail Session
Start a Mail Session
Start Sybmail Without Parameters
Stop a Mail Session
Stored and Extended Procedures for Handling Messages
Outgoing Messages
Incoming Messages
Find the Next Message
Read a Specific Message
Delete a Message
Processing Incoming Mail
Sybmail Security
Set Execution Privileges
Set the Execution Context
Name Both the User and the Database
Name the User But Not the Database
Name the Database But Not the User
Name Neither the User Nor the Database
Manage Adaptive Server Databases
Manage Database Devices
Device Requirements
Creating .dat Files for Database Devices
Back Up and Restore Data
Backing Up Data with a Tape Drive
Windows Tape Drive Names
Set the Maximum Capacity for a Tape Drive
Backing Up Data Using a Hard Disk
Dumping Across a Network
Examples of Backing Up and Restoring User Databases
Back Up and Restore to a Database and Device
Back Up and Restore on a Remote Backup Server
Backup File Names
Additional Dump Devices
Tape Handling Options
Get Information About Files
Backing Up and Restoring System Databases
Optimize Adaptive Server Performance and Tuning
Using Dedicated Adaptive Server Operation
Disk Drives and Adaptive Server Performance
Monitor Disk Usage
Monitoring Adaptive Server Statistics
Database Management System Auditing
Audit System Devices and Databases
Preinstallation for Auditing Devices
Installing Auditing
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Troubleshoot Network Connections
Running Server Ping
Troubleshoot Connection Failures
Using Returned Messages to Diagnose a Failure
Troubleshooting a Connection Failure to Adaptive Server
Failure to Load Net-Library DLLs
Troubleshooting Failure of Other Applications
Before Calling Sybase Technical Support
Adaptive Server Registry Keys
\SOFTWARE\SYBASE\Server\server_name
\SOFTWARE\SYBASE\SQLServer\server_name\parameter
\SOFTWARE\SYBASE\SQLServer
\SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Enabling I/O Fencing
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Making Input/Output Completion Port API Available for Adaptive Server
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Setting Up Raw Disks For Multi-Node Access and I/O Fencing
I/O Fencing via SCSI-3 PGR
Enabling I/O Fencing
Creating Logical Volumes
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server as a Shared Versus Private Installation
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Enabling I/O Fencing
Raw Partitions on Linux
Choosing a Raw Partition
Examples for Creating Raw Partitions
Red Hat Raw Device Administration
SuSE Raw Device Administration
Accessing Raw Devices from the Server
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Enabling I/O Fencing
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Utility Guide 15.7 SP100
Utility Commands Reference
Threaded Versions of Utilities
Installation or Configuration Utilities
Utilities for Languages, Character Sets, and Sort Orders
Utilities to Start Servers
Database Creation and Manipulation Utilities
Utilities to Gather Information
Tuning Utility
Utility to Manage a Cluster
backupserver
bcp
Usage for bcp
Copying Tables with Indexes or Triggers Using bcp
Using bcp with Compressed Data
buildmaster
certauth
Usage for certauth
Accomplish Certificate Management Tasks Using Open Source Utility
Creating a Server Certificate File that Adaptive Server Understands
certpk12
certreq
charset
cobpre
cpre
dataserver
Usage for dataserver
Dependencies and Conditions of -b and -w Options
Potential Issues of Using -f and -w Options Together
ddlgen
Usage for ddlgen
Hiding Passwords in ddlgen
ddlgen for Encrypted Columns
Encrypted Columns and Specifying the -XOD Flag in ddlgen
ddlgen Support for Key Copies
EKC Encryption Key Copy Filter and ddlgen
Create Table DDL
defncopy
dscp
dsedit
extractjava
installjava
Usage for installjava
Cases When Adding New JARs Causes Exceptions
Updating JARs and Classes
Locks
isql
Usage for isql
Interactive isql Commands
isql Session Commands
Prompt Labels and Double Wildcards in an isql Session
Command History in isql
langinstall
optdiag
Usage for optdiag
Byte Ordering and Binary optdiag Files
optdiag Input Mode
preupgrade
Usage for preupgrade
The preupgrade -D Parameter
pwdcrypt
qrmutil
qptune
showserver
sqldbgr
Usage for sqldbgr
Error Messages in sqldbgr
sqlloc
sqllocres
sqlsrvr
Usage for sqlsrvr
Starting Adaptive Server
startsrvr Dependencies and Conditions with -b and -w
sqlupgrade
sqlupgraderes
srvbuild
Usage for srvbuild
Using LDAP with srvbuild in a 64-bit Environment
srvbuildres
startserver
Usage for startserver
The runserver File
sybcluster
sybdiag
Usage for sybdiag
Configuration Options for sybdiag
sybmigrate
sybrestore
sybtsmpasswd
updatease
xpserver
Transferring Data to and from Adaptive Server with bcp
Methods for Moving Data
Import and Export Data with bcp
bcp Modes
bcp Requirements
bcp Permissions
Before You Transfer
Copy Data to Partitions Using bcp
Improve bcp Performance
Fast, Fast-logged, and Slow bcp
Slow bcp
Fast bcp
Fast-logged bcp
Copying Tables with Indexes
Locking Scheme and Fast bcp
Space Requirements for Copying
Summary of Steps for Fast and Fast-logged bcp
Bulk Copying Data into Partitioned Tables
Copying Data Randomly into Partitions
Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
Reducing Logging by Increasing Page Allocations
Using Parallel Bulk Copy to Copy Data into a Specific Partition
bcp in and Locks
Parallel Bulk Copy Methods
Parallel Bulk Copy Syntax
Using Parallel Bulk Copy on Round-robin Partitioned Tables
Parallel Bulk Copy and IDENTITY Columns
Retaining Sort Order
Specifying the Value of a Tableās IDENTITY Column
Bulk Copying Encrypted Data
bcp Options
Using the Default Formats
Native Format
Character Format
Change Terminators from the Command Line
Change the Defaults in Interactive bcp
Respond to bcp Prompts
File Storage Type
Prefix Length
Field length
Field and Row Terminators
Choose Terminators
Format Files
Examples of Copying Out Data Interactively
Examples of Copying In Data Interactively
bcp and Alternate Languages
Support for Initialization Strings
bcp and Row-Level Access Rules
Copy In and Batch Files
Improve Recoverability
Batches and Partitioned Tables
Copy Out and Text and Image Data
Specify a Network Packet Size
Copy In and Error Files
Copy Out and Error Files
Data Integrity for Defaults, Rules, and Triggers
How bcp Differs from Other Utilities
Building Servers Using dataserver
Building a New Master Device
Environments When Using dataserver
Specifying Device and Logical Page Sizes When Building a New Adaptive Server
Starting an Existing Adaptive Server
Upgrading to a Server With Larger Page Sizes
Viewing the Current Server Limits
Viewing and Editing Server Entries Using dscp
Starting dscp
Working with Server Entries
Adding and Modifying Server Entries
Adding a Server Entry
Modifying or Deleting a Server Entry
Copy Server Entries
List and View Contents of Server Entries
Delete Server Entries
Exiting dscp
Viewing and Editing Server Entries Using dsedit
Add, View, and Edit Server Entries
Using dsedit in UNIX
Starting dsedit in UNIX
Open an Editing Session in UNIX
Modify Server Entries in UNIX
Adding a New Server Entry in UNIX
Viewing or Modifying a Server Entry in UNIX
Add or Edit Network Transport Addresses
TCP/IP Addresses
SPX/IPX Addresses
Copying a Server Entry to Another Interfaces File in UNIX
Copying Server Entries Within the Current Session
Copying Server Entries Between Sessions
Using dsedit in Windows
Starting dsedit in Windows
Open an Editing Session in Windows
Opening a Session in Windows
Opening Additional Sessions in Windows
Switching Between Sessions in Windows
Modify Server Entries in Windows
Adding a Server Entry
Modifying a Server Attribute
Renaming a Server Entry
Deleting a Server Entry
Copying server entries within the current session in Windows
Copying server entries between sessions in Windows
Troubleshooting dsedit
Using Interactive isql from the Command Line
Starting isql
Stopping isql
Using Transact-SQL in isql
Formatting isql Output
Correcting isql Input
set Options that Affect Output
Changing the Command Terminator
Performance Statistics Interaction with Command Terminator Values
Input and Output Files
UNIX command line redirection
Using Interactive SQL in Graphics Mode
Starting Interactive SQL
The Main Interactive SQL Window
Plan Dialog Tab
The Interactive SQL Toolbar
Open Multiple Windows
Keyboard Shortcuts
Display Data Using Interactive SQL
Edit Table Values in Interactive SQL
Copying Rows from the Interactive SQL Result Set
Editing Rows from the Interactive SQL Result Set
Inserting Rows into the Database from the Interactive SQL Result Set
Deleting Rows from the Database Using Interactive SQL
SQL Statements in Interactive SQL
Canceling an Interactive SQL Command
Combining Multiple Statements
Looking Up Tables, Columns, and Procedures
Recall Commands
Logging Commands
Configure Interactive SQL
General Dialog Box
Result Dialog Box
Import/Export Dialog Box
Messages Dialog Tab
Editor Dialog Box
Query Editor Dialog Box
Processing Command Files
Saving SQL Statements to a File
Executing Command Files
Saving, Loading, and Running Command Files
The SQL Escape Syntax in Interactive SQL
Interactive SQL Commands
Interactive sybcluster Commands Reference
Commands Active Before Connecting to a Cluster
Commands Active After Connecting to a Cluster
add backupserver
add instance
connect
create backupserver
create cluster
create xpserver
deploy plugin
diagnose cluster
diagnose instance
disconnect
drop backupserver
drop cluster
drop instance
drop xpserver
exit
help
localize
quit
set backupserver
set cluster
set instance
set xpserver port
show agents
show backupserver config
show cluster
show instance
show membership mode
show session
show xpserver
shutdown cluster
shutdown instance
start cluster
start instance
upgrade server
use
Migrating Data Using sybmigrate
What sybmigrate Does
What sybmigrate Does Not Do
Before You Begin
Permissions
Changing Target Login Accounts
Platforms
Environment Settings
Migrating Proxy Tables
Migration process
Overview of the Migration Process
Pre-migration Considerations
Configuration and Tuning for Higher Performance
Configuration Considerations for Adaptive Server
Possible Errors to Avoid
Auto-select Dependent Objects for Migration
Migrating an Archive Database
Upgrading an Adaptive Server with an Archive Database
Downgrading an Adaptive Server with an Archive Database
GUI mode
Setting up source databases for migration
Begin the migration
Validating the migration
Migration and Validation Progress
Resource File Mode
Using sybmigrate with Encrypted Columns
Post-migration Activities
Migrate Databases in the Replication Server Domain
Preparing for migration
Postmigration Procedures
Restoring primary databases
Restoring the RSSD
Amending system tables when the logical page size changes
Restoring Replicate Databases
Logs
Migrating Databases That Support Wide Data
Limitations
Stopping High Availability
Other Limitations
Troubleshooting and Error Messages
Restoring a Database Using sybrestore
Noninteractive Mode
Interactive Mode
Before You Begin
Using sybrestore
Compatibility Geometry Check
sybrestore Syntax
Interactive Mode Syntax
Noninteractive Mode Syntax
Restoring a Database in Noninteractive Mode
Restoring a Database in Interactive Mode
Providing a Mapping Directory
Restoring a Database Using the Interactive Command Line
Restoring a database
Restoring a database to a point in time
Example of Restore to a Point-in-time
Transact-SQL Users Guide 15.7
SQL Building Blocks
SQL in Adaptive Server
Queries, data modification, and commands
Tables, columns, and rows
Relational operations
Compiled objects
Saving or restoring source text
Verifying and encrypting source text
Compliance to ANSI standards
Federal Information Processing Standards (FIPS) flagger
Chained transactions and isolation levels
Identifiers
SQL standard-style comments
Right truncation of character strings
Permissions required for update and delete statements
Arithmetic errors
Synonymous keywords
Treatment of nulls
Naming conventions
SQL data characters
SQL language characters
Identifiers
Multibyte character sets
Delimited identifiers
Uniqueness and qualification conventions
Remote servers
Expressions in Adaptive Server
Arithmetic and character expressions
Operator precedence
Arithmetic operators
Bitwise operators
The string concatenation operator
The comparison operators
Nonstandard operators
Character expression comparisons
Empty strings
Quotation marks
Relational and logical expressions
any, all, and in
and and or
Transact-SQL extensions
compute clause
Control-of-flow language
Stored procedures
Extended stored procedures
Triggers
Defaults and rules
Error handling and set options
Additional Adaptive Server extensions to SQL
Adaptive Server login accounts
isql utility
Default databases
Network-based security services with isql
Displaying SQL text
Queries: Selecting Data from a Table
Queries
select syntax
Checking for identifiers in a select statement
Choosing columns using the select clause
Choosing all columns using select *
Choosing specific columns
Rearranging the column order
Renaming columns in query results
Using expressions
Quoted strings in column headings
Character strings in query results
Computed values in the select list
Arithmetic operator precedence
Selecting text, unitext, and image values
Using readtext
Select list summary
Using select for update
Using select for update in cursors and DML
Concurrency issues
Eliminating duplicate query results with distinct
Specifying tables with the from clause
Selecting rows using the where clause
Comparison operators in where clauses
Ranges (between and not between)
Lists (in and not in)
Matching patterns
Matching character strings: like
Using not like
Getting different results using not like and ^
Using wildcard characters as literal characters
Interaction of wildcard characters and square brackets
Using trailing blanks and %
Using wildcard characters in columns
āUnknownā values: NULL
Testing a column for null values
Difference between false and unknown
Substituting a value for NULLs
Expressions that evaluate to NULL
Concatenating strings and NULL
System-generated NULLs
Connecting conditions with logical operators
Logical operator precedence
Using multiple select items in a nested exists query
Using a column alias in nested select statements
Using Aggregates, Grouping, and Sorting
Using aggregate functions
Aggregate functions and datatypes
count vs. count (*)
Aggregate functions with distinct
Null values and the aggregate functions
Using statistical aggregates
Standard deviation and variance
Organizing query results into groups: the group by clause
group by and SQL standards
Nesting groups with group by
Referencing other columns in queries using group by
Expressions and group by
Using group by in nested aggregates
Null values and group by
where clause and group by
group by and all
Aggregates without group by
Selecting groups of data: the having clause
How the having, group by, and where clauses interact
Using having without group by
Sorting query results: the order by clause
order by and group by
order by and group by used with select distinct
Summarizing groups of data: the compute clause
Row aggregates and compute
Rules for compute clauses
Specifying more than one column after compute
Using more than one compute clause
Applying an aggregate to more than one column
Using different aggregates in the same compute clause
Generating totals: compute without by
Combining queries: the union operator
Guidelines for union queries
Using union with other Transact-SQL commands
Joins: Retrieving Data from Several Tables
How joins work
Join syntax
Joins and the relational model
How joins are structured
The from clause
The where clause
Join operators
Datatypes in join columns
Joins and text and image columns
How joins are processed
Equijoins and natural joins
Joins with additional conditions
Joins not based on equality
Self-joins and correlation names
The not-equal join
Not-equal joins and subqueries
Joining more than two tables
Outer joins
Inner and outer tables
Outer join restrictions
Views used with outer joins
ANSI inner and outer joins
Correlation name and column referencing rules for ANSI joins
ANSI inner joins
ANSI outer joins
Should the predicate be in the on or where clause?
Nested ANSI outer joins
Converting outer joins with join-order-dependency
Transact-SQL outer joins
Using outer joins and aggregate extended columns
Relocated joins
Using relocated joins
Configuring relocated joins
How null values affect joins
Determining which table columns to join
Subqueries: Using Queries Within Other Queries
How subqueries work
Subquery restrictions
Example of using a subquery
Qualifying column names
Subqueries with correlation names
Multiple levels of nesting
Using an asterisk in nested select statements
Using table-name qualifiers
Using nested queries with group by
Examples
Usage
Subqueries in update, delete, and insert statements
Subqueries in conditional statements
Subqueries instead of expressions
Types of subqueries
Expression subqueries
Using scalar aggregate functions to guarantee a single value
Using group by and having in expression subqueries
Using distinct with expression subqueries
Quantified predicate subqueries
Subqueries with any and all
Subqueries used with in
Subqueries used with not in
Subqueries using not in with NULL
Subqueries used with exists
Subqueries used with not exists
Finding intersection and difference with exists
Subqueries using SQL derived tables
Using correlated subqueries
Correlated subqueries with correlation names
Correlated subqueries with comparison operators
Correlated subqueries in a having clause
Using and Creating Datatypes
How Transact-SQL datatypes work
Using system-supplied datatypes
Exact numeric types: integers
Exact numeric types: decimal numbers
Approximate numeric datatypes
Money datatypes
Date and time datatypes
Character datatypes
unichar datatype
text datatype
unitext datatype
Binary datatypes
image datatype
The bit datatype
The timestamp datatype
The sysname and longsysname datatype
Using LOB Locators in Transact-SQL Statements
Creating a LOB locator
Explicitly creating a locator
Implicitly creating a locator
Converting the locator value to the LOB value
Locator scope
Converting between datatypes
Mixed-mode arithmetic and datatype hierarchy
Working with money datatypes
Determining precision and scale
Creating user-defined datatypes
Specifying length, precision, and scale
Specifying null type
Associating rules and defaults with user-defined datatypes
Creating user-defined datatype with IDENTITY property
Creating IDENTITY columns from user-defined datatypes
Dropping a user-defined datatype
Getting information about datatypes
Adding, Changing, Transferring, and Deleting Data
Referential integrity
Transactions
Using the sample databases
Datatype entry rules
char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
date and time
Entering times
Entering dates
Searching for dates and times
binary, varbinary, and image
money and smallmoney
float, real, and double precision
decimal and numeric
Integer types and their unsigned counterparts
timestamp
Adding new data
Adding new rows with values
Inserting data into specific columns
Restricting column data: rules
Using the NULL character string
Inserting NULLs into columns that do not allow them
Adding rows without values in all columns
Changing a columnās value to NULL
Adaptive-Server-generated values for IDENTITY columns
Explicitly inserting data into an IDENTITY column
Retrieving IDENTITY column values with @@identity
Reserving a block of IDENTITY column values
Reaching the IDENTITY columnās maximum value
Adding new rows with select
Using computed columns
Inserting data into some columns
Inserting data from the same table
Creating nonmaterialized, non-null columns
Adding nonmaterialized columns
Tables that already have nonmaterialized columns
Nonmaterialized column storage
Altering nonmaterialized columns
Limitations
Changing existing data
Using the set clause with update
Assigning variables in the set clause
Using the where clause with update
Using the from clause with update
Performing updates with joins
Updating IDENTITY columns
Changing text, unitext, and image data
Trucating trailing zeros
Transferring data incrementally
Marking tables for incremental transfer
Transferring tables from a destination file
Converting Adaptive Server datatypes to IQ
Storing transfer information
Exceptions and errors
Sample session for incremental data transfer
Replacing data with new rows
Deleting data
Using the from clause with delete
Deleting from IDENTITY columns
Deleting all rows from a table
truncate table syntax
Creating Databases and Tables
Databases and tables
Enforcing data integrity in databases
Permissions within databases
Using and creating databases
Choosing a database: use
Creating a user database with create database
The on clause
The log on clause
for load option
quiesce database command
Altering the sizes of databases
Dropping databases
Creating tables
Maximum number of columns per table
Example
Choosing table names
Creating tables in different databases
create table syntax
Using IDENTITY columns
Creating IDENTITY columns with user-defined datatypes
Referencing IDENTITY columns
Referring to IDENTITY columns with syb_identity
Automatically creating āhiddenā IDENTITY columns
Allowing null values in a column
Constraints and rules used with null values
Defaults and null values
Nulls require variable-length datatypes
text, unitext, and image columns
Using temporary tables
Ensuring that the temporary table name is unique
Manipulating temporary tables in stored procedures
General rules for temporary tables
Managing identity gaps in tables
Parameters for controlling identity gaps
Comparison of identity burning set factor and identity_gap
Reducing the identity number gap
Setting the table-specific identity gap
Changing the table-specific identity gap
Displaying table-specific identity gap information
Gaps from other causes
When table inserts reach IDENTITY column maximum value
Defining integrity constraints for tables
Specifying table-level or column-level constraints
Creating error messages for constraints
After creating a check constraint
Specifying default column values
Specifying unique and primary key constraints
Specifying referential integrity constraints
Table-level or column-level referential integrity constraints
Maximum number of references allowed for a table
Using create schema for cross-referencing constraints
General rules for creating referential integrity constraints
Specifying check constraints
Designing applications that use referential integrity
Designing and creating a table
Making a design sketch
Creating the user-defined datatypes
Choosing the columns that accept null values
Defining the table
Creating new tables from query results: select into
Checking for errors
Using select into with IDENTITY columns
Selecting an IDENTITY column into a new table
Selecting the IDENTITY column more than once
Adding a new IDENTITY column with select into
Defining a column for which the value must be computed
IDENTITY columns selected into tables with unions or joins
Altering existing tables
Objects using select * do not list changes to table
Using alter table on remote tables
Adding columns
Adding columns appends column IDs
Adding NOT NULL columns
Adding constraints
Dropping columns
Dropping columns renumbers the column ID
Dropping constraints
Modifying columns
Converting datatypes
Modifying tables may prevent successful bulk copy of previous dump
Decreasing column length may truncate data
Modifying datetime columns
Modifying the NULL default value of a column
Modifying columns that have precision or scale
Modifying text, unitext, and image columns
Adding, dropping, and modifying IDENTITY columns
Adding IDENTITY columns
Dropping IDENTITY columns
Modifying IDENTITY columns
Data copying
Changing exp_row_size
Modifying locking schemes and table schema
Altering columns with user-defined datatypes
Adding a column with user-defined datatypes
Dropping a column with user-defined datatypes
Modifying a column with user-defined datatypes
Errors and warnings from alter table
Errors and warnings generated by alter table modify
Scripts generated by if exists()...alter table
Renaming tables and other objects
Renaming dependent objects
Dropping tables
Computed columns
Using computed columns
Computed columns example
Indexes on computed columns
Deterministic property
How does the deterministic property affect computed columns?
Examples
How does the deterministic property affect function-based indexes?
Assigning permissions to users
Getting information about databases and tables
Getting help on databases
Getting help on database objects
Using sp_help on database objects
Using sp_helpconstraint to find a tableās constraint information
Finding out how much space a table uses
Listing tables, columns, and datatypes
Finding an object name and ID
SQL-Derived Tables
Advantages of SQL-derived tables
SQL-derived tables and optimization
SQL-derived table syntax
Derived column lists
Correlated SQL-derived tables
Using SQL-derived tables
Nesting
Subqueries using SQL-derived tables
Unions
Unions in subqueries
Renaming columns with SQL-derived tables
Constant expressions
Aggregate functions
Joins with SQL-derived tables
Creating a table from a SQL-derived table
Using views with SQL-derived tables
Correlated attributes
Partitioning Tables and Indexes
Upgrading from Adaptive Server 12.5.x and earlier
Data partitions
Index partitions
Partition IDs
Locks and partitions
Partitioning types
Range partitioning
Hash partitioning
List partitioning
Round-robin partitioning
Composite partitioning keys
Partition pruning
Indexes and partitions
Global indexes
Global nonclustered index on unpartitioned table
Global clustered index on unpartitioned table
Global clustered index on round-robin partitioned table
Global nonclustered index on partitioned table
Local indexes
Local clustered indexes
Local nonclustered indexes
Guaranteeing a unique index
Creating and managing partitions
Partitioning tasks
Creating data partitions
Creating a range-partitioned table
Creating a hash-partitioned table
Creating a list-partitioned table
Creating a round-robināpartitioned table
Creating partitioned indexes
Creating global indexes
Creating local indexes
Creating clustered indexes on partitioned tables
Creating a partitioned table from an existing table
Altering data partitions
Changing an unpartitioned table to a partitioned table
Adding partitions to a partitioned table
Changing the partitioning type
Changing the partitioning key
Unpartitioning round-robināpartitioned tables
Using the partition parameter
Altering partition-key columns
Configuring partitions
Updating, deleting, and inserting in partitioned tables
Updating values in partition-key columns
Displaying information about partitions
Using functions
Truncating a partition
Using partitions to load table data
Updating partition statistics
Virtually hashed tables
Structure of a virtually hashed table
Creating a virtually hashed table
Limitations for virtually hashed tables
Commands that support virtually hashed tables
Query processor support
Monitor counter support
System procedure support
Views: Limiting Access to Data
How views work
Advantages of views
Security
Logical data independence
Examples
Creating views
create view syntax
Using the select statement with create view
View definition with projection
View definition with a computed column
View definition with an aggregate or built-in function
View definition with a join
Views used with outer joins
Views derived from other views
distinct views
Views that include IDENTITY columns
Validating a viewās selection criteria
Views derived from other views
Retrieving data through views
View resolution
Redefining views
Renaming views
Altering or dropping underlying objects
Modifying data through views
Restrictions on updating views
Computed columns in a view definition
group by or compute in a view definition
NULL values in underlying objects
Views created using with check option
Multitable views
Views with IDENTITY columns
Dropping views
Using views as security mechanisms
Getting information about views
Using sp_help and sp_helptext to display view information
Using sp_depends to list dependent objects
Listing all views in a database
Finding an object name and ID
Creating Indexes on Tables
How indexes work
Comparing the two ways to create indexes
Guidelines for using indexes
Creating indexes
create index syntax
Indexing more than one column: composite indexes
Indexing with function-based indexes
Using the unique option
Including IDENTITY columns in nonunique indexes
Ascending and descending index-column values
Using fillfactor, max_rows_per_page, and reservepagegap
Indexes on computed columns
Function-based indexes
Using clustered or nonclustered indexes
Creating clustered indexes on segments
Specifying index options
Using the ignore_dup_key option
Using the ignore_dup_row and allow_dup_row options
Using the sorted_data option
Using the on segment_name option
Dropping indexes
Determining what indexes exist on a table
Updating statistics about indexes
Defining Defaults and Rules for Data
How defaults and rules work
Creating defaults
create default syntax
Binding defaults
Unbinding defaults
How defaults affect NULL values
Dropping defaults
Creating rules
create rule syntax
Binding rules
Rules bound to columns
Rules bound to user-defined datatypes
Precedence of rules
Rules and NULL values
Unbinding rules
Dropping rules
Getting information about defaults and rules
Sharing inline defaults
Creating an inline shared default
Unbinding a shared inline default
Limitations
Using Batches and Control-of-Flow Language
Introduction
Rules associated with batches
Examples of using batches
Batches submitted as files
Using control-of-flow language
if...else
case expression
Using case expression for alternative representation
case and division by zero
Using rand functions in case expressions
case expression results
case expressions and set ansinull
case expression requires at least one non-null result
Determining the result set
case and value comparisons
coalesce
nullif
begin...end
while and break...continue
declare and local variables
goto
return
print
raiserror
Creating messages for print and raiserror
waitfor
Comments
Slash-asterisk style comments
Double-hyphen style comments
Local variables
Declaring local variables
Local variables and select statements
Local variables and update statements
Local variables and subqueries
Local variables and while loops and ifā¦else blocks
Variables and null values
Global variables
Transactions and global variables
Checking for errors with @@error
Checking IDENTITY values with @@identity
Checking the transaction nesting level with @@trancount
Checking the transaction state with @@transtate
Checking the nesting level with @@nestlevel
Checking the status from the last fetch
Using Transact-SQL Functions in Queries
Setting up a query
Built-in functions
System functions
String functions
Concatenating expressions
Nesting string functions
Limits on string functions
Text and image functions
Using readtext on unitext columns
Aggregate functions
Limitations
Aggregate functions used with the group by clause
Aggregate functions and null values
Vector and scalar aggregates
Aggregate functions as row aggregates
Statistical aggregate functions
Formulas for computing standard deviations
Mathematical functions
Date functions
Datatype conversion functions
Using the convert function for explicit conversions
Datatype conversion guidelines and constraints
Changing the date format
Conversion error handling
Security functions
XML functions
User-created functions
Using Stored Procedures
How stored procedures work
Examples
Permissions
Performance
Creating and executing stored procedures
Using deferred name resolution
Parameters
Default parameters
Using default parameters in stored procedures
NULL as the default parameter
Wildcard characters in the default parameter
Using more than one parameter
Using large object text, unitext, and image datatypes in stored procedures
Procedure groups
Using with recompile in create procedure
Using with recompile
Using with recompile in execute
Nesting procedures within procedures
Using temporary tables in stored procedures
Setting options in stored procedures
Query optimization settings
Arguments for stored procedures
Length of expressions, variables, and arguments
Executing stored procedures
Executing procedures after a time delay
Executing procedures remotely
Deferred compilation in stored procedures
Returning information from stored procedures
Return status
Reserved return status values
User-generated return values
Checking roles in procedures
Return parameters
Passing values in parameters
The output keyword
Restrictions associated with stored procedures
Qualifying names inside procedures
Renaming stored procedures
Renaming objects referenced by procedures
Using stored procedures as security mechanisms
Dropping stored procedures
System procedures
Executing system procedures
Permissions on system procedures
Types of system procedures
Other Sybase-supplied procedures
Catalog stored procedures
System extended stored procedures
dbcc procedures
Getting information about stored procedures
Getting a report with sp_help
Viewing the source text of a procedure with sp_helptext
Identifying dependent objects with sp_depends
Using sp_depends with deferred_name_resolution
Identifying permissions with sp_helprotect
Using Extended Stored Procedures
Overview
XP Server
Dynamic link library support
Open Server API
ESPs and permissions
ESPs and performance
Creating functions for ESPs
Files for ESP development
Open Server data structures
Open Server return codes
Outline of a simple ESP function
ESP function example
Building the DLL
Search order for DLLs
Sample makefile (UNIX)
Sample definitions file
Registering ESPs
Using create procedure
Using sp_addextendedproc
Removing ESPs
Renaming ESPs
Executing ESPs
System ESPs
Getting information about ESPs
ESP exceptions and messages
Cursors: Accessing Data
Selecting rows with cursors
Sensitivity and scrollability
Types of cursors
Cursor scope
Cursor scans and the cursor result set
Making cursors updatable
Determining which columns can be updated
How processes cursors
Monitoring cursor statements
Using declare cursor
declare cursor examples
Opening cursors
Fetching data rows using cursors
fetch syntax
Checking cursor status
Getting multiple rows with each fetch
Checking the number of rows fetched
Updating and deleting rows using cursors
Updating cursor result set rows
Deleting cursor result set rows
Closing and deallocating cursors
Scrollable and forward-only cursor examples
Forward-only (default) cursors
Example table for scrollable cursors
Insensitive scrollable cursors
Semisensitive scrollable cursors
Using cursors in stored procedures
Cursors and locking
Cursor-locking options
Enhanced transaction support for updatable cursors
Getting information about cursors
Using browse mode instead of cursors
Browsing a table
Browse-mode restrictions
Timestamping a new table for browsing
Timestamping an existing table
Comparing timestamp values
Triggers: Enforcing Referential Integrity
How triggers work
Using triggers versus integrity constraints
Creating triggers
create trigger syntax
SQL statements that are not allowed in triggers
Using triggers to maintain referential integrity
Testing data modifications against the trigger test tables
Insert trigger example
Delete trigger examples
Cascading delete example
Restricted delete examples
Update trigger examples
Restricted update triggers
Updating a foreign key
Multirow considerations
Insert trigger example using multiple rows
Delete trigger example using multiple rows
Update trigger example using multiple rows
Conditional insert trigger example using multiple rows
Rolling back triggers
Global login triggers
Nesting triggers
Trigger self-recursion
Rules associated with triggers
Triggers and permissions
Trigger restrictions
Implicit and explicit null values
Triggers and performance
set commands in triggers
Renaming and triggers
Trigger tips
Disabling triggers
Dropping triggers
Getting information about triggers
sp_help
sp_helptext
sp_depends
In-Row Off-Row LOB
Overview
Compressing in-row LOB columns
Migrating off-row LOB data to use in-row storage
In-row LOB columns and bulk copy
Examples of methods for migrating existing data
Guidelines for selecting the in-row LOB length
Downgrading with tables containing in-row LOB columns
Using instead of Triggers
Inserted and deleted logical tables
Triggers and transactions
Nesting and recursion
instead of insert triggers
Example
instead of update trigger
instead of delete trigger
searched and positioned update and delete
Getting information about triggers
Transactions: Maintaining Data Consistency and Recovery
How transactions work
Transactions and consistency
Transactions and recovery
Using transactions
Allowing data definition commands in transactions
System procedures that are not allowed in transactions
Beginning and committing transactions
Rolling back and saving transactions
Checking the state of transactions
Nested transactions
Example of a transaction
Selecting the transaction mode and isolation level
Choosing a transaction mode
Transaction modes and nested transactions
Finding the status of the current transaction mode
Choosing an isolation level
Default isolation levels for Adaptive Server and ANSI SQL
Dirty reads
Repeatable reads
Finding the status of the current isolation level
Changing the isolation level for a query
Isolation level precedences
Cursors and isolation levels
Stored procedures and isolation levels
Triggers and isolation levels
Compliance with SQL standards
Using the lock table command to improve performance
Using transactions in stored procedures and triggers
Errors and transaction rollbacks
Transaction modes and stored procedures
Running system procedures in chained mode
Setting transaction modes for stored procedures
Using cursors in transactions
Issues to consider when using transactions
Backup and recovery of transactions
Locking Commands and Options
Setting a time limit on waiting for locks
wait/nowait option of the lock table command
Setting a session-level lock-wait limit
Setting a server-wide lock-wait limit
Information on the number of lock-wait timeouts
Readpast locking for queue processing
Incompatible locks during readpast queries
Allpages-locked tables and readpast queries
Effects of isolation levels select queries with readpast
Session-level transaction isolation levels and readpast
Query-level isolation levels and readpast
Data modification commands with readpast and isolation levels
text, unitext, and image columns and readpast
Readpast-locking examples
The pubs2 Database
Tables in the pubs2 database
publishers table
authors table
titles table
titleauthor table
salesdetail table
sales table
stores table
roysched table
discounts table
blurbs table
au_pix table
Diagram of the pubs2 database
The pubs3 Database
Tables in the pubs3 database
publishers table
authors table
titles table
titleauthor table
salesdetail table
sales table
stores table
store_employees table
roysched table
discounts table
blurbs table
Diagram of the pubs3 database
Security Administration Guide 15.7 ESD #2
Introduction to Security
Introduction to security
What is āinformation security?ā
Information security standards
Common Criteria configuration evaluation
FIPS 140-2 validated cryptographic module
Getting Started with Security Administration in Adaptive Server
General process of security administration
Recommendations for setting up security
An example of setting up security
Security features in Adaptive Server
Identification and authentication
External authentication
Managing remote servers
Discretionary access control
Row-level access control
Predicated Privileges
Division of roles
Role hierarchy
Restrictions on role activation
Mutual exclusivity
Auditing for accountability
Confidentiality of data
Managing Adaptive Server Logins and Database Users
Introduction to logins and login profiles
Managing login accounts
Creating login accounts
Last login and managing inactive accounts
Defining a stale period
Tracking the last login
Preventing inactive accounts from being locked
Authentication mechanisms for login
Changing login accounts
Dropping login accounts
Choosing and creating a password
Setting and changing the maximum login attempts
Logging in after losing a password
Displaying password information
Checking passwords for at least one digit
Setting and changing minimum password length
Password complexity checks
Disallowing simple passwords
Custom password-complexity checks
Specifying characters in a password
Password complexity option cross-checks
Setting password complexity checks
Enabling custom password checks
Setting the login and role expiration interval for a password
Password expiration turned off for pre-12.x passwords
Circumventing password protection
Creating a password expiration interval for a new login
Creating a password expiration interval for a new role
Creation date added for passwords
Changing or removing password expiration interval for login or role
Securing login passwords on the network
Securing login passwords stored on disk and in memory
Character set considerations for passwords
Upgrade and downgrade behavior
Login password downgrade
Behavior changes on upgraded master database
Behavior changes in a new master database
Retaining password encryption after upgrading then downgrading
Expiring passwords when allow password downgrade is set to 0
Using passwords in a high-availability environment
High-availability configuration
Passwords updated after upgrade
Establishing a password and login policy
Login failure
Locking Adaptive Server login accounts and roles
Locking and unlocking logins
Locking and unlocking login accounts
Using syslogins to track if an account is locked
Locking and unlocking roles
Locking logins that own thresholds
Managing login profiles
Login profile attributes
Applying login profile and password policy attributes
Creating a login profile
Creating a default login profile
Associating a login profile with a login account
Ignoring a login profile
Transfer existing login account values to a new login profile
Manual replication of login profiles
Granting roles to login profiles
Invoking a login script
Displaying login profile information
Displaying the login profile name
Displaying the login profile ID
Displaying login profile binding information
Modifying login profiles
Adding or dropping auto-activated roles
Changing a login profile to be the default login profile
Dropping a login profile
Adding users to databases
Adding a āguestā user to a database
āguestā user permissions
āguestā user in user databases
āguestā user in installed system databases
āguestā user in pubs2 and pubs3
Adding a guest user to the server
Adding remote users
Creating groups
Changing a userās group membership
Setting up groups and adding users
Using aliases in databases
Adding aliases
Dropping aliases
Getting information about aliases
Getting information about users
Reporting on users and processes
Getting information about login accounts
Getting information about database users
Finding user names and IDs
Changing user information
Changing passwords
Requiring new passwords
Null passwords
Logging in after lost password
Changing user session information
Dropping users and groups
Dropping users
Dropping groups
Monitoring license use
How licenses are counted
Configuring the License Use Monitor
Monitoring license use with the housekeeper task
Logging the number of user licenses
Number of user and login IDs
Limits and ranges of ID numbers
Login connection limitations
Getting information about usage: chargeback accounting
Reporting current usage statistics
Displaying current accounting totals
Initiating a new accounting interval
Specifying the interval for adding accounting statistics
Managing Roles
Creating and assigning roles to users
System-defined roles
System administrator privileges
System security officer privileges
Operator privileges
Sybase Technical Support
Replication role
Distributed Transaction Manager role
High availability role
Monitoring and diagnosis
Job Scheduler roles
Real-time messaging role
Web Services role
Key custodian role
Planning user-defined roles
Creating a user-defined role
Adding and removing passwords from a role
Role hierarchies and mutual exclusivity
Defining and changing mutual exclusivity of roles
Defining and changing a role hierarchy
Setting up default activation at login
Setting conditions for role activation
Dropping user-defined roles
Activating and deactivating roles
Displaying information about roles
Finding role IDs and names
Viewing active system roles
Displaying a role hierarchy
Viewing user roles in a hierarchy
Determining mutual exclusivity
Determining role activation
Checking for roles in stored procedures
Granting and revoking roles
Granting roles
Understanding grant and roles
Revoking roles
Roles granted to login profiles
Securing role passwords
Character set considerations
Locked roles and syssrvroles
Login password policy checks to role passwords
High-availability support for password policy options
Setting up Adaptive Server for roles
Installing
Upgrading Adaptive Server
Downgrading Adaptive Server
External Authentication
Configuring Adaptive Server for network-based security
Security services and Adaptive Server
Administering network-based security
Setting up configuration files for security
Specifying security information for the server
Preparing libtcl.cfg to use network-based security
The objectid.dat file
Identifying users and servers to the security mechanism
Configuring Adaptive Server for security
Enabling network-based security
Requiring unified login
Establishing a secure default login
Mapping security mechanism login names to server names
Requiring message confidentiality with encryption
Requiring data integrity
Memory requirements for network-based security
Adding logins to support unified login
General procedure for adding logins
Establishing Kerberos security for remote connections
Unified login and the remote server logins
Getting information about remote servers
Connecting to the server and using the security services
Using security mechanisms for the client
Getting information about available security services
Determining supported security services and mechanisms
Determining active security services
Determining whether a security service Is enabled
Using Kerberos
Kerberos compatibility
Starting Adaptive Server under Kerberos
Configuring Kerberos
Using principal names
Specifying the Adaptive Server principal name
Using sybmapname to handle user principal names
Concurrent Kerberos authentication
Configuring Adaptive Server for LDAP user authentication
Composed DN algorithm
Searched DN algorithm
Configuring LDAP
LDAP user authentication administration
LDAP user authentication password information changes
Failover support
Adaptive Server logins and LDAP user accounts
Secondary lookup server support
LDAP server state transitions
LDAP user authentication tuning
Adding tighter controls on login mapping
Login mapping of external authentication
Troubleshooting LDAP user authentication errors
Configuring an LDAP server
LDAPS user authentication enhancements
Automatic LDAP user authentication and failback
Setting the LDAP failback time interval
Examples
Configuring Adaptive Server for authentication using PAM
Enabling PAM in Adaptive Server
Configuring operating systems
Running a 32- and 64-bit server on the same machine
Configuring Adaptive Server for PAM user authentication
Adaptive Server logins and PAM user accounts
Enhanced login controls
Forcing authentication
Mapping logins using sp_maplogin
Displaying mapping information
Determining the authentication mechanism
Managing User Permissions
Overview
Permissions for creating databases
Changing database ownership
Database owner privileges
Database object owner privileges
Other database user privileges
Permissions on system procedures
Granting and revoking permissions
Object access permissions
Concrete identification
Special requirements for SQL92 standard compliance
Examples of granting object access permissions
Examples of revoking object access permissions
Granting permissions on dbcc commands
Server-wide and database-specific dbcc commands
dbcc grantees and users in databases
Permissions on system tables
Granting default permissions to system tables and stored procedures
Combining grant and revoke statements
Understanding permission order and hierarchy
Grant dbcc and set proxy issue warning for fipsflagger
Acquiring the permissions of another user
Using setuser
Using proxy authorization
Using set proxy to restrict roles
Executing proxy authorization
Proxy authorization for applications
Changing database object ownership
Supported object types
Authorization
Transferring ownership
Transferring ownership of objects in the system database
Transferring ownership of database owner objects
Using preserve permissions
Security issues
Transferring ownership of encryption keys
Reporting on permissions
Querying the sysprotects table for proxy authorization
Displaying information about users and processes
Reporting permissions on database objects or users
Reporting permissions on specific tables
Using views and stored procedures as security mechanisms
Using views as security mechanisms
Using stored procedures as security mechanisms
Roles and stored procedures
Understanding ownership chains
Example of views and ownership chains
Example of procedures and ownership chains
Permissions on triggers
Executing a procedure with execute as owner or execute as caller
Creating a procedure with references to an object with an unqualified name
Procedures that invoke a nested procedure in another database with a fully qualified name
Using row-level access control
Access rules
Syntax for access rules
Using access and extended access rules
Access rule examples
Access rules and alter table command
Access rules and bcp
Access rules as user-defined Java functions
Using the Application Context Facility
Setting permissions for using application context functions
Creating and using application contexts
set_appcontext
get_appcontext
list_appcontext
rm_appcontext
SYS_SESSION system application context
Solving a problem using an access rule and ACF
Using login triggers
Creating login triggers
Configuring login triggers
Executing a login trigger
Understanding login trigger output
Using login triggers for other applications
Login trigger restrictions
Issues and information
Disabling execute privilege on login triggers
Exporting set options from a login trigger
Setting global login triggers
Granting Predicated Privileges
Introduction to predicated privileges
Commands used for predicated privileges
Configuring Adaptive Server to use predicated privileges
enable predicated privileges
Granting predicated privileges
Granting access to select data
Granting access to update data
Granting access to delete data
Using predicated privileges to enforce a data privacy policy
Revoking predicated privileges
How Adaptive Server saves predicated privileges in sysprotects
Predicated role activation
Combining predicates to enforce row-level privileges
Understanding SQL behavior with predicated privileges
Chain-of-ownership effect on predicated privileges
ansi_permissions and predicated privileges
Permissions on accesses made by predicates
Using triggers with predicated privileges
Recompiling predicated privileges
Disallowing recursive predicate processing
Information leakage through predicates
Using Granular Permissions
Introduction to granular permissions
Configuring Adaptive Server to use granular permissions
System privileges
Effect of privileges as part of system-defined roles
Permission management
manage security permissions privilege
manage server permissions privilege
manage database permissions privilege
manage any object permission privileges
Privileges granted to system-defined roles
Privileges assigned to the database owner
Roles added with granular permissions
sa_serverprivs_role
Default roles granted to the system administrator
Limiting the power of the system administrator and database owner
Enable granular permissions and sybsecurity
Logging in to a locked-out Adaptive Server
General use scenarios
Scenario 1: Permissions for an application server user
Scenario 2: Permissions for a database access manager
Scenario 3: Permissions for a database backup manager
Scenario 4: Permissions for a help desk operator
Scenario 5: Permissions for a security auditor
System table master.dbo.sysprotects
Database user usedb_user
Grantable system privileges
Confidentiality of Data
Secure Sockets Layer (SSL) in Adaptive Server
Internet communications overview
Public-key cryptography
SSL overview
SSL in Adaptive Server
SSL filter
Authentication via the certificate
Connection types
Enabling SSL
Obtaining a certificate
Creating server directory entries
Administering certificates
Performance
Cipher Suites
@@ssl_ciphersuite
Setting SSL cipher suite preferences
Examples sp_ssladmin
Other considerations
Using SSL to specify a common name
Specifying a common name with sp_listener
Stored procedure sp_addserver changed
Kerberos confidentiality
Dumping and loading databases with password protection
Passwords and earlier versions of Adaptive Server
Passwords and character sets
Auditing
Introduction to auditing in Adaptive Server
Correlating Adaptive Server and operating system audit records
The audit system
The sybsecurity database
The audit queue
Auditing configuration parameters
Auditing grant and revoke commands
Auditing DML statements
Auditing login and login profile commands
Auditing stored procedures
System procedures for auditing
Managing deployed source in source code control systems
Installing and setting up auditing
Installing the audit system
Tables and devices for the audit trail
Device for the syslogs transaction log table
Preinstallation tasks for auditing devices
Installing auditing with auditinit
Installing auditing with installsecurity
Moving the auditing database to multiple devices
Moving sybsecurity without saving global audit settings
Moving sybsecurity and saving global audit settings
Setting up audit trail management
Setting up threshold procedures
Setting auditing configuration parameters
Setting up transaction log management
Truncating the transaction log
Managing the transaction log with no truncation
Enabling and disabling auditing
Single-table auditing
Establishing and managing single-table auditing
Threshold procedure for single-table auditing
What happens when the current audit table is full?
Recovering when the current audit table is full
Restarting auditing
Setting global auditing options
Auditing options: types and requirements
Examples of setting auditing options
Hiding system stored procedure and command password parameters
Determining current auditing settings
Adding user-specified records to the audit trail
Examples of adding user-defined audit records
Querying the audit trail
Understanding the audit tables
Reading the extrainfo column
Monitoring failed login attempts
Auditing login failures
Sybase Control Center for Adaptive Server Enterprise 3.2.8
About Sybase Control Center for Adaptive Server
New Features in Sybase Control Center for Adaptive Server Enterprise
User Interface Overview
Toolbar Icons
Status Icons
Display and Copy Options in Adaptive Server monitors
Common Display Options
Keyboard Shortcuts
Displaying the Versions of SCC Components
Style and Syntax Conventions
Accessibility Features
Sybase Control Center Accessibility Information
Get Started
Quick Start for an Evaluation
Get Started in a Production Environment
Deploying an Instance from a Shared Disk Installation
Enabling and Disabling Shared-Disk Mode
Shared-Disk Mode
sccinstance Command
Launching Sybase Control Center
Registering the ODBC Driver in Windows
Starting and Stopping Sybase Control Center in Windows
Starting and Stopping Sybase Control Center in UNIX
Configuring Memory Usage
Changing a Memory Option on the Command Line
Changing a Memory Option for a Sybase Control Center Windows Service
Changing a Memory Option for an SCC UNIX Service
scc Command
Logging in to Sybase Control Center
Logging out of Sybase Control Center
Setting Up Security
Security
Configuring Authentication for Windows
Configuring a Pluggable Authentication Module (PAM) for UNIX
Configuring an LDAP Authentication Module
LDAP Configuration Properties
Mapping Sybase Control Center Roles to LDAP or OS Groups
Encrypting a Password
Configuring Ports
Configuring the E-mail Server
Configuring the Automatic Logout Timer
Configuring Retrieval Thresholds for the Administration Console
User Authorization
Assigning a Role to a Login or a Group
Removing a Role from a Login or a Group
Adding a Group
Removing a Group
Adding a Login Account to a Group
Removing a Login Account from a Group
Adding a Login Account to the System
Removing a Login Account from the System
Modifying a User Profile
Logins, Roles, and Groups
Configure
Configuring Adaptive Server for Monitoring
Registering an Adaptive Server
Importing Resources for Batch Registration
Registering the Agent for an Adaptive Server
Authenticating a Login Account for a Managed Resource
Role Assignment in Sybase Control Center for Adaptive Server
Encrypted Authentication for Adaptive Server
Setting Up Statistics Collection
About Statistics
Adaptive Server Data Collections
Key Performance Indicators for Adaptive Server
Creating an Alert
Adaptive Server Alerts
Alert Types, Severities, and States for Adaptive Server
Alert-Triggered Scripts
Alert-Triggered Script Examples
Substitution Parameters for Scripts
Setting Display Options for Adaptive Server Performance Data
Optional Configuration Steps
Manage and Monitor
Displaying Resource Availability: the Heat Chart
Graphing Performance Counters: the Statistics Chart
Manage Sybase Control Center
Administration Console
Browsing and Managing Resources
Searching and Filtering Resources
Searching for Objects in Adaptive Server
Handling Message Rows for Search Requests
Configuring Retrieval Thresholds for the Administration Console
Job Scheduling
Executing and Stopping a Data Collection Job
Deleting a Data Collection Job
Resuming and Suspending a Data Collection Job
Adding a New Schedule to a Job
Viewing or Deleting a Schedule
Modifying the Data Collection Interval for a Job
Resuming and Suspending the Scheduler
Viewing the Job Execution History
Alerts
Adaptive Server Alerts
Alert Types, Severities, and States for Adaptive Server
Creating an Adaptive Server Alert
Displaying Adaptive Server Alerts
Modifying an Alert
Deleting an Alert
Alert Subscriptions
Adding or Modifying an Alert Subscription
Unsubscribing from an Alert
Enabling and Disabling Alert Subscription
Alert Notifications
Displaying Alert History and Resolutions
Resolving Alerts
Alert-Triggered Scripts
Substitution Parameters for Scripts
Testing an Alert-Triggered Script
Alert-Triggered Script Examples
Resources
Unregistering a Resource
Adding a Resource to a Perspective
Removing a Resource from a Perspective
Modifying a Resourceās Name and Connection Properties
Searching for Resources in the Resource Explorer
Perspectives
Creating a Perspective
Removing a Perspective
Renaming a Perspective
Views
Managing a View
Arranging View Layout in a Perspective
Instances
Enabling and Disabling Shared-Disk Mode
Deploying an Instance from a Shared Disk Installation
Refreshing or Converting an Instance
Removing an Instance
Shared-Disk Mode
sccinstance Command
Repository
Scheduling Backups of the Repository
Modifying the Backup Schedule
Forcing an Immediate Backup
Restoring the Repository from Backups
Configuring Repository Purging
Logging
Viewing the Adaptive Server Component Log
Viewing Sybase Control Center Server Logs
Viewing the Sybase Control Center Client Log
Changing the Logging Level
Logging or Message Levels
Changing Logging Configuration
Sybase Control Center Console
Console Commands
help Command
info Command
shutdown command
status Command
Setting Adaptive Server Parameters in the Configuration File
Configuration Parameters for Adaptive Server
Manage and Monitor the Adaptive Server Environment
Managing an Adaptive Server
Executing SQL Statements
Registering the Agent for an Adaptive Server
Authenticating the Unified Agent
Authenticating the SCC Agent
Starting an Adaptive Server
Stopping an Adaptive Server
Configuring Retrieval Thresholds for the Administration Console
Browsing and Managing Resources
Searching for Objects in Adaptive Server
Handling Message Rows for Search Requests
Adaptive Server Error Log
Viewing the Adaptive Server Error Log
Searching the Error Log for Messages
Managing Flag Definitions
Server Properties
Enabling Granular Permissions
Activating a Role
Displaying the Performance Overview
Performance Overview Statistics and Details
Caches
Monitor Caches
Monitoring Adaptive Server Data Caches
Modifying Data Cache Sizes
Adding Data Cache Buffer Pools
Data Cache Statistics and Details
Monitoring the Adaptive Server Procedure Cache
Procedure Cache Statistics and Details
Monitoring the Adaptive Server Statement Cache
Setting the Statement Cache Size
Statement Cache Statistics and Details
Monitoring Adaptive Server In-memory Storage
In-memory Storage Statistics and Details
Manage Caches
Creating a Cache
Cache Properties
Managing Cache Configurations
Managing Buffer Pools
Managing Binding Options
Generating DDL for Caches
Deleting a Cache
Clusters
Monitor Clusters
Cluster Instances
Monitoring Cluster Instances in Adaptive Server Cluster Configurations
Cluster Instances Statistics and Details
Cluster Interconnect
Displaying the Cluster Overview
Cluster Interconnect Statistics and Details
Monitoring Interprocess Communication in Adaptive Server Cluster Configurations
Workload Management
Monitoring Workloads in Adaptive Server Cluster Configurations
Workload Management Statistics and Details
Manage Clusters
Starting the SCC agent for a Cluster
Starting the Unified Agent for a Cluster
Preparing to Create a Cluster
Creating a Cluster
Registering a Cluster
Registering the Agent and Starting a Cluster
Displaying Cluster Configuration Values
Starting a Cluster
Stopping a Cluster
Dropping a Cluster
Viewing a Cluster Log
Cluster Properties
Manage Logical Clusters
Adding a Logical Cluster
Designating a Failover Logical Cluster
Designating a Failback Logical Cluster
Logical Cluster States
Changing the State of a Logical Cluster
Deleting a Logical Cluster
Generating a DDL Script for a Logical Cluster
Logical Cluster Properties
Manage Cluster Instances
Displaying Instance Configuration Values
Starting an Instance
Adding an Instance to a Cluster
Stopping an Instance
Deleting an Instance
Instance Properties
Viewing an Instance Log
Manage Load Profiles
Adding a Load Profile
Deleting a Load Profile
Generating a DDL Script for a Load Profile
Load Profile Properties
Manage Routes
Adding a Route
Deleting a Route
Route Properties
Manage Auxiliary Servers
Configuring a Backup Server
Deleting a Backup Server
Backup Server Properties
Configuring an XP Server
Deleting an XP Server
XP Server Properties
Compiled Objects
Granting Permissions on Compiled Objects
Revoking Permissions on Compiled Objects
Databases
Monitor Databases
Determining the Backup Status of a Database
Displaying Resources Used by a Database
Modifying Database Sizes
Database Statistics and Details
Displaying Information About Segments Used by a Database
Manage Databases
Creating a User Database
Creating a Proxy Database
Creating a Temporary Database
Creating an Archive Database
Creating an In-Memory Database
Creating an In-Memory Temporary Database
Creating a Temporary Database Group
Backing Up (Dumping) a Database
Viewing Available Dump Configurations
Creating a Dump Configuration
Backing Up a Database Using a Dump Configuration
Dump Configuration Properties
Deleting a Dump Configuration
Backing Up a Database or Transaction Log to Multiple Stripes
Backing Up a Database Incrementally
Backing Up a Database Incrementally Using a Dump Configuration
Viewing Dump Records
Purging Dump Records from Dump History
Generating Database-Creation SQL for a Target Database
Generating Database-Creation SQL from a Dump Image
Backing Up Server Configuration Files
Restoring (Loading) a Database
Generating a Database Load Sequence
Generating a Database Load Sequence for a Target Database from Dump History
Restoring a Database from a Cumulative Dump
Restoring a Database from a SQL Script
Restoring a Database from a Point in Time
Viewing Database Statistics
Checkpointing Databases
Checking Database Consistency
Placing a Database in Quiesce-Hold
Placing a Database in Quiesce-Release
Mounting an Adaptive Server Database
Unmounting an Adaptive Server Database
Database Properties
Changing Database Ownership
Modifying Database Storage Allocations
Modifying the Transaction Log Cache and the Log I/O Buffer Size
Changing Database Options
Generating a DDL Script
Deleting a Database
Shrinking a Database
Defaults
Manage Defaults
Creating a Default
Defaults Properties
Deleting a Default
Devices
Monitor Devices
Determining Device I/O Response and I/O per Second
Modifying Device Sizes
Device Statistics and Details
Manage Devices
Displaying a Device Object
Creating a Database Device
Creating an In-Memory Device
Creating a Dump Device
Database Device Properties
In-Memory Device Properties
Dump Device Properties
Generating a DDL Script
Deleting a Database, In-Memory, or Dump Device
Engines
Monitor Engines
Displaying Engine CPU Utilization
Engine Statistics and Details
Manage Engine Groups
Creating Engine Groups
Engine Groups Properties
Deleting an Engine Group
Generating a DDL Script
Execution Classes
Manage Execution Classes
Creating Execution Classes
Execution Classes Properties
Modifying Bindings to Execution Classes
Extended Stored Procedures
Manage Stored Procedures
Creating an Extended Stored Procedure
Extended Stored Procedures Properties
Generating a DDL Script
Deleting an Extended Stored Procedure
Functions
Manage Scalar Functions
Creating a Scalar Function
Scalar Function Properties
Generating a DDL Script
Deleting a Scalar Function
Manage SQLJ Functions
Creating a SQLJ Function
SQLJ Function Properties
Generating a DDL Script
Deleting a SQLJ Function
Networks
Managing Remote Servers
Configuring Adaptive Server for Remote Procedure Calls
Adding a Remote Server
Deleting a Remote Server
Remote Server Properties
Testing a Remote Server Connection
Setting Options for a Remote Server
Managing Remote Server Login Mappings
Managing CIS Roles and Logins Mappings
Precomputed Result Sets
Configuring Adaptive Server to Use Precomputed Result Sets
Viewing Precomputed Result Sets
Creating a Precomputed Result Set
Deleting a Precomputed Result Set
Altering a Precomputed Result Set
Refreshing Precomputed Result Sets
Truncating a Precomputed Result Set
Granting Permissions
Revoking Permissions
Granting Precomputed Result Set Permissions to a Specific User
Revoking Precomputed Result Set Permissions from a Specific User
Displaying Information About Precomputed Result Sets
Generating DDL for a Precomputed Result Set
Procedures
Manage Stored Procedures
Creating a Stored Procedure
Stored Procedure Properties
Generating a DDL Script
Deleting a Procedure
Manage SQLJ Procedures
Creating a SQLJ Procedure
SQLJ Procedure Properties
Generating a DDL Script
Deleting a SQLJ Procedure
Processes
Monitor Processes
Identifying Resource-Intensive Processes
Identifying Blocked Processes and Blocking Processes
Terminating Blocking Processes
Identifying the Lead Blocker in a Chain
Displaying the SQL Query Associated with a Process
Displaying Wait Events for a Process
Process Statistics and Details
Replication Agents
Monitor Replication Agents
Monitoring RepAgent Threads
Setting Replication Parameters
Replication Agent Statistics and Details
Rules
Manage Rules
Creating a Rule
Rule Properties
Generating a DDL Script
Deleting a Rule
Security
Manage Encryption Keys
Creating a System Encryption Password
Modifying and Deleting a System Encryption Password
Creating a Master Key
Creating a Column Encryption Key
Modifying and Deleting a Column Encryption Key
Modifying, Regenerating, and Deleting a Master Key
Master Key Properties
Dual Control and Split Knowledge
Column Encryption Keys Properties
Creating a Key Copy
Granting Encryption Permissions to a Role, User, or Group
Generating a DDL Script
Deleting an Encryption Key
Manage Login Profiles
Creating a Login Profile
Login Profile Properties
Granting Roles to a Login Profile
Removing Roles Granted to a Login Profile
Deleting a Login Profile
Displaying Logins Assigned to a Login Profile
Transferring Login Attributes to a Login Profile
Manage Logins
Creating a Login
Login Properties
Granting Roles to a Login
Removing Roles from a Login
Managing Users Mapped to Logins
Configuring Login Password Properties
Changing a Login Password
Displaying Login Account Properties
Assigning Login Profiles to a Login
Deleting a Login
Manage Groups
Creating a Group
Adding or Removing Users to or from a Group
Group Properties
Granting or Revoking Command Permissions to or from a Group
Granting Object Permissions to a Group
Revoking Object Permissions from a Group
Granting Privileges to a Group
Revoking Privileges from a Group
Generating a DDL Script
Deleting a Group
Manage Users
Creating a User
Transferring Ownership of a Database Object
Users Properties
Granting Object Permissions to a User
Revoking Object Permissions from a User
Granting Privileges to a User
Revoking Privileges from a User
Generating a DDL Script
Deleting a User
Manage Roles
Expiring a Role Password
Creating a Role
Restoring System Roles
Role Properties
Assigning Logins to a Role
Removing Logins Assigned to a Role
Assigning Login Profiles to a Role
Removing Login Profiles Assigned to a Role
Setting Command Permissions for a Role
Managing Mutually Exclusive Roles
Creating Role Hierarchy
Granting Privileges to a Role
Revoking Privileges from a Role
Granting Object Permissions to a Role
Revoking Object Permission from a Role
Segments
Monitor Segments
Determining the Space Used by a Table on a Segment
Extending a Segment in Adaptive Server
Segment Statistics and Details
Manage Segments
Displaying Segments
Creating a Segment
Segment Properties
Adding a Database Device to a Segment
Removing a Database Device from a Segment
Adding a Threshold to a Segment
Removing a Threshold from a Segment
Generating a DDL Script
Deleting a Segment
Server Configuration
Monitor Server Configuration
Displaying Configuration Values
Modifying Server Configuration Parameters
Server Configuration Statistics and Details
Settings
Statistics
Managing Statistics
Running update statistics
Updating Statistics on Specific Columns
Updating Statistics on an Index
Updating Statistics for a Data Partition
Updating Statistics on an Index Partition
Deleting Statistics from a Table
Deleting Statistics from a Column
Deleting Statistics from a Data Partition
Interpreting Statistics
SQL Activity
Monitoring SQL Queries
Executing SQL Statements
Tables
Manage Tables
Creating a User Table
Creating a Proxy Table
Creating a Column
Creating an Index
Creating a Trigger
Restoring Table Data
Creating a Foreign Key
Creating a Check Constraint
Checking Table Consistency
Binding Defaults and Rules to a Column
Placing a Table on a Segment
Setting the Table Locking Scheme
Creating a Primary Key
Creating a Unique Constraint
Incrementally Transferring Data
Incrementally Transferring Data In
Incrementally Transferring Data Out
Bulk Copying Data
Bulk Copying Data Into a Table
Bulk Copying Data Out of a Table
Setting Table or Column Permissions
Granting Table Permissions
Revoking Table Permissions
Granting Column Permissions
Revoking Column Permissions
Manage Partitions
Using a Hash Partition
Using a Range Partition
Using a List Partition
Using a Round-Robin Partition
Enabling Semantic-based Partitioning
Splitting a Partition
Merging a Partition
Moving a Partition
Manage Reorganization
Reorganizing Tables at the Database Level
Reorganizing Tables
Reorganizing Table Partitions
Reorganizing Indexes
Reorganizing Index Partitions
Status Messages
Managing Table Statistics
Updating Table Statistics
Deleting Table Statistics
Updating Column Statistics
Deleting Column Statistics
Updating Index Statistics
Updating Partition Statistics
Deleting Partition Statistics
Table Properties
Column Properties
Index Properties
Trigger Properties
Foreign Key Properties
Check Constraint Properties
Partition Properties
Deleting a Table
Thread Pools
Monitor Threads
Identifying the Threads in a Thread Pool
Thread Statistics and Details
Manage Thread Pools
Creating a Thread Pool
Thread Pool Properties
Transactions
Monitor Transactions
Identifying a Transactionās Process
Transaction Statistics and Details
User-Defined Datatypes
Manage User-Defined Datatypes
Adding a User-Defined Datatype
User-Defined Datatypes Properties
Deleting a User-Defined Datatype
Views
Manage Views
Creating a View
View Properties
Bulk Copying Data Out of a Table
Deleting a View
Troubleshoot Sybase Control Center for Adaptive Server
Data Display Problems
Cannot Monitor Adaptive Server or Display Statistics Chart
Data on Screens or Charts Is Missing
Database Objects Are Not Updated
Error: No Result Set for this Query
Error: No Data Was Found For Statistic
Properties for Engine Groups Incorrectly Displayed
Same Name Engine Groups Are Not Selectable
Error: Unable to Format the Date String
"Number of Transactions" KPI Is Not Updated
Cannot Find Error Information For Monitor View
Display Large Number of Objects in Administration Console
Data Collection and Alert Problems
Collection Job for Adaptive Server Fails
Alerts Are Configured But Do Not Fire
Data Collections Fail to Complete
Alerts Are Not Generated
Authentication and Access Problems
Cannot Log In
Sybase Control Center Fails to Start
Browser Refresh (F5) Causes Logout
Invalid Connection Profile
Cannot Authenticate Server Configured with a Multibyte Character Set
Features Are Not Enabled Although You Have sa_role
Resetting the Online Help
Performance Problems
Adaptive Server Is Responding Slowly
Memory Warnings at Startup
SCC Out of Memory Errors
Performance Statistics Do Not Cover Enough Time
Collect Diagnostic Data
Preparing to Collect Diagnostic Data
Collecting Field Diagnostic Data
Collecting Optimizer Diagnostic Data
Upload Diagnostic Data
Uploading Diagnostic Data Via FTP
Submitting Diagnostic Data via E-mail Message
Deleting a Diagnostic Data File
Glossary: Sybase Control Center for Adaptive Server
System Administration Guide: Volume 1 15.7
Overview of System Administration
Adaptive Server administration tasks
Roles required for system administration tasks
Database owner
Database object owner
Using isql to perform system administration tasks
Starting isql
Entering statements
Saving and reusing statements
Using Sybase Central for system administration tasks
System tables
Querying the system tables
Keys in system tables
Updating system tables
System procedures
Using system procedures
System procedure tables
Creating system procedures
System extended stored procedures
Creating system ESPs
Logging error messages
Connecting to Adaptive Server
The interfaces file
Directory services
LDAP as a directory service
Multiple directory services
LDAP directory services versus the Sybase interfaces file
Security features available in Adaptive Server
System and Optional Databases
Overview of system databases
master database
Controlling object creation in master
Backing up master and keeping copies of system tables
model database
sybsystemprocs database
tempdb database
Creating temporary tables
sybsecurity database
sybsystemdb database
sybmgmtdb database
pubs2 and pubs3 sample databases
Maintaining the sample databases
pubs2 image data
dbccdb database
sybdiag database
Determining the version of the installation scripts
System Administration for Beginners
Logical page sizes
Using ātestā servers
Planning resources
Achieving performance goals
Considerations when installing Sybase products
Check product compatibility
Install or upgrade Adaptive Server
Install additional third-party software
Configure and test client connections
Allocating physical resources
Dedicated versus shared servers
Decision-support and OLTP applications
Advance resource planning
Operating system configuration
Backup and recovery
Keep up-to-date backups of master
Keep offline copies of system tables
Automate backup procedures
Verify data consistency before backing up a database
Monitor the log size
Ongoing maintenance and troubleshooting
Starting and stopping Adaptive Server
Viewing and pruning the error log
Keeping records
Contact information
Configuration information
Maintenance schedules
System information
Disaster recovery plan
Additional resources
Managing and Monitoring Adaptive Server
Sybase Control Center for Adaptive Server
Adaptive Server Sybase Central Plug-in
Using the Adaptive Server Plug-in
Starting and stopping Sybase Central
Registering Adaptive Server Plug-in
Performing common tasks
Using Interactive SQL
Starting Interactive SQL
Setting Configuration Parameters
Overview
The Adaptive Server configuration file
Modifying configuration parameters
Required roles for modifying configuration parameters
Unit specification using sp_configure
Global versus session settings
Getting help information on configuration parameters
Using sp_configure
Syntax elements
Parameter parsing
Using sp_configure with a configuration file
Naming tips for the configuration file
Using sp_configure to read or write the configuration file
Editing the configuration file
Starting Adaptive Server with a configuration file
The parameter hierarchy
User-defined subsets of the parameter hierarchy: display levels
The effect of the display level on sp_configure output
Performance tuning with sp_configure and sp_sysmon
Using configuration parameters in a clustered environment
sp_configure output
Named cache configuration parameters
sysconfigures and syscurconfigs tables
Querying syscurconfigs and sysconfigures: an example
Configuration parameters
Alphabetical listing of configuration parameters
abstract plan cache
abstract plan dump
abstract plan load
abstract plan replace
additional network memory
allocate max shared memory
allow backward scans
allow nested triggers
allow procedure grouping
allow remote access
allow resource limits
allow sendmsg
allow sql server async i/o
allow updates to system tables
average cap size
audit queue size
auditing
automatic cluster takeover
builtin date strings
caps per ccb
capture compression statistics
check password for digit
CIPC large message pool size
CIPC regular message pool size
cis bulk insert array size
cis bulk insert batch size
cis connect timeout
cis cursor rows
cis idle connection timeout
cis packet size
cis rpc handling
cluster heartbeat interval
cluster heartbeat retries
cluster redundancy level
cluster vote timeout
column default cache size
compression info pool size
compression memory size
configuration file
cost of a logical io
cost of a physical io
cost of a cpu unit
cpu accounting flush interval
cpu grace time
current audit table
deadlock checking period
deadlock pipe active
deadlock pipe max messages
deadlock retries
default character set id
default database size
default exp_row_size percent
default fill factor percent
default language id
default network packet size
default sortorder id
default unicode sortorder
default XML sortorder
deferred name resolution
disable character set conversions
disable disk mirroring
disable varbinary truncation
disk i/o structures
DMA object pool size
dtm detach timeout period
dtm lock timeout period
dump on conditions
dynamic allocation on demand
enable backupserver HA
enable cis
enable compression
enable console logging
enable DTM
enable encrypted columns
enable enterprise java beans
enable file access
enable full-text search
enable functionality group
enable inline default sharing
enable HA
enable housekeeper GC
enable hp posix async i/o
enable i/o fencing
enable java
enable job scheduler
enable ldap user auth
enable literal autoparam
enable logins during recovery
enable merge join
enable metrics capture
enable monitoring
enable pam user auth
enable pci
enable permissive unicode
enable query tuning mem limit
enable query tuning time limit
enable real time messaging
enable rep agent threads
enable row level access control
enable semantic partitioning
enable sort-merge join and JTC
enable sql debugger
enable ssl
enable stmt cache monitoring
enable surrogate processing
enable unicode conversion
enable unicode normalization
enable webservices
enable xact coordination
enable xml
engine memory log size
errorlog pipe active
errorlog pipe max messages
esp execution priority
esp execution stacksize
esp unload dll
event buffers per engine
event log computer name (Windows only)
event logging (Windows only)
executable codesize + overhead
extended cache size
FIPS login password encryption
global async prefetch limit
global cache partition number
heap memory per user
histogram tuning factor
housekeeper free write percent
i/o accounting flush interval
i/o batch size
i/o polling process count
identity burning set factor
identity grab size
identity reservation size
idle migration timeout
job scheduler interval
job scheduler tasks
js job output width
kernel mode
kernel resource memory
license information
lock address spinlock ratio
lock hashtable size
lock scheme
lock shared memory
lock spinlock ratio
lock table spinlock ratio
lock timeout pipe active
lock timeout pipe max messages
lock wait period
log audit logon failure
log audit logon success
max async i/os per engine
max async i/os per server
max cis remote connections
max concurrently recovered db
max memory
max native threads per engine
max nesting level
max network packet size
max number network listeners
max online engines
max online Q engines
max parallel degree
max pci slots
max query parallel degree
max repartition degree
max resource granularity
max scan parallel degree
max SQL text monitored
max transfer history
maximum dump conditions
max buffers per lava operator
maximum failed logins
maximum job output
memory alignment boundary
memory per worker process
messaging memory
metrics elap max
metrics exec max
metrics lio max
metrics pio max
min pages for parallel scan
minimum password length
mnc_full_index_filter
msg confidentiality reqd
msg integrity reqd
net password encryption required
number of alarms
number of aux scan descriptors
number of backup connections
number of ccbs
number of checkpoint tasks
number of devices
number of disk tasks
number of dtx participants
number of dump threads
number of engines at startup
number of histogram steps
number of index trips
number of java sockets
number of large i/o buffers
number of locks
number of mailboxes
number of messages
number of network tasks
number of oam trips
number of open databases
number of open indexes
number of open objects
number of open partitions
number of pre-allocated extents
number of Q engines at startup
number of remote connections
number of remote logins
number of remote sites
number of sort buffers
number of user connections
number of worker processes
o/s file descriptors
object lockwait timing
open index hash spinlock ratio
open index spinlock ratio
open object spinlock ratio
optimization goal
optimization timeout limit
optimizer level
page lock promotion HWM
page lock promotion LWM
page lock promotion PCT
page utilization percent
partition groups
partition spinlock ratio
pci memory size
per object statistics active
percent database for history
percent database for output
percent history free
percent output free
performance monitoring option
permission cache entries
plan text pipe active
plan text pipe max messages
print deadlock information
print recovery information
procedure cache size
procedure deferred compilation
process wait events
prod-consumer overlap factor
quorum heartbeat interval
quorum heartbeat retries
quoted identifier enhancements
read committed with lock
recovery interval in minutes
remote server pre-read packets
restricted decrypt permission
row lock promotion HWM
row lock promotion LWM
row lock promotion PCT
rtm thread idle wait period
runnable process search count
sampling percent
secure default login
select for update
select on syscomments.text
send doneinproc tokens
session migration timeout
session tempdb log cache size
shared memory starting address
size of auto identity column
size of global fixed heap
size of process object heap
size of shared class heap
size of unilib cache
sproc optimize timeout limit
SQL batch capture
SQL Perfmon Integration (Windows only)
sql server clock tick length
sql text pipe active
sql text pipe max messages
stack guard size
stack size
start mail session (Windows only)
start xp server during boot
startup delay
statement cache size
statement pipe active
statement pipe max messages
statement statistics active
streamlined dynamic SQL
strict dtm enforcement
suppress js max task message
suspend audit when device full
syb_sendmsg port number
sysstatistics flush interval
systemwide password expiration
tape retention in days
tcp no delay
text prefetch size
time slice
total data cache size
total logical memory
total physical memory
transfer utility memory size
txn to pss ratio
unified login required
upgrade version
use security services
user log cache size
user log cache spinlock ratio
wait event timing
workload manager cache size
xact coordination interval
xp_cmdshell context
Overview of Disk Resource Issues
Device allocation and object placement
Commands for managing disk resources
Considerations in storage management decisions
Recovery
Keeping logs on a separate device
Mirroring
Performance
Status and defaults at installation time
System tables that manage storage
The sysdevices table
The sysusages table
The syssegments table
The sysindexes table
The syspartitions table
Managing Remote Servers
Overview
Managing remote servers
Adding a remote server
Examples of adding remote servers
Managing remote server names
Setting server connection options
Using the timeouts option
Using the net password encryption option
Using the security mechanism option
Getting information about servers
Dropping remote servers
Adding remote logins
Mapping usersā server IDs
Mapping remote logins to particular local names
Mapping all remote logins to one local name
Keeping remote login names for local servers
Example of remote user login mapping
Password checking for remote users
Effects of using the untrusted mode
Getting information about remote logins
Configuration parameters for remote logins
Initializing Database Devices
Database devices
Using the disk init command
disk init syntax
Specifying a logical device name
Specifying a physical device name
Choosing a device number
Specifying the device size
Specifying the dsync setting (optional)
Performance implications of dsync
Limitations and restrictions of dsync
Using directio to bypass operating system buffer
Other optional parameters for disk init
Getting information about devices
Dropping devices
Designating default devices
Choosing default and nondefault devices
Increasing the size of devices with disk resize
Insufficient disk space
Setting Database Options
Using the sp_dboption procedure
Database option descriptions
Viewing the options on a database
Displaying currently set switches with sysoptions
Configuring Character Sets, Sort Orders, and Languages
Understanding internationalization and localization
Advantages of internationalized systems
A sample internationalized system
Elements of an internationalized system
Selecting the character set for your server
Unicode
Character set installation
Configuration parameters
Functions
Using unichar columns
Using unitext
Open Client interoperability
Java interoperability
Limitations
Selecting the server default character set
Selecting the sort order
Using sort orders
Different types of sort orders
Selecting the default sort order
Chinese Pinyin sort order
Selecting case-insensitive sort orders for Chinese and Japanese character sets
Selecting the default Unicode sort order
Selecting a language for system messages
Setting up your server: examples
A Spanish-version server
A U.S.-based company in Japan
A Japan-based company with multinational clients
Changing the character set, sort order, or message language
Changing the default character set
Changing the sort order with a resources file
Changing the default sort order
Reconfiguring the character set, sort order, or message language
Unicode examples
Schema
Converting to UTF-8
Migrating selected columns to unichar
Migrating to or from unitext
Preliminary steps
Setting the userās default language
Recovery after reconfiguration
Using sp_indsuspect to find corrupt indexes
Rebuilding indexes after changing the sort order
Upgrading text data after changing character sets
Retrieving text values after changing character sets
Handling suspect partitions
Fixing tables with suspect partitions
Handling suspect partitions in cross-platform dump and load operations
Installing date strings for unsupported languages
Server versus client date interpretation
Internationalization and localization files
Types of internationalization files
Character sets directory structure
Types of localization files
Software messages directory structure
Message languages and global variables
Configuring Client/Server Character Set Conversions
Character set conversion
Supported character set conversions
Conversion for native character sets
Conversion in a Unicode system
Adaptive Server direct conversions
Unicode conversions
Allowing Unicode noncharacters
Choosing a conversion type
Non-Unicode client/server systems
Unicode client/server systems
Configuring the server
Enabling and disabling character set conversion
Characters that cannot be converted
Error handling in character set conversion
Conversions and changes to data lengths
Configuring your system and application
Specifying the character set for utility programs
Display and file character set command line options
Setting the display character set
Setting the file character set
Diagnosing System Problems
How Adaptive Server uses error messages
Error log format
Error messages and message numbers
Variables in error message text
Adaptive Server error logging
Severity levels
Severity levels 10 ā 18
Level 10: Status information
Level 11: Specified database object not found
Level 12: Wrong datatype encountered
Level 13: User transaction syntax error
Level 14: Insufficient permission to execute command
Level 15: Syntax error in SQL statement
Level 16: Miscellaneous user error
Level 17: Insufficient resources
Level 18: Nonfatal internal error detected
Severity levels 19 ā 26
Level 19: Adaptive Server fatal error in resource
Level 20: Adaptive Server fatal error in current process
Level 21: Adaptive Server fatal error in database processes
Level 22: Adaptive Server fatal error: Table integrity suspect
Level 23: Fatal error: Database integrity suspect
Level 24: Hardware error or system table corruption
Level 25: Adaptive Server internal error
Level 26: Rule error
Reporting errors
Backup Server error logging
Killing processes
Using kill with statusonly
Using sp_lock to examine blocking processes
Housekeeper functionality
Housekeeper wash
Housekeeper chores
Housekeeper garbage collection
Running at user priority
Configuring enable housekeeper GC
Using the reorg command
Shutting down servers
Shutting down Adaptive Server
Shutting down a Backup Server
Checking for active dumps and loads
Using nowait on a Backup Server
Learning about known problems
System Administration Guide: Volume 2 15.7
Limiting Access to Server Resources
Resource limits
Planning resource limits
Enabling resource limits
Defining time ranges
Determining the time ranges you need
Creating named time ranges
A time range example
Modifying a named time range
Dropping a named time range
When do time range changes take effect?
Identifying users and limits
Identifying heavy-usage users
Identifying heavy-usage applications
Choosing a limit type
Determining time of enforcement
Determining the scope of resource limits
Understanding limit types
Limiting I/O cost
Identifying I/O costs
Calculating the I/O cost of a cursor
The scope of the io_cost limit type
Limiting elapsed time
The scope of the elapsed_time limit type
Limiting the size of the result set
The scope of the row_count limit type
Setting limits for tempdb space usage
Limiting idle time
Creating a resource limit
Resource limit examples
Examples
Getting information on existing limits
Listing all existing resource limits
Modifying resource limits
Dropping resource limits
Resource limit precedence
Time ranges
Resource limits
Mirroring Database Devices
Disk mirroring
Deciding what to mirror
Mirroring using minimal physical disk space
Mirroring for nonstop recovery
Conditions that do not disable mirroring
Disk mirroring commands
Initializing mirrors
Unmirroring a device
Effects on system tables
Restarting mirrors
waitfor mirrorexit
Mirroring the master device
Getting information about devices and mirrors
Disk mirroring tutorial
Disk resizing and mirroring
Configuring Memory
Determining memory availability for Adaptive Server
How Adaptive Server allocates memory
Disk space allocation
Larger logical page sizes and buffers
Heap memory
Calculating heap memory
How Adaptive Server uses memory
Determining the amount of memory Adaptive Server needs
Determining Adaptive Server memory configuration
If you are upgrading
Determining the amount of memory Adaptive Server can use
Configuration parameters that affect memory allocation
Dynamically allocating memory
If Adaptive Server cannot start
Dynamically decreasing memory configuration parameters
Configuring thread pools
Determining the total numberof threads
Tuning the syb_blocking_pool
System procedures for configuring memory
Using sp_configure to set configuration parameters
Memory available for dynamic growth
Using sp_helpconfig
Using sp_monitorconfig
Configuration parameters that control Adaptive Server memory
Adaptive Server executable code size
Data and procedure caches
Determining the procedure cache size
Determining the default data cache size
Monitoring cache space
Kernel resource memory
User connections
Open databases, open indexes, and open objects
Number of locks
Database devices and disk I/O structures
Other parameters that use memory
Parallel processing
Worker processes
Remote servers
Number of remote sites
Other configuration parameters for RPCs
Referential integrity
Other parameters that affect memory
The statement cache
Setting the statement cache
Ad hoc query processing
Monitoring the statement cache
Purging the statement cache
Printing statement summaries
Displaying the SQL plan for cached statements
Configuring Data Caches
The Adaptive Server data cache
Cache configuration commands and system procedures
Information on data caches
Configuring data caches
Creating a new cache
Insufficient space for new cache
Adding memory to an existing named cache
Decreasing the size of a cache
Deleting a cache
Explicitly configuring the default cache
Changing the cache type
Configuring cache replacement policy
Dividing a data cache into memory pools
Matching log I/O size for log caches
Binding objects to caches
Cache binding restrictions
Getting information about cache bindings
Checking cache overhead
How overhead affects total cache space
Dropping cache bindings
Changing the wash area for a memory pool
When the wash area is too small
When the wash area is too large
Setting the housekeeper to avoid washes for cache
Changing the asynchronous prefetch limit for a pool
Changing the size of memory pools
Moving space from the memory pool
Moving space from other memory pools
Adding cache partitions
Setting the number of cache partitions
Setting the number of local cache partitions
Precedence
Dropping a memory pool
When pools cannot be dropped due to page use
Cache binding effects on memory and query plans
Flushing pages from cache
Locking to perform bindings
Cache binding effects on stored procedures and triggers
Configuring data caches using the configuration file
Cache and pool entries in the configuration file
Cache configuration guidelines
Configuration file errors
Managing Multiprocessor Servers
Adaptive Server kernels
Target architecture
Kernel modes
Switching kernel modes
Tasks
Using threads to run tasks
Configuring an SMP environment
Thread pools
Managing engines
Configuring engines in process mode
Configuring engines in threaded mode
Choosing the right number of engines
Starting and stopping engines
Monitoring engine status
Starting and stopping engines with sp_engine
Managing user connections (process mode only)
Configuration parameters that affect SMP systems
Configuring spinlock ratio parameters
Creating and Managing User Databases
Commands for creating and managing user databases
Permissions for managing user databases
Using the create database command
Assigning space and devices to databases
Default database size and devices
Estimating the required space
Placing the transaction log on a separate device
Estimating the transaction log size
Default log size and device
Moving the transaction log to another device
Shrinking log space
Using dump and load database when shrinking log space
Example of sequence using dump and load database
Using dump and load transaction when shrinking log space
Example of sequence using dump and load transaction
Using the for load option for database recovery
Using the with override option with create database
Changing database ownership
Altering databases
alter database syntax
Using the drop database command
System tables that manage space allocation
The sysusages table
The segmap column
The lstart, size, and vstart columns
Getting information about database storage
Database device names and options
Checking the amount of space used
Checking space used in a database
Checking summary information for a table
Checking information for a table and its indexes
Querying system table for space usage information
Database Mount and Unmount
Overview
Manifest file
Copying and moving databases
Performance considerations
Device verification
Mounting and unmounting databases
Unmounting a database
Mounting a database
Creating a mountable copy of a database
Moving databases from one Adaptive Server to another
System restrictions
quiesce database extension
Distributed Transaction Management
Affected transaction types
Distributed transactions coordinated by external transaction managers
Behavior for transaction manager-coordinated transactions
Enhanced transaction manager for Adaptive Server version 15.0.3 or later
RPC and CIS transactions
New behavior for RPC and CIS transactions
SYB2PC transactions
Enabling DTM features
Installing a license key
Enabling DTM features
enable dtm parameter
enable xact coordination parameter
Configuring transaction resources
Calculating required transaction descriptors
Setting the number of transaction descriptors
Using Adaptive Server coordination services
Overview of transaction coordination services
Hierarchical transaction coordination
X/Open XA-compliant behavior in DTP environments
Requirements and behavior
Configuring participant server resources
number of dtx participants parameter
Optimizing number of dtx participants for your system
Using transaction coordination services in heterogeneous environments
strict dtm enforcement parameter
Monitoring coordinated transactions and participants
DTM administration and troubleshooting
Transactions and threads of control
Implications for system administrators
Lock manager changes to support detached transactions
Getting information about distributed transactions
Transaction identification in systransactions
Viewing active transactions with sp_transactions
Determining the commit node and gtrid with sp_transactions
Steps to execute external transactions
Crash recovery procedures for distributed transactions
Transactions coordinated with MSDTC
Transactions coordinated by Adaptive Server or X/Open XA
Transactions coordinated with SYB2PC
Heuristically completing transactions
Completing prepared transactions
Completing transactions that are not prepared
Determining the commit status for Adaptive Server transactions
Programming versus configuration considerations
Behavior of DDLs within distributed transactions
Adaptive Server implicit rollback in external transactions
Creating and Using Segments
Adaptive Server segments
System-defined segments
How Adaptive Server uses segments
Controlling space usage
Improving performance
Separating tables, indexes, and logs
Splitting tables
Moving a table to another device
Creating segments
Changing the scope of segments
Extending the scope of segments
Automatically extending the scope of a segment
Reducing the scope of a segment
Assigning database objects to segments
Creating new objects on segments
Placing existing objects on segments
Placing text pages on a separate device
Creating clustered indexes on segments
Dropping segments
Getting information about segments
sp_helpsegment
sp_helpdb
sp_help and sp_helpindex
Segments and system tables
A segment tutorial
Using the reorg Command
reorg command and its parameters
Using the optdiag utility to assess the need for a reorg
Moving forwarded rows to home pages
Using reorg compact to remove row forwarding
Reclaiming unused space from deletions and updates
Reclaming space without the reorg command
Reclaiming unused space and undoing row forwarding
Rebuilding a table
Prerequisites for running reorg rebuild
Changing space management settings before using reorg rebuild
Using the reorg rebuild command on indexes
Rebuilding indexes with reorg rebuild index_name partition_name
Space requirements for rebuilding an index
Status messages
resume and time options for reorganizing large tables
Specifying no_of_minutes in the time option
Checking Database Consistency
What is the database consistency checker?
Page and object allocation
Understanding the object allocation map (OAM)
Understanding page linkage
What checks can be performed with dbcc?
Understanding the output from dbcc commands
Checking consistency of databases and tables
dbcc checkstorage
Advantages of using dbcc checkstorage
Comparison of dbcc checkstorage and other dbcc commands
Understanding the dbcc checkstorage operation
Performance and scalability
dbcc checktable
dbcc checkdb
Checking page allocation
dbcc checkalloc
dbcc indexalloc
dbcc tablealloc
dbcc textalloc
Correcting allocation errors using the fix | nofix option
Generating reports with dbcc tablealloc and dbcc indexalloc
Checking consistency of system tables
Strategies for using consistency checking commands
Using large I/O and asynchronous prefetch
Scheduling database maintenance at your site
Database use
Backup schedule
Size of tables and importance of data
Errors generated by database consistency problems
Reporting on aborted checkstorage and checkverify operations
Aborting with error 100032
Comparison of soft and hard faults
Soft faults
Hard faults
Verifying faults with dbcc checkverify
How dbcc checkverify works
When to use dbcc checkverify
How to use dbcc checkverify
Preparing to use dbcc checkstorage
Planning resources
Examples of sp_plan_dbccdb output
Planning workspace size
Configuring worker processes
Setting up a named cache for dbcc
Configuring an 8-page I/O buffer pool
Allocating disk space for dbccdb
Segments for workspaces
Creating the dbccdb database
Updating the dbcc_config table
Adding default configuration values with sp_dbcc_updateconfig
Deleting configuration values with sp_dbcc_updateconfig
Viewing the current configuration values
Maintaining dbccdb
Reevaluating and updating dbccdb configuration
Cleaning up dbccdb
Removing workspaces
Performing consistency checks on dbccdb
Generating reports from dbccdb
Reporting a summary of dbcc checkstorage operations
Reporting configuration, statistics and fault information
Upgrading compiled objects with dbcc upgrade_object
Finding compiled object errors before production
Reserved word errors
Missing, truncated, or corrupted source text
Quoted identifier errors
Temporary table references
select * potential problem areas
Using database dumps in upgrades
Upgrading using dump and load
Upgrading compiled objects in database dumps
Determining whether a compiled object has been upgraded
Developing a Backup and Recovery Plan
Keeping track of database changes
Getting information about the transaction log
Using delayed_commit to determine when log records are committed
Designating responsibility for backups
Synchronizing a database and its log: checkpoints
Setting the recovery interval
Automatic checkpoint procedure
Checkpoint after user database upgrade
Truncating the log after automatic checkpoints
Free checkpoints
Manually requesting a checkpoint
Automatic recovery after a system failure or shutdown
Fast recovery
Adaptive Server start-up sequence
Bringing engines online early
Parallel recovery
Database recovery
Recovery order
Changing or deleting the recovery position of a database
Listing the user-assigned recovery order of databases
Parallel checkpoints
Recovery state
Tuning for fast recovery
Database layout
Runtime configuration suggestions
Setting space accounting
Fault isolation during recovery
Persistence of offline pages
Configuring recovery fault isolation
Isolating suspect pages
Raising the number of suspect pages allowed
Getting information about offline databases and pages
Bringing offline pages online
Index-level fault isolation for data-only-locked tables
Side effects of offline pages
Recovery strategies using recovery fault isolation
Reload strategy
Repair strategy
Assessing the extent of corruption
Using the dump and load commands
Making routine database dumps: dump database
Making routine transaction log dumps: dump transaction
Copying the log after device failure: dump tran with no_truncate
Restoring the entire database: load database
Applying changes to the database: load transaction
Making the database available to users: online database
Dumping and loading databases across platforms
Dumping a database
Loading a database
Restrictions for dumping and loading databases and transactions
Performance notes
Moving a database to another Adaptive Server
Upgrading a user database
Using the special dump transaction options
Using the special load options to identify dump files
Restoring a database from backups
Suspending and resuming updates to databases
Guidelines for using quiesce database
Maintaining server roles in a primary and secondary relationship
Starting the secondary server with the -q option
āin quiesceā database log record value updated
Updating the dump sequence number
Backing up primary devices with quiesce database
Recovery of databases for warm standby method
Making archived copies during the quiescent state
Using mount and unmount commands
Using Backup Server for backup and recovery
Communicating with Backup Server
Mounting a new volume
Starting and stopping Backup Server
Configuring your server for remote access
Choosing backup media
Protecting backup tapes from being overwritten
Dumping to files or disks
Creating logical device names for local dump devices
Listing the current device names
Adding a backup device
Scheduling backups of user databases
Scheduling routine backups
Other times to back up a database
Dumping a user database after upgrading
Dumping a database after creating an index
Dumping a database after unlogged operations
Dumping a database when the log has been truncated
Scheduling backups of master
Dumping master after each change
Saving scripts and system tables
Truncating the master database transaction log
Avoiding volume changes and recovery
Scheduling backups of the model database
Truncating the model databaseās transaction log
Scheduling backups of the sybsystemprocs database
Configuring Adaptive Server for simultaneous loads
Gathering backup statistics
Backing Up and Restoring User Databases
Specifying the database and dump device
Rules for specifying database names
Rules for specifying dump devices
Tape device determination by Backup Server
Tape sevice configuration file
Compressing a dump
Backup Server dump files and compressed dumps
Loading compressed dumps
Specifying a remote Backup Server
Specifying tape density, block size, and capacity
Overriding the default density
Overriding the default block size
Specifying a larger block size value
Specifying tape capacity for dump commands
Non-rewinding tape functionality for Backup Server
Tape operations
Dump version compatibility
Specifying the volume name
Loading from a multifile volume
Identifying a dump
Improving dump or load performance
Compatibility with prior versions
Labels stored in integer format
Configuring system resources
Setting shared memory usage
Setting maximum number of stripes
Setting the maximum number of network connections
Setting the maximum number of service threads
Specifying additional dump devices: the stripe on clause
Dumping to multiple devices
Loading from multiple devices
Using fewer devices to load than to dump
Specifying the characteristics of individual devices
Tape handling options
Specifying whether to dismount the tape
Rewinding the tape
Protecting dump files from being overwritten
Reinitializing a volume before a dump
Dumping and loading databases with password protection
Overriding the default message destination
Bringing databases online with standby_access
Determining when to use with standby_access
Bring databases online with standby_access
Getting information about dump files
Requesting dump header information
Determining the database, device, file name, and date
Copying the log after a device failure
Truncating the log
Truncating a log that is not on a separate segment
Truncating the log in early development environments
Truncating a log that has no free space
Dangers of using with truncate_only and with no_log
Providing enough log space
Responding to volume change requests
Volume change prompts for dumps
Volume change prompts for loads
Recovering a database: step-by-step instructions
Getting a current dump of the transaction log
Examining the space usage
Dropping the databases
Re-creating the databases
Loading the database
Loading the transaction logs
Loading a transaction log to a point in time
Bringing the databases online
Replicated databases
Loading database dumps from older versions
Upgrading a dump to the current version of Adaptive Server
The database offline status bit
Version identifiers
Cache bindings and loading databases
Databases and cache bindings
Database objects and cache bindings
Checking on cache bindings
Cross-database constraints and loading databases
Restoring the System Databases
Recovering a system database
Recovering the master database
About the recovery process
Summary of recovery procedure
Finding copies of system tables
Building a new master device
Starting Adaptive Server in master-recover mode
Re-creating device allocations for master
Checking your Backup Server sysservers information
Verifying that your Backup Server is running
Loading a backup of master
Updating the number of devices configuration parameter
Restarting Adaptive Server in master-recover mode
Checking system tables to verify current backup of master
Restarting Adaptive Server
Restoring server user IDs
Restoring the model database
Checking Adaptive Server
Backing up master
Recovering the model database
Recovering the sybsystemprocs database
Restoring sybsystemprocs with installmaster
Restoring sybsystemprocs with load database
How to Reduce the Size of tempdb
Reset tempdb to default size
Restoring system tables with disk reinit and disk refit
Restoring sysdevices with disk reinit
Restoring sysusages and sysdatabase with disk refit
Archive Database Access
Overview
Components of an archive database
The database dump
The modified pages section
The sysaltusages table and the scratch database
Working with an archive database
DDLGen support for archive database access
Configuring an archive database
Sizing the modified pages section
Increasing the amount of space allocated to the modified pages section
Materializing an archive database
Using load database with norecovery
Using logical devices with an archive database
load database limitations with an archive database
Bringing an archive database online
Loading a transaction log into an archive database
Dropping an archive database
Using an archive database
Using SQL commands with an archive database
Using dbcc commands with an archive database
Typical archive database command sequence
Compressed dumps for an archive database
Creating a compression memory pool
Upgrading and downgrading an archive database
Upgrading an Adaptive Server with an archive database
Downgrading an Adaptive Server with an archive database
Compatibility issues for a compressed dump
Archive database limitations
Expanding Databases Automatically
Understanding disks, devices, databases, and segments
Threshold action procedures
Installing automatic database expansion procedures
Running sp_dbextend
Command options in the sp_dbextend interface
Validating current thresholds
Setting up a database for automatic expansion
Restrictions and limitations
Managing Free Space with Thresholds
Monitoring free space with the last-chance threshold
Crossing the threshold
Controlling how often sp_thresholdaction executes
Rollback records and the last-chance threshold
Calculating the space for rollback records
Using lct_admin to determine the free log space
Determining the current space for rollback records
Effect of rollback records on the last-chance threshold
User-defined thresholds
Last-chance threshold and user log caches for shared log and data segments
Using lct_admin abort to abort suspended transactions
Adding space to the master databaseās transaction log
Automatically aborting or suspending processes
Using abort tran on log full to abort transactions
Waking suspended processes
Adding, changing, and deleting thresholds
Displaying information about existing thresholds
Thresholds and system tables
Adding a free-space threshold
Changing or specifying a new free-space threshold
Dropping a threshold
Creating a free-space threshold for the log segment
Testing and adjusting the new threshold
Creating additional thresholds on other segments
Determining threshold placement
Creating threshold procedures
Declaring procedure parameters
Generating error log messages
Dumping the transaction log
A simple threshold procedure
A more complex procedure
Deciding where to put a threshold procedure
Disabling free-space accounting for data segments
Migration Technology Guide 15.5
About this book
Migration Strategy
Preupgrade considerations
Understanding optimization goals
Optimization criteria
Resource recommendations for Adaptive Server 15.0
Incorporating statistics in Adaptive Server 15.0
Recommended testing before upgrade
Migrating to Adaptive Server 15.0 features
Upgrading, and using new features immediately
Upgrading, and using new features later
Upgrading, but not using new features
Troubleshooting
Query processing tips
Information to capture before contacting Technical Support
701 errors
Performance problems with a limited number of queries
System-wide performance issues
Uploading diagnostics to Technical Support
QPTune
Setting up your system
Using QPTune to fix missing statistics
Starting QPTune to fix missing statistics
Collecting statistics
Fixing statistics
Using undo_fix_stats
Using QPTune to tune queries or applications
Starting QPTune to tune queries or applications
Simple start
Custom start
Collecting metrics
Comparing metrics
Applying the best results
Configuration file
Examples
Upgrade issues
Localization
QPTune GUI
Environment and system requirements
Starting the QPTune GUI
Fixing missing statistics
Tuning Task
QPTune reference information
Running the Query Processor in Compatibility Mode
Enabling compatibility mode
Feature support in compatibility mode
Additional trace flag for diagnostics
New stored procedure sp_compatmode
Changes to @@qpmode global variable
Diagnostic tool
Performance and Tuning Series: Basics 15.7
Introduction to the Basics
Good performance
Response time
Throughput
Designing for performance
Tuning performance
Tuning levels
Application layer
Database layer
Adaptive Server layer
Devices layer
Network layer
Hardware layer
Operating system layer
Identifying system limits
Threads, thread pools, engines and CPUs
Varying logical page sizes
Number of columns and column size
Maximum length of expressions, variables, and stored procedure arguments
Number of logins
Performance implications for limits
Size of kernel resource memory
Analyzing performance
Normal forms
Locking
Special considerations
Networks and Performance
Potential performance problems
Basic questions on network performance
Techniques summary
Engine and thread affinity
Network listeners
Network listeners in process mode
How Adaptive Server uses the network
Configuring the I/O controller
Dynamically reconfiguring I/O tasks
Changing network packet sizes
Large versus default packet sizes for user connections
Number of packets is important
Adaptive Server evaluation tools
Other evaluation tools
Server-based techniques for reducing network traffic
Impact of other server activities
Single user versus multiple users
Improving network performance
Isolate heavy network users
Set tcp no delay on TCP networks
Configure multiple network listeners
Using Engines and CPUs
Background concepts
How Adaptive Server processes client requests
Client task implementation
Single-CPU process model
Scheduling engines to the CPU
Scheduling tasks to the engine
Execution task scheduling
Scheduling client task processing time
Maintaining CPU availability during idle time
Adaptive Server SMP process model
Scheduling engines to CPUs
Scheduling Adaptive Server tasks to engines
Multiple network engines
Task priorities and run queues
Processing scenario
Asynchronous log service
Understanding the user log cache (ULC) architecture
When to use ALS
Using the ALS
ULC flusher
Log writer
Housekeeper wash task improves CPU utilization
Side effects of the housekeeper wash task
Configuring the housekeeper wash task
Changing the percentage by which writes can be increased
Disabling the housekeeper wash task
Allowing the housekeeper wash task to work continuously
Measuring CPU usage
Single-CPU machines
Using sp_monitor to measure CPU usage
Using sp_sysmon to measure CPU usage
Operating system commands and CPU usage
Determining when to configure additional engines
Taking engines offline
Enabling engine-to-CPU affinity
Multiprocessor application design guidelines
Distributing Engine Resources
Successfully distributing resources
Environment analysis and planning
Analyzing the environment
Phase 1 ā execution object behavior
Phase 2 ā the entire environment
Performing benchmark tests
Setting goals
Results analysis and tuning
Managing preferred access to resources
Types of execution classes
Execution class attributes
Base priority
Setting the task priority
Task-to-engine affinity
Engine group affinity when switching modes
Setting execution class attributes
Assigning execution classes
Scheduling service tasks
Creating user-defined execution class task affinity
How execution class bindings affect scheduling
Execution class bindings
Engine affinity can affect scheduling in process mode
Setting attributes for a session only
Getting information about execution classes
Determining precedence and scope
Multiple execution objects and ECs
Precedence rule
Scope rule
Resolving a precedence conflict
Examples: determining precedence
Example scenario using precedence rules
Planning
Configuration
Execution characteristics
Considerations for engine resource distribution
Client applications: OLTP and DSS
Unintrusive client applications
I/O-bound client applications
Critical applications
Adaptive Server logins: high-priority users
Stored procedures: āhot spotsā
Memory Use and Performance
How memory affects performance
How much memory to configure
Dynamic reconfiguration
How memory is allocated
Large allocation in Adaptive Server
Caches in Adaptive Server
Cache sizes and buffer pools
Procedure cache
Getting information about the procedure cache size
Monitoring procedure cache performance
Procedure cache sizing
Estimating stored procedure size
Estimating the procedure cache size for a sort
Estimating the amount of procedure cache used by create index
Reducing query processing latency
Reusing dynamic SQL LWPs across multiple connections
Statement cache
Data cache
Page aging in data cache
Effect of data cache on retrievals
Effect of data modifications on the cache
Data cache performance
Testing data cache performance
Cache hit ratio for a single query
Cache hit ratio information from sp_sysmon
Configuring the data cache to improve performance
Commands to configure named data caches
Tuning named caches
Cache configuration goals
Gather data, plan, and then implement
Evaluating cache needs
Large I/O and performance
The optimizer and cache choices
Choosing the right mix of I/O sizes for a cache
Reducing spinlock contention with cache partitions
Cache replacement strategies and policies
Strategies
Policies
Named data cache recommendations
Sizing caches for special objects, tempdb, and transaction logs
Examining cache needs for tempdb
Examining cache needs for transaction logs
Choosing the I/O size for the transaction log
Configuring for large log I/O size
Additional tuning tips for log caches
Basing data pool sizes on query plans and I/O
Checking I/O size for queries
Configuring buffer wash size
Overhead of pool configuration and binding objects
Pool configuration overhead
Cache binding overhead
Maintaining data cache performance for large I/O
Diagnosing excessive I/O counts
Using sp_sysmon to check large I/O performance
Speed of recovery
Tuning the recovery interval
Effects of the housekeeper wash task on recovery time
Auditing and performance
Sizing the audit queue
Auditing performance guidelines
Text and image pages
Tuning Asynchronous Prefetch
How asynchronous prefetch improves performance
Improving query performance by prefetching pages
Prefetching control mechanisms in a multiuser environment
Look-ahead set during recovery
Prefetching log pages
Prefetching data and index pages
Look-ahead set during sequential scans
Look-ahead set during nonclustered index access
Look-ahead set during dbcc checks
Allocation checking
checkdb and checktable
Look-ahead set minimum and maximum sizes
When prefetch is automatically disabled
Flooding pools
I/O system overloads
Unnecessary reads
Page chain fragmentation
Tuning goals for asynchronous prefetch
Commands for configuration
Other Adaptive Server performance features
Large I/O
Sizing and limits for the 16K pool
Limits for the 2K pool
Fetch-and-discard (MRU) scans
Parallel scans and large I/Os
Hash-based table scans
Partition-based scans
Special settings for asynchronous prefetch limits
Setting limits for recovery
Setting limits for dbcc
Maintenance activities for high prefetch performance
Eliminating kinks in heap tables
Eliminating kinks in clustered index tables
Eliminating kinks in nonclustered indexes
Performance monitoring and asynchronous prefetch
Performance and Tuning Series: Improving Performance with Statistical Analysis 15.7
Using the set statistics Commands
set command syntax
Using simulated statistics
Checking subquery cache performance
Checking compile and execute time
Converting ticks to milliseconds
Reporting physical and logical I/O statistics
Total actual I/O cost value
Statistics for writes
Statistics for reads
Sample output with and without an index
statistics io output for cursors
Scan count
Queries reporting a scan count of 1
Queries reporting a scan count of more than 1
Queries reporting scan count of 0
Relationship between physical and logical reads
Logical reads, physical reads, and 2K I/O
Physical reads and large I/O
Reads and writes on worktables
Effects of caching on reads
statistics io and merge joins
Analyzing queries with set statistics plancost
set statistics plancost example
Statistics Tables and Displaying Statistics with optdiag
System tables that store statistics
systabstats table
sysstatistics table
Viewing statistics with the optdiag utility
optdiag syntax
optdiag header information
Table statistics
Table-level derived statistics
Data page cluster ratio
Space utilization
Large I/O efficiency
Index statistics
Index-level derived statistics
Data page cluster ratio
Index page cluster ratio
Data row cluster ratio
Space utilization for an index
Large I/O efficiency for an index
Column statistics
Sample output for column statistics
Range cell and total density values
Range and in-between selectivity values
Histogram displays
Sample output for histograms
Understanding histogram output
Histograms for columns with highly duplicated values
Choosing the number of steps for highly duplicated values
Configuring the histogram tuning factor
How many histogram steps?
Changing statistics with optdiag
Using optdiag binary
When to use binary
Updating selectivities with optdiag input mode
Editing histograms
Adding frequency count cells to a histogram
Skipping load-time verification for step numbering
Rules checked during histogram loading
Re-creating indexes without losing statistics updates
Using simulated statistics
optdiag syntax for simulated statistics
Simulated statistics output
Requirements for loading and using simulated statistics
Using simulated statistics in the original database
Using simulated statistics in another database
Dropping simulated statistics
Running queries with simulated statistics
showplan messages for simulated statistics
Character data containing quotation marks
Effects of SQL commands on statistics
How query processing affects systabstats
Viewing statistics and histograms using sp_showoptstats
Performance and Tuning Series: Locking and Concurrency Control 15.7
Introduction to Locking
How locking affects performance
Locking and data consistency
Granularity of locks and locking schemes
Allpages locking
Datapages locking
Datarows locking
Types of locks in Adaptive Server
Page and row locks
Table locks
Commands that take intent locks
Demand locks
Demand locking with serial execution
Demand locking with parallel execution
Row-locked system tables
Range locking for serializable reads
Latches
Lock compatibility and lock sufficiency
How isolation levels affect locking
Isolation level 0, read uncommitted
Isolation level 1, read committed
Isolation level 2, repeatable read
Isolation level 3, serializable reads
Adaptive Server default isolation level
Lock types and duration during query processing
Lock types during create index commands
Locking for select queries at isolation level 1
Table scans and isolation levels 2 and 3
Table scans and table locks at isolation level 3
Isolation level 2 and allpages-locked tables
When update locks are not required
Locking during or processing
Processing or queries for allpages-locked tables
Processing or queries for data-only-locked tables
Skipping uncommitted inserts during selects
Skipping uncommitted inserts during deletes, updates, and inserts
Locking during DMLs on tables with referential integrity constraints
Using alternative predicates to skip nonqualifying rows
Pseudocolumn-level locking
Select queries that do not reference the updated column
Qualifying old and new values for uncommitted updates
Reducing contention
Locking Configuration and Tuning
Locking and performance
Using sp_sysmon and sp_object_stats
Reducing lock contention
Adding indexes to reduce contention
Keeping transactions short
Avoiding hot spots
Additional locking guidelines
Configuring locks and lock promotion thresholds
Configuring the Adaptive Server lock limit
Estimating number of locks for data-only-locked tables
Setting lock promotion thresholds
Lock promotion and scan sessions
Lock promotion high water mark
Lock promotion low water mark
Lock promotion percent
Setting server-wide lock promotion thresholds
Setting the lock promotion threshold for a table or database
Precedence of settings
Dropping database and table settings
Using sp_sysmon while tuning lock promotion thresholds
Choosing the locking scheme for a table
Analyzing existing applications
Choosing a locking scheme based on contention statistics
Monitoring and managing tables after conversion
Applications not likely to benefit from data-only locking
Tables where clustered index performance must remain high
Tables with maximum-length rows
Optimistic index locking
Using optimistic index locking
Cautions and issues
Locking Reports
Locking tools
Getting information about blocked processes
Viewing locks with sp_lock
Viewing locks with sp_familylock
Intrafamily blocking during network buffer merges
Monitoring lock timeouts
Deadlocks and concurrency
Server-side versus application-side deadlocks
Application deadlock example
Server task deadlocks
Deadlocks and parallel queries
Printing deadlock information to the error log
Avoiding deadlocks
Acquiring locks on objects in the same order
Delaying deadlock checking
Identifying tables where concurrency is a problem
Lock management reporting
Using Locking Commands
Specifying the locking scheme for a table
Specifying a server-wide locking scheme
Specifying a locking scheme with create table
Changing a locking scheme with alter table
Before and after changing locking schemes
Expense of switching to or from allpages locking
Sort performance during alter table
Specifying a locking scheme with select into
Controlling isolation levels
Setting isolation levels for a session
Syntax for query-level and table-level locking options
Using holdlock, noholdlock, or shared
Using the at isolation clause
Making locks more restrictive
Making locks less restrictive
Readpast locking
Cursors and locking
Using the shared keyword
Additional locking commands
lock table
Lock timeouts
Indexes
Types of indexes
Index pages
Root level
Leaf level
Intermediate level
Index size
Indexes and partitions
Local indexes on partitioned tables
Global indexes on partitioned tables
Local versus global indexes
Unsupported partition index types
Clustered indexes on allpages-locked tables
Clustered indexes and select operations
Relationship between physical and logical reads
Clustered indexes and insert operations
Page splitting on full data pages
Exceptions to page splitting
Page splitting on index pages
Performance impacts of page splitting
Overflow pages
Clustered indexes and delete operations
Deleting the last row on a page
Index page merges
Nonclustered indexes
Leaf pages revisited
Nonclustered index structure
Nonclustered indexes and select operations
Nonclustered index performance
Nonclustered indexes and insert operations
Nonclustered indexes and delete operations
Clustered indexes on data-only-locked tables
Index covering
Covering matching index scans
Covering nonmatching index scans
Indexes and caching
Using separate caches for data and index pages
Index trips through the cache
Indexing for Concurrency Control
How indexes affect performance
Detecting indexing problems
Symptoms of poor indexing
Lack of indexes is causing table scans
Index is not selective enough
Index does not support range queries
Too many indexes slow data modification
Index entries are too large
Exception for wide data rows and wide index rows
Fixing corrupted indexes
Index limits and requirements
Choosing indexes
Index keys and logical keys
Guidelines for clustered indexes
Choosing clustered indexes
Candidates for nonclustered indexes
Choosing function-based indexes
Index selection
Examples of using index selection
Other indexing guidelines
Choosing nonclustered indexes
Performance price for data modification
Choosing composite indexes
Key order and performance in composite indexes
Advantages and disadvantages of composite indexes
Using online reorg rebuild for data-only-locked indexes
Techniques for choosing indexes
Choosing an index for a range query
Adding a point query with different indexing requirements
Index and statistics maintenance
Dropping indexes that hurt performance
Choosing space management properties for indexes
Additional indexing tips
Creating artificial columns
Keeping index entries short and avoiding overhead
Dropping and rebuilding indexes
Configuring enough sort buffers
Creating the clustered index first
Configure large buffer pools
Asynchronous log service
Understanding the user log cache (ULC) architecture
When to use ALS
Using ALS
ULC flusher
Log writer
Stored procedure support for ALS
Performance and Tuning Series: Monitoring Adaptive Server with sp_sysmon 15.7
Introduction to sp_sysmon
Using sp_sysmon
When to run sp_sysmon
Invoking sp_sysmon
Fixed-time intervals
Using begin_sample and end_sample
Specifying report sections for output
Specifying the application detail parameter
Using the noclear option
Redirecting output to a file
Monitoring Performance with sp_sysmon
How to use the reports
Header information
Reading output
Rows
Columns in output
Interpreting the data
Per-second and per-transaction data
Percent of total and count data
Per engine data
Total or summary data
Cache Wizard
Cache wizard syntax
Preparing to run the cache wizard
Sample output
Sample output for Cache Wizard
Kernel utilization
Kernel Utilization ā threaded mode
Sample output
Engine Utilization (Tick %)
Average Runnable Tasks
CPU Yields by Engine
Thread Utilization (OS %)
Page Faults at OS
Context Switches at OS
CtlibController, DiskController, and NetController Activity
Blocking Call Activity
Kernel Utilization ā process mode
Sample output
Engine Busy Utilization
CPU Yields by Engine
Network Checks
Disk I/O Checks
Total Disk I/O Checks
Worker Process Management
Sample output
Worker Process Requests
Worker Process Usage
Memory Requests for Worker Processes
Avg Mem Ever Used By a WP
Parallel Query Management
Sample output
Parallel Query Usage
Merge Lock Requests
Sort Buffer Waits
Task Management
Sample output
Connections Opened
Task Context Switches by Engine
Task Context Switches Due To
Voluntary Yields
Cache Search Misses
Exceeding I/O Batch Size
System Disk Writes
Logical Lock Contention
Address Lock Contention
Latch Contention
Physical, logical, and object Lock Transition
Log Semaphore Contention
PLC Lock Contention
Group Commit Sleeps
Last Log Page Writes
Modify Conflicts
I/O Device Contention
Network Packet Received
Network Packet Sent
Network Services
Other Causes
Application Management
Requesting detailed application information
Sample output
Application Statistics Summary (All Applications)
Priority Changes
Allotted Slices Exhausted
Skipped Tasks By Engine
Engine Scope Changes
Per Application Or Per Application And Login
Application Activity
Application Priority Changes
Application I/Os Completed
Resource Limits Violated
ESP Management
Sample output
ESP Requests
Avg. Time to Execute an ESP
Housekeeper Task Activity
Sample output
Buffer Cache Washes
Garbage Collections
Pages Processed in GC
Statistics Updates
Monitor Access to Executing SQL
Sample output
Waits on Execution Plans
Number of SQL Text Overflows
Maximum SQL Text Requested
Transaction Profile
Sample output
Transaction Summary
How to count multidatabase transactions
Transaction Detail
Inserts
Fully and minimally logged
Total Rows Inserted
Updates and update detail sections
Updates
Data-Only-Locked Updates
Deletes
Fully and minimally logged
Total Rows Deleted
Transaction Management
Sample output
ULC Flushes to Xact Log
Any Logging Mode DMLs
Fully Logged DMLs
Minimally Logged DMLs
Total ULC Flushes
ULC Flushes Skipped
Fully Logged DMLs
Minimally Logged DMLs
Total ULC Flushes Skips
ULC Log Records
Fully Logged DMLs
Minimally Logged DMLs
Total ULC Log Records
Max ULC Size During Sample
Fully Logged DMLs
Minimally Logged DMLs
ML-DMLs Sub-Command Scans
ULC scans
syslogs Scans
Total Sub-Command Scans
ML-DMLs ULC Efficiency
Discarded Sub-Commands
Logged Sub-Commands
Total ML-DML Sub-Commands
ULC Semaphore Requests
Log Semaphore Requests
Transaction Log Writes
Transaction Log Allocations
Avg # Writes per Log Page
Tuning Recommendations for Transaction Management
Index Management
Sample output
Nonclustered Maintenance
Ins/Upd Requiring Maint
Deletes Requiring Maintenance
RID Upd from Clust Split
Upd/Del DOL Req Maint
Page Splits
Reducing page splits for ascending key inserts
Default data page splitting
Effects of ascending inserts
Setting ascending inserts mode for a table
Retries and Deadlocks
Add Index Level
Page Shrinks
Index Scans
Metadata Cache Management
Sample output
Open Object, Index, Partition, and Database Usage
Descriptors immediately discarded
Object Manager Spinlock Contention
Object and Index Spinlock Contention
Index Hash Spinlock Contention
Using sp_monitorconfig to find metadata cache usage statistics
Partition Spinlock Contention
Partition Hash Spinlock Contention
Lock Management
Sample output
Lock Summary
Lock Detail
Exclusive Address and Shared Address
Last Page Locks on Heaps
Table Lock Hashtable
Deadlocks by Lock Type
Deadlock Detection
Deadlock Searches
Searches Skipped
Average Deadlocks per Search
Lock Promotions
Lock Time-out Information
Cluster Lock Summary
Data Cache Management
Sample output
Cache Statistics Summary (All Caches)
Cache Search Summary
Cache Turnover
Cache Strategy Summary
Large I/O Usage
Large I/O Effectiveness
Asynchronous Prefetch Activity Report
Other Asynchronous Prefetch Statistics
Dirty Read Behavior
Cache Management by Cache
Cache Spinlock Contention
Utilization
Cache Search, Hit, and Miss Information
Pool Turnover
Cluster Cache Behavior
Buffer Wash Behavior
Cache Strategy
Large I/O Usage
Large I/O Detail
Dirty Read Behavior
Procedure Cache Management
Sample output
Procedure Requests
Procedure Reads from Disk
Procedure Writes to Disk
Procedure Removals
Procedure Recompilations
SQL Statement Cache
Sample output
Memory Management
Sample output
Pages Allocated
Pages Released
Recovery Management
Sample output
Checkpoints
# of Normal Checkpoints
# of Free Checkpoints
Total Checkpoints
Average Time per Normal Checkpoint
Average Time per Free Checkpoint
Increasing the Housekeeper Batch Limit
Disk I/O Management
Sample output
Maximum Outstanding I/Os
I/Os Delayed by
Disk I/O Structures
Server Configuration Limit
Engine Configuration Limit
Operating System Limit
Requested and Completed Disk I/Os
Total Requested Disk I/Os
Completed Disk I/Os
Device Activity Detail
Reads and Writes
Total I/Os
Mirror Semaphore Granted and Waited
Network I/O Management
Sample output
Total Network I/Os Requests
Network I/Os Delayed
Total TDS Packets Received
Total Bytes Received
Average Bytes Received per Packet
Total TDS Packets Sent
Total Bytes Sent
Average Bytes Sent per Packet
Replication Agent
Sample output
Log Scan Summary
Log Records Scanned
Log Records Processed
Number of Log Scans
Amount of Time for Log Scans
Longest Time for Log Scan
Average Time per Log Scan
Log Scan Activity
Transaction Activity
Log Extension Wait
Schema Cache
Backward Schema
Truncation Point Movement
Connections to Replication Server
Network Packet Information
I/O Wait from RS
Performance and Tuning Series: Monitoring Tables 15.7
Introduction to Monitoring Tables
Monitoring tables in Adaptive Server
Where does the monitoring information come from?
Using Transact-SQL to monitor performance
Installing the monitoring tables
Versions earlier than 15.0.2, except Cluster Edition
Configuring loopback proxy server for 15.0.1 ESD #2 and earlier
Remotely accessing and editing monitoring tables
Configuring the monitoring tables to collect data
Allocating memory for pipe error messages
Configuration parameters for the monitoring tables
Error 12036
The mon_role and additional access controls
Wrapping counter datatypes
Stateful historical monitoring tables
Transient monitoring data
Using monitoring tables in a clustered environment
Configuring the system view
InstanceID added to monitor instances
Monitoring tables for the statement cache
Configuring Adaptive Server to monitor the statement cache
Deleting statements from the statement cache
Obtaining the hash key from the SQL text
Displaying text and parameter information for cached statements
Examples of querying the monitoring tables
Wait Events
Event 19: xact coord: pause during idle loop
Action
Event 29: waiting for regular buffer read to complete
Action
Event 30: wait to write MASS while MASS is changing
Action
Event 31: waiting for buf write to complete before writing
Action
Event 32: waiting for an APF buffer read to complete
Action
Event 35: waiting for buffer validation to complete
Action
Event 36: waiting for MASS to finish writing before changing
Action
Event 37: wait for MASS to finish changing before changing
Action
Event 41: wait to acquire latch
Action
Event 46: wait for buf write to finish getting buf from LRU
Action
Event 51: waiting for last i/o on MASS to complete
Action
Event 52: waiting for i/o on MASS initiated by another task
Action
Event 53: waiting for MASS to finish changing to start i/o
Action
Event 54: waiting for write of the last log page to complete
Action
Event 55: wait for i/o to finish after writing last log page
Action
Event 57: checkpoint process idle loop
Action
Event 61: hk: pause for some time
Action
Event 70: waiting for device semaphore
Action
Event 83: wait for DES state is changing
Action
Event 84: wait for checkpoint to complete
Action
Event 85: wait for flusher to queue full DFLPIECE
Action
Event 91: waiting for disk buffer manager i/o to complete
Action
Event 99: wait for data from client
Action
Event 104: wait until an engine has been offlined
Action
Event 124: wait for mass read to finish when getting page
Action
Event 142: wait for logical connection to free up
Action
Event 143: pause to synchronise with site manager
Action
Event 150: waiting for a lock
Action
Event 157: wait for object to be returned to pool
Action
Event 169: wait for message
Action
Event 171: wait for CTLIB event to complete
Action
Event 178: waiting while allocating new client socket
Action
Event 179: waiting while no network read or write is required
Action
Event 197: waiting for read to complete in parallel dbcc
Action
Event 200: waiting for page reads in parallel dbcc
Action
Event 201: waiting for disk read in parallel dbcc
Action
Event 202: waiting to re-read page in parallel
Action
Event 203: waiting on MASS_READING bit in parallel dbcc
Action
Event 205: waiting on TPT lock in parallel dbcc
Action
Event 207: waiting sending fault msg to parent in PLL dbcc
Action
Event 209: waiting for a pipe buffer to read
Action
Event 210: waiting for free buffer in pipe manager
Action
Event 214: waiting on run queue after yield
Action
Event 215: waiting on run queue after sleep
Action
Event 222: replication agent sleeping during flush
Action
Event 250: waiting for incoming network data
Action
Event 251: waiting for network send to complete
Action
Event 259: waiting until last chance threshold is cleared
Action
Event 260: waiting for date or time in waitfor command
Action
Event 266: waiting for message in worker thread mailbox
Action
Event 272: waiting for lock on ULC
Action
Event 334: waiting for Lava pipe buffer for write
Action
Event 374: wait for lock pending/data pending to be cleared
Action
Event 375: OCM wait for finishing BAST handling
Action
Event 389: OCM wait for pushing data flag to be cleared
Event 380: lock/data pending to reset when OCM_ERR_DIDNTWAIT
Action
Event 483: Waiting for ack of a multicast synchronous message
Action
Performance and Tuning Series: Physical Database Tuning 15.7
Controlling Physical Data Placement
Improving performance by controling object placement
Identifying poor object placement
Using sp_sysmon while changing data placement
Improving I/O performance
Spreading data across disks to avoid I/O contention
Avoiding physical contention in parallel join queries
Isolating server-wide I/O from database I/O
tempdb
sybsecurity
Keeping transaction logs on a separate disk
Mirroring a device on a separate disk
Using serial mode
Using segments
Creating objects on segments
Separating tables and indexes
Splitting large tables across devices
Moving text storage to a separate device
Partitioning tables for performance
How Adaptive Server distributes partitions on devices
RAID devices and partitioned tables
Space planning for partitioned tables
Read-only tables
Read-mostly tables
Tables with random data modification
Adding disks when devices are full
Adding disks when devices are full
Adding disks when devices are nearly full
Maintenance issues and partitioned tables
Regular maintenance checks for partitioned tables
Data Storage
Query optimization
Query processing and page reads
Adaptive Server pages
Page headers and page sizes
Data and index pages
Large object (LOB) pages
Extents
Pages that manage space allocation
Global allocation map pages
Allocation pages
Object allocation map pages
How OAM pages and allocation pages manage object storage
Page allocation keeps an objectās pages together
Data access using sysindexes and syspartitions
Space overheads
Number of columns and size
Variable-length columns in APL tables
Variable-length columns in DOL tables
Number of rows per data page
Additional number of object and size restrictions
Tables without clustered indexes
Locking schemes
Select operations on heap tables
Allpages-locked heap tables
Data-only locked heap tables
Inserting data into an allpages-locked heap table
Inserting data into a data-only-locked heap table
Deleting data from a heap table
Deleting from an allpages-locked heap table
Deleting from a data-only locked heap table
Deleting the last row on a page
Updating data on a heap table
Allpages-locked heap tables
Data-only-locked heap tables
How Adaptive Server performs I/O for heap operations
Sequential prefetch, or large I/O
Maintaining heap tables
Using reorg rebuild to reclaim space
Reclaiming space by creating a clustered index
Reclaiming space using bcp
Transaction log: a special heap table
Asynchronous prefetch and I/O on heap tables
Caches and object bindings
Heap tables, I/O, and cache strategies
LRU replacement strategy
MRU replacement strategy
Select operations and caching
Data modification and caching
Caching and inserts on heap tables
Caching, update, and delete operations on heap tables
Setting Space Management Properties
Reducing index maintenance
Advantages of using fillfactor
Disadvantages of using fillfactor
Setting fillfactor values
fillfactor examples
No stored fillfactor values
Table-level or clustered index fillfactor value stored
Using the sorted_data and fillfactor options
Reducing row forwarding
Default, minimum, and maximum values for exp_row_size
Default value
Specifying an expected row size with create table
Adding or changing an expected row size
Setting a default expected row size server-wide
Displaying the expected row size for a table
Choosing an expected row size for a table
Using optdiag to check for forwarded rows
Querying systabstats for forwarded rows
Conversion of max_rows_per_page to exp_row_size
Monitoring and managing tables that use expected row size
Leaving space for forwarded rows and inserts
Extent allocation commands and reservepagegap
Specifying a reserve page gap with create table
Specifying a reserve page gap with create index
Changing reservepagegap
reservepagegap examples
reservepagegap specified only for the table
reservepagegap specified for a clustered index
Choosing a value for reservepagegap
Monitoring reservepagegap settings
reservepagegap and sorted_data options
Matching options and goals
Using max_rows_per_page on allpages-locked tables
Reducing lock contention
Indexes and max_rows_per_page
select into and max_rows_per_page
Applying max_rows_per_page to existing data
Table and Index Size
Determining the sizes of tables and indexes
Effects of data modifications on object sizes
Using optdiag to display object sizes
Advantages of optdiag
Disadvantages of optdiag
Using sp_spaceused to display object size
Advantages of sp_spaceused
Disadvantages of sp_spaceused
Using sp_estspace to estimate object size
Advantages of sp_estspace
Disadvantages of sp_estspace
Using formulas to estimate object size
Factors that can affect storage size
Storage sizes for datatypes
Tables and indexes used in the formulas
Calculating table and clustered index sizes for allpages-locked tables
Calculate the data row size
Compute the number of data pages
Compute the size of clustered index rows
Compute the number of clustered index pages
Compute the total number of index pages
Calculate allocation overhead and total pages
Calculate the size of the leaf index row
Calculate the number of leaf pages in the index
Calculate the size of the nonleaf rows
Calculate the number of non-leaf pages
Calculate the total number of non-leaf index pages
Calculate allocation overhead and total pages
Calculating the sizes of data-only-locked tables
Calculate the data row size
Compute the number of data pages
Calculate allocation overhead and total pages
Calculate the size of the index row
Calculate the number of leaf pages in the index
Calculate the number of non-leaf pages in the index
Calculate the total number of non-leaf index pages
Calculate allocation overhead and total pages
Other factors affecting object size
Effects of space management properties
Very small rows
LOB pages
Advantages of using formulas to estimate object size
Disadvantages of using formulas to estimate object size
Database Maintenance
Running reorg on tables and indexes
Creating and maintaining indexes
Configuring Adaptive Server to speed sorting
Dumping the database after creating an index
Creating an index on sorted data
Maintaining index and column statistics
Rebuilding indexes
Creating or altering a database
Backup and recovery
Local backups
Remote backups
Online backups
Using thresholds to prevent running out of log space
Minimizing recovery time
Recovery order
Bulk-copy
Parallel bulk-copy
Batches and bulk-copy
Slow bulk-copy
Improving bulk-copy performance
Replacing the data in a large table
Adding large amounts of data to a table
Using partitions and multiple bulk-copy processes
Impacts on other users
Database consistency checker
Using dbcc tune (cleanup)
Using dbcc tune on spinlocks
Determining the space available for maintenance activities
Overview of space requirements
Checking space usage and space available
Checking space used for tables and indexes
Checking space on segments
Checking space requirements for space management properties
Space management properties applied to the table
Space management properties applied to the index
Estimating the effects of space management properties
If there is not enough space
Temporary Databases
How temporary database management affects performance
Using temporary tables
Hashed (#) temporary tables
Regular user tables
Worktables
Temporary databases
Session-assigned temporary database
Using multiple temporary databases
Creating user temporary databases
Configuring a default tempdb group
Binding to groups and tempdb
Binding applications and logins to temporary databases
Tuning system temporary databases for performance
Placing system tempdb
Initial allocation of system tempdb
Dropping the master device from tempdb segments
Configuring user-created temporary databases
Caching user temporary databases
General guidelines
Using multiple disks for parallel query performance
Binding tempdb to its own cache
Determining the size of temporary databases
Minimizing logging in temporary databases
Optimizing temporary tables
Logging optimizations for temporary databases
User log cache (ULC)
Performance and Tuning Series: Query Processing and Abstract Plan 15.7
Understanding Query Processing
Query optimizer
Factors analyzed in optimizing queries
Transformations for query optimization
Search arguments converted to equivalent arguments
Search argument transitive closure applied where applicable
equi-join predicate transitive closure applied where applicable
Predicate transformation and factoring to provide additional optimization paths
Handling search arguments and useful indexes
Nonequality operators
Handling joins
Join density and join histograms
Expression histogramming selectivity estimates
Joins with mixed datatypes
Joins with expressions and or predicates
join ordering
Optimization goals
Limiting the time spent optimizing a query
Parallelism
Optimization issues
Lava query execution engine
Lava query plans
Lava operators
Lava query execution
How update operations are performed
Direct updates
In-place updates
Cheap direct updates
Expensive direct updates
Deferred updates
When deferred updates are required
Deferred index inserts
Restrictions on update modes through joins
Joins and subqueries in update and delete statements
Deletes and updates in triggers versus referential integrity
Optimizing updates
Designing for direct updates
Effects of update types and indexes on update modes
Using sp_sysmon while tuning updates
Using showplan
Displaying a query plan
Query plans in Adaptive Server Enterprise 15.0 and later
Why do I get different query plans for the same query?
Using set showplan with noexec
Statement-level output
Query plan shape
Query plan operators
EMIT operator
SCAN operator
FROM cache message
FROM or LIST
FROM TABLE
I/O size messages
RID scan
Log Scan
DELETE, INSERT, and UPDATE operators
TEXT DELETE operator
Query plans for referential integrity enforcement
JOIN operators
NESTED LOOP JOIN
MERGE JOIN
HASH JOIN
NARY NESTED LOOP JOIN operator
semijoin
Distinct operators
GROUP SORTED Distinct operator
SORT Distinct operator
HASH Distinct operator
Vector aggregation operators
compute by message
Union operators
UNION ALL operator
MERGE UNION operator
HASH UNION
SCALAR AGGREGATE operator
RESTRICT operator
SORT operator
STORE operator
SEQUENCER operator
REMOTE SCAN operator
SCROLL operator
RID JOIN operator
SQLFILTER operator
EXCHANGE operator
INSTEAD-OF TRIGGER operators
INSTEAD-OF TRIGGER operator
CURSOR SCAN operator
deferred_index and deferred_varcol messages
Displaying Query Optimization Strategies and Estimates
set commands for text format messages
set commands for XML format messages
Using show_execio_xml to diagnose query plans
Showing cached plans in XML
Diagnostic usage scenarios
Permissions for set commands
Analyzing dynamic parameters
Dynamic parameter example analysis
Finding Slow Running Queries
Saving diagnostics to a trace file
Set options that save diagnostic information to a trace file
Which sessions are being traced?
Rebinding a trace
Displaying SQL text
Retaining session settings
Parallel Query Processing
Vertical, horizontal, and pipelined parallelism
Queries that benefit from parallel processing
Enabling parallelism
number of worker processes
max parallel degree
max resource granularity
max repartition degree
max scan parallel degree
prod-consumer overlap factor
min pages for parallel scan
max query parallel degree
Controlling parallelism at the session level
set command examples
Controlling query parallelism
Query-level parallel clause examples
Using parallelism selectively
Using parallelism with large numbers of partitions
When parallel query results differ
Queries that use set rowcount
Queries that set local variables
Understanding parallel query plans
Adaptive Server parallel query execution model
EXCHANGE operator
Pipe management
Worker process model
Using parallelism in SQL operations
Parallelism of attribute-insensitive operation
Scalar aggregation
union all
Parallelism of attribute-sensitive operation
Subqueries
select into clauses
insert/delete/update
Partition elimination
Partition skew
Why queries do not run in parallel
Runtime adjustment
Recognizing and managing runtime adjustments
Using set process_limit_action
Using showplan
Reducing the likelihood of runtime adjustments
Eager and Lazy Aggregation
Overview
Eager aggregation
Aggregation and query processing
Examples
Using eager aggregation
Enabling eager aggregation
Checking for eager aggregation
Forcing eager aggregation with abstract plans
Controlling Optimization
Special optimizing techniques
Viewing current optimizer settings
Setting the optimization level
Optimizer Diagnostic Utility
Configuring Adaptive Server to run sp_opt_querystats
Running sp_opt_querystats
Specifying query processor choices
Specifying table order in joins
Specifying the number of tables considered by the query processor
Specifying query index
Specifying I/O size in a query
Index type and large I/O size
When prefetch specification cannot be followed
setting prefetch
Specifying cache strategy
In select, delete, and update statements
Controlling large I/O and cache strategies
Getting information on cache strategies
Asynchronous log service
Understanding the user log cache (ULC) architecture
When to use ALS
Using the ALS
Enabling and disabling merge joins
Enabling and disabling hash joins
Enabling and disabling join transitive closure
Controlling literal parameterization
Suggesting a degree of parallelism for a query
Query level parallel clause examples
Optimization goals
Setting optimization goals
Optimization criteria
Limiting optimization time
Controlling parallel optimization
number of worker processes
Specifying the number of worker processes available for parallel processing
max resource granularity
max repartition degree
Concurrency optimization for small tables
Changing the locking scheme
Optimization for Cursors
Definition
Set-oriented versus row-oriented programming
Example
Resources required at each stage
Memory use and execute cursors
Cursor modes
Index use and requirements for cursors
Allpages-locked tables
Data-only-locked tables
Table scans to avoid the Halloween problem
Comparing performance with and without cursors
Sample stored procedure without a cursor
Sample stored procedure with a cursor
Cursor versus noncursor performance comparison
Locking with read-only cursors
Isolation levels and cursors
Partitioned heap tables and cursors
Optimizing tips for cursors
Optimizing for cursor selects using a cursor
Using union instead of or clauses or in lists
Declaring the cursorās intent
Specifying column names in the for update clause
Using set cursor rows
Keeping cursors open across commits and rollbacks
Opening multiple cursors on a single connection
Query Processing Metrics
Overview
Executing QP metrics
Accessing metrics
sysquerymetrics view
Using metrics
Examples
Identifying the most expensive statement
Identifying the most frequently used statement for tuning
Identifying possible performance regression
Clearing metrics
Restricting query metrics capture
Understanding the UID in sysquerymetrics
Using Statistics to Improve Performance
Statistics maintained in Adaptive Server
Importance of statistics
Nonbinary character set histogram interpolation
Updating statistics
Adding statistics for unindexed columns
Limitations for updating statistics on proxy tables and views
update statistics commands
Using sampling for update statistics
Automatically updating statistics
datachange function
Configuring automatic update statistics
Using Job Scheduler to update statistics
Examples of updating statistics with datachange
Column statistics and statistics maintenance
Creating and updating column statistics
When additional statistics may be useful
Adding statistics for a column with update statistics
Adding statistics for minor columns with update index statistics
Adding statistics for all columns with update all statistics
Choosing step numbers for histograms
Choosing a step number
Scan types, sort requirements, and locking
Sorts for unindexed or nonleading columns
Locking, scans, and sorts during update index statistics
Locking, scans and sorts during update all statistics
Using the with consumers clause
Reducing the impact of update statistics on concurrent processes
Using the delete statistics command
When row counts may be inaccurate
Introduction to Abstract Plans
Overview
Managing abstract plans
Relationship between query text and query plans
Limits of options for influencing query plans
Full versus partial plans
Creating a partial plan
Abstract plan groups
How abstract plans are associated with queries
Abstract plans in cached statements
Creating and Using Abstract Plans
Using set commands to capture and associate plans
Enabling plan capture mode with set plan dump
Associating queries with stored plans
Using replace mode during plan capture
When to use replace mode
Using dump, load, and replace modes simultaneously
Using dump and load to the same group
Using dump and load to different groups
Compile-time changes for some set parameters
set plan exists check option
Using other set options with abstract plans
Using show_abstract_plan to view plans
Using showplan
Using noexec
Using fmtonly
Using forceplan
Server-wide abstract plan capture and association modes
Creating plans using SQL
Using create plan
Using the plan clause
Abstract Query Plan Guide
Overview
Abstract plan language
Queries, access methods, and abstract plans
Derived tables
Identifying tables
Identifying indexes
Specifying join order
Shorthand notation for joins
Join order examples
Match between execution methods and abstract plans
Specifying join order for queries using views
Specifying the join type
Specifying partial plans and hints
Grouping multiple hints
Inconsistent and illegal plans using hints
Creating abstract plans for subqueries
Materialized subqueries
Flattened subqueries
Example of changing the join order in a flattened subquery
Nested subqueries
Subquery identification and attachment
More subquery examples: reading ordering and attachment
Modifying subquery nesting
Abstract plans for materialized processing of views
Abstract plans for queries containing aggregates
Abstract plans for queries containing unions
Using abstract plans when queries need ordering
Specifying the reformatting strategy
Specifying the OR strategy
When the store operator is not specified
Abstract plans for parallel processing
Tips on writing abstract plans
Using abstract plans at the query level
Operator name alignment for abstract plan and optimizer criteria
Extending the optimizer criteria set syntax
Comparing plans before and after
Effects of enabling server-wide capture mode
Time and space to copy plans
Abstract plans for stored procedures
Procedures and plan ownership
Procedures with variable execution paths and optimization
Ad hoc queries and abstract plans
Managing Abstract Plans with System Procedures
Managing an abstract plan group
Creating a group
Dropping a group
Getting information about a group
Renaming a group
Finding abstract plans
Managing individual abstract plans
Viewing a plan
Copying a plan to another group
Dropping an individual abstract plan
Comparing two abstract plans
Changing an existing plan
Managing all plans in a group
Copying all plans in a group
Comparing all plans in a group
Dropping all abstract plans in a group
Importing and exporting groups of plans
Exporting plans to a user table
Importing plans from a user table
Glossary 15.7
Glossary
Monitoring Tables Diagram 15.7
Quick Reference Guide 15.7
Quick Reference Guide
Datatypes
Standards and compliance
Datatypes and encrypted columns
Adaptive Server global variables
Reserved words
Transact-SQL reserved words
ANSI SQL reserved words
Potential ANSI SQL reserved words
Functions
XML functions
Commands
Interactive dbsql commands
System procedures
Catalog stored procedures
Extended stored procedures
dbcc stored procedures
System tables
DBCC tables
Monitoring tables
sybpcidb tables
Utilities
System Table Diagram 15.7
Troubleshooting: Error Messages and Advanced Resolutions 15.0
About this book
Introduction
Understanding error message severity levels
Notifying the System Administrator
Variables in error message text
Finding object names in error message text
Finding the Adaptive Server version
Understanding the field order in the version string
Creating error messages
Reporting errors
Sybase Technical Support checklist
Sending error log fragments
Reproducing problems
Parser Errors (100s, 7380)
Error 102
Error 107
Error 195
Error 7380
Sequencer Errors (200s, 7783, 7788, 11000s, 14200)
Error 207
Error 208
Error 213
Error 216
Error 225
Error 226
Error 229
Error 232
Error 233
Error 241
Error 247
Error 257
Error 259
Error 265
Error 266
Error 268
Error 277
Error 7783
Error 7788
Error 11018
Error 11068
Error 11072
Error 14200
Query Processor Errors (300s, 400s, 500s)
Error 311
Error 313
Error 314
Error 403
Error 414
Error 428
Error 511
Error 512
Error 515
Error 530
Error 539
Error 540
Error 546
Error 547
Error 551
Error 584
Access Method Errors (600s)
Error 601
Error 603
Error 605
Error 611
Error 614
Error 622
Error 623
Error 624
Error 625
Error 629
Error 631
Error 644
Error 678
Error 691
Error 692
Error 693
Error 694
Error 695
Error 696
Error 697
Memory Manager Errors (700s)
Error 701
Error 702
Error 703
Error 706
Error 707
Error 709
Error 714
Error 715
Error 717
Error 718
Error 719
Error 720
Error 721
Buffer Manager Errors (800s)
Error 803
Error 804
Error 806
Error 813
Error 820
Error 821
Error 822
Error 823
Error 832
Error 834
Error 835
Error 840
Error 842
Error 847
Error 849
Error 852
Error 855
Error 861
Error 863
Error 881
Error 890
Open Database Manager Errors (900s)
Error 903
Error 905
Error 906
Error 908
Error 911
Error 913
Error 916
Error 921
Error 924
Error 925
Error 926
Error 930
Error 935
Error 940
Error 941
Error 945
Error 950
Error 965
Abstract Plan Manager Errors (1000s)
Error 1024
Page Manager Errors (1100s)
Error 1105
Error 1108
Error 1120
Error 1124
Error 1127
Error 1129
Error 1131
Error 1133
Error 1141
Error 1142
Error 1143
Error 1159
Error 1161
Lock Manager Errors (1200s)
Error 1203
Error 1204
Error 1205
Error 1243
Error 1244
Error 1249
Error 1251
Error 1265
Error 1279
Sort Manager Errors (1500s)
Error 1501
Error 1505
Error 1506
Error 1508
Error 1509
Error 1510
Error 1514
Error 1530
Error 1531
Initialization Errors (1600s)
Error 1601
Error 1602
Error 1603
Error 1605
Error 1608
Error 1613
Error 1621
Error 1622
Error 1623
Create Utilities Errors (1700 - 1900s, 2100s, 2700s, 12800s)
Error 1702
Error 1708
Error 1732
Error 1803
Error 1808
Error 1809
Error 1810
Error 1813
Error 1820
Error 1902
Error 1903
Error 1916
Error 1928
Error 2110
Error 2714
Error 2729
Error 2753
Error 2762
Error 12818
Error 12842
Error 12881
High Availability Errors (2200s)
Error 2243
Character Set Conversion Errors (2400s)
Error 2401
Error 2402
Error 2409
dbcc Errors (2500s, 7900s, 12000s, 15000s)
Error 2501
Error 2502
Error 2503
Error 2507
Error 2509
Error 2510
Error 2511
Error 2513
Error 2514
Error 2517
Error 2520
Error 2521
Error 2524
Error 2525
Error 2529
Error 2540
Error 2546
Error 2547
Error 2550
Error 2558
Error 2559
Error 2572
Error 2573
Error 2574
Error 2575
Error 2578
Error 2582
Error 2583
Error 2591
Error 2596
Error 7901
Error 7902
Error 7928
Error 7930
Error 7939
Error 7940
Error 7949
Error 7989
Error 9961
Error 12964
Error 15056
Error 15080
Error 15082
Error 15084
insert Errors (2600s)
Error 2601
Error 2610
Error 2615
Error 2619
Error 2620
Error 2626
Error 2628
Error 2630
Error 2631
Procedure Manager Errors (2800s)
Error 2805
Error 2806
Error 2811
Error 2812
Error 2824
Error 2835
Error 2844
dump and load Errors (3000s - 3200s, 4200s - 4300s)
Error 3019
Error 3020
Error 3021
Error 3105
Error 3120
Error 3143
Error 3144
Error 3161
Error 3162
Error 3201
Error 3203
Error 3211
Error 3212
Error 3216
Error 3225
Error 3230
Error 3233
Error 3240
Error 4204
Error 4205
Error 4207
Error 4216
Error 4221
Error 4222
Error 4305
Error 4322
commit and abort Errors (3300s)
Error 3301
Error 3307
Error 3321
Error 3322
Recovery Errors (3400s, 12500s)
Error 3401
Error 3403
Error 3404
Error 3414
Error 3429
Error 3434
Error 3445
Error 3446
Error 3447
Error 3452
Error 3454
Error 3462
Error 3470
Error 12546
Error 12547
Error 12551
Error 12583
Error 12587
Exception Handling Errors (3600s)
Error 3604
Error 3621
Error 3624
Error 3626
Error 3641
Error 3642
Error 3643
Error 3644
Error 3646
Error 3648
drop Errors (3700s)
Error 3701
Error 3702
Error 3703
Transaction Errors (3900s)
Error 3904
Error 3905
Error 3906
Error 3908
Error 3917
Error 3949
dataserver Errors (4000s)
Error 4001
Error 4002
Error 4020
View Resolution Manager Errors (4400s)
Error 4430
truncate table Errors (4700s)
Error 4716
Bulk Copy Utility Errors (4800s)
Error 4801
Error 4806
alter table Errors (4900s)
Error 4951
Error 4953
Error 4954
Error 4956
Error 4964
alter database Errors (5000s)
Error 5006
Error 5013
Error 5018
Error 5034
Disk Errors (5100s)
Error 5115
Error 5123
Error 5142
Transaction Coordinator Errors (5600s)
Error 5602
Open Client Errors (5700s)
Error 5701
Error 5704
Configuration Errors (5800s, 10800s)
Error 5806
Error 5808
Error 5824
Error 5846
Error 5847
Error 5848
Error 5849
Error 5850
Error 5851
Error 5852
Error 5853
Error 5854
Error 5857
Error 5859
Error 5861
Error 5863
Error 5865
Error 5866
Error 5867
Error 5868
Error 5893
Error 10841
Error 10865
Process Kill Errors (6100s)
Error 6103
Error 6107
Timestamp Errors (6900s)
Error 6901
Error 6902
Distributed Database Network Errors (7200s)
Error 7201
Error 7205
Error 7207
Error 7211
Error 7212
Error 7214
Error 7215
Error 7218
Error 7220
Error 7221
Error 7223
Error 7227
Error 7234
Error 7235
Text Manager Errors (7100s)
Error 7101
Error 7105
Error 7114
Error 7130
Error 7134
Threshold Manager Errors (7400s)
Error 7401
Error 7402
Error 7403
Error 7404
Error 7406
Error 7407
Error 7408
Error 7409
Error 7410
Error 7411
Error 7412
Error 7413
Error 7414
Error 7415
Error 7417
Error 7418
Error 7438
Auditing Errors (7600s)
Error 7618
Remote Procedure Call Errors (8000s)
Error 8006
Error 8009
Descriptor Manager Errors (8200s)
Error 8201
Error 8203
Error 8204
Error 8207
Error 8210
Error 8211
Error 8219
Error 8239
Error 8241
sysindexes Manager Errors (8400s)
Error 8402
Error 8419
Process Status Structure Errors (8600s)
Error 8601
Site Buffer Manager Errors (8700s)
Error 8704
Disk Manager Errors (9000s)
Error 9004
Replication Agent Manager Errors (9100s - 9200s)
Error 9122
Error 9287
Error 9289
Error 9290
Component Integration Services Errors (11200s)
Error 11201
Error 11202
Error 11203
Configurable Shared Memory Dump Manager (12000s, 12300s)
Error 12036
Error 12326
Error 12328
Error 12329
Error 12330
Error 12333
Error 12334
Error 12335
Fault Isolation Utility Errors (12700s)
Error 12716
Error 12717
Partition (14100s) and Partition Key Manager (14300s) Errors
Error 14100
Error 14108
Error 14120
Error 14124
Error 14126
Error 14313
mount database Errors (14500s)
Error 14503
Error 14504
Error 14511
Error 14513
Error 14560
Error 14561
Anchor Manager Errors (14600s)
Error 14605
Error 14618
Error 14619
Error 14620
Error 14621
Error 14622
Error 14623
XML Utility Manager Errors (14900s)
Error 14901
Message Service Errors (15100s)
Error 15101
Error 15105
Web Services Errors (15200s)
Error 15219
Encryption Errors (15400s)
Error 15402
Error 15403
Error 15412
Error 15413
Error 15417
Statistics Errors (15600s)
Error 15600
Error 15601
System Procedure Errors (17000s, 18000s)
Error 17461
Error 17715
Error 17716
Error 17737
Error 17870
Error 17871
Error 17872
Error 17873
Error 17874
Error 17875
Error 17903
Error 17904
Error 17905
Error 17906
Error 17910
Error 18031
Error 18032
Error 18033
Error 18123
Error 18750
Kernel Errors
Asynchronous I/O not available
Buffer mismatch
Could not create shared memory
Current process infected
dopen error
dstart I/O request repeatedly delayed
Failed to open device
Feature is not licensed
File already in use
Memory too fragmented
Memory usage in procedure headers
Network information message
No more alarms available
Open objects parameter may be too low
os_attach_region errors
os_create_region errors
Read/write errors
Server is unnamed
Stack guardword corrupted
time slice error
t_rcvconnect error
udunmirror errors
No more engines can be offlined
Reference Manuals: Building Blocks 15.7 ESD #2
About this book
System and User-Defined Datatypes
Datatype categories
Range and storage size
Datatypes of columns, variables, or parameters
Datatypes of mixed-mode expressions
Determining the datatype hierarchy
Determining precision and scale
Datatype conversions
Automatic conversion of fixed-length NULL columns
Handling overflow and truncation errors
Standards and compliance
Exact numeric datatypes
Integer types
Decimal datatypes
Standards and compliance
Approximate numeric datatypes
Understanding approximate numeric datatypes
Range, precision, and storage size
Entering approximate numeric data
NaN and Inf values
Standards and compliance
Money datatypes
Accuracy
Range and storage size
Entering monetary values
Standards and compliance
Timestamp datatype
Creating a timestamp column
Date and time datatypes
Range and storage requirements
Entering date and time data
Standards and compliance
Character datatypes
unichar, univarchar
Length and storage size
Entering character data
Entering Unicode characters
Treatment of blanks
Manipulating character data
Standards and compliance
Binary datatypes
Valid binary and varbinary entries
Entries of more than the maximum column size
Treatment of trailing zeros
Platform dependence
Standards and compliance
bit datatype
Standards and compliance
sysname and longsysname datatypes
Standards and compliance
text, image, and unitext datatypes
Data structures used for storing text, unitext, and image data
Initializing text, unitext, and image columns
Defining unitext columns
Saving space by allowing NULL
Getting information from sysindexes
Using readtext and writetext
Determining how much space a column uses
Restrictions on text, image, and unitext columns
Selecting text, unitext, and image data
Converting text and image datatypes
Converting to or from unitext
Pattern matching in text data
Duplicate rows
Using large object text, unitext, and image datatypes in stored procedures
Declaring a LOB datatype
Creating a LOB parameter
Using LOB datatypes
Standards and compliance
Datatypes and encrypted columns
User-defined datatypes
Standards and compliance
Transact-SQL Functions
abs
acos
ascii
asehostname
asin
atan
atn2
avg
audit_event_name
authmech
biginttohex
bintostr
cache_usage
case
cast
ceiling
char
char_length
charindex
coalesce
col_length
col_name
compare
convert
cos
cot
count
count_big
create_locator
current_bigdatetime
current_bigtime
current_date
current_time
curunreservedpgs
data_pages
datachange
datalength
dateadd
datediff
datename
datepart
day
db_attr
db_id
db_instanceid
db_name
db_recovery_status
degrees
derived_stat
difference
dol_downgrade_check
exp
floor
get_appcontext
getdate
get_internal_date
getutcdate
has_role
hash
hashbytes
hextobigint
hextoint
host_id
host_name
instance_id
identity_burn_max
index_col
index_colorder
index_name
inttohex
isdate
is_quiesced
is_sec_service_on
is_singleusermode
isnull
isnumeric
instance_name
lc_id
lc_name
lct_admin
left
len
license_enabled
list_appcontext
locator_literal
locator_valid
lockscheme
log
log10
lower
lprofile_id
lprofile_name
ltrim
max
migrate_instance_id
min
month
mut_excl_roles
newid
next_identity
nullif
object_attr
object_id
object_name
object_owner_id
pagesize
partition_id
partition_name
partition_object_id
password_random
patindex
pi
power
proc_role
pssinfo
radians
rand
rand2
replicate
reserve_identity
reserved_pages
return_lob
reverse
right
rm_appcontext
role_contain
role_id
role_name
round
row_count
rtrim
sdc_intempdbconfig
set_appcontext
setdata
show_cached_plan_in_xml
show_cached_text
show_cached_text_long
show_dynamic_params_in_xml
show_plan
show_role
show_sec_services
sign
sin
sortkey
soundex
space
spid_instance_id
square
sqrt
stddev
stdev
stdevp
stddev_pop
stddev_samp
str
str_replace
strtobin
stuff
substring
sum
suser_id
suser_name
syb_quit
syb_sendmsg
sys_tempdbid
tan
tempdb_id
textptr
textvalid
to_unichar
tran_dumpable_status
tsequal
uhighsurr
ulowsurr
upper
uscalar
used_pages
user
user_id
user_name
valid_name
valid_user
var
var_pop
var_samp
variance
varp
workload_metric
xa_bqual
xa_gtrid
xact_connmigrate_check
xact_owner_instance
xmlextract
xmlparse
xmlrepresentation
xmltable
xmltest
xmlvalidate
year
Global Variables
Adaptive Server global variables
Using global variables in a clustered environment
Expressions, Identifiers, and Wildcard Characters
Expressions
Size of expressions
Arithmetic and character expressions
Relational and logical expressions
Operator precedence
Arithmetic operators
Bitwise operators
String concatenation operator
Comparison operators
Nonstandard operators
Using any, all and in
Negating and testing
Ranges
Using nulls in expressions
Comparisons that return TRUE
Difference between FALSE and UNKNOWN
Using āNULLā as a character string
NULL compared to the empty string
Connecting expressions
Using parentheses in expressions
Comparing character expressions
Using the empty string
Including quotation marks in character expressions
Using the continuation character
Identifiers
Short identifiers
Tables beginning with # (temporary tables)
Case sensitivity and identifiers
Uniqueness of object names
Using delimited identifiers
Enabling quoted identifiers
Identifying tables or columns by their qualified object name
Using delimited identifiers within an object name
Omitting the owner name
Referencing your own objects in the current database
Referencing objects owned by the database owner
Using qualified identifiers consistently
Determining whether an identifier is valid
Renaming database objects
Using multibyte character sets
like pattern matching
Using not like
Pattern matching with wildcard characters
Case and accent insensitivity
Using wildcard characters
The percent sign (%) wildcard character
The underscore (_) wildcard character
Bracketed ([ ]) characters
The caret (^) wildcard character
Using multibyte wildcard characters
Using wildcard characters as literal characters
Using square brackets ( [ ] ) as escape characters
Using the escape clause
Using wildcard characters with datetime data
Reserved Words
Transact-SQL reserved words
ANSI SQL reserved words
Potential ANSI SQL reserved words
SQLSTATE Codes and Messages
Warnings
Exceptions
Cardinality violations
Data exceptions
Integrity constraint violations
Invalid cursor states
Syntax errors and access rule violations
Transaction rollbacks
with check option violation
Reference Manuals: Commands 15.7 ESD #2
Commands
alter database
alter encryption key
alter login
alter login profile
alter precomputed result set
alter...modify owner
alter role
alter table
alter thread pool
begin...end
begin transaction
break
checkpoint
close
commit
compute clause
connect to...disconnect
continue
create archive database
create database
create default
create encryption key
create existing table
create function
create function (SQLJ)
create index
create login
create login profile
create plan
create precomputed result set
create procedure
create procedure (SQLJ)
create proxy_table
create role
create rule
create schema
create service
create table
create thread pool
create trigger
create view
dbcc
deallocate cursor
deallocate locator
declare
declare cursor
delete
delete statistics
disk init
disk mirror
disk refit
disk reinit
disk remirror
disk resize
disk unmirror
drop database
drop default
drop encryption key
drop function
drop function (SQLJ)
drop index
drop login
drop login profile
drop precomputed result set
drop procedure
drop role
drop rule
drop service
drop table
drop thread pool
drop trigger
drop view
dump configuration
dump database
dump transaction
execute
fetch
goto label
grant
grant role
group by and having clauses
if...else
insert
kill
load database
load transaction
lock table
merge
mount
online database
open
order by clause
prepare transaction
print
quiesce database
raiserror
readtext
reconfigure
refresh
remove java
reorg
return
revoke
revoke role
rollback
rollback trigger
save transaction
select
set
setuser
shutdown
transfer table
truncate lob
truncate precomputed result set
truncate table
union operator
unmount
update
update all statistics
update index statistics
update statistics
update table statistics
use
waitfor
where clause
while
writetext
Interactive SQL Commands
clear
configure
connect
disconnect
exit
input
output
parameters
read
set connection
start logging
stop logging
system
Reference Manuals: Procedures 15.7 ESD #2
System Procedures
Introduction to system procedures
Return values for system procedures
Permissions on system procedures
Auditing system procedures
Executing system procedures
Entering parameter values
Messages
System procedure tables
sp_activeroles
sp_add_qpgroup
sp_add_resource_limit
sp_add_time_range
sp_addalias
sp_addauditrecord
sp_addaudittable
sp_addengine
sp_addexeclass
sp_addextendedproc
sp_addexternlogin
sp_addgroup
sp_addlanguage
sp_addlogin
sp_addmessage
sp_addobjectdef
sp_addremotelogin
sp_addsegment
sp_addserver
sp_addthreshold
sp_addtype
sp_addumpdevice
sp_adduser
sp_altermessage
sp_audit
sp_autoconnect
sp_autoformat
sp_bindcache
sp_bindefault
sp_bindexeclass
sp_bindmsg
sp_bindrule
sp_cacheconfig
sp_cachestrategy
sp_changedbowner
sp_changegroup
sp_checknames
sp_checkreswords
sp_checksource
sp_chgattribute
sp_cleanpwdchecks
sp_clearpsexe
sp_clearstats
sp_client_addr
sp_cluster
sp_clusterlockusage
sp_cmp_all_qplans
sp_cmp_qplans
sp_commonkey
sp_companion
sp_compatmode
sp_config_dump
sp_configure
sp_copy_all_qplans
sp_copy_qplan
sp_countmetadata
sp_cursorinfo
sp_dbextend
sp_dboption
sp_dbrecovery_order
sp_dbremap
sp_defaultloc
sp_deletesmobj
sp_depends
sp_deviceattr
sp_diskdefault
sp_displayaudit
sp_displaylevel
sp_displaylogin
sp_displayroles
sp_downgrade
sp_dropalias
sp_drop_all_qplans
sp_drop_qpgroup
sp_drop_qplan
sp_drop_resource_limit
sp_drop_time_range
sp_dropdevice
sp_dropengine
sp_dropexeclass
sp_dropextendedproc
sp_dropexternlogin
sp_dropglockpromote
sp_dropgroup
sp_dropkey
sp_droplanguage
sp_droplogin
sp_dropmessage
sp_dropobjectdef
sp_dropremotelogin
sp_droprowlockpromote
sp_dropsegment
sp_dropserver
sp_dropthreshold
sp_droptype
sp_dropuser
sp_dump_history
sp_dumpoptimize
sp_encryption
sp_engine
sp_errorlog
sp_estspace
sp_export_qpgroup
sp_extendsegment
sp_extengine
sp_extrapwdchecks
sp_familylock
sp_find_qplan
sp_fixindex
sp_flushstats
sp_forceonline_db
sp_forceonline_object
sp_forceonline_page
sp_foreignkey
sp_freedll
sp_getmessage
sp_grantlogin
sp_ha_admin
sp_help
sp_help_resource_limit
sp_help_qpgroup
sp_help_qplan
sp_helpapptrace
sp_helpartition
sp_helpcache
sp_helpcomputedcolumn
sp_helpconfig
sp_helpconstraint
sp_helpdb
sp_helpdevice
sp_helpextendedproc
sp_helpexternlogin
sp_helpgroup
sp_helpindex
sp_helpjava
sp_helpjoins
sp_helpkey
sp_helplanguage
sp_helplog
sp_helpobjectdef
sp_helpremotelogin
sp_helprotect
sp_helpsegment
sp_helpserver
sp_helpsort
sp_helptext
sp_helpthread
sp_helpthreshold
sp_helpuser
sp_hidetext
sp_import_qpgroup
sp_indsuspect
sp_jreconfig
sp_ldapadmin
sp_listener
sp_listsuspect_db
sp_listsuspect_object
sp_listsuspect_page
sp_lmconfig
sp_lock
sp_locklogin
sp_logdevice
sp_loginconfig
sp_logininfo
sp_logiosize
sp_logintrigger
sp_maplogin
sp_merge_dup_inline_default
sp_metrics
sp_modify_resource_limit
sp_modify_time_range
sp_modifylogin
sp_modifystats
sp_modifythreshold
sp_monitor
sp_monitorconfig
sp_monitor_server
sp_object_stats
sp_objectsegment
sp_opt_querystats
sp_optgoal
sp_options
sp_passthru
sp_password
sp_passwordpolicy
sp_pciconfig
sp_placeobject
sp_plan_dbccdb
sp_poolconfig
sp_post_xpload
sp_primarykey
sp_processmail
sp_procxmode
sp_querysmobj
sp_recompile
sp_refit_admin
sp_remap
sp_remoteoption
sp_remotesql
sp_rename
sp_rename_qpgroup
sp_renamedb
sp_reportstats
sp_restore_system_role
sp_revokelogin
sp_role
sp_securityprofile
sp_sendmsg
sp_serveroption
sp_set_qplan
sp_setlangalias
sp_setpglockpromote
sp_setpsexe
sp_setrowlockpromote
sp_setsuspect_granularity
sp_setsuspect_threshold
sp_setup_table_transfer
sp_shmdumpconfig
sp_show_options
sp_showcontrolinfo
sp_showexeclass
sp_showoptstats
sp_showplan
sp_showpsexe
sp_spaceusage
sp_spaceused
sp_ssladmin
sp_syntax
sp_sysmon
sp_tab_suspectptn
sp_tempdb
sp_tempdb_markdrop
sp_thresholdaction
sp_tran_dumpable_status
sp_transactions
sp_unbindcache
sp_unbindcache_all
sp_unbindefault
sp_unbindexeclass
sp_unbindmsg
sp_unbindrule
sp_version
sp_volchanged
sp_webservices
sp_who
sp_xmlschema
Catalog Stored Procedures
Overview
Specifying optional parameters
Pattern matching
System procedure tables
ODBC datatypes
sp_column_privileges
sp_columns
sp_databases
sp_datatype_info
sp_fkeys
sp_pkeys
sp_server_info
sp_special_columns
sp_sproc_columns
sp_statistics
sp_stored_procedures
sp_table_privileges
sp_tables
System Extended Stored Procedures
Overview
Permissions on system ESPs
DLLs associated with system ESPs
Using system ESPs
xp_cmdshell
xp_deletemail
xp_enumgroups
xp_findnextmsg
xp_logevent
xp_readmail
xp_sendmail
xp_startmail
xp_stopmail
dbcc Stored Procedures
Overview
Specifying the object name and date
Specifying the object name
Specifying the date
sp_dbcc_alterws
sp_dbcc_configreport
sp_dbcc_createws
sp_dbcc_deletedb
sp_dbcc_deletehistory
sp_dbcc_differentialreport
sp_dbcc_evaluatedb
sp_dbcc_exclusions
sp_dbcc_faultreport
sp_dbcc_fullreport
sp_dbcc_help_fault
sp_dbcc_patch_finishtime
sp_dbcc_recommendations
sp_dbcc_runcheck
sp_dbcc_statisticsreport
sp_dbcc_summaryreport
sp_dbcc_updateconfig
Reference Manuals: Tables 15.7 ESD #2
System Tables
Locations of system tables
System tables in master
System tables in sybsecurity
System table in sybsystemdb
System tables in all databases
About the sybdiagdb database
About the syblicenseslog table
Using system tables in the Cluster Edition
timestamp columns
Changed identity values
Controlling fake-table materialization
Rules for using system tables
Permissions on system tables
Locking schemes used for system tables
Reserved columns
Updating system tables
Triggers on system tables
syblicenseslog
sysalternates
sysaltusages
sysattributes
sysauditoptions
sysaudits_01 ā sysaudits_08
syscacheinfo
syscachepoolinfo
syscharsets
syscolumns
syscomments
sysconfigures
sysconstraints
syscoordinations
syscurconfigs
sysdatabases
sysdepends
sysdevices
sysencryptkeys
sysengines
sysgams
sysindexes
sysinstances
sysjars
syskeys
syslanguages
syslisteners
syslocks
sysloginroles
syslogins
syslogs
syslogshold
sysmessages
sysmonitors
sysobjects
sysoptions
syspartitionkeys
syspartitions
syspoolinfo
sysprocedures
sysprocesses
sysprotects
sysquerymetrics
sysqueryplans
sysreferences
sysremotelogins
sysresourcelimits
sysroles
syssecmechs
syssegments
sysservers
syssessions
sysslices
syssrvroles
sysstatistics
systabstats
systhresholds
systimeranges
systransactions
systypes
sysusages
sysusermessages
sysusers
sysxtypes
dbccdb Tables
dbccdb workspaces
dbccdb log
dbcc_config
dbcc_counters
dbcc_exclusions
dbcc_fault_params
dbcc_faults
dbcc_operation_log
dbcc_operation_results
dbcc_types
Monitoring Tables
monCachedObject
monCachePool
monCachedProcedures
monCachedStatement
monCIPC
monCIPCEndpoints
monCIPCLinks
monCIPCMesh
monCLMObjectActivity
monClusterCacheManager
monCMSFailover
monDataCache
monDBRecovery
monDBRecoveryLRTypes
monDeadLock
monDeviceIO
monDeviceSpaceUsage
monEngine
monErrorLog
monFailoverRecovery
monInmemoryStorage
monIOController
monIOQueue
monLicense
monLocks
monLockTimeout
monLogicalCluster
monLogicalClusterAction
monLogicalClusterInstance
monLogicalClusterRoute
monNetworkIO
monOpenDatabases
monOpenObjectActivity
monOpenPartitionActivity
monPCIBridge
monPCIEngine
monPCISlots
monPCM
monProcedureCache
monProcedureCacheMemoryUsage
monProcedureCacheModuleUsage
monProcess
monProcessActivity
monProcessLookup
monProcessMigration
monProcessNetIO
monProcessObject
monProcessProcedures
monProcessSQLText
monProcessStatement
monProcessWaits
monProcessWorkerThread
monRepLogActivity
monRepScanners
monRepScannersTotalTime
monRepSenders
monSpinlockActivity
monSQLRepActivity
monSQLRepMisses
monState
monStatementCache
monSysLoad
monSysPlanText
monSysSQLText
monSysStatement
monSysWaits
monSysWorkerThread
monTableColumns
monTableCompression
monTableParameters
monTables
monTableTransfer
monTask
monTempdbActivity
monThread
monThreadPool
monWaitClassInfo
monWaitEventInfo
monWorkload
monWorkloadPreview
monWorkloadProfile
monWorkloadRaw
monWorkQueue
sybpcidb Tables
pca_jre_arguments
pca_jre_directives
pci_arguments
pci_directives
pci_slotinfo
pci_slot_syscalls
Active Messaging Users Guide 15.7
Introduction
Active Messaging concepts
Automatic decisions in real time
Messaging models
JMS
WebSphere MQ messaging models
Message format
JMS message properties
MQ message topics
Message selectors
Understanding Active Messaging
Sending and receiving messages from a queue
Publishing and consuming messages from a JMS topic
Working with message properties
Previewing the messaging interface
MQ overview
Securing channels with SSL
MQ publish/subscribe
Syntax for topics
Publisher and subscriber identities
MQ publish/subscribe examples
Working with MQ cluster queue objects
Working with remote queue objectsļæ½
Working with text messaging
Text messages and JMS
Text messages and MQ
Adaptive Server Cluster Edition support
Login redirection
Extended high availability
Active Messaging support for the threaded kernel
Internationalization support
Transactional message behavior
Transactional messaging set option
MQ security
Connecting to the MQ queue manager
Installing MQ client on Adaptive Server host machines
MQ authorizations
Querying MQ information
SQL Reference
Message-related global variables
<msgheader> and <msgproperties> documents
Adaptive Server-specific message properties
Keywords
Stored procedures
Built-in functions
Syntax segments
sp_configure 'enable real time messaging'
sp_engine
sp_msgadmin
msgconsume
msgpropcount
msgproplist
msgpropname
msgproptype
msgpropvalue
msgpublish
msgrecv
msgsend
msgsubscribe
msgunsubscribe
endpoint
option_string
sizespec
timespec
Samples
Sybase directories
Using code samples with SQL
Using code samples with Java/JDBC
Glossary
Cluster Edition Cluster Users Guide 15.7
An Overview of the Cluster Edition
What is the Cluster Edition?
Adaptive Server integrated clusterware
The cluster coordinator
The quorum device
Database devices in the Cluster Edition
Private installation versus shared installation
Backup Server in the Cluster Edition
How the Cluster Edition enhances the nonclustered edition
Using interconnected networks in the cluster
Monitoring links between instances
Suggested deployment scenarios
HA failover for OLTP applications
Horizontal scalability for DSS reporting applications
Horizontal scalability for OLTP applications
New client technologies in the Cluster Edition
Support for replication
Client Applications and Client/ Server Interaction
Open Client
Enabling failover in Client-Library applications
Client/server interaction
Login redirection
Connection properties for login redirection
Connection migration
Difference between migration and failover
When can migration occur?
Migrated contexts
Criteria for migration
Context migration
Configuring a client migration
Extended high-availability failover
Differences between HA failover and failover in clusters
Using isql in a clustered environment
Using remote procedure calls in a clustered environment
RPCs where the remote server is a cluster
RPCs where the local server is a cluster
RPCs where local and remote servers are instances in the same cluster
sp_serveroption
Reconnecting clients when a node loses power
Using Security with a Clustered Environment
Using encrypted columns in a clustered environment
Using SSL in a clustered environment
Specifying a common name with sp_listener
Using LDAP as a directory service
LDAP directory services versus the Sybase interfaces file
The libtcl*.cfg file
Enabling LDAP directory services
Adding a server to the directory services
Multiple directory services
Encrypting the password
Performance
Migrating from the interfaces file to LDAP
Using LDAP directory services with the shared-disk cluster
Using Monitoring Tables in a Clustered Environment
Monitoring tables for clusters
Configuring the system view
Configuring monitoring tables
Managing the message pipe
Changes for RPCs
Monitoring tables specific to the Cluster Edition
Monitoring tables that return identical information for all instances
Monitoring tables that return specific instance information
Using Backup Server in a Clustered Environment
Nodes joining cluster during a dump
Multiple Backup Servers
Configuring Cluster Edition to use multiple Backup Servers
Using the dedicated method
Using the round-robin method
Starting and stopping Backup Servers
Backing up to media
Changes to stored procedures
sp_addserver
sp_dumpoptimize and sp_helpserver
sp_volchanged
Managing the Workload
Logical cluster resources
The system logical cluster
Setting up a logical cluster
Creating a logical cluster
Adding instances to a logical cluster
Adding routes to a logical cluster
Starting a logical cluster
Assigning routing rules
Routing rules
Configuring logical cluster attributes
The open logical cluster
Down-routing mode
System-view attribute
Start-up mode
Failover mode
Fail_to_any attribute
Load profile attribute
Login distribution mode
Action release
Gather mode
Roles
Configuring failover
Adding failover resources
Managing logical clusters
User tasks and logical clusters
Managing the workload manager thread
Setting memory requirements for the workload manager
Viewing information about a logical cluster
Querying the monitor tables
Using sp_cluster logical, "show"
Creating and dropping a logical cluster
Adding resources to a logical cluster
Dropping resources from a logical cluster
Adding, moving, and dropping routes
Migrating connections
Administering failover, failback, and planned downtime
Cluster and instance states
How states change
Asynchronous commands and logical cluster states
Using action descriptors
An example: scheduling and rescheduling a failover
Using failover, failback, online, offline, and deactivate
failover
failback
online
offline
deactivate
Distributing the workload
Workload metrics
Creating a user metric
Weighting the workload metrics
Load thresholds
Load profiles
Using the sample load profiles
Creating and configuring your own load profile
Creating the load profile
Building the load profile
Specifying weights for load profile metrics
Specifying load distribution thresholds
Associating the load profile with a logical cluster
Changing a load profile
Troubleshooting
Cluster Cache Configuration
Global caches
Local caches
Creating and configuring named data caches
Getting information about named caches
Creating a new cache
sp_cacheconfig
Configuring and using multiple buffer pools
sp_poolconfig
Moving memory between buffer pools
Changing the wash size of a pool
Changing a poolās local asynchronous prefetch percentage
Asynchronous writes during allpages page split
Dropping a buffer pool
Binding objects to named caches
Syntax for binding objects
Getting information about bound caches
Dropping cache bindings
Modifying the configuration file
Format of a local named cache
Extra line in local cache entries
Deleted named cache with global configuration
Named cache with local configuration
Deleted entries with valid configuration
Creating a local configuration in the presence of a global configuration
Limitations
Using Temporary Databases
Types of temporary databases
Local temporary databases
Local user temporary databases
Local system temporary databases
Global temporary databases
Summary information
Creating temporary databases
Creating local system temporary databases
Creating local and global user temporary databases
Binding users and applications to temporary databases
Creating and managing temporary database groups
What you can bind
How the session binding is determined
Creating and managing bindings
Displaying group and binding information
Dropping temporary databases
Dropping all but the last local system temporary database
Dropping the last local system temporary database
Restrictions for temporary databases
Private device support for local databases
Using private devices for temporary data
Creating private devices using disk init
Reinitializing private devices using disk reinit
Dropping private devices using sp_dropdevice
Displaying private device information using sp_helpdevice
Using create database and alter database with a private device
Using disk refit
Running Job Scheduler in a Clustered Environment
Installing and configuring Job Scheduler
Running Job Scheduler in a clustered environment
Shutting down Job Scheduler
Redirecting scheduled jobs
Instance Recovery
Single-instance recovery
Single transaction log
Multiple simultaneous failure
Enabling multiple simultaneous failover
Performance limitations and the cluster redundancy level
Recovery algorithm
Additional Topics
Locks
Deadlocks
Retention locks
Cluster lock requests and task request status
Memory
Thresholds
dbcc thresholds output
dbcc dbtable output
dbcc dbrepair with remap option
dbcc dbrepair with newthreshold option
Cluster interprocess communication
Distributed checkpoints
Quorum device heartbeat
Configuring the quorum device heartbeat
Using InfiniBand
Setting the buffer space
Configuring buffer space
Configuring InfiniBand in a cluster
Private installation mode
Maintaining the server configuration files
Changing configuration options at runtime
Manually changing the configuration file
If the version numbers do not match at start-up
Recommended configurations
Using Java in a clustered environment
Adding space to an archive database
Distributed transactions on a shared-disk cluster
Using DTM on the shared-disk cluster
The cluster as the resource manager
Handling requests on nonowner instances
Handling instance failures
Transaction coordination with ASTC
The impact of connection migration
Connection migration and performance
When connections cannot migrate
Configuration and system issues
Support for mount and unmount commands
Using sp_showplan
Using the Cluster Edition with the Veritas Cluster Server
Supported platforms, requirements, and limitations
Installing and configuring the Cluster Edition on VCS
Installing the Cluster Edition
Creating a new Adaptive Server cluster for Storage Foundation integration
Converting an existing cluster to use SF for Sybase CE
Relocating database storage
Reconfiguring interconnects
Managing a cluster under VCS control
Starting and stopping instances
Adding and removing instances
Increasing the number of user connections
Changing the character set or sort order
Membership modes
Determining the membership mode
Changing membership mode
Understanding failure scenarios
VCS troubleshooting
Cluster Edition fails to start
Veritas log: āSybase home directory does not existā
Instance log: āfailed to bind to socketā
Instance log: āMembership service failed to receive initial message from Veritas cluster membership after 301 seconds. Exiting...ā
Instance log: āFailed to open quorum device 'device_path'. OS error 13, 'Permission denied'ā
Instance log: ābasis_dsizecheck: attempt to open device 'device_path' failed, system error is: Permission deniedā
Instance log: āThe configuration area in master device appears to be corrupt.ā
Veritas log: āPath not foundā
VCS shuts down the instance after it starts and issues resource faults
VCS cannot shutdown the instance resource
Resource faults for VCS groups
VCS fails to start
Troubleshooting
Verifying the cluster environment
Restarting the cluster using a dataserver binary from an earlier version
Errors accessing disk devices
Verifying the cluster is down
Creating cluster using sybcluster fails with error -131
Cluster creation fails leaving files in $SYBASE directory
Unified Agent starts but sybcluster connect fails
Disk devices in use
Instances fail to join the cluster
Private interconnect failure
Client connection failover fails
Client fails to reconnect to alternate high availability servers
sybcluster cannot connect if all connections use SSL
jConnect sample disables HA
PC-Client installation ā java.lang.NoClassDefFound Error
The cluster entry ānameā did not contain any servers
After password change, sybcluster cannot manage the cluster
Agent ācannot be foundā
Sybase Central cannot register the AMCP plug-in
UAF plug-in register error
Data on disk unavailable: problems affecting database creation
Access permission to devices is denied after enabling I/O fencing
sybcluster cannot find interfaces file
IBM errors
Asynchronous I/O not enabled
Incorrect permissions on device
Another machine using device
Error running chdev
Administering Clusters with the Adaptive Server Plug-in
Managing a shared-disk cluster
Connecting to a cluster
Disconnecting from a cluster with the toolbar
Enabling Unified Agent functions in the Adaptive Server plug-in
Changing server discovery settings
Displaying cluster properties
General properties tab
Cluster tab
Configuration tab
Log Space tab
Job Scheduler Server tab
Localization tab
Starting a cluster
Shutting down a cluster
Dropping a cluster
Removing a server group
Displaying the status of a cluster
Managing a clustered instance
Adding an instance to a cluster
Dropping an instance from a cluster
Displaying instance properties
Starting an instance
Shutting down an instance
Creating shared database devices
Managing multiple temporary databases
Managing the local temporary databases
System temporary databases
Adding a user-created global temporary database
Adding a user-created local temporary database
Adding temporary databases to a group
Adding a group
Group properties
Managing the workload
Load profiles
Deleting load profiles
Associating a load profile with a logical cluster
General tab for load profiles
Metric Weights tab
Thresholds tab
Managing logical clusters
Adding a logical cluster
Dropping a logical cluster
Logical cluster properties
General tab
Base Instances tab
Failover Instances tab
Load Profile tab
Routes tab
Viewing workload status
Viewing workload status of an instance
Managing routes
Route properties
Creating a route
Administering Clusters Using sybcluster
Using sybcluster
sybcluster and the Unified Agent Framework
Starting sybcluster
Creating a cluster
Connecting to the cluster
Authenticating the user
Setting the user name and password
Identifying the Unified Agents
Starting the cluster
Managing the cluster
Creating a cluster
Verifying the cluster
Displaying information about available Unified Agents
Displaying cluster information
Changing cluster configuration values
Changing user names or passwords
Changing localization values
Changing the membership mode
Disconnecting from the cluster
Shutting the cluster down
Dropping a cluster
Managing an instance
Displaying information about the instance
Adding an instance
Verifying the instance
Changing the default instance
Changing instance properties
Shutting an instance down
Dropping an instance
Enabling sybcluster after manually creating the cluster
Creating and managing auxiliary servers
Creating auxiliary servers
Dropping auxiliary servers
Displaying listening port information
Changing listening port information
Upgrading the server
Configuring the Operating System
Using the stty setting
Restoring correct permissions
File descriptors and user connections
For Linux
For Sun Solaris
For HP-UX
Displaying current soft and hard limits
Increasing the soft limit
Increasing the hard limit
Sample program
Adjusting the client connection timeout period
For Sun Solaris
For Linux
For HP-UX
Checking for hardware errors
For Sun Solaris
For Linux
For HP-UX
Monitoring the use of operating system resources
A sample C shell maintenance script
Customizing Localization for the Cluster Edition
Overview of localization support
Language modules
Default character sets for servers
Changing the default language and character set
Changing the default character set for servers
Supported character sets
Character set conversion
Conversions between server and client
Sort orders
Available sort orders
Language modules
Installing a new language module
Message languages
Localization
Localization directories
About the directory
About the charsets directory
About the locales.dat file
Format of locales.dat file entries
How client applications use locales.dat
Editing the locales.dat file
Changing the localization configuration
Cluster Edition localization
Backup Server localization
Configuring the Cluster Edition for other character sets
Sort orders
Character sets
charset utility
Adding Optional Functionality to the Cluster Edition
Adding auditing
Audit system devices and databases
Running auditinit with the Cluster Edition
Preinstallation tasks for auditing devices
Installing auditing
Installing online help for Transact-SQL syntax
Online syntax help: sp_syntax
Default device for the sybsyntax database
Installing sybsyntax
Logging Error Messages and Events
Cluster Edition error logging
Enabling and disabling error logging
Setting error log paths
Setting the Cluster Edition error log path
Managing messages
Logging user-defined messages
New messages
Existing messages
Logging auditing events
Setting Up Communications Across the Network
How the Cluster Edition determines which directory service entry to use
How a client uses directory services
Creating a directory services entry
Supported directory drivers
Contents of an interfaces file
Heterogeneous and homogeneous environments
Understanding the format of the interfaces file
Components of an interfaces file entry
Creating a master interfaces file
Using dsedit or dscp to create a master interfaces file
Using a text editor to create a master interfaces file
Configuring interfaces files for multiple networks
Configuring the server for multiple network handlers
Sample interfaces files for multiple network handlers
Configuring the client connections
Using one network-independent DSQUERY name
Using different DSQUERY names
Configuring for query port backup
IPv6 support
Understanding IPv6
IPv6 infrastructure
Starting the Cluster Edition as IPv6-aware
Troubleshooting
Server fails to start
Error when executing an ESP
Component Integration Services Users Guide 15.7
Introduction
Understanding Component Integration Services
Basic concepts
Access methods
Server classes
Object types
Interface to remote servers
Proxy tables
Using the create table command
Using the create existing table command
Datatype conversions
Example of remote table definition
Using the create proxy_table command
Remote procedures as proxy tables
Server limits
create new proxy table
create existing proxy table
create proxy_table
alter table
select, insert, delete, update
RPC handling
sp_tables
Cascading proxy tables
Proxy databases
User proxy databases
User proxy database schema synchronization
System proxy databases
System proxy database creation
Schema synchronization when current database has a system proxy database
Stored procedure execution within a system proxy database
Additional behavior of the system proxy database
File system access
Security considerations
Directory access
Recursion through subordinate directories
File access
Remote servers
Server class ASEnterprise
Server class ASAnywhere
Server class ASIQ
Server class direct_connect
Server class sds
Server class RPCServer
Connection management
Connecting to remote servers without the interfaces file
LDAP directory services
Secure communication with SSL
Trusted roots files
Secure communication using Kerberos
Kerberos security services
Configuration for the remote Adaptive Server Kerberos principal name
Configuration for Component Integration Services Remote Procedure Calls
Security issues
Using encrypted columns in CIS
Remote server logins
Trusted mode
Connecting to Backup Server and XP Server
Mapping external logins
Remote server connection failover
Remote server capabilities
Query processing
Processing steps
Query parsing
Query normalization
Query preprocessing
Decision point
Component Integration Services plan generation
Adaptive Server optimization and plan generation
Component Integration Services plan generation
Component Integration Services remote location optimizer
Query plan execution
RPC handling and Component Integration Services
Site handler and outbound RPCs
Component Integration Services and outbound RPCs
Text parameters for RPCs
Text parameter support for XJS/390
Distributed Transaction Management
Server classes and ASTC
DTM-enabled servers
Pre-DTM servers
strict DTM enforcement
enable xact coordination
Enable Component Integration Services
Transactional RPCs
Restrictions on transaction management
Adaptive Server to Adaptive Server update statistics
Limitations
Updating statistics on non-Adaptive Server backends
Java in the database
@@textsize
@@stringsize
Constraints on Java class columns
Error messages
Java abstract datatypes (ADTs)
Java class definitions
Datatypes
Unicode support
create table
create existing table
create proxy_table
alter table
select, insert, update, and delete statements
Datatype conversions
text and image datatypes
Restrictions on text, image, and unitext columns
Limits of @@textsize
Odd bytes padded
Converting text and image datatypes
Pattern matching with text and unitext data
Entering text and image values
readtext using bytes
text, image, and unitext with bulk copy
Error logging
text, unitext, and image data with server class ASEnterprise
text, image, and unitext data with server class direct_connect
Configuration and tuning
Using sp_configure
sysconfigures table
Changing the configuration parameters
Component Integration Services configuration parameters
Global variables for status
SQL Reference
dbcc commands
dbcc options
Trace flags
Functions
Support for functions within Component Integration Services
Aggregate functions
Datatype conversion functions
Date functions
Mathematical functions
Security functions
String functions
System functions
Text and image functions
Transact-SQL commands
alter table
case
connect to...disconnect
create existing table
create index
create table
delete
drop index
fetch
insert
readtext
select
truncate table
update
update statistics
writetext
Passthrough mode
connect to
sp_autoconnect
sp_passthru
sp_remotesql
Quoted identifier support
Delimited identifier support
auto identity option
Triggers
Tutorial
Getting started with Component Integration Services
Adding a remote server
Overview
Adding the remote server to the interfaces file
Creating server entries in system tables
Adding an alternate login and password
Verifying connectivity
Join between two remote tables
Adding the remote servers to the interfaces file
Defining the remote servers
Mapping the remote tables to Adaptive Server
Performing the join
Troubleshooting
Problems accessing Component Integration Services
Problems using Component Integration Services
Unable to access remote server
Requested server name not found
Driver call to connect two endpoints failed
Login failed
Unable to access remote object
Problem retrieving data from remote objects
Object is altered outside Component Integration Services
Index is added or dropped outside Component Integration Services
If you need help
Compression Users Guide 15.7
Data Compression Overview
Enabling Data Compression
Select Data into Compressed Tables
Administering Compressed Databases
Session-Level Data Compression
Copy, Dump, and Load Compressed Data
Limits for Database Compression
Levels of Data Compression
Row-Level Compression
Page-Level Compression
Creating Databases for Data Compression
Altering the Compression Level of a Database
Creating a Compressed Table
Disabling Compression
Altering the Compression Level of a Table or Partition
Datatypes Available for Compression
Compressed Data Storage Strategies
Compressed Columns with Large Objects
Creating a Compressed Database with LOB Datatypes
Creating Compressed Tables with LOB Datatypes
Altering Tables with Compressed LOB Datatypes
Select Data into Compressed Tables
Administering Compressed Databases
Session-Level Data Compression
Copy, Dump, and Load Compressed Data
Limits for Database Compression
Encrypted Columns Users Guide 15.7
Overview of Encryption
Creating and Managing Column Encryption Keys
Protecting Data with Column Encryption Keys
Creating column encryption keys
Key protection
Granting access to keys
Changing the key
Separating keys from data
Dropping encryption keys
Key encryption
Protecting column encryption keys with the master key
Protecting column encryption keys with the system-encryption password
Protecting column encryption key with user-specified password
Protecting column encryption keys with dual control
Using Database-Level Master and Dual Master Keys
Creating the master and dual master keys
Creating master key copies
Setting passwords for the master and dual master keys
Altering passwords and key encryption keys for master key copies
Regenerating master keys
Dropping master keys and key copies
Recovering the master key and dual master key
Starting Adaptive Server in unattended start-up mode
Configuring the unattended start-up mode
Master key start-up file
How Adaptive Server uses the master key start-up file
Securing External Passwords and Hidden Text
Service keys
Creating service keys
Dropping service keys
Modifying service keys
Changing the syb_extpasswdkey
Changing the syb_syscommkey
Using service keys with external passwords
SSL passwords
LDAP passwords
Replication Agent passwords
Using service keys with hidden text during upgrade
Considerations for service keys encrypted with the master key
Encrypting Data
Specifying encryption on new tables
Specifying encryption on select into
Encrypting data in existing tables
Creating indexes and constraints on encrypted columns
Creating domain and access rules on encrypted columns
Decrypt permission
Revoking decryption permission
Restricting decrypt permission
Assigning privileges for restricted decrypt permissions
Returning default values instead of decrypted data
Defining a decrypt default
Permissions and decrypt default
Columns with decrypt default values
Decrypt default columns and query qualifications
decrypt default and implicit grants
decrypt default and insert, update, and delete statements
Removing decrypt defaults
Length of encrypted columns
Accessing Encrypted Data
Processing encrypted columns
Permissions for decryption
Dropping encryption
Protecting Data Privacy from the Administrator
Role of the key custodian
Users, roles, and data access
Key protection using user-specified passwords
Changing a keyās protection method
Creating key copies
Changing passwords on key copies
Accessing encrypted data with user password
Application transparency using login passwords on key copies
Login password change and key copies
Dropping a key copy
Recovering Keys from Lost Passwords
Loss of password on key copy
Loss of login password
Loss of password on base key
Key recovery commands
Changing ownership of encryption keys
Auditing Encrypted Columns
Auditing options
Audit values
Event names and numbers
Masking passwords in command text auditing
Auditing actions of the key custodian
Performance Considerations
Indexes on encrypted columns
Sort orders and encrypted columns
Joins on encrypted columns
Search arguments and encrypted columns
Movement of encrypted data as cipher text
In-Memory Database Users Guide 15.7
In-Memory Databases
Cache and buffer support
Durability levels
Temporary databases and in-memory temporary databases
Multidatabase transactions and database types
Template databases
Altering the database to use a new template
Minimally logged commands
Limits for in-memory and relaxed-durability databases
Changed system procedures
Managing In-Memory and Relaxed-Durability Databases
Specifying named caches for in-memory databases
Verifying changes to the configuration file
Changing static configuration parameters for in-memory databases
Creating in-memory devices
Creating in-memory databases
Creating disk-resident databases with relaxed durability
Administering in-memory databases
Resizing in-memory storage caches
Deleting in-memory storage caches
Increasing the size of in-memory databases
Dumping and loading in-memory databases
Configuring number of backup connections
Dropping in-memory databases
Dropping in-memory devices
Minimally Logged DML
Types of DML logging settings
Database-level logging
Table-level logging
Session-level logging
Additional minimal logging rules
Transactional semantics
Logging concurrent transactions
Minimal logging with ddl in tran set to true
Effect of referential integrity constraints
Multistatement transactions in minimally logged mode
Stored procedures and minimally logged DML
Including set dml_logging in a trigger
Using deferred updates
Obtaining diagnostic information
Performance and Tuning for In-Memory Databases
Configuring in-memory storage cache
Cache layout
sp_sysmon output for in-memory databases
Monitoring the default data cache performance
Organizing physical data for in-memory devices
Performance optimization for low-durability databases
Tuning checkpoint intervals
Minimally logged DML
Dumping and loading in-memory databases
Tuning for spinlock contention and network connections
Improving contention for lock manager hashtable spinlock ratios
Determining the number of network connections
Java in Adaptive Server Enterprise 15.7
An Introduction to Java in the Database
Advantages of Java in the database
Capabilities of Java in the database
Invoking Java methods in the database
Storing Java classes as datatypes
Storing and querying XML in the database
Java components
Functional changes in Adaptive Server 15.0.3 and later
Changes in class distribution
The PCA/JVM runs in headless mode
Changes in memory management
Changes in ClassLoader behavior
Standards
Java in the database: questions and answers
What are the key features?
How are Java instructions stored in the database?
How is Java executed in the database?
Which Java Virtual Machines (JVMs) are supported?
What is headless mode?
What about JDBC?
How can Java and SQL be used together?
What is the Java API?
Which Java classes are supported in the Java API?
Can user-defined classes be installed in the database?
Can data be accessed using Java?
Can the same classes be used on the client and the server?
How to use Java classes in SQL
Where can information about Java in the database be found?
What you cannot do with Java in the database
Managing the Java Environment
Components of the Java environment
The JVM pluggable component
Pluggable component adapter JVM (PCA/JVM)
Pluggable component interface (PCI) and the PCI Bridge
The PCI memory pool
The sybpcidb database
How configuration values are organized in sybpcidb
When to change configuration values
Server-level options
Configuration options for the PCI Bridge
Configuration options for the PCA/JVM
Changing configuration values in a running server
Changing configuration values by restarting Adaptive Server
Changing configuration values before the JVM is initialized
Changing configuration values after the JVM is initialized
Restoring default configuration values to sybpcidb
Using monitor tables to display information about the PCI Bridge
Preparing for and Maintaining Java in the Database
The Java runtime environment
Java classes in the database
Sybase runtime Java classes
User-defined Java classes
JDBC drivers
The JVM
Enabling Java
Installing Java classes in the database
Using installjava
Installing uncompressed JARs
Retaining the JAR file
Updating installed classes
Referencing other Java-SQL classes
Viewing information about installed classes and JARs
Downloading installed classes and JARs
Removing classes and JARs
Retaining classes
Using Java Classes in SQL
General concepts
Java considerations
Java-SQL names
Using Java classes as datatypes
Creating and altering tables with Java-SQL columns
Altering partitioned tables
Selecting, inserting, updating, and deleting Java objects
Invoking Java methods in SQL
Sample methods
Exceptions in Java-SQL methods
Representing Java instances
Assignment properties of Java-SQL data items
Datatype mapping between Java and SQL fields
Character sets for data and identifiers
Subtypes in Java-SQL data
Widening conversions
Narrowing conversions
Runtime versus compile-time datatypes
Treatment of nulls in Java-SQL data
References to fields and methods of null instances
Null values as arguments to Java-SQL methods
Null values when using the SQL convert function
Java-SQL string data
Zero-length strings
Type and void methods
Java void instance methods
Java void static methods
Equality and ordering operations
Evaluation order and Java method calls
Columns
Variables and parameters
Deterministic Java functions in expressions
Static variables in Java-SQL classes
Changes for static variables for Adaptive Server 15.0.3 and later
Changes for static variables for the Cluster Edition
Java classes in multiple databases
Scope
Cross-database references
Inter-class transfers
Passing inter-class arguments
Temporary and work databases
Java classes
Data Access Using JDBC
Overview
JDBC concepts and terminology
Differences between client- and server-side JDBC
Permissions
Using JDBC to access data
Overview of the JDBCExamples class
The main( ) and serverMain( ) methods
Using main( )
Using serverMain( )
Obtaining a JDBC connection: the Connecter( ) method
Routing the action to other methods: the doAction( ) method
Executing imperative SQL operations: the doSQL( ) method
Executing an update statement: the updater( ) method
Executing a select statement: the selecter( ) method
Calling a SQL stored procedure: the caller( ) method
Error handling in the native JDBC driver
The JDBCExamples class
The main( ) method
The serverMain( ) method
The connecter( ) method
The doAction( ) method
The doSQL( ) method
The updater( ) method
The selecter( ) method
The caller( ) method
SQLJ Functions and Stored Procedures
Overview
Compliance with SQLJ Part 1 specifications
General issues
Security and permissions
SQLJ Examples
Invoking Java methods in Adaptive Server
Using Sybase Central to manage SQLJ functions and procedures
SQLJ user-defined functions
Handling null argument values
Handling nulls when creating the function
Handling nulls in the function call
Deleting a SQLJ function name
SQLJ stored procedures
Modifying SQL data
Using input and output parameters
Returning result sets
Deleting a SQLJ stored procedure name
Viewing information about SQLJ functions and procedures
Advanced topics
Mapping Java and SQL datatypes
Using the command main method
SQLJ and Sybase implementation: a comparison
SQLJExamples class
Debugging Java in the Database
Supported Java debuggers
Setting up Java debugging
Configuring the server to support debugging
Attaching the remote debugger to the JVM debug agent
File and Network Access Using Java
File access using java.io
User identity and permissions
Specifying directories for file I/O: UNIX platforms
Mask syntax
Examples
Specifying directories for file I/O: Windows platforms
Mask syntax
Examples
File I/O changes
Rules for opening existing files
UNIX platforms
Windows platforms
Rules for creating files with a file open operation
Final file check
File access using java.net
Examples
Using socket classes
Using the URL classes
Additional Topics
JDK requirement for Java classes in the server
Assignments
Assignment rules at compile-time
Assignment rules at runtime
Allowed conversions
Transferring Java-SQL objects to clients
Suggestions for improving performance
Minimize the number of calls from SQL to the JVM
Use the java.lang.Thread class with care
Determine if you are running within the PCA/JVM
Avoid SQL loops in a multi-engine environment
Controlling access to native methods in the PCA/JVM
Unsupported Java API packages, classes, and methods
Restricted Java packages, classes, and methods
Unsupported java.sql methods and interfaces
Invoking SQL from Java
Special considerations
Transact-SQL commands from Java methods
Datatype mapping between Java and SQL
Java-SQL identifiers
Java-SQL class and package names
Java-SQL column declarations
Java-SQL variable declarations
Java-SQL column references
Java-SQL member references
Java-SQL method calls
Glossary
Job Scheduler Users Guide 15.7
Overview
Introduction
Terminology and concepts
Job Scheduler components and functionality
Job Scheduler architecture
Security
js_user_role
js_admin_role
js_sa_role
Shared objects
Configuring and Running Job Scheduler
Installing Job Scheduler manually
Setting up Job Scheduler users
Setting up access to target servers
Using Templates to Create Jobs
Introduction
Installing stored procedures on a target server
Installing the templates into Job Scheduler
Using Job Scheduler templates
Backup
Statistics management
Reorganization
Reconfiguration
Template updates
Using Job Scheduler at the Command Line
Creating a job
Job state codes
Creating a schedule
Creating a scheduled job
Deleting a scheduled job
Modifying a scheduled job
Invoking stored procedures on a target server
Managing jobs
Managing job history and logs
Command Reference
Command line stored procedures
Command syntax
sp_sjobcreate
sp_sjobcmd
sp_sjobmodify
sp_sjobdrop
sp_sjobhelp
sp_sjobcontrol
sp_sjobhistory
Managing Job Scheduler in the Sybase Central ASE Plug-in
Adding a scheduled job
Adding a job
Adding a schedule
Scheduling an existing job
Viewing job history
Purging job history
Administering Job Scheduler
Showing all users
Managing a scheduled job
Editing properties
Deleting a Job Scheduler object
Troubleshooting
Logging error messages
A job fails to run at the time you scheduled it
A scheduled job created from a template fails
A job with multiple calls to sp_sjobcmd fails
A stored procedure fails
Unified Agent and Agent Management Console Users Guide 2.0.2
About this book
Overview
What is Unified Agent?
Services provided
Agent Management Console
Installing and Configuring Unified Agent and Agent Management Console
Pre-installation tasks
Installing Unified Agent
Starting the JINI server
Starting and stopping Unified Agent
Starting Unified Agent as a service on UNIX platforms
Starting Unified Agent as a service on Windows platforms
Installing the Agent Management Console
Configuring Unified Agent
Post-configuration tasks
Security
Unified Agent security
Encryption
Authentication
Login modules
Security module control flags
Authorization
Role mappings
Permissions
Agent Management Console Features and Functionality
Managing look-up services
Creating a network lookup profile
Discovering Unified Agents
Deleting a network look-up profile
Changing a network look-up profile
Specifying a network plug-in name filter
Managing Unified Agents
Manually adding an agent
Connecting to an agent
Adding credentials
Disconnecting from an agent
Restarting an agent
Retrieving the agent log
Viewing and changing agent properties
Managing discovery adaptors
Creating a discovery adaptor
Deleting a discovery adaptor
Viewing and changing discovery adaptor properties
Setting discovery adaptor password
Managing security modules
Creating a security module
Deleting a security module
Ordering the security module authentication
Viewing and changing security module properties
Setting a security module password
Managing role mappings
Creating a role mapping
Managing agent services
Starting an agent service
Restarting an agent service
Stopping an agent service
Viewing agent service properties
Managing agent plug-ins
Loading an agent plug-in
Unloading an agent plug-in
Reloading an agent plug-in
Viewing agent plug-in properties
Server-based plug-ins
Pinging the server
Starting the server
Restarting the server
Stopping the server
Retrieving the server log
Managing attributes
Viewing attributes
Updating attribute values
Viewing properties and changing permissions
Managing operations
Viewing operations
Password Encryption and Security Configuration
Password encryption utility
Enabling Rivest-Shamir-Adleman (RSA) encryption
Adaptive Server agent plug-in server password encryption
Pluggable Authentication Module (PAM) configuration
SNMP Agent Plug-in
Overview
Terminology
Sybase Adaptive Server MIB
Unified Agent SNMP services and plug-ins
UAF SNMP Service
UAF SNMP Service MIBs
Adaptive Server-to-SNMP client architecture
Security
Security for connections from Adaptive Server
Security for connections from SNMP
Configuring Adaptive Server for the SNMP Agent Plug-in
TDS services
UAF SNMP Agent Service
Adaptive Server runtime
Using the Adaptive Server SNMP Agent Plug-in
Viewing the SNMP information from NET-SNMP
Sybase MIB
Tabular Data Stream (TDS) Service
What is TDS?
Using the TDS service
UAF services
uaf_list_service_operations
uaf_list_services
uaf_list_service_operation_arguments
uaf_invoke_service_operation
uaf_list_service_attributes
uaf_get_service_attribute
uaf_set_service_attribute
UAF plug-ins
uaf_list_plugins
uaf_list_plugin_operations
uaf_list_plugin_operation_arguments
uaf_invoke_plugin_operation
uaf_list_plugin_attributes
uaf_get_plugin_attribute
uaf_set_plugin_attribute
TDS listener client examples
Setting up examples for the Adaptive Server client
Examples for configuring the Adaptive Server client
Examples for using the Adaptive Server client
Examples for configuring the Adaptive Server client
Reporting functionality and error recovery
Using Backup Server with IBM Tivoli Storage Manager 15.7
Creating Backups Using the IBM Tivoli Storage Manager
Installing and setting up the backup system
Installing the backup system
Configuring TSM to allow different source and target machines
Configuring TSM data compression
TSM concepts and Backup Server
Logical structures on TSM
Object naming and data organization
Backing up databases and transactions
Using dump and load with the same and different databases
Using dump and load when the source and target Adaptive Servers are different
Using dump and load with multiple stripes
Listing a serverās backup objects
Deleting backup objects from TSM
Using Sybase Failover in a High Availability System 15.7
Failover and Failback
What is failover?
Client connections during fail over
User logins in failover
What is failback?
Performing failback
Cluster locks in a high availability node
What is High Availability?
Differences between active-active and active-passive
Requirements for failover
Resource requirements
How does Sybase Failover work with high availability?
Single-system presentation
Special considerations for Sybase Failover
Installing the monitoring table scripts
Using disk mirroring
Running the installhasvss script
Creating a SYB_HACMP server entry
Defining user-defined datatypes
Adaptive Server and two-phase commit transactions
Asymmetric and Symmetric Configurations
Asymmetric and symmetric configuration
Configuring the asymmetric companion
Performance of Adaptive Server in an asymmetric configuration
Configuring the symmetric companion
Performance of Adaptive Server in a symmetric configuration
Auditing in a high availability system
Setting auditing options
sybsecurity and Sybase Failover
Audit trails and Sybase Failover
Modes of Failover
What are modes?
Different modes of a companion server
Determining the companionās mode
Domains
Proxy Databases, User Databases, and Proxy System Tables
Proxy databases
Creating proxy databases
When are proxy databases created?
Size of the proxy databases
Commands and system procedures in proxy databases
Changes to commands in proxy databases
Changes to system procedures in proxy databases
Issuing user-defined stored procedures in proxy databases
Manually updating the proxy databases
Proxy system tables in master
Running do_advisory
What is the do_advisory option?
Running the do_advisory option
Quorum attributes
Configuring Adaptive Server for Failover on HP
Hardware and operating system requirements
Preparing Adaptive Server for high availability
Installing Adaptive Servers
Adding entries for both Adaptive Servers to the interfaces file
Adding entries to interfaces file for client connections
Setting the value of $SYBASE
Configuring sybha executable
Creating a new default device other than master
Adding the local server to sysservers
Adding the secondary companion to sysservers
Running installhasvss
Assigning ha_role to system administrator
Verifying configuration parameters
Configuring HP for failover
Creating the package configuration
Editing the ASE_HA.sh script
Creating the package control script
Verifying and distributing the configuration
Starting the primary and secondary companions
Configuring companion servers for failover
Running sp_companion with do_advisory option
Creating an asymmetric companion configuration
Creating the symmetric configuration
Administering Sybase Failover
Failing back to the primary companion and resuming normal companion mode
Suspending companion mode
Resuming normal companion mode from suspended mode
Dropping companion mode
Troubleshooting Sybase Failover on HP
Error message 18750
Recovering from a failed prepare_failback
Location of error logs
Upgrading Adaptive Server
Configuring Adaptive Server for Failover on IBM AIX HACMP
Hardware and operating system requirements
Requirements for running Failover on IBM AIX HACMP
Special considerations for running Adaptive Server on HACMP for AIX
Preparing Adaptive Server to work with high availability
Installing Adaptive Servers
Adding entries for both Adaptive Servers to the interfaces file
Adding entries to the interfaces file for client connections
Setting the value of $SYBASE
sybha executable
Verifying configuration parameters
Adding thresholds to the master log
Creating a new default device other than master
Adding a local server to sysservers
Adding a secondary companion to sysservers
Running installhasvss script
Assigning ha_role to System Administrator
Configuring the IBM AIX subsystem for Sybase Failover
Modifying the ASE_HA.sh script
Configuring resource groups in HACMP
Configuring companion servers for failover
Running sp_companion with do_advisory option
Creating an asymmetric companion configuration
Creating the symmetric configuration
Starting the primary companion as a monitored resource
Administering Sybase Failover
Failing back to the primary node
Failing back manually
Suspending companion mode
Restarting companion during suspended mode
Resuming normal companion mode
Resuming normal companion mode from suspended mode
Resuming normal companion mode from failover mode
Dropping companion mode
Troubleshooting fail over for HACMP for AIX
Error message 18750
Recovering from a failed prepare_failback
Location of error logs
Upgrading Adaptive Server
Active-Active Configuration for Sun Cluster 3.0 and 3.1
Hardware and operating system requirements
Active-active setup in Sun Cluster
Preparing Adaptive Server for active-active setup
Installing Adaptive Servers
Adding entries for both Adaptive Servers to the interfaces file
The value of $SYBASE is the same for both companions
Executing sybha
Creating new default devices
Adding the local server to sysservers
Adding secondary companion to sysservers
Assigning the ha_role to System Administrator
Running installhasvss script
Verifying configuration parameters
Adding thresholds to the master log
Adding user and login for fault monitor
Configuring the Sun Cluster subsystem
Using the syscadm script
Sample sysc_input_file
Adaptive Server resource extension properties
Configuring Adaptive Server resource groups
Using SUNW.HAStoragePlus
Configuring companion servers for failover
High availability services library within Adaptive Server
Running sp_companion with do_advisory
Before initiating sp_companion
Creating an asymmetric companion configuration
Setting up a symmetric configuration
Administering Sybase Failover
Failing back to the primary companion
Suspending normal companion mode
Resuming normal companion mode
Dropping companion mode
Verifying high availability on Sun Cluster
Configuring the resource groups manually
Primary companion resource group
Secondary companion resource group
Upgrading Adaptive Server
Troubleshooting
Recovering from a failed prepare_failback
Recovering from a secondary failover on the secondary companion
Preventing the failover of secondary companion
Changing resource and resource group state
Location of the error logs
Active-Passive Configuration for Sun Cluster 3.0 and 3.1
Hardware and operating system requirements
Active-passive setup in Sun Cluster
Failing back in an active-passive configuration
Clients in an active-passive configuration
Preparing Adaptive Server for active-passive setup
Installing Adaptive Server
Passing environment to Adaptive Server
Running the SySam license manager in the cluster
Adding an entry for Adaptive Server to the interfaces file
Configuring the interfaces file on the server side
Configuring the interfaces file on the client side
Verifying configuration parameters
Adding thresholds to the master log
Adding user and login for fault monitor
Configuring the Sun Cluster subsystem
Using the syscadm script
Sample sysc_input_file
Configuring the Adaptive Server resource group
Using SUNW.HAStoragePlus
Verifying the active-passive configuration
Configuring the resource group manually
Upgrading Adaptive Server
Location of the error logs
Configuring Adaptive Server for Failover on Veritas 5.0 and later
Hardware and operating system requirements
Preparing Adaptive Server to work with high availability
Installing Adaptive Servers
Adding entries for both Adaptive Servers to the interfaces file
Adding entries to the interfaces file for client connections during fail over
sybha executable
Creating a new default device
Adding the local server to sysservers
Adding secondary companion to sysservers
Assigning ha_role
Installing high availability stored procedures
Verifying configuration parameters
Adding thresholds to the master log
Configuring the Veritas subsystem for Sybase Failover
Installing the HAase agent
Creating an Adaptive Server login file
Importing the HAase resource type
Starting the HAase agent
Adding the HAase resource
Configuring an instance of the HAase resource for each service group
Configuring companion servers for failover
Adding user and login for high availability monitor
Running sp_companion with do_advisory option
Verifying the high availability agent
Creating an asymmetric companion configuration
Configuring for symmetric configuration
Administering Sybase Failover
During failover
Failing back to the primary companion
Suspending normal companion mode
Resuming normal companion mode
Dropping companion mode
Upgrading from an agent of resource type Sybase
Upgrading Adaptive Server
Troubleshooting failover for Veritas Cluster
Recovering from a failed prepare_failback
Location of the logs
Configuring Adaptive Server for Failover on Windows
Hardware and operating system requirements
Installing Adaptive Servers
Changing the domain administration account
Adding entries for both Adaptive Servers to sql.ini
Adding entries to sql.ini for client connections
Creating a new default device other than master
Adding the primary companion as a local server
Adding secondary companion to sysservers
Assigning ha_role to the System Administrator
Running insthasv to install high availability stored procedures
Verifying configuration parameters
Running sp_companion with do_advisory option
Configuring Windows
Asymmetric setup from the command line
Symmetric configuration from the command line
Configuring Sybase companion servers using the Windows management tools
Configuring and securing Microsoft Cluster Server
Securing the MSCS cluster
Troubleshooting
Error message 18750
Recovering from a failed prepare_failback
Upgrading Adaptive Server
Open Client Functionality in a Failover Configuration
CTLIB application changes
Troubleshooting Secondary Points of Failure
Troubleshooting with dbcc ha_admin
Reinstalling installmaster
Rerunning installhasvss
Using dbcc ha_admin for rolling back failover commands
Using @@hacmpservername
Error messages
Changes to Commands, System Procedures, and Databases
Changes to commands
Changes to system procedures
System procedures hold table lock
System procedures that synchronize changes
Other changes to system procedures
dbcc options for high availability systems
dbcc dbrepair option
Glossary
Web Services Users Guide 15.7 ESD #2
Understanding Adaptive Server Enterprise Web Services
Overview
Adaptive Server Enterprise Web Services
Advantages of ASE Web Services
Stored procedures and functions
SQL
Security
LDAP
User-defined Web services
Web services standards
XML
Example
XML document structure
WSDL
SOAP
SOAP message structure
Understanding the ASE Web Services Engine
Producer of Web services
Producer components
Producer Web methods
User-defined Web services
Consumer of Web services
Consumer components
SDS server
SOAP stack
Proxy tables
Web Services engine as a consumer versus producer
Installing and Configuring ASE Web Services
Installing Web Services
Configuring Web Services
Configuring during installation
Configuring after installation
Licensing
Configuration files
Security
Configuring SSL
Installing a certificate for Microsoft .NET
Using ASE Web Services
Using the ASE Web Services Engine
Starting and stopping the ASE Web Services Engine
Conditions
Verification
ASE Web Services methods
execute
login
logout
Using sp_webservices
add
help
list
modify
remove
Invoking a Web service
Using user-defined Web services
Commands for user-defined Web services
create service
drop service
Using sp_webservices with user-defined Web services
addalias
deploy
dropalias
listudws
listalias
undeploy
Security for user-defined Web services
Auditing for user-defined Web services
Auditing sp_webservices ādeployā
Auditing sp_webservices āundeployā
ASE Web Services logging
Rolling over log files
Using Sybase Central
Sample Applications
Apache sample client
Creating the sample client
Using runexecute
Microsoft .NET sample client
Creating the sample client
Using Execute.exe
Troubleshooting
Troubleshooting issues
Remote server class definition setting
Unmapped RPC/encoded Web method
Truncated document/literal results
Starting ASE Web Services Engine
Locating WSDL
Specifying entries in ws.properties
Windows NT command-line arguments
Run or stop scripts fail
Null passwords
Specifying SOAP endpoints with SSL
Abnormal termination of sp_webservices āaddā
Web Services proxy table restrictions
sysattributes table entry
Diagnostic tools
Detailed logging
Enabling JDBC-level tracing
Messages
Installation Contents
ASE Web Services directory tree
Configuration Properties
ws.properties
myres.properties
Specifying properties file entries
SOAP and Adaptive Server Enterprise Datatype Mapping
Datatype mapping
SOAP-to-ASE datatype mappings
ASE-to-SOAP datatype mappings for the create service command
Glossary
XA Interface Integration Guide for CICS, Encina, and TUXEDO 15.7
The Sybase XA Environment
Definitions
Overview of the X/Open DTP model
Components of the model
How the components communicate
How the components interact
Recovery
The Sybase XA environment
Components of the Sybase XA environment
Connections in the Sybase XA environment
Identifying connections via LRMs
Where is the connection information stored?
Establishing connections
Distributing work across LRMs
Configuring the XA Environment
Configuring Adaptive Server
Open string parameters for the DTM XA Interface
Open string parameters
dtm_tm_role required for username
Log file and trace flag parameters
Labels for logfile entries
xa_open() function behavior
XA configuration file for DTM XA Interface
Environment variable for specifying the configuration file
[all] section for defining common LRM parameters
Parameter definitions for [all] section
Editing the XA configuration file
Additional capabilities, properties, and options
Using the DTM XA Interface with CICS
Building the switch-load file
Compiling the switch-load file on IBM RISC System/6000 AIX
Compiling the switch-load file on HP9000 Series 800 HP-UX
Compiling the switch-load file on Sun Solaris 2.x (SPARC)
Adding a Sybase stanza to the CICS region XAD definition
Using the DTM XA Interface with Encina
Assigning an open string with monadmin create rm
Initializing LRMs with mon_RegisterRmi
Linking applications with DTM XA Interface libraries
Establishing connections
Using the DTM XA Interface with TUXEDO
Linking
Setting up the UBBCONFIG file
Creating the TUXEDO configuration file
Building the TMS
Building the COBOL runtime environment
Application Programming Guidelines
X/Open DTP versus traditional Sybase transaction processing
Managing transactions and connections
Managing transactions
Managing connections
The current connection
Nontransactional connections
Deallocating cursor function with Client-Library
Dynamic SQL
Obtaining a Client-Library connection handle
Multiple-thread environment issues
Caveats of thread use
Embedded SQL thread-safe code
Tightly coupled transactions
Linking with CT Library
Sample embedded SQL COBOL fragment
Sample embedded SQL C fragment
XML Services 15.7
Introduction to XML Services
XML capabilities
Overview
XML in the database
A sample XML document
HTML display of Order data
XML document types
XML Query Functions
XML query functions
Example sections
xmlextract
xmltest
xmlparse
xmlrepresentation
xmlvalidate
option_strings: general format
Option values for query functions.
XML Language and XML Query Language
Character set support
URI support
Namespace support
XML schema support
Predefined entities in XML documents
Predefined entities in XPath queries
White space
Empty elements
XML Query Language
XPath-supported syntax and tokens
XPath operators
XPath basic operators
XPath set operators
XPath comparison operators
XPath functions
General guidelines and examples
Functions
Parenthesized expressions
Parentheses and subscripts
Parentheses and unions
for xml Mapping Function
for xml clause
for xml subqueries
for xml schema and for xml all
XML Mappings
SQLX options
SQLX option definitions
SQLX data mapping
Mapping duplicate column names and unnamed columns
Mapping SQL names to XML names
Mapping SQL values to XML values
Numeric values
Character values
Binary values
XML Support for I18N
Overview
Unicode datatypes
Surrogate pairs
Numeric character representation
Client-server conversions
Character sets and XML data
I18N in for xml
Option strings
Numeric Character Representation in for xml
header option
Exceptions
Examples
Example 1
Example 2
Example 3
Example 4
Example 5
Example 6
Example 7
I18N in xmlparse
Options
Sort ordering in xmlparse
I18N in xmlextract
NCR option
Sort ordering in xmlextract
Sort ordering in XML Services
I18n in xmlvalidate
NCR option
xmltable()
Introduction
xmltable and derived table syntax
xmltable
The sample_docs Example Table
sample_docs table columns and rows
Sample_docs table columns
sample_docs table rows
sample_docs tables
Table script (for publishers table)
Publishers table representation
Titles table representation
XML Services and External File System Access
Getting Started
Enabling XML services and External File System Access
Character set conversions with external file systems
Examples
Setting up your XML documents and creating the proxy table
Example: extracting the book title from the XML documents
Example: importing XML documents or XML query results to an Adaptive Server table
Example: storing parsed XML documents in the file system
Example: 'xmlerror' option capabilities with External File Access
Example: specifying the 'xmlerror=messageā option in xmlextract
Example: parsing XML and non-XML documents with the 'xmlerror=message' option
Example: using the option 'xmlerror=null' for non-XML documents
Migrating Between the Java-based XQL Processor and the Native XML Processor
Introduction
Migrating documents and queries
Migrating documents between the Java-based XQL processor and the native XML processor
Migrating text documents between the Java-based XQL processor and the native XML processor
Migrating documents from regenerated copies
Regenerating text documents from the Java-based XQL processor
Regenerating text documents from the native XML processor
Migrating queries between the native XML processor and the Java-based XQL processor
Sample Application for xmltable()
Sample table
Using the depts document
The depts document structure
Creating SQL tables from the depts document
Normalizing the data from the depts document
Generating tables using select
New Features Summary Adaptive Server Enterprise 15.7 SP100
Version 15.7 SP100
Adaptive Server 15.7 SP100 Feature and Platform Matrix
Shrinking Databases
Enhancements to Backup and Restore
Aggregating Metrics from Syntactically Similar Queries
Updates to Precomputed Result Sets
Improved Data Load Performance
Incremental Reorganization
Creating Indexes Without Blocking Access to Data
Query Plan and Execution Statistics in HTML
Gathering Hash-Based Statistics with create index
Query Plan Optimization with Bloom Filters
Support for Replication by Column Value
Support for Multiple Scanner Threads
Sybase Central Adaptive Server Plug-in
Running Adaptive Server on VMware vSphere
Support for OData
Support for NTLM and MIT Kerberos on Windows 64-bit
Properties Added to Responses File
Automatic Physical Database Rearrangement
System Changes for Adaptive Server Version 15.7 SP100
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Permission Changes for Commands and Functions
Version 15.7 ESD #4
15.7 ESD #4.2
Improved Rollback Reporting
15.7 ESD #4
Remote Backup Server Maximum Name Length
Support for Query Plan Pinning
AF_UNIX Support
Changes to sp_addthreshold and Roles
System Changes for Adaptive Server Version 15.7 ESD #4
Utilities
Configuration Parameters
Version 15.7 ESD #3
sybrestore Utility
System Changes for Adaptive Server Version 15.7 ESD #3
Commands
Functions
System Stored Procedures
Monitoring Table Changes
Version 15.7 ESD #2
Granular Permissions
Predicated Privileges
Deferred Table Creation
Online Utilities
Merging and Splitting Partitions
Maximum Size of Query in the Statement Cache
Enhancements to show_cached_plan_in_xml
Fast-Logged Bulk Copy
Precomputed Result Sets
Concurrent dump database and dump transaction Commands
Hash-Based Update Statistics
Enhancements to dump and load
alter table drop column without datacopy
Expanded Maximum Database Size
User-Defined Optimization Goal
Shared Query Plans
Initializing Databases Asynchronously
In-Row Large Object Compression
Configuring Shared Memory Dumps
System Changes for Adaptive Server Version 15.7 ESD #2
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Version 15.7 ESD #1
Proxy Table Support for In-row LOB Columns
Support for System Procedures in Replicated Master Database
Increased Number of Parameters
Multiple Listeners on Windows
Windows Supports Adaptive Server High Availability
New and Changed Configuration Parameters
Version 15.7
Application Functionality Configuration Group
New Adaptive Server Kernel
Compressing Data in Adaptive Server
New Security Features
End-to-End CIS Kerberos Authentication
Dual Control of Encryption Keys and Unattended Startup
Securing Logins, Roles, and Password Management Extensions
Login Profiles
Employee Lifecycle Management
External Passwords and Hidden Text
Abstract Plans in Cached Statements
Shrink Log Space
Displaying Currently Set Switches with sysoptions
Changes for Large Objects
In-Row Off-Row LOB
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Using LOB Locators in Transact-SQL Statements
Extension to where Clause for Large Objects
Showing Cached Plans in XML
Padding a Character Field Using str
Changes to select for update
Creating Nonmaterialized, Non-null Columns
Sharing Inline Defaults
Retain Monitoring Data
Analyze Dynamic Parameters
Monitor Lock Timeouts
Truncate Trailing Zeros
Fully Recoverable DDL
Transfer Rows from Source to Target Table Using merge
View Statistics and Histograms with sp_showoptstats
Changes to Cursors
Release Cursor Locks at Cursor Close
Enhanced Transaction Support for Cursors
Monitor Cursor Statements
Nested select Statement Enhancements
Changes to Commands and System Procedures in Chained Transaction
Expanded Variable-Length Rows
Changes to like Pattern Matching
Changes to Quoted Identifiers
Allowing Unicode Noncharacters
Reduce Query Processing Latency
The sybdiag Utility
The Optimizer Diagnostic Utility
System Changes for Adaptive Server Version 15.7
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
New Monitoring Tables
Changes to Monitoring Tables
Global Variables
Version 15.5 Cluster Edition
Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
Multiple simultaneous failover
Adding space to an archive database
Distributed transaction management in the shared-disk cluster
System Changes for Adaptive Server Version 15.5 Cluster Edition
Changed commands
Monitoring Tables
Configuration Parameters
Functions
Version 15.5
Adaptive Server 15.5 Feature and Platform Matrix
In-Memory and Relaxed-Durability Databases
Faster Compression for Backups
Backup Server Support for the IBMĀ® TivoliĀ® Storage Manager
Deferred Name Resolution for User-Defined Stored Procedures
FIPS 140-2 Login Password Encryption
Incremental Data Transfer
bigdatetime and bigtime Datatypes
Creating and Managing tempdb Groups
System Changes for Adaptive Server Version 15.5
Datatypes
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Utilities
Auditing
Version 15.0.3
SQL Statement Replication
Security Enhancements
LDAPS User Authentication Enhancement
Automatic LDAP User Authentication and Failback
Login Mapping of External Authentication
Using SSL to Specify a Common Name
Concurrent Kerberos Authentication
Virtually Hashed Tables
Huge Pages
Upgrading During a High Availability Configuration
Reinstalling System Stored Procedures
Distributed Transaction Management (DTM)
Adaptive Server Plug-in Updates
The Java Interface
System Changes for Adaptive Server Version 15.0.3
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Version 15.0.2
Encrypted Columns
Archive Database Access
Finding Slow-Running Queries
Deferred Compilation
Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Statistical Aggregate Functions
Standard Deviation and Variance
Eager and Lazy Aggregation
Vector and Scalar Aggregation
Improved Performance for Data Insertion
Using Asynchronous Writes During a Page Split
Improving Throughput of tempdb Transactions
Post-commit Optimization
Changes to the Query Processor
Deferred Compilation
Non-binary Character Set Histogram Interpolation
Expression Histogramming Selectivity Estimates
Viewing Current Optimizer Settings
New Security Features
PAM Support in 64-bit Adaptive Server on AIX
Global Login Triggers Set Automatically
SSL Support
Improved Password Security
Auditing Enhancements
Hiding System Stored Procedure and Command Password Parameters
Monitoring Failed Login Attempts
High Availability Considerations
Installing and Editing Monitoring Tables
Monitoring Tables for the Statement Cache
Row-Level Locking for System Tables
The xmltable() Function
Relocated Joins
User-Defined SQL Functions
instead of Triggers
System Changes for Adaptive Server Version 15.0.2
Trace Flags
Commands
Changes to the set Command
Utilities
System Stored Procedures
System Tables
Configuration Parameters
Functions
Global Variables
Version 15.0.1
Changes to Abstract Plans
New Query-Level Settings
Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
Extending the Optimizer Criteria Set Syntax
Literal Parameterization
System Changes for Adaptive Server Version 15.0.1
Functions
Configuration Parameters
Commands
Monitoring Tables
Version 15.0
Partition Support
Row-Locked System Catalogs
Query Processor
Large Identifiers
Computed Columns
Differences Between Computed Columns and Function-Based Indexes
Differences Between Materialized and Not Materialized Computed Columns
Scrollable Cursors
unitext Datatype Support
big int Datatype Support
Unsigned Integer Datatype Support
Integer Identity
Enhancements to XML Services
Adaptive Server Plug-in Enhancements
Interactive SQL
User-Defined Web Services
Very Large Storage Support
Automatic Running of update statistics
SySAM License Management
Query Processing Metrics (qp Metrics)
Updates to Abstract Plans
showplan Changes
Secure Socket Layer Uses FIPS 140-2
System Changes for Adaptive Server Version 15.0
Utilities
Reserved Words
Global Variables
Configuration Parameters
Functions
Commands
System Stored Procedures
System Tables
Monitoring Tables
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
New Features Guide Adaptive Server Enterprise 15.7 SP100
Change in Release Version Number
Shrinking Databases
Shrinking a Database
How Adaptive Server Shrinks the Database
Shrink Operations on Databases That Contain Text or Image Data
Restarting Partially Completed Shrink Operations
Moving Data Before Shrinking the Database
Restrictions for Moving the Transaction Log
Locks Held During Data Movement
Determine the Status of a Shrink Operation
Upgrading or Downgrading Shrunken Databases
Restrictions
Enhancements to Backup and Restore
Cumulative Dump
Dump and Load Sequences
Partially Logged Operations and Cumulative Dumps
Restrictions
System Changes Supporting Cumulative Dumps
Changes to load database
Apply Source Database Attributes to the Target Database
Generate SQL for a Different Target Database
Restore Databases in Tivoli Storage Manager to Different Target Databases
The sybdumptran Utility
Aggregating Metrics from Syntactically Similar Queries
Updates to Precomputed Result Sets
Improved Data Load Performance
Enable Data Load Optimization
Tables with Indexes
Viewing Queries with bulkInsertRowCount
Batch Insert Optimization
Restrictions
Incremental Reorganization
Running reorg defrag
Checking the Reorganization Status
Clearing reorg defrag Information from sysattributes
Logging Behavior
Restrictions
Creating Indexes Without Blocking Access to Data
Query Plan and Execution Statistics in HTML
set statistics Command Options
Query Plan Tree Structure
Query Timings
Thread Usage
CPU Usage
Wait Distribution
Query Text
Query Detail
Parallel Query Plan Fragments
Writing HTML to an External File
Gathering Hash-Based Statistics with create index
Query Plan Optimization with Bloom Filters
Example of showplan Output for Bloom Filters
Example of Lava Operator Tree for Bloom Filters
Disabling Bloom Filters
Adaptive Server Support for Multiple Scanner Threads
Adaptive Server Support for Replication by Column Value
Sybase Central Adaptive Server Plug-in
Running Adaptive Server on VMware vSphere 5.0
Configure the BIOS Settings
Configure the Guest Operating System
CPU Considerations
Recommendations for Virtual CPUs
CPU Scheduling
Memory Considerations
Resource Management
Hardware-Assisted Memory Virtualization
Linux Huge Pages
Networking
Storage
Automatic Physical Database Rearrangement on Load
Support for OData
OData Server Architecture
OData Server Limitations
Unsupported OData Protocol Features
Security Considerations for OData Server
Configuring OData Server
Setting Up an HTTP Server for OData
Create an OData Producer Service Model
OData Server Sample Files
Starting and Stopping OData Server
MIT Kerberos and NTLM Security Services
Using NT Lan Manager Security Services on Windows 64-bit
Using MIT Kerberos Security Services on Windows 64-bit
Solaris Asynchronous I/O Performance
Properties Added to Responses File
System Changes
New Functions
defrag_status
loginfo
show_condensed_text
shrinkdb_status
Changed Commands
alter database
create index
create materialized view
create precomputed result set
dbcc
dump database
load database
reorg
select
set
update statistics
Procedures
New System Procedures
sp_helpdefrag
sp_dump_info
Changed System Procedures
sp_configure
sp_config_rep_agent
sp_dboption
sp_depends
sp_dump_history
sp_extrapwdchecks
sp_helpdb
sp_helprotect
sp_listener
sp_optgoal
sp_replication_path
sp_showoptstats
sp_sjobcreate and sp_sjobmodify
Tables
New System Tables
sysdams
Changed System Tables
New Monitoring Tables
monSysExecutionTime
monRepCoordinator
monRepSchemaCache
Changed Monitoring Tables
Utilities
New Utilities
sybdumptran
Options for load transaction
Changed Utilities
Configuration Parameters
Changed Configuration Parameters
New Configuration Parameters
Permission Changes for Commands and Functions
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for HP-UX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for IBM AIX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Linux
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise 15.7 SP100 for Windows
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
In-Row LOB Column Replication
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Compressed LOB Column Replication
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server
Known Issues for Adaptive Server
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for HP-UX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for IBM AIX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Making Input/Output Completion Port API Available for Adaptive Server
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for Linux
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Raw Partitions on Linux
Choosing a Raw Partition
Examples for Creating Raw Partitions
Red Hat Raw Device Administration
SuSE Raw Device Administration
Accessing Raw Devices from the Server
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for Sun Solaris
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise 15.7 SP100 for Windows
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Preparing to Install Adaptive Server
Managing Java in the Database During Installations and Upgrades
Installing Adaptive Server
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Minimally Configuring Adaptive Server
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Postinstallation Tasks
Stopping and Starting Services
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Adding a Server to the Interfaces File
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading Adaptive Server on Windows
Testing the Adaptive Server Upgrade
Manually Upgrading to Adaptive Server
Installation of Version 15.7 SP100 over an Existing 15.x Adaptive Server
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Downgrading an Adaptive Server That Uses Encryption
Downgrade Considerations for Adaptive Server with Replicated Databases
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Configuration Guide for UNIX 15.7 ESD #2
About Adaptive Server
System-Specific Issues
System User Roles
Environment Variables
Adaptive Server Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
sybmgmtdb Database
Using Operating System Files as Database Devices
The directio Parameter
The dsync Parameter
Determine the Size of a Database Device
Support for Raw Partitions or Files
Preparation of a Raw Partition Device
Choosing a Raw Partition
Client/Server Communication
About Changing Adaptive Server Configuration
Languages Other Than US English
Adaptive Server Specifications
Database Specifications
Table Specifications
Procedure Specifications
Query Specifications
Maximum Column Sizes
Database Requirements for Varying Page Sizes
Data Limits for Tables According to Page Size
Start and Stop Servers
Start Servers
Server Start-up Parameters
RUN_server_name File
Using the startserver Command
Start Servers When the Operating System Restarts
Creating a System Restart Script for HP-UX
Creating a System Restart Script for IBM RS/6000
Creating a System Restart Script for Sun Solaris and Linux
Starting XP Server After Initial Installation
Stop Servers
Stopping Adaptive Server
Stopping Backup Server
Using the kill Command
Shutdown and Shared Memory Files
Huge Pages on Linux
Configure the Operating System
Verifying Environment Variables
Using the stty Setting
Restore Correct Permissions
File Descriptors and User Connections
File Descriptors and User Connections for HP-UX
File Descriptors and User Connections for AIX
File Descriptors and User Connections for Linux
File Descriptors and User Connections for Sun Solaris
Displaying Current Soft and Hard Limits
Increasing the Soft Limit
Increasing the Hard Limit
Enable Asynchronous Disk I/O
Enabling Asynchronous Disk I/O on Linux
Enabling Asynchronous Disk I/O on IBM AIX
Enabling Asynchronous Disk I/O HP-UX
Enabling Asynchronous I/O for File System Devices
Enabling Asynchronous I/O for File Systems
Adjust the Client Connection Timeout Period
Adjusting the Client Connection Timeout for HP-UX
Adjusting the Client Connection Timeout for IBM RS/6000
Adjusting the Client Connection Timeout for Linux
Check for Hardware Errors
Monitor the Use of Operating System Resources
Monitor Operating System Resources for HP-UX
Monitor Operating System Resources for IBM RS/6000
Monitor Operating System Resources for Sun Solaris and Linux
Check Database Integrity
Configuring New Servers with srvbuild
Adaptive Server Default Configuration
Default Settings
Set Up Communications Across the Network
How Adaptive Server Determines Which Directory Service Entry to Use
How a Client Uses Directory Services
Create a Directory Services Entry
Supported Directory Drivers
Contents of the interfaces File
interfaces File Format
Components of an interfaces File Entry
Create a Master interfaces File
Using dsedit or dscp to Create a Master interfaces File
Using a Text Editor to Create a Master interfaces File
Configure the interfaces File for Multiple Networks
Configuring the Server for Multiple Network Handlers
Configure Client Connections
Manage One Network-Independent DSQUERY Name
Using Different DSQUERY Names
Configuring for Query Port Backup
IPv6 Support
IPv6 Infrastructure
Troubleshoot
Troubleshooting when the Server Fails to Start
Troubleshooting an Error when Executing an ESP
Use the Lightweight Directory Access Protocol as a Directory Service
LDAP Directory Services Versus the Sybase Interfaces File
The libtcl*.cfg File
Enabling LDAP Directory Services
Keywords for the LDAP URL Variables
Adding a Server to the Directory Services
Multiple Directory Services
Encrypting the Password
Performance
Migrating from the interfaces File to LDAP
Localization Support
Language Modules
Default Character Sets
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Names
Load Character Sets
Language Definition Files Sort Order
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders for Character Sets
Language Modules
Installing a New Language Module
Message Languages
Localization Directories
About the locales Directory
About the charsets Directory
Format of locales.dat File Entries
How Client Applications Use locales.dat
Changing Adaptive Server Localization Configuration
Configuring Adaptive Server for Other Character Sets
Editing the locales.dat File
Changing Backup Server Localization Configuration
Adaptive Server Error Logging
Set Error Log Paths
Set the Adaptive Server Error Log Path
Manage Messages
Log User-Defined Messages
Log Auditing Events
Manage Database Devices
Device Requirements
Create Files for Database Devices
Database Management System Auditing
Audit System Devices and Databases
Install Auditing
Preinstallation Recommendations for Auditing Devices
Configuring Adaptive Server for Auditing
Creating a Device for the Audit Database Transaction Log
Enabling Auditing
Deleting a Device Entry
Changing a Device Entry
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Configuration Guide for Windows 15.7 ESD #2
About Adaptive Server
System-Specific Issues
User Roles
Environment Variables
Adaptive Server Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
Using Operating System Files as Database Devices
The dsync Parameter
The directio Parameter
Client/Server Communication
About Changing Adaptive Server Configurations
Languages Other Than US English
Adaptive Server Specifications
Database Specifications
Table Specifications
Query Specifications
Procedure Specifications
Extended-Limit Capabilities
Start and Stop Servers
Server Start-up Parameters
Specifying Additional Start-up Parameters
Starting and Stopping Servers Using Unified Agent
Start and Stop Servers Using the Control Panel
Starting Servers as an Automatic Service
Setting Up Adaptive Server as an Automatic Service
Starting, Stopping, and Pausing Servers Manually
Stopping Backup Server
Stopping Adaptive Server
Monitor Servers
Monitoring Servers with the Control Panel
Adaptive Server Configurations
Default Adaptive Server Configuration
Default Adaptive Server Parameter Settings
Default Backup and XP Server Settings
Change Adaptive Server Configurations
Starting Server Config
Configuring Adaptive Server
Setting Adaptive Server Parameters
Changing the Default Backup Server
Changing the Default XP Server
Configuring Backup Server
Configuring Job Scheduler and Self Management
Network Communications Using sql.ini
Client Connections to Adaptive Server
Determine the Address to Listen for Client Connections
Client Access to Adaptive Server
Enabling Client Access to a Server
Changing the Server Entries in sql.ini
Components in the sql.ini File
Server Name
Network Driver
Service Type
Server Address
Address Format
IP Address
Named Pipes Format
Windows Sockets Format
Increasing Windows Sockets Connections
Modifying an Existing TcpNumConnections Value
Adding a TcpNumConnections Value
Using Multiple TCP/IP Network Interface Cards
Controlling the Connection Timeout
Increasing the TcpKeepTries Value
NWLink IPX/SPX Format
Available NWLink IPX/SPX Connection Formats
Selecting Valid Connection Formats
Share Network Configuration Information
Creating a Master sql.ini File
Windows Registry as a Directory Service
Using Windows Registry as a Directory Service
Verify Server Connections
Configure ODBC Connections
Configuring the ODBC Driver
IPv6 Support
IPv6 Infrastructure
Lightweight Directory Access Protocol in Adaptive Server
LDAP Directory Services versus the Sybase Interfaces File
The libtcl.cfg File
Enabling LDAP Directory Services
Adding a Server to the Directory Services
Adding a Server Entry to the Directory Service Using dsedit
Multiple Directory Services
Encrypting the Password
Performance with LDAP
Migrating from the sql.ini File to LDAP
Localization Support
Language Modules
Default Character Sets for Servers
Changing the Default Character Set for Servers
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders
Language Modules
Installing a New Language Module
Message Languages
Localization
Localization Directories
charsets and locales Directories
Format of locales.dat File Entries
Client Application Use of locales.dat
Editing the locales.dat File
Changing Adaptive Server and Backup Server Localization Configuration
Completing Adaptive Server Localization Changes
Completing Backup Server Localization Changes
Configuring Adaptive Server for Other Character Sets
Language-Specific Sort Orders
Sybase Character Set Names
charset Utility
Log Error Messages and Events
Adaptive Server Error Logging
Windows Event Logging
Setting Up Windows Event Logging
Enable and Disable Windows Event Logging
Enabling or Disabling Event Logging Using Server Config Utility
Enabling or Disabling Event Logging Using sp_configure
Windows Event Log Information
Manage Logs
Set Error Log Paths
Setting the Adaptive Server Error Log Path
Setting the Backup Server Error Log Path
Manage Messages
Log User-Defined Messages
New Messages
Existing Messages
Log Auditing Events
Log User-Defined Events
Using a Remote Log
Central Logging Site
Log Messages from Multiple Adaptive Servers
Set Up a Local Central Logging Site
Creating a Registry key
Defining a Registry Key
View Messages
Viewing Messages in the Windows Event Log
Viewing Messages in the Adaptive Server Error Log
Security Services with Windows LAN Manager
How Login Authentication Works
Administering Security Services Using LAN Manager
Modify Configuration Files Required for a Unified Login
Set Up Drivers for Network-Based Security
Entries for Network Drivers
Entries for Directory Services
Entries for Security Drivers
Editing the libtcl.cfg File
Checking the LAN Manager's Local Name
Specifying Security Information for Adaptive Server
Identify Users and Servers to LAN Manager
Configure Adaptive Server for LAN Manager Security
Enabling and Disabling External Security Services
Manage Unified Login
Requiring Unified Login
Establishing a Secure Default Login
Map LAN Manager Login Names to Server Names
Data Integrity Check
Ensure Adequate Memory for Security Services
Add Logins to Support Unified Login
Adding Logins
Define the Connection to a Server for Security Services
Specifying the Principal Name
Specifying Network-Based User Authentication
Specifying the Name Assigned to LAN Manager
Determining the Status of Security Services
Configuration Parameters Used in Security Services
Data Integrity Check
Message Sequence Check
Detect Interception or Replay
Specify a Login
Control User Authentication
Manage Login Security on an Windows Computer
Adaptive Server Security
Combined Adaptive Server and Windows Login Security
Trusted Connections and Combined Login Security
Login Security Modes
Standard Mode
Integrated Mode
Mixed Mode
Manage the Login Security Features
Permit Trusted Connections
Windows Registry Parameters
Default Login
Default Domain
SetHostName
Character Mappings
Modify the Parameter Values
Administer Login Security Using System Procedures
Assigning Trusted Connection Permissions
Display the Current Registry Values
Display Permissions and User Names
Revoke Permissions Granted with sp_grantlogin
Configuring Login Security
Creating Windows Users and Groups
Configuring Mapping and Default Domain Values
Setting Login Security Mode
Adding Network Login Names to syslogins
Assigning Roles
Change Login Security Options
Enabling Standard Login Security Mode
Enabling Integrated or Mixed Login Security Mode
E-mail Messages and Adaptive Server
Sybmail Messages
Send Messages
Receive Messages
Preparing Windows Mail for Sybmail
Connecting to a Post Office
Creating a Mailbox for Adaptive Server
Creating a Mail Profile for Adaptive Server
Create an Adaptive Server Login for Sybmail
Configuring Sybmail and Extended Stored Procedures
Manage a Mail Session
Start a Mail Session
Start Sybmail Without Parameters
Stop a Mail Session
Stored and Extended Procedures for Handling Messages
Outgoing Messages
Incoming Messages
Find the Next Message
Read a Specific Message
Delete a Message
Processing Incoming Mail
Sybmail Security
Set Execution Privileges
Set the Execution Context
Name Both the User and the Database
Name the User But Not the Database
Name the Database But Not the User
Name Neither the User Nor the Database
Manage Adaptive Server Databases
Manage Database Devices
Device Requirements
Creating .dat Files for Database Devices
Back Up and Restore Data
Backing Up Data with a Tape Drive
Windows Tape Drive Names
Set the Maximum Capacity for a Tape Drive
Backing Up Data Using a Hard Disk
Dumping Across a Network
Examples of Backing Up and Restoring User Databases
Back Up and Restore to a Database and Device
Back Up and Restore on a Remote Backup Server
Backup File Names
Additional Dump Devices
Tape Handling Options
Get Information About Files
Backing Up and Restoring System Databases
Optimize Adaptive Server Performance and Tuning
Using Dedicated Adaptive Server Operation
Disk Drives and Adaptive Server Performance
Monitor Disk Usage
Monitoring Adaptive Server Statistics
Database Management System Auditing
Audit System Devices and Databases
Preinstallation for Auditing Devices
Installing Auditing
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Troubleshoot Network Connections
Running Server Ping
Troubleshoot Connection Failures
Using Returned Messages to Diagnose a Failure
Troubleshooting a Connection Failure to Adaptive Server
Failure to Load Net-Library DLLs
Troubleshooting Failure of Other Applications
Before Calling Sybase Technical Support
Adaptive Server Registry Keys
\SOFTWARE\SYBASE\Server\server_name
\SOFTWARE\SYBASE\SQLServer\server_name\parameter
\SOFTWARE\SYBASE\SQLServer
\SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Release Bulletin Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
Product Summary
Adaptive Server Interoperability
Product Compatibility
Password Compatibility with Replication Server
Changes That Affect Existing Applications
Changes to Sybase Central
Backup Server and IBM Tivoli Storage Manager
Software Developer Kit (SDK) and Open Server
Command Line Version of ddlgen
Changed Functionality
XML Services and External Entity Reference
Support for db2 Server Class
Unsupported Features and Utilities
Installation and Configuration
Special Installation Instructions
Special Configuration Instructions
Configure Adaptive Server for Clients Using EPEP Algorithm
Special Upgrade and Downgrade Instructions
TIPSA Flag 0x4000 Error After Upgrade
Special Downgrade Instructions
Loading Database Dumps into Earlier Versions
Known Installation Issues for Adaptive Server Cluster Edition
Known Plug-In Issues for Adaptive Server Cluster Edition
Known Issues for Adaptive Server Cluster Edition
Documentation Updates
Enabling Custom Password Checks
isql -K keytab_file Parameter
Job Scheduler Parameter job scheduler interval
Job Scheduler Command sp_sjobdrop
Security Built-in Function Permissions
Shareable Temporary Tables
Hash-Based Update Statistics
Additional Information for Windows Failover in a High Availability System
Configure Adaptive Server for Failover on Windows
Setting maximum failed logins
Changing the maximum failed logins for specific roles
Changing the maximum failed logins for specific logins
Values for lock timeout pipe active
dbcc page Parameter logical
Behavior of Concurrent DDLs and reorg defrag
Updates to Third-Party Licensing
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for HP-UX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Enabling I/O Fencing
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for IBM AIX
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Making Input/Output Completion Port API Available for Adaptive Server
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Setting Up Raw Disks For Multi-Node Access and I/O Fencing
I/O Fencing via SCSI-3 PGR
Enabling I/O Fencing
Creating Logical Volumes
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Linux
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server as a Shared Versus Private Installation
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Enabling I/O Fencing
Raw Partitions on Linux
Choosing a Raw Partition
Examples for Creating Raw Partitions
Red Hat Raw Device Administration
SuSE Raw Device Administration
Accessing Raw Devices from the Server
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide Adaptive Server Enterprise Cluster Edition 15.7 SP100 for Sun Solaris
Conventions
Installation Task Overview
Installation Workflows
Installing Adaptive Server for the First Time
Upgrading to a New Version of Adaptive Server
Adaptive Server Components
Adaptive Server Editions
Determining the Edition You Have
Adaptive Server Options
Managing Adaptive Server Enterprise with Sybase Control Center
Client Applications and Utilities
System Requirements
Cluster Edition System Requirements for Using Private Interconnect Technology
System Requirements for Clients
Planning Your Adaptive Server Installation
Adaptive Server Release Bulletin
Obtaining a License
Understanding License Generation
Determining Your License Deployment Model
Comparing License Deployment Models
Fault Tolerance, License Grace, and Redundancy
Served License Deployment Model
License Servers
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity licensing
Generating Licenses at SPDC
Logging in to SPDC and Beginning License Generation
Generating Unserved Licenses
Generating Served Licenses
Regenerating, Renewing, and Rehosting Licenses
Managing License Hosts
Modifying Individual Licenses
Generating Licenses at SMP
Generating License Keys
Installation Directory Contents and Layout
PC-Client Product Descriptions and Layout
Performing Administrative Tasks
Creating the Sybase User Account
Preparing to Install Adaptive Server
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing Adaptive Server
Mounting the Installation Media
Installing Adaptive Server with the GUI Wizard
Installing Adaptive Server in Console Mode
Installing Adaptive Server Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling Adaptive Server
Removing an Existing Adaptive Server
Installing Components from the PC-Client
Creating a Response File for the Client
Installing the Client in Unattended, Silent Mode
Uninstalling PC-Client
Starting and Stopping Sybase Control Center
Creating and Starting the Cluster
Differences Between Private and Shared Installations
Cluster Edition Preinstallation Checklist
Creating a Simulated Cluster on a Single Node
Before Creating a Cluster
Creating a Cluster with Storage Foundation for Sybase Cluster Edition
Worksheet for Creating a Cluster
Create a Cluster Using sybcluster
Configuring the Cluster Using sybcluster
Starting and Stopping a Cluster Using sybcluster
Verifying the Cluster Configuration
Starting the Cluster When the Operating System Starts
Cleaning Up After a Failed Cluster Installation
Auxiliary Servers
Configuring Backup Server Using sybcluster
Installing Job Scheduler
Configuring XP Server Using sybcluster
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Creating a Test Environment
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
I/O Fencing
Preparing to Set Up I/O Fencing
Enabling I/O Fencing
Manual Cluster Setup and Management
Setting the Environment
Raw Devices
The Cluster Input File
Manually Configuring the Cluster
Configuring the Interfaces File
Building the Master and Quorum Devices
System Stored Procedures
Initializing and Creating sybsystemprocs
Creating Runserver Files
Setting Up Local System and Temporary Databases
Automatic Takeover of a Cluster
Starting the Cluster
Starting the Cluster After a System Failure
Postconfiguration Tasks
Shutting Down the Cluster or the Instance
Shutting Down an Instance
Reconfiguring the Cluster
Enabling sybcluster and Sybase Control Center After a Manual Configuration
A sybcluster Sample Session Configuration Values
Sample sybcluster Session
Configuring the Cluster Using an Input File
Adaptive Server Upgrades
Upgrading Adaptive Server
Considerations for Component Integration Services
Preparing to Upgrade
Changes in Adaptive Server Directories
Checking System and Upgrade Requirements
Performing Tasks Before Upgrading
Upgrade System Tables and Stored Procedures
The runserver File Location
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Upgrading to a Private Installation
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to Adaptive Server 15.7 SP100
Upgrading from One Version of Adaptive Server Cluster Edition to Another
Upgrade a Noncluster Version of Adaptive Server to the Cluster Edition Using sybcluster
Verifying the Cluster Edition Server for Upgrade
Upgrading the Cluster Edition Server Using an Input File
Upgrading the Cluster Edition Server Interactively
Responding to upgrade server Prompts
Installation of Version 15.7 SP100 over an Existing 15.7 or 15.7 ESD Cluster Edition
Determining the Adaptive Server Version
Backing Up Adaptive Server
Installing Adaptive Server Using the Binary Overlay
The updatease Utility
Upgrading in Silent Mode
Postupgrade Tasks
Updating JAR and XML Files
Running the instmsgs.ebf Script
Restoring Functionality in Adaptive Server After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Migrating a Server Configured for High Availability
Using bcp to Migrate Data
Adaptive Server Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading Adaptive Server
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Adaptive Server Downgrades
Preparing to Downgrade Adaptive Server
Downgrading from Adaptive Server 15.7 SP100
Downgrading to an Earlier Version of Adaptive Server 15.7
Opening a 15.7 SP100 Database in an Earlier 15.7 Version of Adaptive Server
Additional Considerations for New Features Used
Performing an In-Place Downgrade
Downgrading Job Scheduler
Post-downgrade Tasks for Adaptive Server
Troubleshooting SySAM Errors
Where to Find License Error Information
SySAM Problems and Solutions
Installing for the First Time
Possible Causes of a License Server Failure
Solution for Problem: Product Cannot Find License for Optional Features
Unserved License Deployment Models
Served License Deployment Models
Contacting SySAM Technical Support
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for Sybase Servers
Troubleshooting Common Installation Problems
Stopping Adaptive Server After a Failure
Recovering from a Failed Installation
If the Installation Quits While You Are Configuring Adaptive Server
If Adaptive Server Fails the Preupgrade Eligibility Test
If the Cluster Edition Configuration Fails
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Re-running the Cluster Edition Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
If Lack of Space Prevents an Upgrade
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Utility Guide 15.7 SP100
Utility Commands Reference
Threaded Versions of Utilities
Installation or Configuration Utilities
Utilities for Languages, Character Sets, and Sort Orders
Utilities to Start Servers
Database Creation and Manipulation Utilities
Utilities to Gather Information
Tuning Utility
Utility to Manage a Cluster
backupserver
bcp
Usage for bcp
Copying Tables with Indexes or Triggers Using bcp
Using bcp with Compressed Data
buildmaster
certauth
Usage for certauth
Accomplish Certificate Management Tasks Using Open Source Utility
Creating a Server Certificate File that Adaptive Server Understands
certpk12
certreq
charset
cobpre
cpre
dataserver
Usage for dataserver
Dependencies and Conditions of -b and -w Options
Potential Issues of Using -f and -w Options Together
ddlgen
Usage for ddlgen
Hiding Passwords in ddlgen
ddlgen for Encrypted Columns
Encrypted Columns and Specifying the -XOD Flag in ddlgen
ddlgen Support for Key Copies
EKC Encryption Key Copy Filter and ddlgen
Create Table DDL
defncopy
dscp
dsedit
extractjava
installjava
Usage for installjava
Cases When Adding New JARs Causes Exceptions
Updating JARs and Classes
Locks
isql
Usage for isql
Interactive isql Commands
isql Session Commands
Prompt Labels and Double Wildcards in an isql Session
Command History in isql
langinstall
optdiag
Usage for optdiag
Byte Ordering and Binary optdiag Files
optdiag Input Mode
preupgrade
Usage for preupgrade
The preupgrade -D Parameter
pwdcrypt
qrmutil
qptune
showserver
sqldbgr
Usage for sqldbgr
Error Messages in sqldbgr
sqlloc
sqllocres
sqlsrvr
Usage for sqlsrvr
Starting Adaptive Server
startsrvr Dependencies and Conditions with -b and -w
sqlupgrade
sqlupgraderes
srvbuild
Usage for srvbuild
Using LDAP with srvbuild in a 64-bit Environment
srvbuildres
startserver
Usage for startserver
The runserver File
sybcluster
sybdiag
Usage for sybdiag
Configuration Options for sybdiag
sybmigrate
sybrestore
sybtsmpasswd
updatease
xpserver
Transferring Data to and from Adaptive Server with bcp
Methods for Moving Data
Import and Export Data with bcp
bcp Modes
bcp Requirements
bcp Permissions
Before You Transfer
Copy Data to Partitions Using bcp
Improve bcp Performance
Fast, Fast-logged, and Slow bcp
Slow bcp
Fast bcp
Fast-logged bcp
Copying Tables with Indexes
Locking Scheme and Fast bcp
Space Requirements for Copying
Summary of Steps for Fast and Fast-logged bcp
Bulk Copying Data into Partitioned Tables
Copying Data Randomly into Partitions
Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
Reducing Logging by Increasing Page Allocations
Using Parallel Bulk Copy to Copy Data into a Specific Partition
bcp in and Locks
Parallel Bulk Copy Methods
Parallel Bulk Copy Syntax
Using Parallel Bulk Copy on Round-robin Partitioned Tables
Parallel Bulk Copy and IDENTITY Columns
Retaining Sort Order
Specifying the Value of a Tableās IDENTITY Column
Bulk Copying Encrypted Data
bcp Options
Using the Default Formats
Native Format
Character Format
Change Terminators from the Command Line
Change the Defaults in Interactive bcp
Respond to bcp Prompts
File Storage Type
Prefix Length
Field length
Field and Row Terminators
Choose Terminators
Format Files
Examples of Copying Out Data Interactively
Examples of Copying In Data Interactively
bcp and Alternate Languages
Support for Initialization Strings
bcp and Row-Level Access Rules
Copy In and Batch Files
Improve Recoverability
Batches and Partitioned Tables
Copy Out and Text and Image Data
Specify a Network Packet Size
Copy In and Error Files
Copy Out and Error Files
Data Integrity for Defaults, Rules, and Triggers
How bcp Differs from Other Utilities
Building Servers Using dataserver
Building a New Master Device
Environments When Using dataserver
Specifying Device and Logical Page Sizes When Building a New Adaptive Server
Starting an Existing Adaptive Server
Upgrading to a Server With Larger Page Sizes
Viewing the Current Server Limits
Viewing and Editing Server Entries Using dscp
Starting dscp
Working with Server Entries
Adding and Modifying Server Entries
Adding a Server Entry
Modifying or Deleting a Server Entry
Copy Server Entries
List and View Contents of Server Entries
Delete Server Entries
Exiting dscp
Viewing and Editing Server Entries Using dsedit
Add, View, and Edit Server Entries
Using dsedit in UNIX
Starting dsedit in UNIX
Open an Editing Session in UNIX
Modify Server Entries in UNIX
Adding a New Server Entry in UNIX
Viewing or Modifying a Server Entry in UNIX
Add or Edit Network Transport Addresses
TCP/IP Addresses
SPX/IPX Addresses
Copying a Server Entry to Another Interfaces File in UNIX
Copying Server Entries Within the Current Session
Copying Server Entries Between Sessions
Using dsedit in Windows
Starting dsedit in Windows
Open an Editing Session in Windows
Opening a Session in Windows
Opening Additional Sessions in Windows
Switching Between Sessions in Windows
Modify Server Entries in Windows
Adding a Server Entry
Modifying a Server Attribute
Renaming a Server Entry
Deleting a Server Entry
Copying server entries within the current session in Windows
Copying server entries between sessions in Windows
Troubleshooting dsedit
Using Interactive isql from the Command Line
Starting isql
Stopping isql
Using Transact-SQL in isql
Formatting isql Output
Correcting isql Input
set Options that Affect Output
Changing the Command Terminator
Performance Statistics Interaction with Command Terminator Values
Input and Output Files
UNIX command line redirection
Using Interactive SQL in Graphics Mode
Starting Interactive SQL
The Main Interactive SQL Window
Plan Dialog Tab
The Interactive SQL Toolbar
Open Multiple Windows
Keyboard Shortcuts
Display Data Using Interactive SQL
Edit Table Values in Interactive SQL
Copying Rows from the Interactive SQL Result Set
Editing Rows from the Interactive SQL Result Set
Inserting Rows into the Database from the Interactive SQL Result Set
Deleting Rows from the Database Using Interactive SQL
SQL Statements in Interactive SQL
Canceling an Interactive SQL Command
Combining Multiple Statements
Looking Up Tables, Columns, and Procedures
Recall Commands
Logging Commands
Configure Interactive SQL
General Dialog Box
Result Dialog Box
Import/Export Dialog Box
Messages Dialog Tab
Editor Dialog Box
Query Editor Dialog Box
Processing Command Files
Saving SQL Statements to a File
Executing Command Files
Saving, Loading, and Running Command Files
The SQL Escape Syntax in Interactive SQL
Interactive SQL Commands
Interactive sybcluster Commands Reference
Commands Active Before Connecting to a Cluster
Commands Active After Connecting to a Cluster
add backupserver
add instance
connect
create backupserver
create cluster
create xpserver
deploy plugin
diagnose cluster
diagnose instance
disconnect
drop backupserver
drop cluster
drop instance
drop xpserver
exit
help
localize
quit
set backupserver
set cluster
set instance
set xpserver port
show agents
show backupserver config
show cluster
show instance
show membership mode
show session
show xpserver
shutdown cluster
shutdown instance
start cluster
start instance
upgrade server
use
Migrating Data Using sybmigrate
What sybmigrate Does
What sybmigrate Does Not Do
Before You Begin
Permissions
Changing Target Login Accounts
Platforms
Environment Settings
Migrating Proxy Tables
Migration process
Overview of the Migration Process
Pre-migration Considerations
Configuration and Tuning for Higher Performance
Configuration Considerations for Adaptive Server
Possible Errors to Avoid
Auto-select Dependent Objects for Migration
Migrating an Archive Database
Upgrading an Adaptive Server with an Archive Database
Downgrading an Adaptive Server with an Archive Database
GUI mode
Setting up source databases for migration
Begin the migration
Validating the migration
Migration and Validation Progress
Resource File Mode
Using sybmigrate with Encrypted Columns
Post-migration Activities
Migrate Databases in the Replication Server Domain
Preparing for migration
Postmigration Procedures
Restoring primary databases
Restoring the RSSD
Amending system tables when the logical page size changes
Restoring Replicate Databases
Logs
Migrating Databases That Support Wide Data
Limitations
Stopping High Availability
Other Limitations
Troubleshooting and Error Messages
Restoring a Database Using sybrestore
Noninteractive Mode
Interactive Mode
Before You Begin
Using sybrestore
Compatibility Geometry Check
sybrestore Syntax
Interactive Mode Syntax
Noninteractive Mode Syntax
Restoring a Database in Noninteractive Mode
Restoring a Database in Interactive Mode
Providing a Mapping Directory
Restoring a Database Using the Interactive Command Line
Restoring a database
Restoring a database to a point in time
Example of Restore to a Point-in-time
Transact-SQL Users Guide 15.7
SQL Building Blocks
SQL in Adaptive Server
Queries, data modification, and commands
Tables, columns, and rows
Relational operations
Compiled objects
Saving or restoring source text
Verifying and encrypting source text
Compliance to ANSI standards
Federal Information Processing Standards (FIPS) flagger
Chained transactions and isolation levels
Identifiers
SQL standard-style comments
Right truncation of character strings
Permissions required for update and delete statements
Arithmetic errors
Synonymous keywords
Treatment of nulls
Naming conventions
SQL data characters
SQL language characters
Identifiers
Multibyte character sets
Delimited identifiers
Uniqueness and qualification conventions
Remote servers
Expressions in Adaptive Server
Arithmetic and character expressions
Operator precedence
Arithmetic operators
Bitwise operators
The string concatenation operator
The comparison operators
Nonstandard operators
Character expression comparisons
Empty strings
Quotation marks
Relational and logical expressions
any, all, and in
and and or
Transact-SQL extensions
compute clause
Control-of-flow language
Stored procedures
Extended stored procedures
Triggers
Defaults and rules
Error handling and set options
Additional Adaptive Server extensions to SQL
Adaptive Server login accounts
isql utility
Default databases
Network-based security services with isql
Displaying SQL text
Queries: Selecting Data from a Table
Queries
select syntax
Checking for identifiers in a select statement
Choosing columns using the select clause
Choosing all columns using select *
Choosing specific columns
Rearranging the column order
Renaming columns in query results
Using expressions
Quoted strings in column headings
Character strings in query results
Computed values in the select list
Arithmetic operator precedence
Selecting text, unitext, and image values
Using readtext
Select list summary
Using select for update
Using select for update in cursors and DML
Concurrency issues
Eliminating duplicate query results with distinct
Specifying tables with the from clause
Selecting rows using the where clause
Comparison operators in where clauses
Ranges (between and not between)
Lists (in and not in)
Matching patterns
Matching character strings: like
Using not like
Getting different results using not like and ^
Using wildcard characters as literal characters
Interaction of wildcard characters and square brackets
Using trailing blanks and %
Using wildcard characters in columns
āUnknownā values: NULL
Testing a column for null values
Difference between false and unknown
Substituting a value for NULLs
Expressions that evaluate to NULL
Concatenating strings and NULL
System-generated NULLs
Connecting conditions with logical operators
Logical operator precedence
Using multiple select items in a nested exists query
Using a column alias in nested select statements
Using Aggregates, Grouping, and Sorting
Using aggregate functions
Aggregate functions and datatypes
count vs. count (*)
Aggregate functions with distinct
Null values and the aggregate functions
Using statistical aggregates
Standard deviation and variance
Organizing query results into groups: the group by clause
group by and SQL standards
Nesting groups with group by
Referencing other columns in queries using group by
Expressions and group by
Using group by in nested aggregates
Null values and group by
where clause and group by
group by and all
Aggregates without group by
Selecting groups of data: the having clause
How the having, group by, and where clauses interact
Using having without group by
Sorting query results: the order by clause
order by and group by
order by and group by used with select distinct
Summarizing groups of data: the compute clause
Row aggregates and compute
Rules for compute clauses
Specifying more than one column after compute
Using more than one compute clause
Applying an aggregate to more than one column
Using different aggregates in the same compute clause
Generating totals: compute without by
Combining queries: the union operator
Guidelines for union queries
Using union with other Transact-SQL commands
Joins: Retrieving Data from Several Tables
How joins work
Join syntax
Joins and the relational model
How joins are structured
The from clause
The where clause
Join operators
Datatypes in join columns
Joins and text and image columns
How joins are processed
Equijoins and natural joins
Joins with additional conditions
Joins not based on equality
Self-joins and correlation names
The not-equal join
Not-equal joins and subqueries
Joining more than two tables
Outer joins
Inner and outer tables
Outer join restrictions
Views used with outer joins
ANSI inner and outer joins
Correlation name and column referencing rules for ANSI joins
ANSI inner joins
ANSI outer joins
Should the predicate be in the on or where clause?
Nested ANSI outer joins
Converting outer joins with join-order-dependency
Transact-SQL outer joins
Using outer joins and aggregate extended columns
Relocated joins
Using relocated joins
Configuring relocated joins
How null values affect joins
Determining which table columns to join
Subqueries: Using Queries Within Other Queries
How subqueries work
Subquery restrictions
Example of using a subquery
Qualifying column names
Subqueries with correlation names
Multiple levels of nesting
Using an asterisk in nested select statements
Using table-name qualifiers
Using nested queries with group by
Examples
Usage
Subqueries in update, delete, and insert statements
Subqueries in conditional statements
Subqueries instead of expressions
Types of subqueries
Expression subqueries
Using scalar aggregate functions to guarantee a single value
Using group by and having in expression subqueries
Using distinct with expression subqueries
Quantified predicate subqueries
Subqueries with any and all
Subqueries used with in
Subqueries used with not in
Subqueries using not in with NULL
Subqueries used with exists
Subqueries used with not exists
Finding intersection and difference with exists
Subqueries using SQL derived tables
Using correlated subqueries
Correlated subqueries with correlation names
Correlated subqueries with comparison operators
Correlated subqueries in a having clause
Using and Creating Datatypes
How Transact-SQL datatypes work
Using system-supplied datatypes
Exact numeric types: integers
Exact numeric types: decimal numbers
Approximate numeric datatypes
Money datatypes
Date and time datatypes
Character datatypes
unichar datatype
text datatype
unitext datatype
Binary datatypes
image datatype
The bit datatype
The timestamp datatype
The sysname and longsysname datatype
Using LOB Locators in Transact-SQL Statements
Creating a LOB locator
Explicitly creating a locator
Implicitly creating a locator
Converting the locator value to the LOB value
Locator scope
Converting between datatypes
Mixed-mode arithmetic and datatype hierarchy
Working with money datatypes
Determining precision and scale
Creating user-defined datatypes
Specifying length, precision, and scale
Specifying null type
Associating rules and defaults with user-defined datatypes
Creating user-defined datatype with IDENTITY property
Creating IDENTITY columns from user-defined datatypes
Dropping a user-defined datatype
Getting information about datatypes
Adding, Changing, Transferring, and Deleting Data
Referential integrity
Transactions
Using the sample databases
Datatype entry rules
char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
date and time
Entering times
Entering dates
Searching for dates and times
binary, varbinary, and image
money and smallmoney
float, real, and double precision
decimal and numeric
Integer types and their unsigned counterparts
timestamp
Adding new data
Adding new rows with values
Inserting data into specific columns
Restricting column data: rules
Using the NULL character string
Inserting NULLs into columns that do not allow them
Adding rows without values in all columns
Changing a columnās value to NULL
Adaptive-Server-generated values for IDENTITY columns
Explicitly inserting data into an IDENTITY column
Retrieving IDENTITY column values with @@identity
Reserving a block of IDENTITY column values
Reaching the IDENTITY columnās maximum value
Adding new rows with select
Using computed columns
Inserting data into some columns
Inserting data from the same table
Creating nonmaterialized, non-null columns
Adding nonmaterialized columns
Tables that already have nonmaterialized columns
Nonmaterialized column storage
Altering nonmaterialized columns
Limitations
Changing existing data
Using the set clause with update
Assigning variables in the set clause
Using the where clause with update
Using the from clause with update
Performing updates with joins
Updating IDENTITY columns
Changing text, unitext, and image data
Trucating trailing zeros
Transferring data incrementally
Marking tables for incremental transfer
Transferring tables from a destination file
Converting Adaptive Server datatypes to IQ
Storing transfer information
Exceptions and errors
Sample session for incremental data transfer
Replacing data with new rows
Deleting data
Using the from clause with delete
Deleting from IDENTITY columns
Deleting all rows from a table
truncate table syntax
Creating Databases and Tables
Databases and tables
Enforcing data integrity in databases
Permissions within databases
Using and creating databases
Choosing a database: use
Creating a user database with create database
The on clause
The log on clause
for load option
quiesce database command
Altering the sizes of databases
Dropping databases
Creating tables
Maximum number of columns per table
Example
Choosing table names
Creating tables in different databases
create table syntax
Using IDENTITY columns
Creating IDENTITY columns with user-defined datatypes
Referencing IDENTITY columns
Referring to IDENTITY columns with syb_identity
Automatically creating āhiddenā IDENTITY columns
Allowing null values in a column
Constraints and rules used with null values
Defaults and null values
Nulls require variable-length datatypes
text, unitext, and image columns
Using temporary tables
Ensuring that the temporary table name is unique
Manipulating temporary tables in stored procedures
General rules for temporary tables
Managing identity gaps in tables
Parameters for controlling identity gaps
Comparison of identity burning set factor and identity_gap
Reducing the identity number gap
Setting the table-specific identity gap
Changing the table-specific identity gap
Displaying table-specific identity gap information
Gaps from other causes
When table inserts reach IDENTITY column maximum value
Defining integrity constraints for tables
Specifying table-level or column-level constraints
Creating error messages for constraints
After creating a check constraint
Specifying default column values
Specifying unique and primary key constraints
Specifying referential integrity constraints
Table-level or column-level referential integrity constraints
Maximum number of references allowed for a table
Using create schema for cross-referencing constraints
General rules for creating referential integrity constraints
Specifying check constraints
Designing applications that use referential integrity
Designing and creating a table
Making a design sketch
Creating the user-defined datatypes
Choosing the columns that accept null values
Defining the table
Creating new tables from query results: select into
Checking for errors
Using select into with IDENTITY columns
Selecting an IDENTITY column into a new table
Selecting the IDENTITY column more than once
Adding a new IDENTITY column with select into
Defining a column for which the value must be computed
IDENTITY columns selected into tables with unions or joins
Altering existing tables
Objects using select * do not list changes to table
Using alter table on remote tables
Adding columns
Adding columns appends column IDs
Adding NOT NULL columns
Adding constraints
Dropping columns
Dropping columns renumbers the column ID
Dropping constraints
Modifying columns
Converting datatypes
Modifying tables may prevent successful bulk copy of previous dump
Decreasing column length may truncate data
Modifying datetime columns
Modifying the NULL default value of a column
Modifying columns that have precision or scale
Modifying text, unitext, and image columns
Adding, dropping, and modifying IDENTITY columns
Adding IDENTITY columns
Dropping IDENTITY columns
Modifying IDENTITY columns
Data copying
Changing exp_row_size
Modifying locking schemes and table schema
Altering columns with user-defined datatypes
Adding a column with user-defined datatypes
Dropping a column with user-defined datatypes
Modifying a column with user-defined datatypes
Errors and warnings from alter table
Errors and warnings generated by alter table modify
Scripts generated by if exists()...alter table
Renaming tables and other objects
Renaming dependent objects
Dropping tables
Computed columns
Using computed columns
Computed columns example
Indexes on computed columns
Deterministic property
How does the deterministic property affect computed columns?
Examples
How does the deterministic property affect function-based indexes?
Assigning permissions to users
Getting information about databases and tables
Getting help on databases
Getting help on database objects
Using sp_help on database objects
Using sp_helpconstraint to find a tableās constraint information
Finding out how much space a table uses
Listing tables, columns, and datatypes
Finding an object name and ID
SQL-Derived Tables
Advantages of SQL-derived tables
SQL-derived tables and optimization
SQL-derived table syntax
Derived column lists
Correlated SQL-derived tables
Using SQL-derived tables
Nesting
Subqueries using SQL-derived tables
Unions
Unions in subqueries
Renaming columns with SQL-derived tables
Constant expressions
Aggregate functions
Joins with SQL-derived tables
Creating a table from a SQL-derived table
Using views with SQL-derived tables
Correlated attributes
Partitioning Tables and Indexes
Upgrading from Adaptive Server 12.5.x and earlier
Data partitions
Index partitions
Partition IDs
Locks and partitions
Partitioning types
Range partitioning
Hash partitioning
List partitioning
Round-robin partitioning
Composite partitioning keys
Partition pruning
Indexes and partitions
Global indexes
Global nonclustered index on unpartitioned table
Global clustered index on unpartitioned table
Global clustered index on round-robin partitioned table
Global nonclustered index on partitioned table
Local indexes
Local clustered indexes
Local nonclustered indexes
Guaranteeing a unique index
Creating and managing partitions
Partitioning tasks
Creating data partitions
Creating a range-partitioned table
Creating a hash-partitioned table
Creating a list-partitioned table
Creating a round-robināpartitioned table
Creating partitioned indexes
Creating global indexes
Creating local indexes
Creating clustered indexes on partitioned tables
Creating a partitioned table from an existing table
Altering data partitions
Changing an unpartitioned table to a partitioned table
Adding partitions to a partitioned table
Changing the partitioning type
Changing the partitioning key
Unpartitioning round-robināpartitioned tables
Using the partition parameter
Altering partition-key columns
Configuring partitions
Updating, deleting, and inserting in partitioned tables
Updating values in partition-key columns
Displaying information about partitions
Using functions
Truncating a partition
Using partitions to load table data
Updating partition statistics
Virtually hashed tables
Structure of a virtually hashed table
Creating a virtually hashed table
Limitations for virtually hashed tables
Commands that support virtually hashed tables
Query processor support
Monitor counter support
System procedure support
Views: Limiting Access to Data
How views work
Advantages of views
Security
Logical data independence
Examples
Creating views
create view syntax
Using the select statement with create view
View definition with projection
View definition with a computed column
View definition with an aggregate or built-in function
View definition with a join
Views used with outer joins
Views derived from other views
distinct views
Views that include IDENTITY columns
Validating a viewās selection criteria
Views derived from other views
Retrieving data through views
View resolution
Redefining views
Renaming views
Altering or dropping underlying objects
Modifying data through views
Restrictions on updating views
Computed columns in a view definition
group by or compute in a view definition
NULL values in underlying objects
Views created using with check option
Multitable views
Views with IDENTITY columns
Dropping views
Using views as security mechanisms
Getting information about views
Using sp_help and sp_helptext to display view information
Using sp_depends to list dependent objects
Listing all views in a database
Finding an object name and ID
Creating Indexes on Tables
How indexes work
Comparing the two ways to create indexes
Guidelines for using indexes
Creating indexes
create index syntax
Indexing more than one column: composite indexes
Indexing with function-based indexes
Using the unique option
Including IDENTITY columns in nonunique indexes
Ascending and descending index-column values
Using fillfactor, max_rows_per_page, and reservepagegap
Indexes on computed columns
Function-based indexes
Using clustered or nonclustered indexes
Creating clustered indexes on segments
Specifying index options
Using the ignore_dup_key option
Using the ignore_dup_row and allow_dup_row options
Using the sorted_data option
Using the on segment_name option
Dropping indexes
Determining what indexes exist on a table
Updating statistics about indexes
Defining Defaults and Rules for Data
How defaults and rules work
Creating defaults
create default syntax
Binding defaults
Unbinding defaults
How defaults affect NULL values
Dropping defaults
Creating rules
create rule syntax
Binding rules
Rules bound to columns
Rules bound to user-defined datatypes
Precedence of rules
Rules and NULL values
Unbinding rules
Dropping rules
Getting information about defaults and rules
Sharing inline defaults
Creating an inline shared default
Unbinding a shared inline default
Limitations
Using Batches and Control-of-Flow Language
Introduction
Rules associated with batches
Examples of using batches
Batches submitted as files
Using control-of-flow language
if...else
case expression
Using case expression for alternative representation
case and division by zero
Using rand functions in case expressions
case expression results
case expressions and set ansinull
case expression requires at least one non-null result
Determining the result set
case and value comparisons
coalesce
nullif
begin...end
while and break...continue
declare and local variables
goto
return
print
raiserror
Creating messages for print and raiserror
waitfor
Comments
Slash-asterisk style comments
Double-hyphen style comments
Local variables
Declaring local variables
Local variables and select statements
Local variables and update statements
Local variables and subqueries
Local variables and while loops and ifā¦else blocks
Variables and null values
Global variables
Transactions and global variables
Checking for errors with @@error
Checking IDENTITY values with @@identity
Checking the transaction nesting level with @@trancount
Checking the transaction state with @@transtate
Checking the nesting level with @@nestlevel
Checking the status from the last fetch
Using Transact-SQL Functions in Queries
Setting up a query
Built-in functions
System functions
String functions
Concatenating expressions
Nesting string functions
Limits on string functions
Text and image functions
Using readtext on unitext columns
Aggregate functions
Limitations
Aggregate functions used with the group by clause
Aggregate functions and null values
Vector and scalar aggregates
Aggregate functions as row aggregates
Statistical aggregate functions
Formulas for computing standard deviations
Mathematical functions
Date functions
Datatype conversion functions
Using the convert function for explicit conversions
Datatype conversion guidelines and constraints
Changing the date format
Conversion error handling
Security functions
XML functions
User-created functions
Using Stored Procedures
How stored procedures work
Examples
Permissions
Performance
Creating and executing stored procedures
Using deferred name resolution
Parameters
Default parameters
Using default parameters in stored procedures
NULL as the default parameter
Wildcard characters in the default parameter
Using more than one parameter
Using large object text, unitext, and image datatypes in stored procedures
Procedure groups
Using with recompile in create procedure
Using with recompile
Using with recompile in execute
Nesting procedures within procedures
Using temporary tables in stored procedures
Setting options in stored procedures
Query optimization settings
Arguments for stored procedures
Length of expressions, variables, and arguments
Executing stored procedures
Executing procedures after a time delay
Executing procedures remotely
Deferred compilation in stored procedures
Returning information from stored procedures
Return status
Reserved return status values
User-generated return values
Checking roles in procedures
Return parameters
Passing values in parameters
The output keyword
Restrictions associated with stored procedures
Qualifying names inside procedures
Renaming stored procedures
Renaming objects referenced by procedures
Using stored procedures as security mechanisms
Dropping stored procedures
System procedures
Executing system procedures
Permissions on system procedures
Types of system procedures
Other Sybase-supplied procedures
Catalog stored procedures
System extended stored procedures
dbcc procedures
Getting information about stored procedures
Getting a report with sp_help
Viewing the source text of a procedure with sp_helptext
Identifying dependent objects with sp_depends
Using sp_depends with deferred_name_resolution
Identifying permissions with sp_helprotect
Using Extended Stored Procedures
Overview
XP Server
Dynamic link library support
Open Server API
ESPs and permissions
ESPs and performance
Creating functions for ESPs
Files for ESP development
Open Server data structures
Open Server return codes
Outline of a simple ESP function
ESP function example
Building the DLL
Search order for DLLs
Sample makefile (UNIX)
Sample definitions file
Registering ESPs
Using create procedure
Using sp_addextendedproc
Removing ESPs
Renaming ESPs
Executing ESPs
System ESPs
Getting information about ESPs
ESP exceptions and messages
Cursors: Accessing Data
Selecting rows with cursors
Sensitivity and scrollability
Types of cursors
Cursor scope
Cursor scans and the cursor result set
Making cursors updatable
Determining which columns can be updated
How processes cursors
Monitoring cursor statements
Using declare cursor
declare cursor examples
Opening cursors
Fetching data rows using cursors
fetch syntax
Checking cursor status
Getting multiple rows with each fetch
Checking the number of rows fetched
Updating and deleting rows using cursors
Updating cursor result set rows
Deleting cursor result set rows
Closing and deallocating cursors
Scrollable and forward-only cursor examples
Forward-only (default) cursors
Example table for scrollable cursors
Insensitive scrollable cursors
Semisensitive scrollable cursors
Using cursors in stored procedures
Cursors and locking
Cursor-locking options
Enhanced transaction support for updatable cursors
Getting information about cursors
Using browse mode instead of cursors
Browsing a table
Browse-mode restrictions
Timestamping a new table for browsing
Timestamping an existing table
Comparing timestamp values
Triggers: Enforcing Referential Integrity
How triggers work
Using triggers versus integrity constraints
Creating triggers
create trigger syntax
SQL statements that are not allowed in triggers
Using triggers to maintain referential integrity
Testing data modifications against the trigger test tables
Insert trigger example
Delete trigger examples
Cascading delete example
Restricted delete examples
Update trigger examples
Restricted update triggers
Updating a foreign key
Multirow considerations
Insert trigger example using multiple rows
Delete trigger example using multiple rows
Update trigger example using multiple rows
Conditional insert trigger example using multiple rows
Rolling back triggers
Global login triggers
Nesting triggers
Trigger self-recursion
Rules associated with triggers
Triggers and permissions
Trigger restrictions
Implicit and explicit null values
Triggers and performance
set commands in triggers
Renaming and triggers
Trigger tips
Disabling triggers
Dropping triggers
Getting information about triggers
sp_help
sp_helptext
sp_depends
In-Row Off-Row LOB
Overview
Compressing in-row LOB columns
Migrating off-row LOB data to use in-row storage
In-row LOB columns and bulk copy
Examples of methods for migrating existing data
Guidelines for selecting the in-row LOB length
Downgrading with tables containing in-row LOB columns
Using instead of Triggers
Inserted and deleted logical tables
Triggers and transactions
Nesting and recursion
instead of insert triggers
Example
instead of update trigger
instead of delete trigger
searched and positioned update and delete
Getting information about triggers
Transactions: Maintaining Data Consistency and Recovery
How transactions work
Transactions and consistency
Transactions and recovery
Using transactions
Allowing data definition commands in transactions
System procedures that are not allowed in transactions
Beginning and committing transactions
Rolling back and saving transactions
Checking the state of transactions
Nested transactions
Example of a transaction
Selecting the transaction mode and isolation level
Choosing a transaction mode
Transaction modes and nested transactions
Finding the status of the current transaction mode
Choosing an isolation level
Default isolation levels for Adaptive Server and ANSI SQL
Dirty reads
Repeatable reads
Finding the status of the current isolation level
Changing the isolation level for a query
Isolation level precedences
Cursors and isolation levels
Stored procedures and isolation levels
Triggers and isolation levels
Compliance with SQL standards
Using the lock table command to improve performance
Using transactions in stored procedures and triggers
Errors and transaction rollbacks
Transaction modes and stored procedures
Running system procedures in chained mode
Setting transaction modes for stored procedures
Using cursors in transactions
Issues to consider when using transactions
Backup and recovery of transactions
Locking Commands and Options
Setting a time limit on waiting for locks
wait/nowait option of the lock table command
Setting a session-level lock-wait limit
Setting a server-wide lock-wait limit
Information on the number of lock-wait timeouts
Readpast locking for queue processing
Incompatible locks during readpast queries
Allpages-locked tables and readpast queries
Effects of isolation levels select queries with readpast
Session-level transaction isolation levels and readpast
Query-level isolation levels and readpast
Data modification commands with readpast and isolation levels
text, unitext, and image columns and readpast
Readpast-locking examples
The pubs2 Database
Tables in the pubs2 database
publishers table
authors table
titles table
titleauthor table
salesdetail table
sales table
stores table
roysched table
discounts table
blurbs table
au_pix table
Diagram of the pubs2 database
The pubs3 Database
Tables in the pubs3 database
publishers table
authors table
titles table
titleauthor table
salesdetail table
sales table
stores table
store_employees table
roysched table
discounts table
blurbs table
Diagram of the pubs3 database
Security Administration Guide 15.7 ESD #2
Introduction to Security
Introduction to security
What is āinformation security?ā
Information security standards
Common Criteria configuration evaluation
FIPS 140-2 validated cryptographic module
Getting Started with Security Administration in Adaptive Server
General process of security administration
Recommendations for setting up security
An example of setting up security
Security features in Adaptive Server
Identification and authentication
External authentication
Managing remote servers
Discretionary access control
Row-level access control
Predicated Privileges
Division of roles
Role hierarchy
Restrictions on role activation
Mutual exclusivity
Auditing for accountability
Confidentiality of data
Managing Adaptive Server Logins and Database Users
Introduction to logins and login profiles
Managing login accounts
Creating login accounts
Last login and managing inactive accounts
Defining a stale period
Tracking the last login
Preventing inactive accounts from being locked
Authentication mechanisms for login
Changing login accounts
Dropping login accounts
Choosing and creating a password
Setting and changing the maximum login attempts
Logging in after losing a password
Displaying password information
Checking passwords for at least one digit
Setting and changing minimum password length
Password complexity checks
Disallowing simple passwords
Custom password-complexity checks
Specifying characters in a password
Password complexity option cross-checks
Setting password complexity checks
Enabling custom password checks
Setting the login and role expiration interval for a password
Password expiration turned off for pre-12.x passwords
Circumventing password protection
Creating a password expiration interval for a new login
Creating a password expiration interval for a new role
Creation date added for passwords
Changing or removing password expiration interval for login or role
Securing login passwords on the network
Securing login passwords stored on disk and in memory
Character set considerations for passwords
Upgrade and downgrade behavior
Login password downgrade
Behavior changes on upgraded master database
Behavior changes in a new master database
Retaining password encryption after upgrading then downgrading
Expiring passwords when allow password downgrade is set to 0
Using passwords in a high-availability environment
High-availability configuration
Passwords updated after upgrade
Establishing a password and login policy
Login failure
Locking Adaptive Server login accounts and roles
Locking and unlocking logins
Locking and unlocking login accounts
Using syslogins to track if an account is locked
Locking and unlocking roles
Locking logins that own thresholds
Managing login profiles
Login profile attributes
Applying login profile and password policy attributes
Creating a login profile
Creating a default login profile
Associating a login profile with a login account
Ignoring a login profile
Transfer existing login account values to a new login profile
Manual replication of login profiles
Granting roles to login profiles
Invoking a login script
Displaying login profile information
Displaying the login profile name
Displaying the login profile ID
Displaying login profile binding information
Modifying login profiles
Adding or dropping auto-activated roles
Changing a login profile to be the default login profile
Dropping a login profile
Adding users to databases
Adding a āguestā user to a database
āguestā user permissions
āguestā user in user databases
āguestā user in installed system databases
āguestā user in pubs2 and pubs3
Adding a guest user to the server
Adding remote users
Creating groups
Changing a userās group membership
Setting up groups and adding users
Using aliases in databases
Adding aliases
Dropping aliases
Getting information about aliases
Getting information about users
Reporting on users and processes
Getting information about login accounts
Getting information about database users
Finding user names and IDs
Changing user information
Changing passwords
Requiring new passwords
Null passwords
Logging in after lost password
Changing user session information
Dropping users and groups
Dropping users
Dropping groups
Monitoring license use
How licenses are counted
Configuring the License Use Monitor
Monitoring license use with the housekeeper task
Logging the number of user licenses
Number of user and login IDs
Limits and ranges of ID numbers
Login connection limitations
Getting information about usage: chargeback accounting
Reporting current usage statistics
Displaying current accounting totals
Initiating a new accounting interval
Specifying the interval for adding accounting statistics
Managing Roles
Creating and assigning roles to users
System-defined roles
System administrator privileges
System security officer privileges
Operator privileges
Sybase Technical Support
Replication role
Distributed Transaction Manager role
High availability role
Monitoring and diagnosis
Job Scheduler roles
Real-time messaging role
Web Services role
Key custodian role
Planning user-defined roles
Creating a user-defined role
Adding and removing passwords from a role
Role hierarchies and mutual exclusivity
Defining and changing mutual exclusivity of roles
Defining and changing a role hierarchy
Setting up default activation at login
Setting conditions for role activation
Dropping user-defined roles
Activating and deactivating roles
Displaying information about roles
Finding role IDs and names
Viewing active system roles
Displaying a role hierarchy
Viewing user roles in a hierarchy
Determining mutual exclusivity
Determining role activation
Checking for roles in stored procedures
Granting and revoking roles
Granting roles
Understanding grant and roles
Revoking roles
Roles granted to login profiles
Securing role passwords
Character set considerations
Locked roles and syssrvroles
Login password policy checks to role passwords
High-availability support for password policy options
Setting up Adaptive Server for roles
Installing
Upgrading Adaptive Server
Downgrading Adaptive Server
External Authentication
Configuring Adaptive Server for network-based security
Security services and Adaptive Server
Administering network-based security
Setting up configuration files for security
Specifying security information for the server
Preparing libtcl.cfg to use network-based security
The objectid.dat file
Identifying users and servers to the security mechanism
Configuring Adaptive Server for security
Enabling network-based security
Requiring unified login
Establishing a secure default login
Mapping security mechanism login names to server names
Requiring message confidentiality with encryption
Requiring data integrity
Memory requirements for network-based security
Adding logins to support unified login
General procedure for adding logins
Establishing Kerberos security for remote connections
Unified login and the remote server logins
Getting information about remote servers
Connecting to the server and using the security services
Using security mechanisms for the client
Getting information about available security services
Determining supported security services and mechanisms
Determining active security services
Determining whether a security service Is enabled
Using Kerberos
Kerberos compatibility
Starting Adaptive Server under Kerberos
Configuring Kerberos
Using principal names
Specifying the Adaptive Server principal name
Using sybmapname to handle user principal names
Concurrent Kerberos authentication
Configuring Adaptive Server for LDAP user authentication
Composed DN algorithm
Searched DN algorithm
Configuring LDAP
LDAP user authentication administration
LDAP user authentication password information changes
Failover support
Adaptive Server logins and LDAP user accounts
Secondary lookup server support
LDAP server state transitions
LDAP user authentication tuning
Adding tighter controls on login mapping
Login mapping of external authentication
Troubleshooting LDAP user authentication errors
Configuring an LDAP server
LDAPS user authentication enhancements
Automatic LDAP user authentication and failback
Setting the LDAP failback time interval
Examples
Configuring Adaptive Server for authentication using PAM
Enabling PAM in Adaptive Server
Configuring operating systems
Running a 32- and 64-bit server on the same machine
Configuring Adaptive Server for PAM user authentication
Adaptive Server logins and PAM user accounts
Enhanced login controls
Forcing authentication
Mapping logins using sp_maplogin
Displaying mapping information
Determining the authentication mechanism
Managing User Permissions
Overview
Permissions for creating databases
Changing database ownership
Database owner privileges
Database object owner privileges
Other database user privileges
Permissions on system procedures
Granting and revoking permissions
Object access permissions
Concrete identification
Special requirements for SQL92 standard compliance
Examples of granting object access permissions
Examples of revoking object access permissions
Granting permissions on dbcc commands
Server-wide and database-specific dbcc commands
dbcc grantees and users in databases
Permissions on system tables
Granting default permissions to system tables and stored procedures
Combining grant and revoke statements
Understanding permission order and hierarchy
Grant dbcc and set proxy issue warning for fipsflagger
Acquiring the permissions of another user
Using setuser
Using proxy authorization
Using set proxy to restrict roles
Executing proxy authorization
Proxy authorization for applications
Changing database object ownership
Supported object types
Authorization
Transferring ownership
Transferring ownership of objects in the system database
Transferring ownership of database owner objects
Using preserve permissions
Security issues
Transferring ownership of encryption keys
Reporting on permissions
Querying the sysprotects table for proxy authorization
Displaying information about users and processes
Reporting permissions on database objects or users
Reporting permissions on specific tables
Using views and stored procedures as security mechanisms
Using views as security mechanisms
Using stored procedures as security mechanisms
Roles and stored procedures
Understanding ownership chains
Example of views and ownership chains
Example of procedures and ownership chains
Permissions on triggers
Executing a procedure with execute as owner or execute as caller
Creating a procedure with references to an object with an unqualified name
Procedures that invoke a nested procedure in another database with a fully qualified name
Using row-level access control
Access rules
Syntax for access rules
Using access and extended access rules
Access rule examples
Access rules and alter table command
Access rules and bcp
Access rules as user-defined Java functions
Using the Application Context Facility
Setting permissions for using application context functions
Creating and using application contexts
set_appcontext
get_appcontext
list_appcontext
rm_appcontext
SYS_SESSION system application context
Solving a problem using an access rule and ACF
Using login triggers
Creating login triggers
Configuring login triggers
Executing a login trigger
Understanding login trigger output
Using login triggers for other applications
Login trigger restrictions
Issues and information
Disabling execute privilege on login triggers
Exporting set options from a login trigger
Setting global login triggers
Granting Predicated Privileges
Introduction to predicated privileges
Commands used for predicated privileges
Configuring Adaptive Server to use predicated privileges
enable predicated privileges
Granting predicated privileges
Granting access to select data
Granting access to update data
Granting access to delete data
Using predicated privileges to enforce a data privacy policy
Revoking predicated privileges
How Adaptive Server saves predicated privileges in sysprotects
Predicated role activation
Combining predicates to enforce row-level privileges
Understanding SQL behavior with predicated privileges
Chain-of-ownership effect on predicated privileges
ansi_permissions and predicated privileges
Permissions on accesses made by predicates
Using triggers with predicated privileges
Recompiling predicated privileges
Disallowing recursive predicate processing
Information leakage through predicates
Using Granular Permissions
Introduction to granular permissions
Configuring Adaptive Server to use granular permissions
System privileges
Effect of privileges as part of system-defined roles
Permission management
manage security permissions privilege
manage server permissions privilege
manage database permissions privilege
manage any object permission privileges
Privileges granted to system-defined roles
Privileges assigned to the database owner
Roles added with granular permissions
sa_serverprivs_role
Default roles granted to the system administrator
Limiting the power of the system administrator and database owner
Enable granular permissions and sybsecurity
Logging in to a locked-out Adaptive Server
General use scenarios
Scenario 1: Permissions for an application server user
Scenario 2: Permissions for a database access manager
Scenario 3: Permissions for a database backup manager
Scenario 4: Permissions for a help desk operator
Scenario 5: Permissions for a security auditor
System table master.dbo.sysprotects
Database user usedb_user
Grantable system privileges
Confidentiality of Data
Secure Sockets Layer (SSL) in Adaptive Server
Internet communications overview
Public-key cryptography
SSL overview
SSL in Adaptive Server
SSL filter
Authentication via the certificate
Connection types
Enabling SSL
Obtaining a certificate
Creating server directory entries
Administering certificates
Performance
Cipher Suites
@@ssl_ciphersuite
Setting SSL cipher suite preferences
Examples sp_ssladmin
Other considerations
Using SSL to specify a common name
Specifying a common name with sp_listener
Stored procedure sp_addserver changed
Kerberos confidentiality
Dumping and loading databases with password protection
Passwords and earlier versions of Adaptive Server
Passwords and character sets
Auditing
Introduction to auditing in Adaptive Server
Correlating Adaptive Server and operating system audit records
The audit system
The sybsecurity database
The audit queue
Auditing configuration parameters
Auditing grant and revoke commands
Auditing DML statements
Auditing login and login profile commands
Auditing stored procedures
System procedures for auditing
Managing deployed source in source code control systems
Installing and setting up auditing
Installing the audit system
Tables and devices for the audit trail
Device for the syslogs transaction log table
Preinstallation tasks for auditing devices
Installing auditing with auditinit
Installing auditing with installsecurity
Moving the auditing database to multiple devices
Moving sybsecurity without saving global audit settings
Moving sybsecurity and saving global audit settings
Setting up audit trail management
Setting up threshold procedures
Setting auditing configuration parameters
Setting up transaction log management
Truncating the transaction log
Managing the transaction log with no truncation
Enabling and disabling auditing
Single-table auditing
Establishing and managing single-table auditing
Threshold procedure for single-table auditing
What happens when the current audit table is full?
Recovering when the current audit table is full
Restarting auditing
Setting global auditing options
Auditing options: types and requirements
Examples of setting auditing options
Hiding system stored procedure and command password parameters
Determining current auditing settings
Adding user-specified records to the audit trail
Examples of adding user-defined audit records
Querying the audit trail
Understanding the audit tables
Reading the extrainfo column
Monitoring failed login attempts
Auditing login failures
Sybase Control Center for Adaptive Server Enterprise 3.2.8
About Sybase Control Center for Adaptive Server
New Features in Sybase Control Center for Adaptive Server Enterprise
User Interface Overview
Toolbar Icons
Status Icons
Display and Copy Options in Adaptive Server monitors
Common Display Options
Keyboard Shortcuts
Displaying the Versions of SCC Components
Style and Syntax Conventions
Accessibility Features
Sybase Control Center Accessibility Information
Get Started
Quick Start for an Evaluation
Get Started in a Production Environment
Deploying an Instance from a Shared Disk Installation
Enabling and Disabling Shared-Disk Mode
Shared-Disk Mode
sccinstance Command
Launching Sybase Control Center
Registering the ODBC Driver in Windows
Starting and Stopping Sybase Control Center in Windows
Starting and Stopping Sybase Control Center in UNIX
Configuring Memory Usage
Changing a Memory Option on the Command Line
Changing a Memory Option for a Sybase Control Center Windows Service
Changing a Memory Option for an SCC UNIX Service
scc Command
Logging in to Sybase Control Center
Logging out of Sybase Control Center
Setting Up Security
Security
Configuring Authentication for Windows
Configuring a Pluggable Authentication Module (PAM) for UNIX
Configuring an LDAP Authentication Module
LDAP Configuration Properties
Mapping Sybase Control Center Roles to LDAP or OS Groups
Encrypting a Password
Configuring Ports
Configuring the E-mail Server
Configuring the Automatic Logout Timer
Configuring Retrieval Thresholds for the Administration Console
User Authorization
Assigning a Role to a Login or a Group