SAP Adaptive Server Enterprise 16.0
Release Bulletin SAP Adaptive Server Enterprise 16.0 for HP-UX
Release Bulletin SAP Adaptive Server Enterprise 16.0 for IBM AIX
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Linux
Release Bulletin SAP Adaptive Server Enterprise 16.0 Solaris
Release Bulletin SAP Adaptive Server Enterprise 16.0 for Windows
Release Bulletin SAP Control Center 3.3
Product Summary
Installation and Upgrade
Installation and Implementation of SAP Control Center
Choosing an Installer
Supported Server Versions
Supported Product Modules and Release Documents
Known Issues
Known Issues for Installation, Upgrade, and Deployment
Known Issues for SAP Control Center
Known Issues for SAP® Adaptive Server® Enterprise
Known Issues for Data Assurance
Known Issues for Replication
Known Issues for SAP Sybase Event Stream Processor
Known Issues for SAP Sybase IQ
Known Issues for Accessibility
Documentation Changes
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
SAP Control Center Accessibility Information
Installation Guide SAP Adaptive Server Enterprise 16.0 for HP-UX
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for IBM AIX
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Making Input/Output Completion Port API Available
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
The System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for Linux
Installation Guide SAP Adaptive Server Enterprise 16.0 for Solaris
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
Memory Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Creating the Sybase User Account
Preparing to Install SAP ASE
Adjusting the Operating System Shared Memory Parameters
Managing Java in the Database During Installations and Upgrades
Multipathing
Setting Up Multipathing
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading Interactively Using sqlupgrade
Upgrading Noninteractively Using sqlupgraderes
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
Migrating Data by Replacing the Binary
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Adaptive Server Enterprise 16.0 for Windows
Conventions
Installation Task Overview
Installation Workflows
SAP ASE Components
SAP ASE Editions
Determining the Edition You Have
SAP ASE Options
Managing SAP ASE with SAP Control Center
Client Components and Utilities
System Requirements
System Requirements for Clients
Planning Your SAP ASE Installation
SAP ASE Release Bulletin
Obtaining a License
Comparing License Deployment Models
SySAM License Server
Determining Host IDs
Determining Host IDs for Machines with Multiple Network Adapters
Using Alternate Host IDs on Windows
Generating Licenses
Generating License Keys at SMP
Knowing the Product License Type
Optional Feature Licenses
SySAM Licensing Checkout
Sub-capacity Licensing
Installation Directory Contents and Layout
Preparing to Install SAP ASE
Managing Java in the Database During Installations and Upgrades
Installing SAP ASE
Installing SAP ASE in GUI Mode
Installing SAP ASE in Console Mode
Minimally Configuring an SAP ASE Server
Installing SAP ASE Using a Response File
Creating a Response File
Installing in Silent Mode
Command Line Options
Uninstalling SAP ASE
Removing an Existing SAP ASE Server
Starting and Stopping SAP Control Center
Postinstallation Tasks
Set Up sybase User in Windows
Verifying That Servers are Running
Verifying Your Connection to the Servers
Test the Installation and Network Connections
Configuring libtcl.cfg for LDAP
Adding a Server to the Directory Service
Adding a Server to the Interfaces File
Setting the System Administrator Password
Installing Sample Databases
Default Devices for Sample Databases
Running the Database Scripts
Installing the interpubs Database
Installing the jpubs Database
Maintaining Sample Databases
SAP ASE Upgrades
Considerations When Upgrading from SAP ASE 15.0.x or Earlier
Considerations for Component Integration Services
Preparing to Upgrade
Changes in SAP ASE Directories
Preupgrade Tasks
Upgrade Stored Procedures
Reserved Words
Running a Reserved Word Check
Addressing Reserved Words Conflicts
Quoted Identifiers
Preparing the Database and Devices
The sybprocsdev device
Increasing the Size of the sybsystemprocs Database
Increasing Device and Database Capacity for System Procedures
Upgrade to SAP ASE 16.0
Upgrading SAP ASE on Windows
Testing the SAP ASE Upgrade
Manually Upgrading SAP ASE
Postupgrade Tasks
Restoring Functionality in SAP ASE After Upgrading
Reenabling Auditing
Updating Threshold Procedures for Audit Segments
Restoring Permissions
Reenabling Replication Server After the Dataserver Upgrade
Restoring Replication on Replicate Databases
Restoring Replication on Primary Databases
Migrate
Migrating Data Using a Dump-and-Load Method
Using bcp to Migrate Data
SAP ASE Components and Related Products
Upgrading Job Scheduler
Upgrading Job Scheduler Templates
Upgrading High Availability and Cluster Support
Upgrading Java in the Database
Enabling Java in the Database in a High Availability System
Upgrading Backup Server
Upgrading Databases Using Dump and Load
How Compiled Objects Are Handled When Upgrading SAP ASE
Finding Compiled Object Errors Before Production
Quoted Identifier Errors
Determining Whether to Change select * in Views
Downgrading SAP ASE
Troubleshoot the Server
Error Logs for Installation Utilities
Error Logs for SAP ASE Servers
Troubleshooting Common Installation Problems
If the Installation Quits While You Are Configuring an SAP ASE Server
Stopping a SAP ASE Server After a Failure
If SAP ASE Fails the Preupgrade Eligibility Test
When an Upgrade Fails
If You Can Identify the Cause of the Upgrade Failure
Restoring Databases After a Failed Upgrade
Recovering from a Failed Upgrade
If You Cannot Identify the Cause of an Upgrade Failure
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
Installation Guide SAP Control Center 3.3
About SAP Control Center
Installation Task Flows for SAP Control Center
Planning Your Installation
Obtaining a License
System Requirements
SAP Control Center Network Ports
Installation Considerations
Preparing to Roll Back from an Upgrade
Preinstallation Tasks
Installing SAP Control Center
Installing with the SAP Installer
Installing with a Response File
Creating a Response File
Installing in Unattended (Silent) Mode
Uninstalling
Upgrading SAP Control Center
Upgrading a Singleton SAP Control Center
Upgrading Shared-Disk Instances
Installing JDBC Drivers for Third-Party Replicate Databases
Starting and Stopping SAP Control Center
Registering the ODBC Driver in Windows
Starting and Stopping SAP Control Center in Windows
Starting and Stopping SAP Control Center in UNIX
Getting Started After Installing
Configuring the SSL Certificate
Setting Passwords or Disabling Default Login Accounts
Encrypting a Password
Enabling Incremental Backups
Configuring SAP Control Center
Troubleshooting Installation
Configuration Guide for UNIX Adaptive Server Enterprise 16.0
About SAP ASE
System-Specific Issues
System User Roles
Environment Variables
SAP ASE Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
sybmgmtdb Database
Using Operating System Files as Database Devices
The directio Parameter
The dsync Parameter
Determine the Size of a Database Device
Support for Raw Partitions or Files
Preparation of a Raw Partition Device
Choosing a Raw Partition
Client/Server Communication
About Changing SAP ASE Configuration
Languages Other Than US English
SAP ASE Specifications
Database Specifications
Table Specifications
Procedure Specifications
Query Specifications
Maximum Column Sizes
Database Requirements for Varying Page Sizes
Data Limits for Tables According to Page Size
Start and Stop Servers
Start Servers
Server Start-up Parameters
RUN_server_name File
Using the startserver Command
Start Servers When the Operating System Restarts
Creating a System Restart Script for HP-UX
Creating a System Restart Script for IBM RS/6000
Creating a System Restart Script for Sun Solaris and Linux
Starting XP Server After Initial Installation
Stop Servers
Stopping SAP ASE
Stopping Backup Server
Using the kill Command
Shutdown and Shared Memory Files
Huge Pages on Linux
Configure the Operating System
Verifying Environment Variables
Using the stty Setting
Restore Correct Permissions
File Descriptors and User Connections
File Descriptors and User Connections for HP-UX
File Descriptors and User Connections for AIX
File Descriptors and User Connections for Linux
File Descriptors and User Connections for Sun Solaris
Displaying Current Soft and Hard Limits
Increasing the Soft Limit
Increasing the Hard Limit
Enable Asynchronous Disk I/O
Enabling Asynchronous Disk I/O on Linux
Enabling Asynchronous Disk I/O on IBM AIX
Enabling Asynchronous Disk I/O HP-UX
Enabling Asynchronous I/O for File System Devices
Enabling Asynchronous I/O for File Systems
Adjust the Client Connection Timeout Period
Adjusting the Client Connection Timeout for HP-UX
Adjusting the Client Connection Timeout for IBM RS/6000
Adjusting the Client Connection Timeout for Linux
Check for Hardware Errors
Monitor the Use of Operating System Resources
Monitor Operating System Resources for HP-UX
Monitor Operating System Resources for IBM RS/6000
Monitor Operating System Resources for Sun Solaris and Linux
Check Database Integrity
Configuring New Servers with srvbuild
Optimize the SAP ASE Configuration
SAP ASE Default Configuration
Default Settings
Set Up Communications Across the Network
How SAP ASE Determines Which Directory Service Entry to Use
How a Client Uses Directory Services
Create a Directory Services Entry
Supported Directory Drivers
Contents of the interfaces File
interfaces File Format
Components of an interfaces File Entry
Create a Master interfaces File
Using dsedit or dscp to Create a Master interfaces File
Using a Text Editor to Create a Master interfaces File
Configure the interfaces File for Multiple Networks
Configuring the Server for Multiple Network Handlers
Configure Client Connections
Manage One Network-Independent DSQUERY Name
Using Different DSQUERY Names
Configuring for Query Port Backup
IPv6 Support
IPv6 Infrastructure
Troubleshoot
Troubleshooting when the Server Fails to Start
Troubleshooting an Error when Executing an ESP
Use the Lightweight Directory Access Protocol as a Directory Service
LDAP Directory Services Versus the SAP Interfaces File
The libtcl*.cfg File
Enabling LDAP Directory Services
Keywords for the LDAP URL Variables
Adding a Server to the Directory Services
Multiple Directory Services
Encrypting the Password
Performance
Migrating from the interfaces File to LDAP
Localization Support
Language Modules
Default Character Sets
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Names
Load Character Sets
Language Definition Files Sort Order
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders for Character Sets
Language Modules
Installing a New Language Module
Message Languages
Localization Directories
About the locales Directory
About the charsets Directory
Format of locales.dat File Entries
How Client Applications Use locales.dat
Changing SAP ASE Localization Configuration
Configuring SAP ASE for Other Character Sets
Editing the locales.dat File
Changing Backup Server Localization Configuration
SAP ASE Error Logging
Set Error Log Paths
Set the SAP ASE Error Log Path
Manage Messages
Log User-Defined Messages
Log Auditing Events
Manage Database Devices
Device Requirements
Create Files for Database Devices
Database Management System Auditing
Audit System Devices and Databases
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Configuration Guide for Windows Adaptive Server Enterprise 16.0
About SAP ASE
System-Specific Issues
User Roles
Environment Variables
SAP ASE Devices and System Databases
The master Device
The sybsystemdb Device
The sysprocsdev Device
Optional Devices and Databases
Pluggable Component Interface (PCI) Database
Sample Databases
sybsecurity Device and Database
dbccdb Database
Using Operating System Files as Database Devices
The dsync Parameter
The directio Parameter
Client/Server Communication
About Changing SAP ASE Configurations
Languages Other Than US English
SAP ASE Specifications
Database Specifications
Table Specifications
Query Specifications
Procedure Specifications
Extended-Limit Capabilities
Start and Stop Servers
Server Start-up Parameters
Specifying Additional Start-up Parameters
Starting and Stopping Servers Using Unified Agent
Start and Stop Servers Using the Control Panel
Starting Servers as an Automatic Service
Setting Up SAP ASE as an Automatic Service
Starting, Stopping, and Pausing Servers Manually
Stopping Backup Server
Stopping SAP ASE
Monitor Servers
Monitoring Servers with the Control Panel
SAP ASE Configurations
Default SAP ASE Configuration
Default SAP ASE Parameter Settings
Default Backup and XP Server Settings
Change SAP ASE Configurations
Starting Server Config
Configuring SAP ASE
Setting SAP ASE Parameters
Changing the Default Backup Server
Changing the Default XP Server
Configuring Backup Server
Configuring Job Scheduler and Self Management
Optimize the SAP ASE Configuration
Network Communications Using sql.ini
Client Connections to SAP ASE
Determine the Address to Listen for Client Connections
Client Access to SAP ASE
Enabling Client Access to a Server
Changing the Server Entries in sql.ini
Components in the sql.ini File
Server Name
Network Driver
Service Type
Server Address
Address Format
IP Address
Named Pipes Format
Windows Sockets Format
Increasing Windows Sockets Connections
Modifying an Existing TcpNumConnections Value
Adding a TcpNumConnections Value
Using Multiple TCP/IP Network Interface Cards
Controlling the Connection Timeout
Increasing the TcpKeepTries Value
NWLink IPX/SPX Format
Available NWLink IPX/SPX Connection Formats
Selecting Valid Connection Formats
Share Network Configuration Information
Creating a Master sql.ini File
Windows Registry as a Directory Service
Using Windows Registry as a Directory Service
Verify Server Connections
Configure ODBC Connections
Configuring the ODBC Driver
IPv6 Support
IPv6 Infrastructure
Lightweight Directory Access Protocol in SAP ASE
LDAP Directory Services versus the SAP Interfaces File
The libtcl.cfg File
Enabling LDAP Directory Services
Adding a Server to the Directory Services
Adding a Server Entry to the Directory Service Using dsedit
Multiple Directory Services
Encrypting the Password
Performance with LDAP
Migrating from the sql.ini File to LDAP
Localization Support
Language Modules
Default Character Sets for Servers
Changing the Default Character Set for Servers
Supported Character Sets
Arabic Character Sets
Baltic Character Set
Simplified Chinese Character Sets
Traditional Chinese Character Set
Cyrillic Character Sets
Eastern European Character Sets
Greek Character Sets
Hebrew Character Sets
Japanese Character Sets
Korean Character Set
Thai Character Sets
Turkish Character Sets
Unicode Character Set
Vietnamese Character Set
Western European Character Sets
Character Set Conversion
Conversions Between Server and Client
Sort Orders
Available Sort Orders
Language Modules
Installing a New Language Module
Message Languages
Localization
Localization Directories
charsets and locales Directories
Format of locales.dat File Entries
Client Application Use of locales.dat
Editing the locales.dat File
Changing SAP ASE and Backup Server Localization Configuration
Completing SAP ASE Localization Changes
Completing Backup Server Localization Changes
Configuring SAP ASE for Other Character Sets
Language-Specific Sort Orders
SAP ASE Character Set Names
charset Utility
Log Error Messages and Events
SAP ASE Error Logging
Windows Event Logging
Setting Up Windows Event Logging
Enable and Disable Windows Event Logging
Enabling or Disabling Event Logging Using Server Config Utility
Enabling or Disabling Event Logging Using sp_configure
Windows Event Log Information
Manage Logs
Set Error Log Paths
Setting the SAP ASE Error Log Path
Setting the Backup Server Error Log Path
Manage Messages
Log User-Defined Messages
New Messages
Existing Messages
Log Auditing Events
Log User-Defined Events
Using a Remote Log
Central Logging Site
Log Messages from Multiple SAP ASEs
Set Up a Local Central Logging Site
Creating a Registry key
Defining a Registry Key
View Messages
Viewing Messages in the Windows Event Log
Viewing Messages in the SAP ASE Error Log
Security Services with Windows LAN Manager
How Login Authentication Works
Administering Security Services Using LAN Manager
Modify Configuration Files Required for a Unified Login
Set Up Drivers for Network-Based Security
Entries for Network Drivers
Entries for Directory Services
Entries for Security Drivers
Editing the libtcl.cfg File
Checking the LAN Manager's Local Name
Specifying Security Information for SAP ASE
Identify Users and Servers to LAN Manager
Configure SAP ASE for LAN Manager Security
Enabling and Disabling External Security Services
Manage Unified Login
Requiring Unified Login
Establishing a Secure Default Login
Map LAN Manager Login Names to Server Names
Data Integrity Check
Ensure Adequate Memory for Security Services
Add Logins to Support Unified Login
Adding Logins
Define the Connection to a Server for Security Services
Specifying the Principal Name
Specifying Network-Based User Authentication
Specifying the Name Assigned to LAN Manager
Determining the Status of Security Services
Configuration Parameters Used in Security Services
Data Integrity Check
Message Sequence Check
Detect Interception or Replay
Specify a Login
Control User Authentication
Manage Login Security on an Windows Computer
SAP ASE Security
Combined SAP ASE and Windows Login Security
Trusted Connections and Combined Login Security
Login Security Modes
Standard Mode
Integrated Mode
Mixed Mode
Manage the Login Security Features
Permit Trusted Connections
Windows Registry Parameters
Default Login
Default Domain
SetHostName
Character Mappings
Modify the Parameter Values
Administer Login Security Using System Procedures
Assigning Trusted Connection Permissions
Display the Current Registry Values
Display Permissions and User Names
Revoke Permissions Granted with sp_grantlogin
Configuring Login Security
Creating Windows Users and Groups
Configuring Mapping and Default Domain Values
Setting Login Security Mode
Adding Network Login Names to syslogins
Assigning Roles
Change Login Security Options
Enabling Standard Login Security Mode
Enabling Integrated or Mixed Login Security Mode
Manage SAP ASE Databases
Manage Database Devices
Device Requirements
Creating .dat Files for Database Devices
Back Up and Restore Data
Backing Up Data with a Tape Drive
Windows Tape Drive Names
Set the Maximum Capacity for a Tape Drive
Backing Up Data Using a Hard Disk
Dumping Across a Network
Examples of Backing Up and Restoring User Databases
Back Up and Restore to a Database and Device
Back Up and Restore on a Remote Backup Server
Backup File Names
Additional Dump Devices
Tape Handling Options
Get Information About Files
Backing Up and Restoring System Databases
Optimize SAP ASE Performance and Tuning
Using Dedicated SAP ASE Operation
Disk Drives and SAP ASE Performance
Monitor Disk Usage
Monitoring SAP ASE Statistics
Database Management System Auditing
Audit System Devices and Databases
Install Online Help for Transact-SQL Syntax
Default Device for the sybsyntax Database
Installing sybsyntax
Troubleshoot Network Connections
Running Server Ping
Troubleshoot Connection Failures
Using Returned Messages to Diagnose a Failure
Troubleshooting a Connection Failure to SAP ASE
Failure to Load Net-Library DLLs
Troubleshooting Failure of Other Applications
Before Calling Technical Support
SAP ASE Registry Keys
\SOFTWARE\SYBASE\Server\server_name
\SOFTWARE\SYBASE\SQLServer\server_name\parameter
\SOFTWARE\SYBASE\SQLServer
\SYSTEM\CurrentControlSet\Services\SYBSQL_server_name
New Features Summary SAP Adaptive Server Enterprise 16.0
Version 16.0
Increased Data Availability with Partition Locking
CIS Support for HANA Server
Relaxed Query Limits
Query Plan Optimization with Star Joins
Query Performance Improvements
Full-Text Auditing
Auditing for Authorization Checks Inside Stored Procedures
Replacing Object Definitions
Query Plan and Execution Statistics in HTML
Index Compression
SAP JVM Support
Full Database Encryption
Scalability Enhancements and Features
Monitoring Threshold-Based Events
Multiple Triggers
Residual Data Removal
Configuration History Tracking
Cyclic Redundancy Checks for dump database
Calculating the Transaction Log Growth Rate
System Changes for SAP ASE Version 16.0
Version 15.7 SP100
Adaptive Server 15.7 SP100 Feature and Platform Matrix
Shrinking Databases
Enhancements to Backup and Restore
Aggregating Metrics from Syntactically Similar Queries
Updates to Precomputed Result Sets
Improved Data Load Performance
Incremental Reorganization
Creating Indexes Without Blocking Access to Data
Query Plan and Execution Statistics in HTML
Gathering Hash-Based Statistics with create index
Query Plan Optimization with Bloom Filters
Support for Replication by Column Value
Support for Multiple Scanner Threads
Sybase Central Adaptive Server Plug-in
Running Adaptive Server on VMware vSphere
Support for OData
Support for NTLM and MIT Kerberos on Windows 64-bit
Properties Added to Responses File
Automatic Physical Database Rearrangement
System Changes for Adaptive Server Version 15.7 SP100
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Permission Changes for Commands and Functions
Version 15.7 ESD #4
15.7 ESD #4.2
Improved Rollback Reporting
15.7 ESD #4
Remote Backup Server Maximum Name Length
Support for Query Plan Pinning
AF_UNIX Support
Changes to sp_addthreshold and Roles
System Changes for Adaptive Server Version 15.7 ESD #4
Utilities
Configuration Parameters
Version 15.7 ESD #3
sybrestore Utility
System Changes for Adaptive Server Version 15.7 ESD #3
Commands
Functions
System Stored Procedures
Monitoring Table Changes
Version 15.7 ESD #2
Granular Permissions
Predicated Privileges
Deferred Table Creation
Online Utilities
Merging and Splitting Partitions
Maximum Size of Query in the Statement Cache
Enhancements to show_cached_plan_in_xml
Fast-Logged Bulk Copy
Precomputed Result Sets
Concurrent dump database and dump transaction Commands
Hash-Based Update Statistics
Enhancements to dump and load
alter table drop column without datacopy
Expanded Maximum Database Size
User-Defined Optimization Goal
Shared Query Plans
Initializing Databases Asynchronously
In-Row Large Object Compression
Configuring Shared Memory Dumps
System Changes for Adaptive Server Version 15.7 ESD #2
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
Version 15.7 ESD #1
Proxy Table Support for In-row LOB Columns
Support for System Procedures in Replicated Master Database
Increased Number of Parameters
Multiple Listeners on Windows
Windows Supports Adaptive Server High Availability
New and Changed Configuration Parameters
Version 15.7
Application Functionality Configuration Group
New Adaptive Server Kernel
Compressing Data in Adaptive Server
New Security Features
End-to-End CIS Kerberos Authentication
Dual Control of Encryption Keys and Unattended Startup
Securing Logins, Roles, and Password Management Extensions
Login Profiles
Employee Lifecycle Management
External Passwords and Hidden Text
Abstract Plans in Cached Statements
Shrink Log Space
Displaying Currently Set Switches with sysoptions
Changes for Large Objects
In-Row Off-Row LOB
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Using LOB Locators in Transact-SQL Statements
Extension to where Clause for Large Objects
Showing Cached Plans in XML
Padding a Character Field Using str
Changes to select for update
Creating Nonmaterialized, Non-null Columns
Sharing Inline Defaults
Retain Monitoring Data
Analyze Dynamic Parameters
Monitor Lock Timeouts
Truncate Trailing Zeros
Fully Recoverable DDL
Transfer Rows from Source to Target Table Using merge
View Statistics and Histograms with sp_showoptstats
Changes to Cursors
Release Cursor Locks at Cursor Close
Enhanced Transaction Support for Cursors
Monitor Cursor Statements
Nested select Statement Enhancements
Changes to Commands and System Procedures in Chained Transaction
Expanded Variable-Length Rows
Changes to like Pattern Matching
Changes to Quoted Identifiers
Allowing Unicode Noncharacters
Reduce Query Processing Latency
The sybdiag Utility
The Optimizer Diagnostic Utility
System Changes for Adaptive Server Version 15.7
Commands
Functions
System Stored Procedures
Configuration Parameters
System Tables
Utilities
Monitoring Table Changes
New Monitoring Tables
Changes to Monitoring Tables
Global Variables
Version 15.5 Cluster Edition
Adaptive Server 15.5 Cluster Edition Feature and Platform Matrix
Multiple simultaneous failover
Adding space to an archive database
Distributed transaction management in the shared-disk cluster
System Changes for Adaptive Server Version 15.5 Cluster Edition
Changed commands
Monitoring Tables
Configuration Parameters
Functions
Version 15.5
Adaptive Server 15.5 Feature and Platform Matrix
In-Memory and Relaxed-Durability Databases
Faster Compression for Backups
Backup Server Support for the IBM® Tivoli® Storage Manager
Deferred Name Resolution for User-Defined Stored Procedures
FIPS 140-2 Login Password Encryption
Incremental Data Transfer
bigdatetime and bigtime Datatypes
Creating and Managing tempdb Groups
System Changes for Adaptive Server Version 15.5
Datatypes
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Utilities
Auditing
Version 15.0.3
SQL Statement Replication
Security Enhancements
LDAPS User Authentication Enhancement
Automatic LDAP User Authentication and Failback
Login Mapping of External Authentication
Using SSL to Specify a Common Name
Concurrent Kerberos Authentication
Virtually Hashed Tables
Huge Pages
Upgrading During a High Availability Configuration
Reinstalling System Stored Procedures
Distributed Transaction Management (DTM)
Adaptive Server Plug-in Updates
The Java Interface
System Changes for Adaptive Server Version 15.0.3
Functions
System Stored Procedures
Commands
Configuration Parameters
Monitoring Tables
System Tables
Version 15.0.2
Encrypted Columns
Archive Database Access
Finding Slow-Running Queries
Deferred Compilation
Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Statistical Aggregate Functions
Standard Deviation and Variance
Eager and Lazy Aggregation
Vector and Scalar Aggregation
Improved Performance for Data Insertion
Using Asynchronous Writes During a Page Split
Improving Throughput of tempdb Transactions
Post-commit Optimization
Changes to the Query Processor
Deferred Compilation
Non-binary Character Set Histogram Interpolation
Expression Histogramming Selectivity Estimates
Viewing Current Optimizer Settings
New Security Features
PAM Support in 64-bit Adaptive Server on AIX
Global Login Triggers Set Automatically
SSL Support
Improved Password Security
Auditing Enhancements
Hiding System Stored Procedure and Command Password Parameters
Monitoring Failed Login Attempts
High Availability Considerations
Installing and Editing Monitoring Tables
Monitoring Tables for the Statement Cache
Row-Level Locking for System Tables
The xmltable() Function
Relocated Joins
User-Defined SQL Functions
instead of Triggers
System Changes for Adaptive Server Version 15.0.2
Trace Flags
Commands
Changes to the set Command
Utilities
System Stored Procedures
System Tables
Configuration Parameters
Functions
Global Variables
Version 15.0.1
Changes to Abstract Plans
New Query-Level Settings
Operator Name Alignment for the Abstract Plan and the Optimizer Criteria
Extending the Optimizer Criteria Set Syntax
Literal Parameterization
System Changes for Adaptive Server Version 15.0.1
Functions
Configuration Parameters
Commands
Monitoring Tables
Version 15.0
Partition Support
Row-Locked System Catalogs
Query Processor
Large Identifiers
Computed Columns
Differences Between Computed Columns and Function-Based Indexes
Differences Between Materialized and Not Materialized Computed Columns
Scrollable Cursors
unitext Datatype Support
big int Datatype Support
Unsigned Integer Datatype Support
Integer Identity
Enhancements to XML Services
Adaptive Server Plug-in Enhancements
Interactive SQL
User-Defined Web Services
Very Large Storage Support
Automatic Running of update statistics
SySAM License Management
Query Processing Metrics (qp Metrics)
Updates to Abstract Plans
showplan Changes
Secure Socket Layer Uses FIPS 140-2
System Changes for Adaptive Server Version 15.0
Utilities
Reserved Words
Global Variables
Configuration Parameters
Functions
Commands
System Stored Procedures
System Tables
Monitoring Tables
Obtaining Help and Additional Information
Technical Support
Downloading Product Updates
Product and Component Certifications
Accessibility Features
New Features Guide SAP Adaptive Server Enterprise 16.0
Overview of Version 16.0
Increased Data Availability with Partition Locking
Partition Locks
Partition Lock Name
Enabling Partition Locking
View Partition Locks with sp_lock
View Partition Locks with sp_familylock
View Partition Locks with monLocks and monDeadLock
Deadlocks and Lock Timeouts
Partition Lock Promotion
Setting Partition Lock Promotion Thresholds
Dropping Partition Lock Promotion Thresholds
Lock Compatibility and Lock Sufficiency
Partition Lock Compatibility
Partition Lock Sufficiency
Schema Lock Compatibility
Schema Lock Sufficiency
Improved Concurrency for Partition-Level Online Operations
Partition-Level Online Operation Syntax
Concurrency with Partition-Level Online Operations
Partition-Level Online Operations with Global Index
Schema Locks
Component Integration Services Support for HANA Server
Configuring CIS for HANA
Creating SAP HANA as an ODBC Data Source on Windows
Adding SAP HANA to the SAP ASE Interfaces File
Configuring the PCI Bridge and PCA/ODBC
Adding Server Class HANAODBC
Datatype Mapping Between SAP ASE and HANA
Restrictions
Relaxed Query Limits
Query Plan Optimization with Star Joins
Star Join Hint
Star Join Query Plans Under the use fact_table Hint
Query Performance Improvements
Dynamic Thread Assignment
SORT Operator Performance Improvement
Hash Join Operator Performance Improvement
Full-Text Auditing
Auditing for Authorization Checks Inside Stored Procedures
Replacing Object Definitions
Install Script Changes
Data and Log Segment Changes
Query Plan and Execution Statistics in HTML
Option for Prefix of Generated File
Index Compression
Enabling Index Compression
Creating an Index Compressed Table
Creating a Compressed Index
Changing the Compression State
SAP JVM Support
Full Database Encryption
Full Database Encryption Versus Encrypted Columns
Creating the Database Encryption Key
Changing a Database Encryption Key
Dropping a Database Encryption Key
Create an Encrypted Database
Encrypt an Existing Database
Encryption Status and Progress
Performance Considerations
Suspend the Encryption Process
The quiesce database Command and Fully Encrypted Databases
Resume the Encryption Process
Decrypt an Encrypted Database
Recover Fully Encrypted Databases
Back Up (Dump) a Fully Encrypted Database
Back Up the Database Encryption Key
Restore (Load) Backups of Fully Encrypted Databases
Loading Behavior of Encrypted Databases
Dropping a Database That is Being Encrypted
Mounting and Unmounting a Fully Encrypted Database
Archive Databases and Full Encryption
Full Database Encryption and System Changes
Scalability Enhancements and Features
Run-Time Logging Enhancements
Lock Management Enhancements
Metadata and Latch Management Enhancements
Monitoring Threshold-Based Events
Multiple Triggers
Creating Multiple Triggers
Changing the Order of When a Trigger is Fired
Order of Triggers in Merge Statements
Transactional Behavior with Multiple Triggers
Disabling and Reenabling Triggers
@@trigger_name Global Variable
Residual Data Removal
Configuration History Tracking
Configuring SAP ASE to Track Configuration Changes
Changes Captured
Querying ch_events to View Changes
Cyclic Redundancy Checks for dump database
Calculating the Transaction Log Growth Rate
System Changes
Configuration Parameters
New Configuration Parameters
Changed Configuration Parameters
Built-In Functions
dbencryption_status
Commands
alter database for Full Database Encryption
alter index
alter table for Index Compression
alter table for Multiple Triggers
alter table for Residual Data Removal
create archive database for Full Database Encryption
create database for Full Database Encryption
create default
create encryption key
create function
create function (SQLJ)
create index
create procedure
create procedure (SQLJ)
create rule
create table for Index Compression
create table for Residual Data Removal
create trigger for Multiple Triggers
create trigger for or replace
create view
drop encryption key
drop trigger
dump database
kill
load database
select
select into
set
System Procedures
Changed System Procedures
sp_audit
sp_chgattribute
sp_clusterlockusage
sp_dboption
sp_depends
sp_encryption
sp_familylock
sp_helpdb
sp_lock
New System Procedures
sp_confighistory
sp_ dropglockpromote_ptn
sp_droprowlockpromote_ptn
sp_helptrigger
sp_jsconfigure
sp_logging_rate
sp_setpglockpromote_ptn
sp_setrowlockpromote_ptn
System Tables
Changed System Tables
New System Tables
ch_events
Changed Monitoring Tables
New Monitoring Tables
monThresholdEvent
Utilities
ddlgen
sybmigrate
sybrestore
Global Variables
Security Administration Guide SAP Adaptive Server Enterprise 16.0
SAP Control Center 3.3 for SAP Adaptive Server Enterprise
About SAP Control Center for SAP Adaptive Server Enterprise
New Features in SAP Control Center for SAP Adaptive Server Enterprise
User Interface Overview
Toolbar Icons
Status Icons
Display and Copy Options in SAP Adaptive Server Enterprise Monitors
Common Display Options
Keyboard Shortcuts
Displaying the Versions of SCC Components
Style and Syntax Conventions
SAP Control Center Accessibility Information
Get Started
Quick Start for an Evaluation
Get Started in a Production Environment
Deploying an Instance from a Shared Disk Installation
Enabling and Disabling Shared-Disk Mode
Shared-Disk Mode
sccinstance Command
Launching SAP Control Center
Registering the ODBC Driver in Windows
Starting and Stopping SAP Control Center in Windows
Starting and Stopping SAP Control Center in UNIX
Configuring Memory Usage
Changing a Memory Option on the Command Line
Changing a Memory Option for an SAP Control Center Windows Service
Changing a Memory Option for an SCC UNIX Service
scc Command
Logging in to SAP Control Center
Logging out of SAP Control Center
Setting Up Security
Security
Configuring Authentication for Windows
Configuring a Pluggable Authentication Module (PAM) for UNIX
Configuring an LDAP Authentication Module
LDAP Configuration Properties
Mapping SAP Control Center Roles to LDAP or OS Groups
Encrypting a Password
Configuring Ports
Configuring the E-mail Server
Configuring the Automatic Logout Timer
Configuring Retrieval Thresholds for the Administration Console
User Authorization
Assigning a Role to a Login or a Group
Removing a Role from a Login or a Group
Adding a Group
Removing a Group
Adding a Login Account to a Group
Removing a Login Account from a Group
Adding a Login Account to the System
Removing a Login Account from the System
Modifying a User Profile
Logins, Roles, and Groups
Configure
Configuring SAP Adaptive Server Enterprise for Monitoring
Registering an SAP ASE Server
Importing Resources for Batch Registration
Registering the Agent for an SAP ASE Server
Authenticating a Login Account for a Managed Resource
Role Assignment in SAP Control Center for SAP ASE
Encrypted Authentication for SAP ASE
Setting Up Statistics Collection
About Statistics
SAP ASE Data Collections
Key Performance Indicators for SAP ASE
Creating an Alert
SAP ASE Alerts
Alert Types, Severities, and States for SAP ASE
Alert-Triggered Scripts
Alert-Triggered Script Examples
Substitution Parameters for Scripts
Setting Display Options for SAP ASE Performance Data
Optional Configuration Steps
Manage and Monitor
Displaying Resource Availability: the Heat Chart
Graphing Performance Counters: the Statistics Chart
Manage SAP Control Center
Administration Console
Browsing and Managing Resources
Searching and Filtering Resources
Searching for Objects in SAP ASE
Manage Message Rows for Search Requests
Configuring Retrieval Thresholds for the Administration Console
Job Scheduling
Executing and Stopping a Data Collection Job
Deleting a Data Collection Job
Resuming and Suspending a Data Collection Job
Adding a New Schedule to a Job
Viewing or Deleting a Schedule
Modifying the Data Collection Interval for a Job
Resuming and Suspending the Scheduler
Viewing the Job Execution History
Alerts
SAP ASE Alerts
Alert Types, Severities, and States for SAP ASE
Creating an SAP ASE Alert
Displaying SAP ASE Alerts
Modifying an Alert
Deleting an Alert
Alert Subscriptions
Adding or Modifying an Alert Subscription
Unsubscribing from an Alert
Enabling and Disabling Alert Subscription
Alert Notifications
Displaying Alert History and Resolutions
Resolving Alerts
Alert-Triggered Scripts
Substitution Parameters for Scripts
Testing an Alert-Triggered Script
Alert-Triggered Script Examples
Resources
Unregistering a Resource
Adding a Resource to a Perspective
Removing a Resource from a Perspective
Modifying a Resource’s Name and Connection Properties
Searching for Resources in the Resource Explorer
Perspectives
Creating a Perspective
Removing a Perspective
Renaming a Perspective
Views
Managing a View
Arranging View Layout in a Perspective
Instances
Enabling and Disabling Shared-Disk Mode
Deploying an Instance from a Shared Disk Installation
Refreshing or Converting an Instance
Removing an Instance
Shared-Disk Mode
sccinstance Command
Repository
Scheduling Backups of the Repository
Modifying the Backup Schedule
Forcing an Immediate Backup
Restoring the Repository from Backups
Configuring Repository Purging
Logging
Viewing the SAP ASE Component Log
Viewing SAP Control Center Server Logs
Viewing the SAP Control Center Client Log
Changing the Logging Level
Logging or Message Levels
Changing Logging Configuration
SAP Control Center Console
Console Commands
help Command
info Command
shutdown command
status Command
Setting SAP ASE Parameters in the Configuration File
Configuration Parameters for SAP ASE
Manage and Monitor the SAP ASE Environment
Managing an SAP ASE server
Executing SQL Statements
Registering the Agent for an SAP ASE Server
Authenticating the Unified Agent
Authenticating the SCC Agent
Starting an SAP ASE Server
Stopping an SAP ASE Server
Configuring Retrieval Thresholds for the Administration Console
SAP ASE Error Log
Viewing the SAP ASE Error Log
Searching the Error Log for Messages
Managing Flag Definitions
Importing Flag Definitions
Exporting Flag Definitions
Server Configuration
Displaying Configuration Values
Modifying Server Configuration Parameters
Server Configuration Statistics and Details
Server Monitor Settings
Server Properties
Activating a Role
Managing Permissions
Enabling Granular Permissions
Replacing Compiled Object Definitions
Displaying the Performance Overview
Performance Overview Statistics and Details
Caches
Monitor Caches
Monitoring SAP ASE Data Caches
Modifying Data Cache Sizes
Adding Data Cache Buffer Pools
Data Cache Statistics and Details
Monitoring the SAP ASE Procedure Cache
Procedure Cache Statistics and Details
Monitoring the SAP ASE Statement Cache
Setting the Statement Cache Size
Statement Cache Statistics and Details
Monitoring SAP ASE In-memory Storage
In-memory Storage Statistics and Details
Manage Caches
Creating a Cache
Cache Properties
Managing Binding Options
Managing Buffer Pools
Managing Cache Configurations
Generating DDL for a Cache
Deleting a Cache
Clusters
Monitor Clusters
Cluster Instances
Monitoring Cluster Instances in Cluster Configurations
Cluster Instances Statistics and Details
Cluster Interconnect
Displaying the Cluster Overview
Cluster Interconnect Statistics and Details
Monitoring Interprocess Communication in Cluster Configurations
Workload Management
Monitoring Workloads in Cluster Configurations
Workload Management Statistics and Details
Manage Clusters
Starting the SCC agent for a Cluster
Starting the Unified Agent for a Cluster
Preparing to Create a Cluster
Creating a Cluster
Registering a Cluster
Registering the Agent and Starting a Cluster
Displaying Cluster Configuration Values
Starting a Cluster
Stopping a Cluster
Dropping a Cluster
Viewing a Cluster Log
Cluster Properties
Manage Logical Clusters
Adding a Logical Cluster
Designating a Failover Logical Cluster
Designating a Failback Logical Cluster
Logical Cluster States
Changing the State of a Logical Cluster
Deleting a Logical Cluster
Generating a DDL Script for a Logical Cluster
Logical Cluster Properties
Manage Cluster Instances
Displaying Instance Configuration Values
Starting an Instance
Adding an Instance to a Cluster
Stopping an Instance
Deleting an Instance
Instance Properties
Viewing an Instance Log
Manage Load Profiles
Adding a Load Profile
Deleting a Load Profile
Generating a DDL Script for a Load Profile
Load Profile Properties
Manage Routes
Adding a Route
Deleting a Route
Route Properties
Manage Auxiliary Servers
Configuring a Backup Server
Deleting a Backup Server
Backup Server Properties
Configuring an XP Server
Deleting an XP Server
XP Server Properties
Databases
Monitor Databases
Determining the Backup Status of a Database
Displaying Resources Used by a Database
Modifying Database Sizes
Database Statistics and Details
Displaying Information About Segments Used by a Database
Manage Databases
Creating a User Database
Creating a Proxy Database
Creating a Temporary Database
Creating an Archive Database
Creating an In-Memory Database
Creating an In-Memory Temporary Database
Creating an Encrypted Database
Encrypting an Existing Database
Suspending the Encryption Process
Resuming the Encryption Process
Decrypting an Encrypted Database
Suspending the Decryption Process
Resuming the Decryption Process
Creating a Temporary Database Group
Shrinking a Database
Backing Up (Dumping) a Database
Viewing Available Dump Configurations
Creating a Dump Configuration
Backing Up a Database Using a Dump Configuration
Dump Configuration Properties
Deleting a Dump Configuration
Backing Up a Database or Transaction Log to Multiple Stripes
Backing Up a Database Incrementally
Backing Up a Database Incrementally Using a Dump Configuration
Viewing Dump Records
Purging Dump Records from Dump History
Generating Database-Creation SQL for a Target Database
Generating Database-Creation SQL from a Dump Image
Backing Up Server Configuration Files
Scheduling a Database Backup
Requirements and Permissions for Scheduling Backups
Creating a Schedule for Backups
Schedule Properties
Deleting a Schedule
Scheduling a Backup Job in the Backup Wizard
Creating a New Scheduled Backup Job
Properties of a Scheduled Backup Job
Manage a Scheduled Backup Job
Enabling Scheduled Jobs
Deleting a Backup Job from the Schedule
Disabling Scheduled Jobs
Running a Scheduled Job Now
Rescheduling a Backup Job
Terminating a Scheduled Job in Progress
Viewing the Execution History of a Scheduled Backup Job
Job History Properties
Viewing the Contents of the Execution History Log
Deleting the Execution History of a Scheduled Backup Job
Job Scheduler Administration
Set Up an Alert for When a Backup Job Fails
Restoring (Loading) a Database
Generating a Database Load Sequence
Generating a Database Load Sequence for a Target Database from Dump History
Restoring a Database from a Cumulative Dump
Restoring a Database from a SQL Script
Restoring a Database from a Point in Time
Viewing Database Statistics
Checkpointing Databases
Checking Database Consistency
Placing a Database in Quiesce-Hold
Placing a Database in Quiesce-Release
Mounting an SAP ASE Database
Unmounting an SAP ASE Database
Database Properties
Changing Database Ownership
Modifying Database Storage Allocations
Modifying the Transaction Log Cache and the Log I/O Buffer Size
Changing Database Options
Generating DDL for a Database
Deleting a Database
Defaults
Creating a Default
Defaults Properties
Replacing a Default Definition
Deleting a Default
Devices
Monitor Devices
Determining Device I/O Response and I/O per Second
Modifying Device Sizes
Device Statistics and Details
Manage Devices
Displaying a Device Object
Creating a Database Device
Creating an In-Memory Device
Creating a Dump Device
Database Device Properties
In-Memory Device Properties
Dump Device Properties
Generating DDL for a Device
Deleting a Database, In-Memory, or Dump Device
Engines
Monitor Engines
Displaying Engine CPU Utilization
Engine Statistics and Details
Manage Engine Groups
Creating Engine Groups
Engine Groups Properties
Deleting an Engine Group
Generating DDL for an Engine Group
Execution Classes
Creating Execution Classes
Execution Classes Properties
Modifying Bindings to Execution Classes
Extended Stored Procedures
Creating an Extended Stored Procedure
Replacing an Extended Stored Procedure Definition
Extended Stored Procedures Properties
Granting Execute Permission on an Extended Stored Procedure
Revoking Execute Permission on an Extended Stored Procedure
Deleting an Extended Stored Procedure
Generating DDL for an Extended Stored Procedure
Functions
Manage Scalar Functions
Creating a Scalar Function
Replacing a Scalar User Defined Function Definition
Scalar Function Properties
Granting Execute Permission on a Scalar Function
Revoking Execute Permission on a Scalar Function
Deleting a Scalar Function
Generating DDL for a Scalar Function
Manage SQLJ Functions
Creating a SQLJ Function
Replacing a SQLJ Function Definition
SQLJ Function Properties
Deleting a SQLJ Function
Generating DDL for a SQLJ Function
Networks
Managing Remote Servers
Configuring a Server for Remote Procedure Calls
Adding a Remote Server
Deleting a Remote Server
Remote Server Properties
Testing a Remote Server Connection
Setting Options for a Remote Server
Managing Remote Server Login Mappings
Managing CIS Roles and Logins Mappings
Precomputed Result Sets
Configuring SAP ASE to Use Precomputed Result Sets
Viewing Precomputed Result Sets
Creating a Precomputed Result Set
Deleting a Precomputed Result Set
Altering a Precomputed Result Set
Refreshing Precomputed Result Sets
Truncating a Precomputed Result Set
Granting Permissions on Precomputed Result Sets
Revoking Permissions on Precomputed Result Sets
Granting Precomputed Result Set Permissions to a Specific User
Revoking Precomputed Result Set Permissions from a Specific User
Displaying Information About Precomputed Result Sets
Generating DDL for a Precomputed Result Set
Procedures
Manage Stored Procedures
Creating a Stored Procedure
Replacing a Stored Procedure Definition
Stored Procedure Properties
Granting Execute Permission on a Stored Procedure
Revoking Execute Permission on a Stored Procedure
Deleting a Stored Procedure
Generating DDL for a Stored Procedure
Manage SQLJ Procedures
Creating a SQLJ Procedure
Replacing a SQLJ Procedure Definition
SQLJ Procedure Properties
Deleting a SQLJ Procedure
Generating DDL for a SQLJ Procedure
Processes
Identifying Resource-Intensive Processes
Identifying Blocked Processes and Blocking Processes
Terminating Blocking Processes
Identifying the Lead Blocker in a Chain
Displaying the SQL Query Associated with a Process
Displaying Wait Events for a Process
Process Statistics and Details
Replication Agents
Monitoring RepAgent Threads
Replication Agent Statistics and Details
Rules
Manage Rules
Creating a Rule
Replacing a Rule Definition
Rule Properties
Deleting a Rule
Generating DDL for a Rule
Security
Manage Encryption Keys
Modifying and Deleting a System Encryption Password
Creating a System Encryption Password
Creating a Master Key
Master Key Properties
Modifying, Regenerating, and Deleting a Master Key
Dual Control and Split Knowledge
Creating a Column Encryption Key
Column Encryption Keys Properties
Creating a Key Copy
Modifying and Deleting a Column Encryption Key
Creating a Database Encryption Key
Database Encryption Keys Properties
Granting Encryption Permissions to a Role, User, or Group
Modifying a Database Encryption Key
Deleting an Encryption Key
Generate DDL for an Encryption Key
Manage Login Profiles
Creating a Login Profile
Login Profile Properties
Removing Roles Granted to a Login Profile
Granting Roles to a Login Profile
Deleting a Login Profile
Displaying Logins Assigned to a Login Profile
Transferring Login Attributes to a Login Profile
Manage Logins
Creating a Login
Login Properties
Managing Users Mapped to Logins
Removing Roles from a Login
Granting Roles to a Login
Configuring Login Password Properties
Changing a Login Password
Displaying Login Account Properties
Assigning Login Profiles to a Login
Deleting a Login
Manage Groups
Creating a Group
Adding or Removing Users to or from a Group
Group Properties
Setting Command Permissions for a Group
Granting Object Permissions to a Group
Revoking Object Permissions from a Group
Granting Privileges to a Group
Revoking Privileges from a Group
Deleting a Group
Generate DDL for a Group
Manage Users
Creating a User
Transferring Ownership of a Database Object
Users Properties
Granting Object Permissions to a User
Revoking Object Permissions from a User
Granting Privileges to a User
Revoking Privileges from a User
Setting Command Permissions for a User
Deleting a User
Manage Roles
Expiring a Role Password
Creating a Role
Restoring System Roles
Role Properties
Revoking Object Permission from a Role
Granting Object Permissions to a Role
Revoking Privileges from a Role
Granting Privileges to a Role
Creating Role Hierarchy
Managing Mutually Exclusive Roles
Removing Login Profiles Assigned to a Role
Assigning Login Profiles to a Role
Removing Logins Assigned to a Role
Assigning Logins to a Role
Setting Command Permissions for a Role
Segments
Monitor Segments
Determining the Space Used by a Table on a Segment
Extending a Segment in SAP ASE
Segment Statistics and Details
Manage Segments
Displaying Segments
Creating a Segment
Segment Properties
Removing a Threshold from a Segment
Adding a Threshold to a Segment
Removing a Database Device from a Segment
Adding a Database Device to a Segment
Deleting a Segment
Generating DDL for a Segment
Statistics
Interpreting Statistics
Updating Statistics on a Table
Updating Statistics on Specific Columns
Updating Statistics on an Index
Updating Statistics for a Data Partition
Updating Statistics on an Index Partition
Deleting Statistics from a Table
Deleting Statistics from a Column
Deleting Statistics from a Data Partition
SQL Activity
Monitoring SQL Queries
Executing SQL Statements
Tables
Creating a User or Proxy Table
Creating a Column
Creating an Index
Restoring Table Data
Creating a Foreign Key
Creating a Check Constraint
Checking Table Consistency
Binding Defaults and Rules to a Column
Placing a Table on a Segment
Setting the Table Locking Scheme
Creating a Unique Constraint or Primary Key
Manage Table Compression
Identifying Table Compression Candidates
Initiating a Compression Estimate
Applying Compression Settings
Manage Index Compression
Setting Index Compression on an Index
Setting Index Compression on a Local Index Partition
Setting Index Compression on a Table
Manage Triggers
Creating a Trigger
Trigger Properties
Replacing a Trigger Definition
Incrementally Transferring Data
Enabling Incremental Transfer
Incrementally Transferring Data In
Incrementally Transferring Data Out
Bulk Copying Data
Bulk Copying Data Into or Out of Tables
Setting Table or Column Permissions
Granting Table Permissions
Revoking Table Permissions
Granting Column Permissions
Revoking Column Permissions
Manage Partitions
Partition Locking
Enabling Partition Locking
Enabling Semantic-based Partitioning
Using a Hash Partition
Using a Range Partition
Using a List Partition
Using a Round-Robin Partition
Splitting a Partition
Merging Partitions
Moving a Partition
Deleting a Partition
Reorganize Tables and Table Objects
Reorganizing Tables at the Database Level
Reorganizing Tables
Reorganizing Table Partitions
Reorganizing Indexes
Reorganizing Index Partitions
Status Messages
Table Properties
Column Properties
Index Properties
Foreign Key Properties
Check Constraint Properties
Partition Properties
Deleting a Table
Deleting an Index
Thread Pools
Monitor Threads
Identifying the Threads in a Thread Pool
Thread Statistics and Details
Manage Thread Pools
Creating a Thread Pool
Thread Pool Properties
Transactions
Identifying a Transaction’s Process
Transaction Statistics and Details
User-Defined Datatypes
Adding a User-Defined Datatype
User-Defined Datatypes Properties
Deleting a User-Defined Datatype
Views
Creating a View
Replacing a View Definition
View Properties
Granting Permissions on Views
Revoking Permissions on Views
Deleting a View
Troubleshoot SAP Control Center for SAP ASE
Data Display Problems
Cannot Monitor SAP ASE or Display Statistics Chart
Data on Screens or Charts Is Missing
Database Objects Are Not Updated
Error: No Result Set for this Query
Error: No Data Was Found For Statistic
Error: Unable to Format the Date String
Properties for Engine Groups Incorrectly Displayed
Same Name Engine Groups Are Not Selectable
"Number of Transactions" KPI Is Not Updated
Cannot Find Error Information For Monitor View
Display Large Number of Objects in Administration Console
Data Collection and Alert Problems
Collection Job for SAP ASE Fails
Alerts Are Configured But Do Not Fire
Data Collections Fail to Complete
Alerts Are Not Generated
Authentication and Access Problems
Cannot Log In
SAP Control Center Fails to Start
Browser Refresh (F5) Causes Logout
Invalid Connection Profile
Cannot Authenticate Server Configured with a Multibyte Character Set
Features Are Not Enabled Although You Have sa_role
Resetting the Online Help
Performance Problems
SAP ASE is Responding Slowly
Memory Warnings at Startup
SCC Out of Memory Errors
Performance Statistics Do Not Cover Enough Time
Collect Diagnostic Data
Preparing to Collect Diagnostic Data
Collecting Field Diagnostic Data
Collecting Optimizer Diagnostic Data
Upload Diagnostic Data
Uploading Diagnostic Data Via FTP
Submitting Diagnostic Data via E-mail Message
Deleting a Diagnostic Data File
Glossary: SAP Control Center for SAP ASE
Utility Guide SAP Adaptive Server Enterprise 16.0
Types of Utilities
Threaded Versions of Utilities
Installation or Configuration Utilities
Utilities for Languages, Character Sets, and Sort Orders
Utilities to Start Servers
Database Creation and Manipulation Utilities
Utilities to Gather Information
Tuning Utility
Utility to Manage a Cluster
Utility Commands Reference
auditinit
backupserver
bcp
Usage for bcp
Copying Tables with Indexes or Triggers Using bcp
Using bcp with Compressed Data
buildmaster
certauth
certpk12
certreg
charset
cobpre
cpre
dataserver
Usage for dataserver
Dependencies and Conditions of dataserver -b and -w Options
Potential Issues of Using dataserver -f and -w Options Together
ddlgen
Usage for ddlgen
Hiding Passwords in ddlgen
ddlgen and Encryption
ddlgen for Encrypted Columns
Encrypted Columns and Specifying the -XOD Flag in ddlgen
ddlgen Support for Key Copies
EKC Encryption Key Copy Filter and ddlgen
Create Table DDL
defncopy
dscp
dsedit
extractjava
installjava
Usage for installjava
Cases When Adding New JARs Causes Exceptions
Updating JARs and Classes
Locks
isql
Usage for isql
Interactive isql Commands
isql Session Commands
Prompt Labels and Double Wildcards in an isql Session
Command History in isql
langinstall
optdiag
Usage for optdiag
Byte Ordering and Binary optdiag Files
optdiag Input Mode
preupgrade
Usage for preupgrade
The preupgrade -D Parameter
pwdcrypt
qptune
qrmutil
showserver
sqldbgr
Usage for sqldbgr
Error Messages in sqldbgr
sqlloc
sqllocres
sqlsrvr
Usage for sqlsrvr
Starting an SAP ASE Server
startsrvr Dependencies and Conditions with -b and -w
sqlupgrade
sqlupgraderes
srvbuild
Usage for srvbuild
Using LDAP with srvbuild in a 64-bit Environment
srvbuildres
startserver
Usage for startserver
The Runserver File
sybatch
sybcluster
syconfig
sybdiag
Usage for sybdiag
Viewing sybdiag Output
Configuration Options for sybdiag
sybdumptran
Usage for sybdumptran
sybmigrate
sybrestore
sybtsmpasswd
updatease
xpserver
Using bcp to Transfer Data to and from SAP ASE
Methods for Moving Data
Import and Export Data with bcp
bcp Modes
bcp Requirements
bcp Permissions
Before You Transfer
Copy Data to Partitions Using bcp
Improve bcp Performance
Fast, Fast-logged, and Slow bcp
Slow bcp
Fast bcp
Fast-logged bcp
Copying Tables with Indexes
Locking Scheme and Fast bcp
Space Requirements for Copying
Summary of Steps for Fast and Fast-logged bcp
Bulk Copying Data into Partitioned Tables
Copying Data Randomly Into Partitions
Monitoring bcp Sessions with dbcc checktable and sp_helpsegment
Reducing Logging by Increasing Page Allocations
Using Parallel Bulk Copy to Copy Data into a Specific Partition
bcp in and Locks
Parallel Bulk Copy Methods
Parallel Bulk Copy Syntax
Using Parallel Bulk Copy on Round-robin Partitioned Tables
Parallel Bulk Copy and IDENTITY Columns
Retaining Sort Order
Specifying the Value of a Table’s IDENTITY Column
Bulk Copying Encrypted Data
bcp Options
Using the Default Formats
Native Format
Character Format
Change Terminators from the Command Line
Change the Defaults in Interactive bcp
Respond to bcp Prompts
File Storage Type
Prefix Length
Field length
Field and Row Terminators
Choose Terminators
Format Files
Examples of Copying Out Data Interactively
Examples of Copying In Data Interactively
bcp and Alternate Languages
Support for Initialization Strings
bcp and Row-Level Access Rules
Copy In and Batch Files
Improve Recoverability
Batches and Partitioned Tables
Copy Out and Text and Image Data
Specify a Network Packet Size
Copy In and Error Files
Copy Out and Error Files
Data Integrity for Defaults, Rules, and Triggers
How bcp Differs from Other Utilities
Using dataserver Build Servers
Building a New Master Device
Environments When Using dataserver
Specifying Device and Logical Page Sizes When Building a New SAP ASE Server
Starting an Existing a SAP ASE Server
Upgrading to a Server With Larger Page Sizes
Viewing the Current Server Limits
Using dscp to View and Edit Server Entries
Starting dscp
Working with Server Entries
Adding and Modifying Server Entries
Adding a Server Entry
Modifying or Deleting a Server Entry
Copy Server Entries
List and View Contents of Server Entries
Delete Server Entries
Exiting dscp
Using dsedit to View and Edit Server Entries
Add, View, and Edit Server Entries
Using dsedit in UNIX
Starting dsedit in UNIX
Open an Editing Session in UNIX
Modify Server Entries in UNIX
Adding a New Server Entry in UNIX
Viewing or Modifying a Server Entry in UNIX
Add or Edit Network Transport Addresses
TCP/IP Addresses
SPX/IPX Addresses
Copying a Server Entry to Another Interfaces File in UNIX
Copying Server Entries Within the Current Session
Copying Server Entries Between Sessions
Using dsedit in Windows
Starting dsedit in Windows
Open an Editing Session in Windows
Opening a Session in Windows
Opening Additional Sessions in Windows
Switching Between Sessions in Windows
Modify Server Entries in Windows
Adding a Server Entry
Modifying a Server Attribute
Renaming a Server Entry
Deleting a Server Entry
Copying Server Entries Within the Current Session in Windows
Copying Server Entries Between Sessions in Windows
Troubleshooting dsedit
Using Interactive isql from the Command Line
Starting isql
Stopping isql
Using Transact-SQL in isql
Formatting isql Output
Correcting isql Input
set Options that Affect Output
Changing the Command Terminator
Performance Statistics Interaction with Command Terminator Values
Input and Output Files
UNIX command line redirection
Using Interactive SQL in Graphics Mode
Starting Interactive SQL
The Main Interactive SQL Window
Plan Dialog Tab
The Interactive SQL Toolbar
Open Multiple Windows
Keyboard Shortcuts
Display Data Using Interactive SQL
Edit Table Values in Interactive SQL
Copying Rows from the Interactive SQL Result Set
Editing Rows from the Interactive SQL Result Set
Inserting Rows into the Database from the Interactive SQL Result Set
Deleting Rows from the Database Using Interactive SQL
SQL Statements in Interactive SQL
Canceling an Interactive SQL Command
Combining Multiple Statements
Looking Up Tables, Columns, and Procedures
Recall Commands
Logging Commands
Configure Interactive SQL
General Dialog Box
Result Dialog Box
Import/Export Dialog Box
Messages Dialog Tab
Editor Dialog Box
Query Editor Dialog Box
Processing Command Files
Saving SQL Statements to a File
Executing Command Files
Saving, Loading, and Running Command Files
The SQL Escape Syntax in Interactive SQL
Interactive SQL Commands
Interactive sybcluster Commands Reference
Commands Active Before Connecting to a Cluster
Commands Active After Connecting to a Cluster
add backupserver
add instance
connect
create backupserver
create cluster
create xpserver
deploy plugin
diagnose cluster
diagnose instance
disconnect
drop backupserver
drop cluster
drop instance
drop xpserver
exit
help
localize
quit
set backupserver
set cluster
set instance
set xpserver port
show agents
show backupserver config
show cluster
show instance
show membership mode
show session
show xpserver
shutdown cluster
shutdown instance
start cluster
start instance
upgrade server
use
Using sybmigrate to Migrate Data
What sybmigrate Does
What sybmigrate Does Not Do
Before You Begin
Permissions
Changing Target Login Accounts
Platforms
Environment Settings
Migrating Proxy Tables
Migration process
Overview of the Migration Process
Pre-migration Considerations
Configuration and Tuning for Higher Performance
Configuration Considerations for SAP ASE
Possible Errors to Avoid
Auto-select Dependent Objects for Migration
Migrating an Archive Database
Upgrading an SAP ASE Server with an Archive Database
Downgrading an SAP ASE Server with an Archive Database
GUI Mode
Setting Up Source Databases for Migration
Begin the Migration
Validating the Migration
Migration and Validation Progress
Resource File Mode
Using sybmigrate with Encrypted Columns
Post-migration Activities
Migrate Databases in the Replication Server Domain
Preparing for Migration
Postmigration Procedures
Restoring Primary Databases
Restoring the RSSD
Amending System Tables When the Logical Page Size Changes
Restoring Replicate Databases
Logs
Migrating Databases That Support Wide Data
Limitations
Stopping High Availability
Other Limitations
Troubleshooting and Error Messages
Using sybrestore to Restore Databases
Before You Begin
sybrestore Checks
Compatibility Geometry Check
sybrestore Syntax
Restoring a Database in Noninteractive Mode
Restoring a Database in Interactive Mode
Interactive Menu Options
Logging sybrestore Output
Providing a Mapping Directory
Restoring a Database to a Point In Time
Example of Restoring a Database to a Point In Time
Restoring User and System Databases
Master Database Restore
Prerequisites for Restoring a Master Database
Configuration and Resource Files
Creating or Editing the Restore Utility Configuration File
Creating or Editing Resource Files
Resource File Examples
Restoring a Master Database
Transact-SQL Users Guide 16.0
SQL Building Blocks
Tables, Columns, and Rows
Queries, Data Modification, and Commands
Relational Operations
Compiled Objects
Save or Restore Source Text
Verify and Encrypt Source Text
Replacing Object Definitions
Compliance to ANSI Standards
Federal Information Processing Standards (FIPS) Flagger
Chained Transactions and Isolation Levels
Identifier Compliance to ANSI Standards
SQL Standard-Style Comments
Right Truncation of Character Strings
Permissions Required for update and delete Statements
Arithmetic Errors
Synonymous Keywords
Treatment of Nulls
Data and Language Characters
Naming Convention Identifiers
Multibyte Character Sets
Delimited Identifiers
Uniqueness and Qualification Conventions
Remote Servers
Expressions in SAP ASE
Arithmetic Operators
Bitwise Operators
The String Concatenation Operator
The Comparison Operators
Nonstandard Operators
Character Expression Comparisons
Empty Strings
Quotation Marks
Relational and Logical Expressions
Transact-SQL Extensions
compute Clause
Control-of-Flow Language
Stored Procedures
Extended Stored Procedures
Triggers
Defaults and Rules
Error Handling and set Options
Additional SAP ASE Extensions to SQL
SAP ASE Login Accounts
isql Utility
Default Databases
Network-Based Security Services with isql
Displaying SQL Text
Databases and Tables
Databases
Create a User Database
The on Clause
The log on Clause
for load Option
Choose a Database
Permissions Within Databases
Initialize Databases Asynchronously
Determine If There is Space to be Initialized
Restrictions for Initializing Databases Asynchronously
Drop Databases
Change the Database Size
Enforce Data Integrity in Databases
quiesce database Command
Tables
Designing and Creating a Table
Table Names
Create the User-Defined Datatypes
Choose Columns That Accept Null Values
Sample Table Design Sketch
Define the Sample Table
Create Tables in Different Databases
Create New Tables from Query Results: select into
Check for Errors
Temporary Tables Usage
Unique Temporary Table Names
Manipulate Temporary Tables in Stored Procedures
General Rules for Temporary Tables
Deferred Table Creation
Deferred Table Creation at the Database Level
Create Deferred Tables
Explicitly Materialize Deferred Tables
Identify Deferred Tables
Roll Back for Deferred Tables
Command Behavior in Deferred Tables
IDENTITY Columns Usage
Create IDENTITY Columns with User-Defined Datatypes
Reference IDENTITY Columns
Refer to IDENTITY Columns with syb_identity
Automatically Create “hidden” IDENTITY Columns
Using select into with IDENTITY Columns
Select an IDENTITY Column into a New Table
Select the IDENTITY Column More Than Once
Add a New IDENTITY Column with select into
Define a Column for Which the Value Must Be Computed
IDENTITY Columns Selected into Tables with Unions or Joins
Allow Null Values in a Column
Constraints and Rules Used with Null Values
Defaults and Null Values
Nulls Require Variable-Length Datatypes
text, unitext, and image Columns
Alter Existing Tables
Objects Using select * Do Not List Changes to Table
Use alter table on Remote Tables
Add Columns
Add Columns Appends Column IDs
Add NOT NULL Columns
Add Constraints
Drop Columns
Drop Columns Renumbers the Column ID
Drop Columns Without Performing a Data Copy
Restrictions for no datacopy Parameter
Drop Constraints
Modify Columns
Convert Datatypes
Modifying Tables and Using Bulk Copy
Decreased Column Length May Truncate Data
Modify datetime Columns
Modify the NULL Default Value of a Column
Check Columns That Have Precision or Scale
Modify text, unitext, and image Columns
Add IDENTITY Columns
Drop IDENTITY Columns
Modify IDENTITY Columns
Data Copying
Change exp_row_size
Modifying Locking Schemes and Table Schema
Add, Drop, or Modify Columns with User-Defined Datatypes
Errors and Warnings from alter table
Errors and Warnings Generated by alter table modify
Scripts Generated by if exists()...alter table
Rename Tables and Other Objects
Rename Dependent Objects
Drop Tables
Manage Identity Gaps in Tables
Parameters for Controlling Identity Gaps
Comparison of identity burning set factor and identity_gap
Set the Table-Specific Identity Gap
Change the Table-Specific Identity Gap
Display Table-Specific Identity Gap Information
Gaps from Other Causes
IDENTITY Column Maximum Value
Define Integrity Constraints for Tables
Table and Column Level Constraints
Create Error Messages for Constraints
Check Constraints
Default Column Values
unique and primary key Constraints
Referential Integrity Constraints
Table and Column Level Referential Integrity Constraints
Using Create Schema for Cross-Referencing Constraints
General Rules for Creating Referential Integrity Constraints
Designing Applications That Use Referential Integrity
Computed Columns
Computed Columns Usage
Computed Columns Example
Indexes on Computed Columns
Deterministic Property
Effects of Deterministic Property on Computed Columns
Effects of Deterministic Property on Materialized Computed Columns
Effects of Deterministic Property on Virtual Computed Columns
Effects of Deterministic Property on Function-Based Indexes
Examples of Nondeterministic Computed Columns
Retrieve Information About Databases and Tables
Help on Databases
Help on Database Objects
sp_help Usage on Database Objects
Use sp_helpconstraint to Find Table Constraint Information
Determining Much Space a Table Uses
List Tables, Columns, and Datatypes
Find an Object Name and ID
SQL-Derived Tables
SQL-Derived Tables and Optimization
SQL-Derived Table Syntax
Derived Column Lists
Correlated SQL-Derived Tables Are Not Supported
SQL-Derived Tables Usage
Nesting
Subqueries Using SQL-Derived Tables
Unions in Derived-Table Expressions
Unions in Subqueries
Rename Columns with SQL-Derived Tables
Constant Expressions
Aggregate Functions
Joins with SQL-Derived Tables
Create a Table From a SQL-Derived Table
Views with SQL-Derived Tables
Correlated Attributes
Partition Tables and Indexes
Partitioning Types
Range Partitioning
Hash Partitioning
List Partitioning
Round-Robin Partitioning
Partition Pruning
Composite Partitioning Keys
Indexes and Partitions
Global Indexes
Local Indexes
Guarantee a Unique Index
Create and Manage Partitions
Partitioning Tasks
Create a Range-Partitioned Table
Restrictions on Partition Keys and Bound Values for Range-Partitioned Tables
Create a Hash-Partitioned Table
Create a List-Partitioned Table
Create a Round-Robin–Partitioned Table
Create Partitioned Indexes
Create a Partitioned Table From an Existing Table
Change Data Partitions
Split, Merge, and Move Partitions
Partition Schemes Available for Splitting or Merging
Split Partitions
Merge Partitions
Move Partitions
Effect of Split or Merged Partitions on Indexes
Add Partitions to a Partitioned Table
Change the Partitioning Type or Key
Unpartition Round-Robin–Partitioned Tables
partition Parameter Usage
Change Partition-Key Columns
Configure Partitions
update, delete, and insert in Partitioned Tables
Update Values in Partition-Key Columns
Display Information About Partitions
Function Usage
Truncate a Partition
Using Partitions to Load Table Data
Update Partition Statistics
Improved Concurrency for Partition-Level Online Operations
Partition-Level Online Operation Syntax
Concurrency with Partition-Level Online Operations
Partition-Level Online Operations with Global Index
Virtually Hashed Tables
Structure of a Virtually Hashed Table
Create a Virtually Hashed Table
Limitations for Virtually Hashed Tables
Commands that Support Virtually Hashed Tables
Query Processor Support
Monitor Counter Support
System Procedure Support
Create Indexes on Tables
Guidelines for Using Indexes
Methods of Creating Indexes
Create Indexes
Issue create index in Parallel
Configuring enhanced parallel create index
Enhanced Parallel create index Usage
View Parallel create index Commands with showplan
Function-Based Indexes
Create Indexes Without Blocking Access to Data
Unique Indexes
IDENTITY Columns in Nonunique Indexes
Ascending and Descending Index-Column Values
Using fillfactor, max_rows_per_page, and reservepagegap
Indexes on Computed Columns
Clustered or Nonclustered Index Usage
Create Clustered Indexes on Segments
Index Options
ignore_dup_key Option
ignore_dup_row and allow_dup_row
sorted_data Option
on segment_name Option
Drop Indexes
Identifying the Indexes on a Table
Update Statistics for Indexes
Datatypes
System-Supplied Datatypes
Exact Numeric Types: Integers
Exact Numeric Types: Decimal Numbers
Approximate Numeric Datatypes
Money Datatypes
Date and Time Datatypes
Character Datatypes
unichar Datatype
Relational Expressions
Join Operators
Union Operators
Clauses and Modifiers
text Datatype
unitext Datatype
Binary Datatypes
image Datatype
bit Datatype
timestamp Datatype
sysname and longsysname Datatype
LOB Locators in Transact-SQL Statements
Implicitly Create a Locator
Explicitly Create a Locator
Convert the Locator Value to the LOB Value
Locator Scope
Convert Between Datatypes
Mixed-Mode Arithmetic and Datatype Hierarchy
Working with money Datatypes
Determine Precision and Scale
User-Defined Datatypes
Length, Precision, and Scale
Null Type
Associate Rules and Defaults with User-Defined Datatypes
Create User-Defined Datatype with IDENTITY Property
Create IDENTITY Columns from User-Defined Datatypes
Drop a User-Defined Datatype
Datatype Entry Rules
char, nchar, unichar, univarchar, varchar, nvarchar, unitext, and text
Date and Time
Enter Times
Enter Dates
Date Formats
Search Dates and Times
binary, varbinary, and image
money and smallmoney
float, real, and double precision
decimal and numeric
Integer Types and Their Unsigned Counterparts
timestamp
Get Information About Datatypes
Queries: Selecting Data from a Table
select Syntax
Check for Identifiers in a select Statement
Choose Columns Using the select Clause
Choose all Columns Using select *
Choose Specific Columns
Rearrange the Column Order
Rename Columns in Query Results
Expressions
Quoted Strings in Column Headings
Character Strings in Query Results
Computed Values in the select List
Arithmetic Operator Precedence
Select Text, Unitext, and Image Values
readtext Usage
select List Summary
select for update
Use select for update in Cursors and DML
Concurrency Issues
Eliminate Duplicate Query Results with Distinct
Specify Tables with the from Clause
Select Rows Using the where Clause
Comparison Operators in where Clauses
Ranges (between and not between)
Lists (in and not in)
Matching Character Strings: like
not like Usage
Different Results Using not like and ^
Use Wildcard Characters as Literal Characters
Interaction of Wildcard Characters and Square Brackets
Use Trailing Blanks and %
Use Wildcard Characters in Columns
“Unknown” Values: NULL
SQL Standard for NULL Concatenation
Test a Column for Null Values
Difference Between False and Unknown
Substitute a Value for NULLs
Expressions that Evaluate to NULL
Concatenate Strings and NULL
System-Generated NULLs
Connect Conditions with Logical Operators
Logical Operator Precedence
Multiple select Items in a Nested exists Query
Use a Column Alias in Nested select Statements
Subqueries: Queries Within Other Queries
Subquery Restrictions
Qualify Column Names
Subqueries with Correlation Names
Multiple Levels of Nesting
Using an Asterisk in Nested select Statements
Use Table-Name Qualifiers
Use Nested Queries with group by
Usage and Examples of Asterisks in select Statements
Subqueries in update, delete, and insert Statements
Subqueries in Conditional Statements
Subqueries Instead of Expressions
Types of Subqueries
Expression Subqueries
Use Scalar Aggregate Functions to Guarantee a Single Value
Use group by and having in Expression Subqueries
Use distinct with Expression Subqueries
Quantified Predicate Subqueries
Subqueries with any and all
> all Means Greater Than All Values
= all Means Equal to Every Value
> any Means Greater Than at Least One Value
= any Means Equal to Some Value
Subqueries Used with in
Subqueries Used with not in
Subqueries Using not in with NULL
Subqueries Used with exists
Subqueries Used with not exists
Find Intersection and Difference with exists
Subqueries Using SQL Derived Tables
Correlated Subqueries
Correlated Subqueries with Correlation Names
Correlated Subqueries with Comparison Operators
Correlated Subqueries in a having Clause
Aggregates, Grouping, and Sorting
Aggregate Functions and Datatypes
count versus count (*)
Aggregate Functions with distinct
Null Values and the Aggregate Functions
Using Statistical Aggregates
Organize Query Results into Groups: the group by Clause
group by and SQL Standards
Nest Groups with group by
Reference Other Columns in Queries Using group by
Expressions and group by
group by in Nested Aggregates
Null Values and group by
where Clause and group by
group by and all
Aggregates Without group by
Select Groups of Data: the having Clause
Interactions between having, group by, and where Clauses
having Without group by
Sort Query Results: the order by Clause
order by and group by
order by and group by Used with select distinct
Summarize Groups of Data: the compute Clause
Row Aggregates and compute
Rules for compute Clauses
Specify More Than One Column After compute
Use More Than One compute Clause
Apply an Aggregate to More Than One Column
Use Different Aggregates in the Aame compute Clause
Generate Totals: compute Without by
Combine Queries: the union Operator
Guidelines for union Queries
Joins: Retrieve Data from Several Tables
Join Syntax
Joins and the Relational Model
How Joins are Structured
The from Clause
The where Clause
Join Operators
Datatypes in Join Columns
Joins and Text and Image Columns
How Joins are Processed
Equijoins and Natural Joins
Joins with Additional Conditions
Joins Not Based on Equality
Self-Joins and Correlation Names
The Not-Equal Join
Not-Equal Joins and Subqueries
Join More Than Two Tables
Star Joins
Outer Joins
Inner and Outer Tables
Outer Join Restrictions
Views Used with Outer Joins
ANSI Inner and Outer Joins
Correlation Name and Column Referencing Rules for ANSI Joins
ANSI Inner Joins
The Join Table of an Inner Join
The on Clause of an ANSI Inner Join
ANSI outer joins
Placement of the Predicate in the on or where Clause
Nested ANSI Outer Joins
Transact-SQL Outer Joins
Outer Joins and Aggregate Extended Columns
Relocated Joins
Configuring Relocated Joins
How Null Values Affect Joins
Determine Which Table Columns to Join
Managing Data
Referential Integrity
Transactions
Sample Databases
Add New Data
Add New Rows with Values
Insert Data into Specific Columns
Restrict Column Data: Rules
The NULL Character String
Insert NULLs into Columns That Do Not Allow Them
Add Rows Without Values in All Columns
Change a Column’s Value to NULL
SAP ASE-generated values for IDENTITY columns
Explicitly Insert Data into an IDENTITY Column
Retrieve IDENTITY Column Values with @@identity
Reserve a Block of IDENTITY Column Values
Maximum Value of the IDENTITY Column
Modify the Maximum Value of the IDENTITY Column
Creating a New Table with a Larger Precision
Renumbering the Table IDENTITY Columns with bcp
Add New Rows with select
Use Computed Columns
Insert Data into Some Columns
Insert Data from the Same Table
Create Nonmaterialized, Non-Null Columns
Add Nonmaterialized Columns
Tables That Already Have Nonmaterialized Columns
Nonmaterialized Column Storage
Alter Nonmaterialized Columns
Limitations for Nonmaterialized Columns
Change Existing Data
Use the set Clause with Update
Assign Variables in the set Clause
Use the where Clause with update
Use the from Clause with update
Perform updates with joins
Update IDENTITY Columns
Change text, unitext, and image data
Truncate Trailing Zeros
Transfer Data Incrementally
Mark Tables for Incremental Transfer
Transfer Tables from a Destination File
Convert SAP ASE Datatypes to SAP IQ
Store Transfer Information
Exceptions and Errors
Sample Incremental Transfer
Replacing Data with New Rows
Delete Data
Use the from Clause with delete
Delete from IDENTITY Columns
Delete All Rows from a Table
truncate table Syntax
Views: Limit Access to Data
Advantages of Views
Security
Logical Data Independence
Create Views
create view Syntax
select Statement Usage with create view
View Definition with Projection
View Definition with a Computed Column
View Definition with an Aggregate or Built-In Function
View Definition with a Join
Views Used with Outer Joins
Views Derived From Other Views
Distinct Views
Views That Include IDENTITY Columns
Validate a View’s Selection Criteria
Views Derived from Other Views
Retrieve Data Through Views
View Resolution
Redefine Views
Rename Views
Alter or Drop Underlying Objects
Modify Data Through Views
Restrictions on Updating Views
Drop Views
Use Views as Security Mechanisms
Get Information About Views
Defining Defaults and Rules for Data
Create Defaults
Bind Defaults
Unbind Defaults
How Defaults Affect NULL Values
Drop Defaults
Create Rules
Bind Rules
Rules Bound to Columns
Rules Bound to User-Defined Datatypes
Precedence of Rules
Rules and NULL Values
Unbind Rules
Drop Rules
Retrieve Information About Defaults and Rules
Share Inline Defaults
Create an Inline Shared Default
Unbind a Shared Inline Default
Limitations for Shared Inline Defaults
Precomputed Result Sets
Benefits of Precomputed Result Sets
Configuring SAP ASE for Precomputed Result Sets
Creating Precomputed Result Sets
Identifying Precomputed Result Sets
Refreshing Precomputed Result Sets
Altering Precomputed Result Sets
Dropping or Truncating Precomputed Result Sets
Configuring Staleness
Querying Precomputed Result Sets
Rewriting Queries
Replicating Precomputed Result Sets
Restrictions for Precomputed Result Sets
Batches and Control-of-Flow Language
Rules Associated with Batches
Examples of Using Batches
Batches Submitted as Files
Control-of-Flow Language Usage
if...else
case Expression
case Expression for Alternative Representation
case and Division by Zero
rand Functions in case Expressions
case Expression Results
case Expressions and set ansinull
case Expression Requires at Least one Non-Null Result
Determining the Result Set
case and Value Comparisons
coalesce
nullif
begin...end
while and break...continue
declare and Local Variables
goto
return
print
raiserror
Create Messages for print and raiserror
waitfor
Comments
Slash-Asterisk Style Comments
Double-Hyphen Style Comments
Local Variables
Local Variables and select Statements
Local Variables and update Statements
Local Variables and Subqueries
Local Variables and while Loops and if…else Blocks
Variables and Null Values
Global Variables
Transactions and Global Variables
Check for Errors with @@error
Check IDENTITY Values with @@identity
Check the Transaction Nesting Level with @@trancount
Check the Transaction State with @@transtate
Check the Nesting Level with @@nestlevel
Check the Status From the Last Fetch
Transact-SQL Functions
Built-In Functions
System Functions
String Functions
Concatenating Expressions
Concatenation Operators and LOB Locators
Nest String Functions
Limits on String Functions
Text and Image Functions
readtext on unitext Columns Usage
Aggregate Functions
Aggregate Functions Used with the group by Clause
Aggregate Functions and Null Values
Vector and Scalar Aggregates
Aggregate Functions as Row Aggregates
Statistical Aggregate Functions
Formulas for Computing Standard Deviations
Mathematical Functions
Date Functions
Datatype Conversion Functions
convert Function Usage for Explicit Conversions
Datatype Conversion Guidelines and Constraints
Convert Character Data to a Noncharacter Type
Convert from One Character Type to Another
Convert Numbers to a Character Type
Convert to or from unitext
Rounding During Conversion To and From Money Types
Convert Date and Time Information
Convert Between Numeric Types
Convert Between Binary and Integer Types
Convert Between Binary and Numeric or Decimal Types
Convert Image Columns to Binary Types
Convert Other Types to bit
Convert Hexadecimal Data
Convert bigtime and bigdatetime Data
Convert NULL Value
Change the Date Format
Conversion Error Handling
Security Functions
XML Functions
User-Created Functions
Stored Procedures
Examples
Permissions
Performance
Create and Execute Stored Procedures
Deferred Name Resolution Usage
Parameters
Default Parameters
Default Parameters Usage
NULL as the Default Parameter
Wildcard Characters in the Default Parameter
Using Multiple Parameters
LOB Datatypes in Stored Procedures
Procedure Groups
with recompile in create procedure
with recompile in execute
Nesting Procedures
Temporary Tables in Stored Procedures
Set Options in Stored Procedures
Query Optimization Settings
Maximum Number of Arguments
Maximum Size for Expressions, Variables, and Arguments
Execution of Stored Procedures
Execute Procedures After a Time Delay
Execute Procedures Remotely
Execute a Procedure with execute as owner or execute as caller
Example with execute as Omitted
Example of Procedure with execute as
Deferred Compilation in Stored Procedures
Information Returned From Stored Procedures
Return Status
Reserved Return Status Values
User-Generated Return Values
Check Roles in Procedures
Return Parameters
Pass Values in Parameters
The Output Keyword
Restrictions Associated with Stored Procedures
Qualify Names Inside Procedures
Rename Stored Procedures
Rename Objects Referenced by Procedures
Stored Procedures as Security Mechanisms
Dropping Stored Procedures
System Procedures
Execute System Procedures
Permissions on System Procedures
Types of System Procedures
Other SAP ASE-Supplied Stored Procedures
Get Information About Stored Procedures
Get a Report with sp_help
View the Source Text of a Procedure with sp_helptext
Identify Dependent Objects with sp_depends
Use sp_depends with deferred_name_resolution
Identify Permissions with sp_helprotect
Extended Stored Procedures Usage
XP Server
CIS RPC Mechanism
sybesp_dll_version
Dynamic Link Library Support
Open Server API
ESPs and Permissions
ESPs and Performance
Create Functions for ESPs
Files for ESP Development
Open Server Data Structures
Open Server Return Codes
Outline of a Simple ESP Function
ESP Function Example
Building the DLL
Registering ESPs
create procedure Usage
sp_addextendedproc Usage
Remove ESPs
Renaming ESPs
Execute ESPs
System ESPs
Get Information About ESPs
ESP Exceptions and Messages
Cursors: Accessing Data
Types of Cursors
Cursor Scope
Cursor Scans and the Cursor Result Set
Make Cursors Updatable
Determine Which Columns Can Be Updated
How SAP ASE Processes Cursors
Monitor Cursor Statements
declare cursor
cursor_scrollability
Cursor Sensitivity
read_only Option
Open Cursors
Fetch Data Rows Using Cursors
fetch Syntax
into Clause Usage
Check Cursor Status
Get Multiple Rows With Each Fetch
Check the Number of Rows Fetched
Update and Delete Rows Using Cursors
Update Cursor Result Set Rows
Delete Cursor Result Set Rows
Close and Deallocate Cursors
Cursor Examples
Cursors in Stored Procedures
Cursors and Locking
Cursor-Locking Options
Transaction Support for Updatable Cursors
Get Information About Cursors
Browse Mode Versus Cursors
Triggers: Enforce Referential Integrity
Use Triggers Versus Integrity Constraints
Create Triggers
create trigger Syntax
Use Triggers to Maintain Referential Integrity
Test Data Modifications Against the Trigger Test Tables
Insert Trigger Example
Delete Trigger Examples
Update Trigger Examples
Multirow Considerations
Insert Trigger Example Using Multiple Rows
Delete Trigger Example Using Multiple Rows
Update Trigger Example Using Multiple Rows
Conditional Insert Trigger Example Using Multiple Rows
Roll Back Triggers
Global Login Triggers
Nesting Triggers
Trigger Self-Recursion
Rules Associated with Triggers
Triggers and Permissions
Trigger Restrictions
Implicit and Explicit Null Values
Triggers and Performance
set Commands in Triggers
Renaming and triggers
Disable Triggers
Drop Triggers
Multiple Triggers
Changing the Order of When a Trigger Is Fired
Order of Triggers in Merge Statements
Transactional Behavior with Multiple Triggers
Disabling and Reenabling Triggers
Get Information About Triggers
sp_help
sp_helptext
sp_depends
instead of Triggers
Inserted and Deleted Logical Tables
Triggers and Transactions
Nesting
Recursion
instead of insert Triggers
instead of update Trigger
instead of delete Trigger
Searched and Positioned update and delete
Get Information About instead of Triggers
In-Row Off-Row LOB
In-Row LOB Columns Compression
Migrate Off-Row LOB Data to In-Row Storage
In-Row LOB Columns and Bulk Copy
Methods for Migrating Existing Data
Set Up the mymsgs Example Table
Migrate Using Update Statement
Use reorg rebuild
Migrate Using alter table with Data Copy
Guidelines for Selecting the In-Row LOB Length
Identifying In-Row LOB Length Selection
Downgrading Tables Containing In-Row LOB Columns
Transactions: Maintain Data Consistency and Recovery
Transactions and Consistency
Transactions and Recovery
Transaction Usage
Allow Data Definition Commands in Transactions
System Procedures That Are Not Allowed in Transactions
Begin and Commit Transactions
Roll Back and Save Transactions
Transaction States
Nested Transactions
Example of a Transaction
Transaction Mode and Isolation Level
Choose a Transaction Mode
Transaction Modes and Nested Transactions
Find the Status of the Current Transaction Mode
Choose an Isolation Level
Default Isolation Levels for SAP ASE and ANSI SQL
Dirty Reads
Repeatable Reads
Find the Status of the Current Isolation Level
Change the Isolation Level for a Query
Isolation Level Precedences
Cursors and Isolation Levels
Stored Procedures and Isolation Levels
Triggers and Isolation Levels
Compliance with SQL Standards
Use the Lock Table Command to Improve Performance
Transactions in Stored Procedures and Triggers
Errors and Transaction Rollbacks
Transaction Modes and Stored Procedures
Run System Procedures in Chained Mode
Set Transaction Modes for Stored Procedures
Use Cursors in Transactions
Issues to Consider When Using Transactions
Backup and Recovery of Transactions
Locking Commands and Options
wait/nowait Option of the Lock Table Command
Session-Level Lock-Wait Limit
Server-Wide Lock-Wait Limit
Information on the Number of Lock-Wait Timeouts
Readpast Locking for Queue Processing
Incompatible Locks During readpast Queries
Allpages-Locked Tables and readpast Queries
Effects of Isolation Levels Select Queries with readpast
Data Modification Commands with readpast and Isolation Levels
text, unitext, and image columns and readpast
The pubs2 Database
Tables in the pubs2 Database
publishers Table
authors Table
titles Table
titleauthor Table
salesdetail Table
sales Table
stores Table
roysched Table
discounts Table
blurbs Table
au_pix Table
Diagram of the pubs2 Database
The pubs3 Database
Tables in the pubs3 Database
publishers Table
authors Table
titles Table
titleauthor Table
salesdetail Table
sales Table
stores Table
store_employees Table
roysched Table
discounts Table
blurbs Table
Diagram of the pubs3 Database
System Administration Guide 16.0: Volume 1
Overview of System Administration
Roles Required for System Administration Tasks
Database Owner
Database Object Owner
Performing System Administration Tasks
System Tables
Querying the System Tables
Keys in System Tables
Updating System Tables
System Procedures
Using System Procedures
System Procedure Tables
Creating Stored Procedures
System Extended Stored Procedures
Creating System ESPs
Logging Error Messages
Connecting to SAP ASE
The interfaces File
Directory Services
LDAP as a Directory Service
Multiple Directory Services
LDAP Directory Services Versus the SAP Interfaces File
LDAP Performance
Security Features Available in SAP ASE
System and Optional Databases
Overview of System Databases
The master Database
Controlling Object Creation in the master Database
Backing Up Master and Keeping Copies of System Tables
model Database
sybsystemprocs Database
tempdb database
Creating Temporary Tables
sybsecurity Database
sybsystemdb Database
sybmgmtdb Database
pubs2 and pubs3 Sample Databases
Maintaining the Sample Databases
pubs2 Image Data
dbccdb Database
sybdiag Database
Determining the Version of the Installation Scripts
System Administration for Beginners
Logical Page Sizes
Using “Test” Servers
Planning Resources
Achieving Performance Goals
Considerations When Installing SAP Products
Allocating Physical Resources
Dedicated Versus Shared Servers
Decision-Support and OLTP Applications
Advance Resource Planning
Operating System Configuration
Backup and Recovery
Keep Up-To-Date Backups of the master Database
Keep Offline Copies of System Tables
Automating Backup Procedures
Verify Data Consistency Before Backing Up a Database
Monitor the Log Size
Ongoing Maintenance and Troubleshooting
Starting and Stopping SAP ASE
Viewing and Pruning the Error Log
Keeping Records
Contact Information
Configuration Information
Maintenance Schedules
System Information
Disaster Recovery Plan
Additional Resources
Managing and Monitoring SAP ASE
SAP Control Center for SAP ASE
Configuration History Tracking
Configuring SAP ASE to Track Configuration Changes
Changes Captured
Querying ch_events
Setting Configuration Parameters
Modifying Configuration Parameters
Required Roles for Modifying Configuration Parameters
Unit Specification Using sp_configure
Global Versus Session Settings
Getting Help Information on Configuration Parameters
Using sp_configure
sp_configure Syntax Elements
Issue sp_configure with the Configuration File
Configuration File Naming Recommendations
Read or Write the Configuration File with sp_configure
Edit the Configuration File
Permissions for Configuration Files
Backing Up Configuration Files
Verify the Name of the Configuration File Currently in Use
Start SAP ASE Using a Configuration File
Configuration File Errors
The Parameter Hierarchy
User-Defined Subsets of the Parameter Hierarchy: Display Levels
The Effect of the Display Level on sp_configure Output
Performance Tuning with sp_configure and sp_sysmon
Using Configuration Parameters in a Clustered Environment
sp_configure Output
sysconfigures and syscurconfigs Tables
Example syscurconfigs and sysconfigures Query
Named Cache Configuration Parameter Group
Dump Configuration Parameter Group
Configuration Parameters
Alphabetical Listing of Configuration Parameters
abstract plan cache
abstract plan dump
abstract plan load
abstract plan replace
abstract plan sharing
additional network memory
aggresive task stealing
allocate max shared memory
allow backward scans
allow nested triggers
allow procedure grouping
allow remote access
allow resource limits
allow sendmsg
allow sql server async i/o
allow updates to system tables
average cap size
audit queue size
auditing
automatic cluster takeover
builtin date strings
caps per ccb
capture compression statistics
capture missing statistics
check password for digit
CIPC large message pool size
CIPC regular message pool size
cis bulk insert array size
cis bulk insert batch size
cis connect timeout
cis cursor rows
cis idle connection timeout
cis packet size
cis rpc handling
cluster heartbeat interval
cluster heartbeat retries
cluster redundancy level
cluster vote timeout
column default cache size
compression info pool size
compression memory size
configuration file
cost of a logical io
cost of a physical io
cost of a cpu unit
cpu accounting flush interval
cpu grace time
current audit table
deadlock checking period
deadlock pipe active
deadlock pipe max messages
deadlock retries
default character set id
default database size
default exp_row_size percent
default fill factor percent
default language id
default network packet size
Requesting a Larger Packet Size at Login
default sortorder id
default unicode sortorder
default XML sortorder
deferred name resolution
disable character set conversions
disable disk mirroring
disable jsagent core dump
disable varbinary truncation
disk i/o structures
DMA object pool size
dtm detach timeout period
dtm lock timeout period
dump history filename
dump on conditions
dynamic allocation on demand
dynamic SQL plan pinning
early row send increment
enable async database init
enable backupserver HA
enable cis
enable compression
enable concurrent dump tran
enable console logging
enable DTM
enforce dump configuration
enable dump history
enable encrypted columns
enable enterprise java beans
enable file access
enable full-text search
enable functionality group
enable inline default sharing
enable HA
enable housekeeper GC
enable hp posix async i/o
enable HugePages
enable i/o fencing
enable ISM
enable java
enable job scheduler
enable js restart logging
enable large chunk elc
enable large pool for load
enable ldap user auth
enable literal autoparam
engine local cache percent
enable logins during recovery
enable merge join
enable metrics capture
enable monitoring
enable pam user auth
enable pci
enable permissive unicode
enable plan sharing
enable predicated privileges
enable query tuning mem limit
enable query tuning time limit
enable rapidlog
enable real time messaging
enable rep agent threads
enable row level access control
enable semantic partitioning
enable sort-merge join and JTC
enable sql debugger
enable ssl
enable stmt cache monitoring
enable surrogate processing
enable unicode conversion
enable unicode normalization
enable utility lvl 0 scan wait
enable webservices
enable xact coordination
enable xml
engine memory log size
errorlog pipe active
errorlog pipe max messages
esp execution priority
esp execution stacksize
esp unload dll
event buffers per engine
event log computer name (Windows only)
event logging
executable codesize + overhead
extended cache size
FIPS login password encryption
global async prefetch limit
global cache partition number
heap memory per user
histogram tuning factor
housekeeper free write percent
i/o accounting flush interval
i/o batch size
i/o polling process count
identity burning set factor
identity grab size
identity reservation size
idle migration timeout
job scheduler interval
job scheduler tasks
js heartbeat interval
js job output width
kernel mode
kernel resource memory
large allocation auto tune
license information
lock address spinlock ratio
lock hashtable size
lock scheme
lock shared memory
lock spinlock ratio
lock table spinlock ratio
lock timeout pipe active
lock timeout pipe max messages
lock wait period
log audit logon failure
log audit logon success
max async i/os per engine
On the Linux Platform
max async i/os per server
max buffers per lava operator
Differences Between number of sort buffers and max data buffers per lava sort
max cis remote connections
max concurrently recovered db
max js restart attempts
max memory
If SAP ASE Cannot Start
max native threads per engine
max nesting level
max network packet size
Choosing Packet Sizes
max network peek depth
max number network listeners
max online engines
max online Q engines
max parallel degree
max pci slots
max query parallel degree
max repartition degree
max resource granularity
max scan parallel degree
max SQL text monitored
max transfer history
max utility parallel degree
maximum dump conditions
maximum failed logins
maximum job output
memory alignment boundary
memory dump compression level
memory per worker process
messaging memory
metrics elap max
metrics exec max
metrics lio max
metrics pio max
min pages for parallel scan
minimum password length
mnc_full_index_filter
msg confidentiality reqd
msg integrity reqd
net password encryption reqd
network polling mode
In-Line Network Polling
number of alarms
number of aux scan descriptors
Monitoring and Estimating Scan Descriptor Usage
number of backup connections
number of ccbs
number of checkpoint tasks
number of devices
Setting the number of devices on UNIX
number of disk tasks
number of dtx participants
Optimizing the Number of DTX Participants for Your System
number of dump threads
number of early send rows
number of engines at startup
number of histogram steps
number of index trips
number of java sockets
number of large i/o buffers
number of locks
number of mailboxes
number of messages
number of network tasks
number of oam trips
number of open databases
Optimizing the number of open databases
number of open indexes
Optimizing number of open indexes
number of open objects
Optimizing number of open objects
number of open partitions
number of pre-allocated extents
Using a Value of 32 for the number of pre-allocated extents
number of Q engines at startup
number of remote connections
number of remote logins
number of remote sites
number of sort buffers
number of user connections
number of worker processes
o/s file descriptors
object lockwait timing
open index hash spinlock ratio
open index spinlock ratio
open object spinlock ratio
optimization goal
optimize temp table resolution
optimization timeout limit
optimizer level
page lock promotion HWM
page lock promotion LWM
page lock promotion PCT
page utilization percent
partition groups
partition spinlock ratio
pci memory size
per object statistics active
percent database for history
percent database for output
percent history free
percent output free
performance monitoring option
permission cache entries
plan text pipe active
plan text pipe max messages
print deadlock information
print recovery information
procedure cache size
procedure deferred compilation
process wait events
prod-consumer overlap factor
quorum heartbeat interval
quorum heartbeat retries
quoted identifier enhancements
rapidlog buffer size
rapidlog max files
read committed with lock
recovery interval in minutes
recovery prefetch size
remote server pre-read packets
restricted decrypt permission
row lock promotion HWM
row lock promotion LWM
row lock promotion PCT
rtm thread idle wait period
runnable process search count
runnable process search count versus idle timeout
sampling percent
secure default login
select for update
select on syscomments.text
send doneinproc tokens
session migration timeout
session tempdb log cache size
shared memory starting address
size of auto identity column
size of global fixed heap
size of process object heap
size of shared class heap
size of unilib cache
solaris async i/o mode
sproc optimize timeout limit
SQL batch capture
SQL Perfmon Integration
sql server clock tick length
sql text pipe active
sql text pipe max messages
stack guard size
stack size
start mail session
start xp server during boot
startup delay
statement cache size
statement pipe active
statement pipe max messages
statement statistics active
streamlined dynamic SQL
strict dtm enforcement
suppress js max task message
suspend audit when device full
syb_sendmsg port number
sysstatistics flush interval
systemwide password expiration
tape retention in days
tcp no delay
text prefetch size
threshold event max messages
threshold event monitoring
time slice
total data cache size
total logical memory
total physical memory
transfer utility memory size
txn to pss ratio
Optimizing the txn to pss ratio for your system
unified login required
update statistics hashing
upgrade version
use security services
user log cache queue size
user log cache size
user log cache spinlock ratio
utility statistics hashing
wait event timing
wait on uncommitted insert
workload manager cache size
xact coordination interval
xp_cmdshell context
Disk Resource Issues
Device Allocation and Object Placement
Commands for Managing Disk Resources
Considerations in Storage Management Decisions
Recovery
Performance
Status and Defaults at Installation
System Tables That Manage Storage
The sysdevices Table
The sysusages Table
The syssegments Table
The sysindexes Table
The syspartitions Table
Managing Remote Servers
Adding Remote Logins
Map Users’ Server IDs
Map Remote Logins to Particular Local Names
Map All Remote Logins to One Local Name
Keeping Remote Login Names for Local Servers
Example of Remote User Login Mapping
Password Checking for Remote Users
Effects of Using the Untrusted Mode
Getting Information About Remote Logins
Configuration Parameters for Remote Logins
Initializing Database Devices
Using the disk init command
Getting Information about Devices
Dropping devices
Designating Default Devices
Choosing Default and Nondefault Devices
Increasing the Size of Devices with disk resize
Insufficient Disk Space
Setting Database Options
Database Option Descriptions
Viewing the Options on a Database
Displaying Currently Set Switches with sysoptions
Configuring Character Sets, Sort Orders, and Languages
Advantages of Internationalized Systems
A Sample Internationalized System
Elements of an Internationalized System
Selecting the Character Set for Your Server
Unicode
Configuration Parameters
Functions
Using unichar Columns
Using unitext
Open Client Interoperability
Java Interoperability
Selecting the Server Default Character Set
Selecting the Sort Order
Different Types of Sort Orders
Selecting the Default Sort Order
Chinese Pinyin Sort Order
Selecting Case-Insensitive Sort Orders for Chinese and Japanese Character Sets
Selecting the Default Unicode Sort Order
Select a Language for System Messages
A Spanish-Version Server
A US-based company in Japan
A Japan-Based Company with Multinational Clients
Changing the character set, sort order, or message language
Changing the default character set
Changing the sort order with a resources file
Change the Default Sort Order
Reconfiguring the Character Set, Sort Order, or Message Language
Example: Converting a Unicode Database to UTF-8
Migrating Selected Columns to unichar
Migrating to or from unitext
Before Changing the Character Set or Sort Order
Set the User’s Default Language
Manage Suspect Partitions
Installing Date Strings for Unsupported Languages
Server Versus Client Date Interpretation
Internationalization and localization files
Character sets directory structure
Types of localization files
Software Messages Directory Structure
Global variables for Languages and Character Sets
Configuring Client/Server Character Set Conversions
Supported Character Set Conversions
Conversion for Native Character Sets
Conversion in a Unicode System
SAP ASE Direct Conversions
Unicode Conversions
Allowing Unicode noncharacters
Choosing a Conversion Type
Enabling and Disabling Character Set Conversion
Characters That Cannot Be Converted
Error handling in character set conversion
Conversions and Changes to Data Lengths
Specify the Character Set for Utility Programs
Display and file character set command line options
Diagnosing System Problems
How SAP ASE Uses Error Messages
Error Log Format
Error Messages and Message Numbers
Variables in Error Message Text
SAP ASE error logging
Severity Levels
Severity Levels 10 – 18
Level 10: Status Information
Level 11: Specified Database Object Not Found
Level 12: Wrong Datatype Encountered
Level 13: User Transaction Syntax Error
Level 14: Insufficient Permission to Execute Command
Level 15: Syntax Error in SQL Statement
Level 16: Miscellaneous User Error
Level 17: Insufficient Resources
Level 18: Nonfatal Internal Error Detected
Severity Levels 19 – 26
Level 19: SAP ASE Fatal Error in Resource
Level 20: SAP ASE Fatal Error in Current Process
Level 21: SAP ASE Fatal Error in Database Processes
Level 22: SAP ASE Fatal Error: Table Integrity Suspect
Level 23: Fatal Error: Database Integrity Suspect
Level 24: Hardware Error or System Table Corruption
Level 25: SAP ASE Internal Error
Level 26: Rule Error
Backup Server Error Logging
Killing Processes
Using kill with statusonly
Using sp_lock to Examine Blocking Processes
Using Shared Memory Dumps
Configuring Shared Memory Dump Conditions
System-Wide Default Settings
Housekeeper functionality
Housekeeper wash
Housekeeper chores
Housekeeper Garbage Collection
Configure SAP ASE Priority Level
Configuring enable housekeeper GC
Using The reorg Command
Shutting Down Servers
Shutting Down SAP ASE
Shutting down a Backup Server
Using nowait on a Backup Server
Learning about known problems
System Administration Guide 16.0: Volume 2
Limiting Access to Server Resources
Resource Limits
Plan Resource Limits
Enable Resource Limits
Define Time Ranges
Determe the Time Ranges You Need
Modifying a Named Time Range
Dropping a Named Time Range
When Do Time Range Changes Take Effect?
Identify Users and Limits
Identifying Heavy-Usage Users
Identifying Heavy-Usage Applications
Choosing a Limit Type
Determining Time of Enforcement
Determining the Scope of Resource Limits
Understanding Limit Types
Limiting I/O Cost
Identify I/O Costs
Calculate the I/O Cost of a Cursor
Scope of the io_cost Limit Type
Limiting Elapsed Time
Scope of the elapsed_time Limit Type
Limiting the Size of the Result Set
Scope of the row_count Limit Type
Setting Limits for tempdb Space Usage
Limiting Idle Time
Creating a Resource Limit
Resource Limit Examples
Getting Information on Existing Limits
Modifying Resource Limits
Dropping Resource Limits
Resource Limit Precedence
Mirroring Database Devices
Determining Which Devices to Mirror
Mirroring Using Minimal Physical Disk Space
Mirroring for Nonstop Recovery
Conditions That Do Not Disable Mirroring
Disk Mirroring Commands
Initializing Mirrors
Unmirroring a Device
Effects on System Tables
Restarting Mirrors
waitfor mirrorexit
Mirroring the Master Device
Getting Information About Devices and Mirrors
Disk Mirroring Tutorial
Disk Resizing and Mirroring
Configuring Memory
How SAP ASE Allocates Memory
Disk Space Allocation
How SAP ASE Allocates Buffer Pools
Heap Memory
Calculating Heap Memory
Memory Management in SAP ASE
Determining the Amount of Memory SAP ASE Needs
Determine the SAP ASE Memory Configuration
If You Are Upgrading
Determining the Amount of Memory SAP ASE Can Use
Configuration Parameters That Affect Memory Allocation
Dynamically Allocating Memory
If SAP ASE Cannot Start
Dynamically Decreasing Memory Configuration Parameters
Configuring Thread Pools
Determining the Total Number of Threads
Tuning the syb_blocking_pool
System Procedures for Configuring Memory
Viewing the Configuration Parameters for Memory
Memory Available for Dynamic Growth
Using sp_helpconfig
Using sp_monitorconfig
Configuration Parameters That Control SAP ASE Memory
SAP ASE Executable Code Size
Data and Procedure Caches
Determining the Procedure Cache Size
Determining the Default Data Cache Size
Monitoring Cache Space
Modify the ELC Size
Kernel Resource Memory
User Connections
Open Databases, Open Indexes, and Open Objects
Number of Locks
Database Devices and Disk I/O Structures
Parameters That Use Memory
Parallel Processing
Remote Servers
Referential Integrity
Parameters That Affect Memory
The Statement Cache
Setting the Statement Cache
Performing Ad Hoc Query Processing
Statement Matching Criteria
Caching Conditions
Statement Cache Sizing
Monitoring the Statement Cache
Aggregating Metrics from Syntactically Similar Queries
Purging the Statement Cache
Printing Statement Summaries
Displaying the SQL Plan for Cached Statements
Configuring Data Caches
The SAP ASE Data Cache
Cache Configuration Commands and System Procedures
Viewing Information About Data Caches
Configuring Data Caches
Creating a New Cache
Insufficient Space for New Cache
Adding Memory to an Existing Named Cache
Decreasing the Size of a Cache
Deleting a Cache
Explicitly Configuring the Default Cache
Changing the Cache Type
Improving the Recovery Log Scan During load database and load tran
Configuring a Cache Replacement Policy
Dividing a Data Cache into Memory Pools
Matching Log I/O Size for Log Caches
Binding Objects to Caches
Getting Information About Cache Bindings
Checking Cache Overhead
Effects of Overhead on Total Cache Space
Dropping Cache Bindings
Changing the Wash Area for a Memory Pool
When the Wash Area Is Too Small
When the Wash Area is Too Large
Setting the Housekeeper to Avoid Washes for Cache
Changing the Asynchronous Prefetch Limit for a Pool
Changing the Size of Memory Pools
Moving Space from the Memory Pool
Moving Space from Other Memory Pools
Adding Cache Partitions to Reduce Spinlock
Dropping a Memory Pool
When Pools Cannot Be Dropped Due to Page Use
Cache Binding Effects on Memory and Query Plans
Configuring Data Caches Using the Configuration File
Cache and Pool Entries in the Configuration File
Cache Configuration Guidelines
Configuration File Errors
Managing Multiprocessor Servers
SAP ASE Kernels
Target Architecture
Kernel Modes
Switching Kernel Modes
Tasks
Using Threads to Run Tasks
Configuring an SMP Environment
Thread Pools
Dynamic Thread Assignment
Managing Engines
Configuring Engines in Process Mode
Configuring Engines in Threaded Mode
Choosing the Right Number of Engines
Starting and Stopping Engines
Monitoring Engine Status
Starting and Stopping Engines with sp_engine
Relationship Between Network Connections and Engines
Logical Process Management and dbcc engine(offline)
Managing User Connections
Configuration Parameters That Affect SMP Systems
Configuring Spinlock Ratio Parameters
Round-Robin Assignment
Sequential Assignment
Creating and Managing User Databases
Permissions for Managing User Databases
Using the create database Command
Assigning Space and Devices to Databases
Default Database Size and Devices
Estimating the Required Space
Placing a Transaction Log on a Separate Device
Estimating the Transaction Log Size
Default Log Size and Device
Moving the Transaction Log to Another Device
Shrinking Log Space
Using dump and load database When Shrinking Log Space
Shrinking a Log Before a dump and load database
Using dump and load transaction When Shrinking Log Space
Shrinking Log Space
Calculating the Transaction Log Growth Rate
Database Recovery with the for load Parameter
Using the with override Option with create database
Changing Database Ownership
Altering Databases
Using alter database
Using the drop database Command
System Tables That Manage Space Allocation
The sysusages Table
The segmap Column
The lstart, size, and vstart Columns
SAP ASE Support for Replication by Column Value
Getting Information about Database Storage
Using sp_helpdb to Find Database Device Names and Options
Checking the Amount of Space Used
Checking Space Used in a Database
Checking Summary Information for a Table
Checking Information for a Table and Its Indexes
Querying System Table for Space Usage Information
Database Mount and Unmount
Manifest File
Operations That Copy and Move Databases
Performance Considerations
Device Verification
Mounting and Unmounting Databases
Unmounting a Database
Mounting a Database
Moving Databases from One SAP ASE to Another
System Restrictions
quiesce database Extension
Distributed Transaction Management
Configuration Considerations
Behavior for Transaction Manager-Coordinated Transactions
Enhanced Transaction Manager for SAP ASE Versions 15.0.3 or Later
RPC and CIS Transactions
SYB2PC Transactions
Enabling DTM Features
Configuring Transaction Resources
Calculating the Number of Required Transaction Descriptors
Setting the Number of Transaction Descriptors
Using SAP ASE Coordination Services
Overview of Transaction Coordination Services
Hierarchical Transaction Coordination
X/Open XA-Compliant Behavior in DTP Environments
Requirements and Behavior
Ensuring Sufficient Resources for Updates
number of dtx participants Parameter
Optimizing the number of dtx participants
Using Transaction Coordination Services on Remote Servers
Set the strict dtm enforcement Parameter
Monitoring Coordinated Transactions and Participants
DTM Administration and Troubleshooting
Transactions and Threads of Control
Lock Manager Support for Detached Transactions
Getting Information About Distributed Transactions
Transaction Identification in systransactions
Transaction Keys
Viewing active transactions with sp_transactions
Identify Local, Remote, and External Transactions
Identify the Transaction Coordinator
View the Transaction Thread of Control
Understanding Transaction State Information
Limiting sp_transactions Output to Specific States
Transaction Failover Information
Determining the Commit Node and gtrid with sp_transactions
Commit and Parent Nodes
Global Transaction ID
Executing External Transactions
Crash Recovery Procedures for Distributed Transactions
Transactions Coordinated with MSDTC During Crash Recovery
Transactions Coordinated by SAP ASE or X/Open XA During Crash Recovery
Transactions Coordinated with SYB2PC During Crash Recovery
Heuristically Completing Transactions
Completing Prepared Transactions
Maintaining a Transaction's Commit Status
Manually Clearing the Commit Status
Completing Transactions That Are Not Prepared
Determining the Commit Status for SAP ASE Transactions
Troubleshooting for Transactions Coordinated by External Transaction Managers
SAP ASE Implicit Rollback in External Transactions
Support for OData
OData Server Architecture
OData Server Limitations
Unsupported OData Protocol Features
Security Considerations for OData Server
Configuring OData Server
Setting Up an HTTP Server for OData
Create an OData Producer Service Model
OData Server Sample Files
Starting and Stopping OData Server
Creating and Using Segments
System-Defined Segments
Segment Usage in SAP ASE
Controlling Space Usage
Use Segments to Allocate Database Objects
Separating Tables, Indexes, and Logs
Splitting Tables
Moving a Table to Another Device
Creating Segments
Changing the Scope of Segments
Extending the Scope of Segments
Automatically Extending the Scope of a Segment
Reducing the Scope of a Segment
Assigning Database Objects to Segments
Creating New Objects on Segments
Placing Existing Objects on Segments
Placing Text Pages on a Separate Device
Creating Clustered Indexes on Segments
Dropping Segments
Getting Information About Segments
sp_helpsegment
sp_helpdb
sp_help and sp_helpindex
Segments and System Tables
A Segment Tutorial
Using the reorg Command
reorg Command and Its Parameters
Running reorg rebuild Concurrently
Using the optdiag Utility to Assess the Need for a reorg
Moving Forwarded Rows to Home Pages
Use reorg compact to Remove Row Forwarding
Reclaiming Unused Space from Deletions and Updates
Reclaming Space Without the reorg Command
Reclaiming Unused Space and Undoing Row Forwarding
Rebuilding a Table
Prerequisites for Running reorg rebuild
Changing Space Management Settings Before Using reorg rebuild
Using the reorg rebuild Command on Indexes
Rebuilding Indexes with reorg rebuild index_name partition_name
Space Requirements for Rebuilding an Index
Status Messages
resume and time Options for Reorganizing Large Tables
Incremental Reorganization
Checking the Reorganization Status
Clearing reorg defrag Information from sysattributes
Logging Behavior
Checking Database Consistency
Page and Object Allocation
Understanding the Object Allocation Map (OAM)
Understanding Page Linkage
dbcc Checks
dbcc Command Output
Checking Database and Table Consistency
dbcc checkstorage
Understanding the dbcc checkstorage Operation
Performance and Scalability
dbcc checktable
dbcc checkindex
dbcc checkdb
Checking Page Allocation
dbcc checkalloc
dbcc indexalloc
dbcc tablealloc
dbcc textalloc
Correcting Allocation Errors Using the fix | nofix Options
Generate Reports with dbcc tablealloc and dbcc indexalloc
Checking Consistency of System Tables
Strategies for Using Consistency Checking Commands
Using Large I/O and Asynchronous Prefetch
Scheduling Database Maintenance at Your Site
Database Use
Backup Schedule
Size of Tables and Importance of Data
Errors Generated by Database Consistency Problems
Reporting on Aborted checkstorage and checkverify Operations
Aborting with Error 100032
Comparison of Soft and Hard Faults
Soft Faults
Hard Faults
Verifying Faults with dbcc checkverify
Scheduling dbcc checkverify
Executing dbcc checkverify
Preparing to Use dbcc checkstorage
Planning Resources
Planning Workspace Size
Number of Concurrent Workspaces
Automatic Workspace Expansion
Configuring Worker Processes
Setting a Named Cache for dbcc
Configuring an 8-page I/O Buffer Pool
Disk Space for dbccdb
Segments for Workspaces
Creating the dbccdb Database
Updating the dbcc_config Table
Viewing the Current Configuration Values
Default Configuration Values
Deleting Configuration Values
dbccdb Maintenance Tasks
Reevaluating and Updating the dbccdb Configuration
Cleaning Up dbccdb
Performing Consistency Checks on dbccdb
Generating Reports from dbccdb
Reporting a Summary of dbcc checkstorage Operations
Upgrading Compiled Objects with dbcc upgrade_object
Finding Compiled Object Errors Before Production
Reserved Word Errors
Missing, Truncated, or Corrupted Source Text
Temporary Table References
Resolving select * Potential Problem Areas
Using Database Dumps in Upgrades
Upgrading Compiled Objects in Database Dumps
Developing a Backup and Recovery Plan
Tracking Database Changes
Getting Information About the Transaction Log
Determining When Log Records Are Committed
Changes to Logging Behavior
Risks of Using delayed_commit
Enabling set delayed_commit
Designating Responsibility for Backups
Checkpoints: Synchronizing a Database and Its Log
Setting the Recovery Interval
Automatic Checkpoint Procedure
Truncating the Log After Automatic Checkpoints
Free Checkpoints
Manually Requesting a Checkpoint
Automatic Recovery After a System Failure or Shutdown
Fast Recovery
SAP ASE Start-up Sequence
Bringing Engines Back Online
Parallel Recovery
Database Recovery
Specifying the Recovery Order
Changing or Deleting the Recovery Position of a Database
Listing the User-Assigned Recovery Order of Databases
Parallel Checkpoints
Recovery State
Tuning for Fast Recovery
The sybdumptran Utility
Fault Isolation During Recovery
Persistence of Offline Pages
Configuring Recovery Fault Isolation
Isolating Suspect Pages
Raising the Number of Suspect Pages Allowed
Getting Information About Offline Databases and Pages
Bringing Offline Pages Online
Index-Level Fault Isolation for Data-Only-Locked Tables
Side Effects of Offline Pages
Recovery Strategies Using Recovery Fault Isolation
Reload Strategy
Repair Strategy
Assessing the Extent of Corruption
Using the dump and load Commands
dump database: Making Routine Database Dumps
dump transaction: Making Routine Transaction Log Dumps
dump tran with no_truncate: Copying the Log After Device Failure
load database: Restoring the Entire Database
load transaction: Applying Changes to the Database
online database: Making the Database Available to Users
Dumping and Loading Databases Across Platforms
Dumping a Database
Loading a Database
Restrictions for Dumping and Loading Databases and Transactions
Improving Recovery Prefetch
Performance Notes
Moving a Database to Another SAP ASE
Upgrading a User Database
Using the Special Load Options to Identify Dump Files
Restoring a Database from Backups
Suspending and Resuming Updates to Databases
Guidelines for using quiesce database
Maintaining Server Roles in a Primary and Secondary Relationship
Starting the Secondary Server with the -q Option
“in quiesce” Database Log Record Value Updated
Updating the Dump Sequence Number
Backing up Primary Devices with quiesce database
Recovery of Databases for Warm Standby Method
Making Archived Copies During the Quiescent State
The mount and unmount Commands
Using Backup Server for Backup and Recovery
Requirements for Communicating with Backup Server
Mounting a New Volume
Starting and Stopping Backup Server
Configuring Your Server for Remote Access
Choosing Backup Media
Protecting Backup Tapes from Being Overwritten
Dumping to Files or Disks
Creating Logical Device Names for Local Dump Devices
Adding a Backup Device
Scheduling backups of user databases
Other Times to Back Up a Database
Scheduling Backups of master
Dump the master Database After Each Change
Save Scripts and System Tables
Truncate the master Database Transaction Log
Avoid Volume Changes and Recovery
Scheduling Backups of the model Database
Truncate the model Database’s Transaction Log
Schedule Backups of the sybsystemprocs Database
Configuring SAP ASE for Simultaneous Loads
Gather Backup Statistics
Backing Up and Restoring User Databases
Specifying the Database and Dump Device
Rules for Specifying Database Names
Rules for Specifying Dump Devices
Tape Device Determination by Backup Server
Tape Device Configuration File
Compressing a Dump
Backup Server Dump Files and Compressed Dumps
Loading Compressed Dumps
Cyclic Redundancy Checks for dump database
Dump History File
Backups for the Dump Configuration Files
Performing Cumulative Dumps
Dump and Load Sequences
Partially Logged Operations and Cumulative Dumps
Restrictions
Specifying a Remote Backup Server
Remote Dump Host Control
Specifying Tape Density, Block Size, and Capacity
Overriding the Default Density
Overriding the Default Block Size
Specifying a Larger Block Size Value
Specifying Tape Capacity for Dump Commands
Nonrewinding Tape Functionality for Backup Server
Tape Operations
Dump Version Compatibility
Apply Source Database Attributes to the Target Database
Generate SQL for a Different Target Database
Specifying the Volume Name
Loading from a Multifile Volume
Identifying a Dump
Improving Dump or Load Performance
Compatibility with Prior Versions
Reducing load database Time
Concurrent dump database and dump transaction Commands
Configure SAP ASE to Run Concurrent Dumps
Labels Stored in Integer Format
Configure Local and Remote Backup Servers
Setting Shared Memory Usage
Configuring Shared Memory Dumps
Setting the Maximum Number of Stripes
Setting the Maximum Number of Network Connections
Setting the Maximum Number of Service Threads
Automatic Physical Database Rearrangement on Load
Specify Additional Dump Devices with the stripe on Clause
Dumps to, and Loads from, Multiple Devices
Using Fewer Devices to Load Than to Dump
Specifying the Characteristics of Individual Devices
Tape Handling Options
Prevent Dump Files from Being Overwritten
Reinitializing a Volume Before a Dump
Dumping and Loading Databases with Password Protection
Overriding the Default Message Destination
Bringing Databases Online with standby_access
Getting Information About Dump Files
Requesting Dump Header Information
Determining the Database, Device, File Name, and Date
Copying the Log After a Device Failure
Responding to Volume Change Requests
Volume Change Prompts for Dumps
Volume Change Prompts for Loads
Recovering a Database: Step-By-Step Instructions
Getting a Current Dump of the Transaction Log
Examining the Space Usage
Dropping the Databases
Re-creating the Databases
Loading the Database
Loading the Transaction Logs
Loading a Transaction Log to a Point in Time
Bringing the Databases Online
Replicated Databases
Loading Database Dumps from Older Versions
Upgrading a Dump to the Current Version of SAP ASE
The Database Offline Status Bit
Version Identifiers and Automatic Upgrade
Cache Bindings and Loading Databases
Databases and Cache Bindings
Database Objects and Cache Bindings
Checking on Cache Bindings
Cross-Database Constraints and Loading Databases
Restoring the System Databases
Recovering the master Database
Recovery Procedure
Finding Copies of System Tables
Building a New Master Device
Replacing the Master Device
Rebuilding the Configuration Area
Starting SAP ASE in Master-Recover Mode
Re-creating Device Allocations for master
Checking Your Backup Server sysservers Information
Verifying That Your Backup Server Is Running
Loading a Backup of master
Updating the number of devices Configuration Parameter
Restarting SAP ASE in Master-Recover Mode
Checking System Tables to Verify Current Backup of master
Restarting SAP ASE
Restoring Server User IDs
Restoring the model Database
Checking SAP ASE
Backing Up master
Recovering the model Database
Recovering the sybsystemprocs Database
Restoring sybsystemprocs with installmaster
Restoring sybsystemprocs with load database
Reducing the Size of tempdb
Reset tempdb to Default Size
Restoring System Tables with disk reinit and disk refit
Restoring sysdevices with disk reinit
Restoring sysusages and sysdatabase with disk refit
Archive Database Access
Components of an Archive Database
The Database Dump
The Modified Pages Section
The sysaltusages Table and the Scratch Database
Working With an Archive Database
DDLGen Support for Archive Database Access
Configuring an Archive Database
Sizing the Modified Pages Section
Increasing the Amount of Space Allocated to the Modified Pages Section
Materializing an Archive Database
Using load database with norecovery
Using Logical Devices with an Archive Database
load database Limitations with an Archive Database
Bringing an Archive Database Online
Loading a Transaction Log into an Archive Database
Dropping an Archive Database
SQL Commands for Archive Databases
dbcc Commands for Archive Databases
Issuing a Typical Archive Database Command Sequence
Compressed Dumps for an Archive Database
Creating a Compression Memory Pool
Upgrading and Downgrading an SAP ASE with Archive Databases
Limitations for Downgrading an SAP ASE with an Archive Database
Compatibility Issues for a Compressed Dump
Archive Database Limitations
Shrinking Databases
Shrinking a Database
How SAP ASE Shrinks the Database
Shrink Operations on Databases That Contain Text or Image Data
Shrink Database Backlink Performance Improvements
Restarting Partially Completed Shrink Operations
Moving Data Before Shrinking the Database
Restrictions for Moving the Transaction Log
Locks Held During Data Movement
Determine the Status of a Shrink Operation
Upgrading or Downgrading Shrunken Databases
Restrictions
Expanding Databases Automatically
Layouts for Disks, Devices, Databases, and Segments
Threshold Action Procedures
Installing Automatic Database Expansion Procedures
Running sp_dbextend
Validating Current Thresholds
Configuring a Database for Automatic Expansion
Restrictions and Limitations
Managing Free Space with Thresholds
Monitoring Free Space with the Last-Chance Threshold
Controlling How Often sp_thresholdaction Executes
Rollback Records and the Last-Chance Threshold
Calculating the Space for Rollback Records
Using lct_admin to Determine the Free Log Space
Determining the Current Space for Rollback Records
Effect of Rollback Records on the Last-Chance Threshold
User-Defined Thresholds
Last-Chance Threshold and User Log Caches for Shared Log and Data Segments
Using lct_admin abort to Abort Suspended Transactions
Add Space to the Master Database’s Transaction Log
Automatically Aborting or Suspending Processes
Using abort tran on log full to Abort Transactions
Waking Suspended Processes
Adding, Changing, and Deleting Thresholds
Displaying Information About Existing Thresholds
Thresholds and System Tables
Creating Free-Space Thresholds
Changing or Specifying a New Free-Space Threshold
Dropping a Threshold
Creating a Free-Space Threshold for the Log Segment
Usage Scenario: Testing and Adjusting the New Threshold
Creating Additional Thresholds on Data and Log Segments
Determining Threshold Placement
Creating Threshold Procedures
Parameters for Threshold Procedures
Generating Error Log Messages
sp_thresholdaction Procedures that Include a dump transaction
A Simple Threshold Procedure
A More Complex Procedure
Placement for Threshold Procedures
Disabling Free-Space Accounting for Data Segments
Transaction Log Space Management
Transaction Log Space
Automating Transaction Log Management
Rescue Scenario Use Case
Monitoring Use Case
Monitoring and Control Use Case
Analyzing and Managing Transaction Log Space
Viewing the Span of a Transaction
Viewing the Oldest Active Transactions
Truncating a Log that Is Not on A Separate Segment
Truncating the Log in Early Development Environments
Truncating a Log that Has No Free Space
Dangers of Using with truncate_only and with no_log
Provide Sufficient Log Space
Querying the syslogshold Table
Migration Technology Guide 15.5
About this book
Migration Strategy
Preupgrade considerations
Understanding optimization goals
Optimization criteria
Resource recommendations for Adaptive Server 15.0
Incorporating statistics in Adaptive Server 15.0
Recommended testing before upgrade
Migrating to Adaptive Server 15.0 features
Upgrading, and using new features immediately
Upgrading, and using new features later
Upgrading, but not using new features
Troubleshooting
Query processing tips
Information to capture before contacting Technical Support
701 errors
Performance problems with a limited number of queries
System-wide performance issues
Uploading diagnostics to Technical Support
QPTune
Setting up your system
Using QPTune to fix missing statistics
Starting QPTune to fix missing statistics
Collecting statistics
Fixing statistics
Using undo_fix_stats
Using QPTune to tune queries or applications
Starting QPTune to tune queries or applications
Simple start
Custom start
Collecting metrics
Comparing metrics
Applying the best results
Configuration file
Examples
Upgrade issues
Localization
QPTune GUI
Environment and system requirements
Starting the QPTune GUI
Fixing missing statistics
Tuning Task
QPTune reference information
Running the Query Processor in Compatibility Mode
Enabling compatibility mode
Feature support in compatibility mode
Additional trace flag for diagnostics
New stored procedure sp_compatmode
Changes to @@qpmode global variable
Diagnostic tool
Performance and Tuning Series: Basics 16.0
Performance and Tuning Series: Improving Performance with Statistical Analysis 16.0
Performance and Tuning Series: Locking and Concurrency Control 16.0
Performance and Tuning Series: Monitoring Adaptive Server with sp_sysmon 16.0
Performance and Tuning Series: Monitoring Tables 16.0
Performance and Tuning Series: Physical Database Tuning 16.0
Performance and Tuning Series: Query Processing and Abstract Plans 16.0
Glossary 16.0
Quick Reference Guide 15.7
Quick Reference Guide
Datatypes
Standards and compliance
Datatypes and encrypted columns
Adaptive Server global variables
Reserved words
Transact-SQL reserved words
ANSI SQL reserved words
Potential ANSI SQL reserved words
Functions
XML functions
Commands
Interactive dbsql commands
System procedures
Catalog stored procedures
Extended stored procedures
dbcc stored procedures
System tables
DBCC tables
Monitoring tables
sybpcidb tables
Utilities
System Tables Diagram 16.0
Monitoring Tables Diagram 16.0
Troubleshooting: Error Messages Advanced Resolutions 15.0
About this book
Introduction
Understanding error message severity levels
Notifying the System Administrator
Variables in error message text
Finding object names in error message text
Finding the Adaptive Server version
Understanding the field order in the version string
Creating error messages
Reporting errors
Sybase Technical Support checklist
Sending error log fragments
Reproducing problems
Parser Errors (100s, 7380)
Error 102
Error 107
Error 195
Error 7380
Sequencer Errors (200s, 7783, 7788, 11000s, 14200)
Error 207
Error 208
Error 213
Error 216
Error 225
Error 226
Error 229
Error 232
Error 233
Error 241
Error 247
Error 257
Error 259
Error 265
Error 266
Error 268
Error 277
Error 7783
Error 7788
Error 11018
Error 11068
Error 11072
Error 14200
Query Processor Errors (300s, 400s, 500s)
Error 311
Error 313
Error 314
Error 403
Error 414
Error 428
Error 511
Error 512
Error 515
Error 530
Error 539
Error 540
Error 546
Error 547
Error 551
Error 584
Access Method Errors (600s)
Error 601
Error 603
Error 605
Error 611
Error 614
Error 622
Error 623
Error 624
Error 625
Error 629
Error 631
Error 644
Error 678
Error 691
Error 692
Error 693
Error 694
Error 695
Error 696
Error 697
Memory Manager Errors (700s)
Error 701
Error 702
Error 703
Error 706
Error 707
Error 709
Error 714
Error 715
Error 717
Error 718
Error 719
Error 720
Error 721
Buffer Manager Errors (800s)
Error 803
Error 804
Error 806
Error 813
Error 820
Error 821
Error 822
Error 823
Error 832
Error 834
Error 835
Error 840
Error 842
Error 847
Error 849
Error 852
Error 855
Error 861
Error 863
Error 881
Error 890
Open Database Manager Errors (900s)
Error 903
Error 905
Error 906
Error 908
Error 911
Error 913
Error 916
Error 921
Error 924
Error 925
Error 926
Error 930
Error 935
Error 940
Error 941
Error 945
Error 950
Error 965
Abstract Plan Manager Errors (1000s)
Error 1024
Page Manager Errors (1100s)
Error 1105
Error 1108
Error 1120
Error 1124
Error 1127
Error 1129
Error 1131
Error 1133
Error 1141
Error 1142
Error 1143
Error 1159
Error 1161
Lock Manager Errors (1200s)
Error 1203
Error 1204
Error 1205
Error 1243
Error 1244
Error 1249
Error 1251
Error 1265
Error 1279
Sort Manager Errors (1500s)
Error 1501
Error 1505
Error 1506
Error 1508
Error 1509
Error 1510
Error 1514
Error 1530
Error 1531
Initialization Errors (1600s)
Error 1601
Error 1602
Error 1603
Error 1605
Error 1608
Error 1613
Error 1621
Error 1622
Error 1623
Create Utilities Errors (1700 - 1900s, 2100s, 2700s, 12800s)
Error 1702
Error 1708
Error 1732
Error 1803
Error 1808
Error 1809
Error 1810
Error 1813
Error 1820
Error 1902
Error 1903
Error 1916
Error 1928
Error 2110
Error 2714
Error 2729
Error 2753
Error 2762
Error 12818
Error 12842
Error 12881
High Availability Errors (2200s)
Error 2243
Character Set Conversion Errors (2400s)
Error 2401
Error 2402
Error 2409
dbcc Errors (2500s, 7900s, 12000s, 15000s)
Error 2501
Error 2502
Error 2503
Error 2507
Error 2509
Error 2510
Error 2511
Error 2513
Error 2514
Error 2517
Error 2520
Error 2521
Error 2524
Error 2525
Error 2529
Error 2540
Error 2546
Error 2547
Error 2550
Error 2558
Error 2559
Error 2572
Error 2573
Error 2574
Error 2575
Error 2578
Error 2582
Error 2583
Error 2591
Error 2596
Error 7901
Error 7902
Error 7928
Error 7930
Error 7939
Error 7940
Error 7949
Error 7989
Error 9961
Error 12964
Error 15056
Error 15080
Error 15082
Error 15084
insert Errors (2600s)
Error 2601
Error 2610
Error 2615
Error 2619
Error 2620
Error 2626
Error 2628
Error 2630
Error 2631
Procedure Manager Errors (2800s)
Error 2805
Error 2806
Error 2811
Error 2812
Error 2824
Error 2835
Error 2844
dump and load Errors (3000s - 3200s, 4200s - 4300s)
Error 3019
Error 3020
Error 3021
Error 3105
Error 3120
Error 3143
Error 3144
Error 3161
Error 3162
Error 3201
Error 3203
Error 3211
Error 3212
Error 3216
Error 3225
Error 3230
Error 3233
Error 3240
Error 4204
Error 4205
Error 4207
Error 4216
Error 4221
Error 4222
Error 4305
Error 4322
commit and abort Errors (3300s)
Error 3301
Error 3307
Error 3321
Error 3322
Recovery Errors (3400s, 12500s)
Error 3401
Error 3403
Error 3404
Error 3414
Error 3429
Error 3434
Error 3445
Error 3446
Error 3447
Error 3452
Error 3454
Error 3462
Error 3470
Error 12546
Error 12547
Error 12551
Error 12583
Error 12587
Exception Handling Errors (3600s)
Error 3604
Error 3621
Error 3624
Error 3626
Error 3641
Error 3642
Error 3643
Error 3644
Error 3646
Error 3648
drop Errors (3700s)
Error 3701
Error 3702
Error 3703
Transaction Errors (3900s)
Error 3904
Error 3905
Error 3906
Error 3908
Error 3917
Error 3949
dataserver Errors (4000s)
Error 4001
Error 4002
Error 4020
View Resolution Manager Errors (4400s)
Error 4430
truncate table Errors (4700s)
Error 4716
Bulk Copy Utility Errors (4800s)
Error 4801
Error 4806
alter table Errors (4900s)
Error 4951
Error 4953
Error 4954
Error 4956
Error 4964
alter database Errors (5000s)
Error 5006
Error 5013
Error 5018
Error 5034
Disk Errors (5100s)
Error 5115
Error 5123
Error 5142
Transaction Coordinator Errors (5600s)
Error 5602
Open Client Errors (5700s)
Error 5701
Error 5704
Configuration Errors (5800s, 10800s)
Error 5806
Error 5808
Error 5824
Error 5846
Error 5847
Error 5848
Error 5849
Error 5850
Error 5851
Error 5852
Error 5853
Error 5854
Error 5857
Error 5859
Error 5861
Error 5863
Error 5865
Error 5866
Error 5867
Error 5868
Error 5893
Error 10841
Error 10865
Process Kill Errors (6100s)
Error 6103
Error 6107
Timestamp Errors (6900s)
Error 6901
Error 6902
Distributed Database Network Errors (7200s)
Error 7201
Error 7205
Error 7207
Error 7211
Error 7212
Error 7214
Error 7215
Error 7218
Error 7220
Error 7221
Error 7223
Error 7227
Error 7234
Error 7235
Text Manager Errors (7100s)
Error 7101
Error 7105
Error 7114
Error 7130
Error 7134
Threshold Manager Errors (7400s)
Error 7401
Error 7402
Error 7403
Error 7404
Error 7406
Error 7407
Error 7408
Error 7409
Error 7410
Error 7411
Error 7412
Error 7413
Error 7414
Error 7415
Error 7417
Error 7418
Error 7438
Auditing Errors (7600s)
Error 7618
Remote Procedure Call Errors (8000s)
Error 8006
Error 8009
Descriptor Manager Errors (8200s)
Error 8201
Error 8203
Error 8204
Error 8207
Error 8210
Error 8211
Error 8219
Error 8239
Error 8241
sysindexes Manager Errors (8400s)
Error 8402
Error 8419
Process Status Structure Errors (8600s)
Error 8601
Site Buffer Manager Errors (8700s)
Error 8704
Disk Manager Errors (9000s)
Error 9004
Replication Agent Manager Errors (9100s - 9200s)
Error 9122
Error 9287
Error 9289
Error 9290
Component Integration Services Errors (11200s)
Error 11201
Error 11202
Error 11203
Configurable Shared Memory Dump Manager (12000s, 12300s)
Error 12036
Error 12326
Error 12328
Error 12329
Error 12330
Error 12333
Error 12334
Error 12335
Fault Isolation Utility Errors (12700s)
Error 12716
Error 12717
Partition (14100s) and Partition Key Manager (14300s) Errors
Error 14100
Error 14108
Error 14120
Error 14124
Error 14126
Error 14313
mount database Errors (14500s)
Error 14503
Error 14504
Error 14511
Error 14513
Error 14560
Error 14561
Anchor Manager Errors (14600s)
Error 14605
Error 14618
Error 14619
Error 14620
Error 14621
Error 14622
Error 14623
XML Utility Manager Errors (14900s)
Error 14901
Message Service Errors (15100s)
Error 15101
Error 15105
Web Services Errors (15200s)
Error 15219
Encryption Errors (15400s)
Error 15402
Error 15403
Error 15412
Error 15413
Error 15417
Statistics Errors (15600s)
Error 15600
Error 15601
System Procedure Errors (17000s, 18000s)
Error 17461
Error 17715
Error 17716
Error 17737
Error 17870
Error 17871
Error 17872
Error 17873
Error 17874
Error 17875
Error 17903
Error 17904
Error 17905
Error 17906
Error 17910
Error 18031
Error 18032
Error 18033
Error 18123
Error 18750
Kernel Errors
Asynchronous I/O not available
Buffer mismatch
Could not create shared memory
Current process infected
dopen error
dstart I/O request repeatedly delayed
Failed to open device
Feature is not licensed
File already in use
Memory too fragmented
Memory usage in procedure headers
Network information message
No more alarms available
Open objects parameter may be too low
os_attach_region errors
os_create_region errors
Read/write errors
Server is unnamed
Stack guardword corrupted
time slice error
t_rcvconnect error
udunmirror errors
No more engines can be offlined
Reference Manual: Building Blocks 16.0
About These Topics
System and User-Defined Datatypes
Datatype Categories
Exact Numeric Datatypes
Integer Types
Decimal Datatypes
Approximate Numeric Datatypes
Understanding Approximate Numeric Datatypes
Range, Precision, and Storage Size
Entering Approximate Numeric Data
NaN and Inf Values
Money Datatypes
Accuracy
Range and Storage Size
Entering Monetary Values
timestamp Datatype
Creating a timestamp Column
Date and Time Datatypes
Range and Storage Requirements
Entering Date and Time Data
Entering the Date
Entering the Time
Displaying Formats for datetime, smalldatetime, and date Values
Display Formats for bigdatetime and bigtime
Displaying Formats for time Value
Finding Values That Match a Pattern
Manipulating Dates
Standards and Compliance
Character Datatypes
unichar and univarchar
Length and Storage Size
Determining Column Length with System Functions
Entering Character Data
Entering Unicode Characters
Example of Treatment of Blanks
Manipulating Character Data
Standards and Compliance for Character Datatypes
Binary Datatypes
Valid binary and varbinary Entries
Entries of More than the Maximum Column Size
Treatment of Trailing Zeros
Platform Dependence
bit Datatype
sysname and longsysname Datatypes
text, image, and unitext Datatypes
Data Structures Used for Storing text, unitext, and image Data
Initialize text, unitext, and image Columns
Define unitext Columns
Save Space by Allowing NULL
Obtain Information from sysindexes
Using readtext and writetext
Determine How Much Space a Column Uses
Restrictions on text, image, and unitext Columns
Selecting text, unitext, and image Data
Converting text and image Datatypes
Converting to or from Unitext
Pattern Matching in text Data
Duplicate Rows
Using Large Object text, unitext, and image Datatypes in Stored Procedures
Declaring a LOB Datatype
Creating a LOB Parameter
Examples for Using LOB Datatypes
Standards and Compliance
Range and Storage Size
Datatypes of Columns, Variables, or Parameters
Declaring Datatypes for a Column in a Table
Declaring Datatypes for Local Variable in a Batch or Procedure
Declaring Datatypes for a Parameter in a Stored Procedure
Determine the Datatype of Numeric Literals
Determine the Datatype of Character Literals
Datatypes of Mixed-Mode Expressions
Determine the Datatype Hierarchy
Determine Precision and Scale
Datatype Conversions
Automatic Conversion of Fixed-Length NULL Columns
Handling Overflow and Truncation Errors
Datatypes and Encrypted Columns
User-Defined Datatypes
Standards and Compliance
Transact-SQL Functions
abs
acos
allocinfo
ascii
asehostname
asin
atan
atn2
avg
audit_event_name
authmech
biginttohex
bintostr
cache_usage
case
cast
Usage for cast
Conversions Involving Java Classes
Implicit Conversion
Explicit Conversion
ceiling
char
Usage for char
Reformatting Output With char
char_length
charindex
coalesce
col_length
col_name
compare
Usage for compare
Maximum Row and Column Length for APL and DOL
convert
Usage for convert
Conversions Involving Java classes
Implicit Conversion
Explicit Conversion
cos
cot
count
count_big
create_locator
current_bigdatetime
current_bigtime
current_date
current_time
curunreservedpgs
data_pages
datachange
Usage for datachange
Restrictions for datachange
datalength
dateadd
datediff
datename
datepart
day
db_attr
db_id
db_instanceid
db_name
db_recovery_status
dbencryption_status
defrag_status
degrees
derived_stat
difference
dol_downgrade_check
exp
floor
get_appcontext
get_internal_date
getdate
getutcdate
has_role
hash
hashbytes
hextobigint
hextoint
host_id
host_name
instance_id
identity_burn_max
index_col
index_colorder
index_name
inttohex
isdate
is_quiesced
is_sec_service_on
is_singleusermode
isnull
isnumeric
instance_name
lc_id
lc_name
lct_admin
left
len
license_enabled
list_appcontext
locator_literal
locator_valid
lockscheme
log
log10
loginfo
lower
lprofile_id
lprofile_name
ltrim
max
migrate_instance_id
min
month
mut_excl_roles
newid
next_identity
nullif
object_attr
object_id
object_name
object_owner_id
pagesize
partition_id
partition_name
partition_object_id
password_random
patindex
pi
power
proc_role
pssinfo
radians
rand
rand2
replicate
reserve_identity
reserved_pages
return_lob
reverse
right
rm_appcontext
role_contain
role_id
role_name
round
row_count
rtrim
sdc_intempdbconfig
set_appcontext
setdata
shrinkdb_status
show_cached_plan_in_xml
show_cached_text
show_cached_text_long
show_condensed_text
show_dynamic_params_in_xml
show_plan
show_role
show_sec_services
sign
sin
sortkey
Usage for sortkey
Collation Tables
Collation Names and IDs
soundex
space
spaceusage
spid_instance_id
square
sqrt
stddev
stdev
stdevp
stddev_pop
stddev_samp
str
str_replace
strtobin
stuff
substring
sum
suser_id
suser_name
syb_quit
syb_sendmsg
sys_tempdbid
tan
tempdb_id
textptr
textvalid
to_unichar
tran_dumpable_status
tsequal
Usage for tsequal
Adding a Timestamp to a New Table for Browsing
uhighsurr
ulowsurr
upper
uscalar
used_pages
user
user_id
user_name
valid_name
valid_user
var
var_pop
var_samp
variance
varp
workload_metric
xa_bqual
xa_gtrid
xact_connmigrate_check
xact_owner_instance
xmlextract
xmlparse
xmlrepresentation
xmltable
xmltest
xmlvalidate
year
Global Variables
Using Global Variables in a Clustered Environment
Expressions, Identifiers, and Wildcard Characters
Expressions
Size of Expressions
Arithmetic and Character Expressions
Relational and Logical Expressions
Operator Precedence
Arithmetic Operators
Bitwise Operators
String Concatenation Operator
Comparison Operators
Nonstandard Operators
Using any, all, and in
Negating and Testing
Ranges
Using Nulls in Expressions
Comparisons That Return TRUE
Difference Between FALSE and UNKNOWN
Using “NULL” as a Character String
NULL Compared to the Empty String
Connecting Expressions
Using Parentheses in Expressions
Comparing Character Expressions
Using the Empty String
Including Quotation Marks in Character Expressions
Using the Continuation Character
Identifiers
Short Identifiers
Tables Beginning With # (Temporary Tables)
Case Sensitivity and Identifiers
Uniqueness of Object Names
Using Delimited Identifiers
Enabling Quoted Identifiers
Identifying Tables or Columns by Their Qualified Object Name
Using Delimited Identifiers Within an Object Name
Omitting the Owner Name
Referencing Your Own Objects in the Current Database
Referencing Objects Owned by the Database Owner
Using Qualified Identifiers Consistently
Determining Whether an Identifier is Valid
Renaming Database Objects
Using Multibyte Character Sets
like Pattern Matching
Using not like
Pattern Matching with Wildcard Characters
Case and Accent Insensitivity
Using Wildcard Characters
The Percent Sign (%) Wildcard Character
The Underscore (_) Wildcard Character
Bracketed ([ ]) Characters
The Caret (^) Wildcard Character
Using Multibyte Wildcard Characters
Using Wildcard Characters as Literal Characters
Using Square Brackets ( [ ] ) as Escape Characters
Using the escape Clause
Using Wildcard Characters With datetime Data
Reserved Words
Transact-SQL Reserved Words
ANSI SQL Reserved Words
Potential ANSI SQL Reserved Words
SQLSTATE Codes and Messages
SQLSTATE Warnings
Exceptions
Cardinality Violations
Data Exceptions
Integrity Constraint Violations
Invalid Cursor States
Syntax Errors and Access Rule Violations
Transaction Rollbacks
with check option Violation
Reference Manual: Commands 16.0
Commands
alter database
alter database Restrictions
Using alter database for Archive Databases
Altering In-Memory and Relaxed Durability Databases
Backing Up master After Allocating More Space
Placing the Log on a Separate Device
Altering Databases for Compression
In-row LOB Columns
Shrinking Log Space
Getting Help on Space Usage
The system and default Segments
Using alter database to Awaken Sleeping Processes
Using the alter database for proxy_update Parameter
Fully Encrypting Databases
alter encryption key
alter login
alter index
alter login profile
alter precomputed result set
alter...modify owner
alter role
Changing Passwords for Roles
Mutually Exclusive Roles
alter table
Restrictions for alter table
alter table and Encrypted Columns
Altering a Table’s Compression
Interactions Between Compression and Other alter table Parameters
Altering the Compression Level for a Table Using Large Objects
Getting Information About Tables
Specifying Ascending or Descending Ordering in Indexes
Using Cross-Database Referential Integrity Constraints
Changing Defaults
Setting Space Management Properties for Indexes
Conversion of max_rows_per_page to exp_row_size
Using reservepagegap
Partitioning Tables for Improved Performance
Using Computed Columns
Adding IDENTITY Columns
Altering Table Schema
Restrictions for Modifying a Table Schema
Restrictions for Modifying text and image Columns
Modifying Tables With Unitext Columns
Changing Locking Schemes
Adding Java-SQL Columns
Restrictions for Shared-Disk Clusters
alter thread pool
begin...end
begin transaction
break
checkpoint
close
commit
compute Clause
compute Clause Restrictions
compute Results Appear as a New Row or Rows
Case-Sensitivity
connect to...disconnect
continue
create archive database
create database
Restrictions for create database
Temporary Databases
Creating Compressed Databases
Creating Databases With In-Row LOBs
Creating In-Memory and Relaxed Durability Databases
New Databases Created from model
Ensuring Database Recoverability
Using the for load Option
Getting Information About Databases
Using with default_location and for proxy_update
create default
create default Restrictions
Datatype Compatibility
Getting Information about Defaults
Defaults and Rules
Defaults and Nulls
Specifying a Default Value in create table
Objects Dependent on Replaced Defaults
create encryption key
create existing table
Datatype Conversions
Changes by Server Class
Remote Procedures
Encrypted Columns
create function
Objects Dependent on Replaced Functions
create function (SQLJ)
create index
Creating Indexes Efficiently
Creating Clustered Indexes
Creating Indexes on Compressed Table
Creating Indexes on Encrypted Columns
Specifying Ascending or Descending Ordering in Indexes
Space Requirements for Indexes
Duplicate Rows
Using Unique Constraints in Place of Indexes
Using the sorted_data Option to Speed Sorts
Specifying the Number of Histogram Steps
Space Management Properties
Index Options and Locking Modes
Using the sorted_data Option on Data-Only-Locked Tables
Getting Information About Tables and Indexes
Creating Indexes on Computed Columns
Creating Partitioned Indexes
Creating Function-Based Indexes
create index and Stored Procedures
create login
create login profile
create plan
create precomputed result set
create procedure
create procedure Restrictions
execute as Stored Procedure
System Procedures
Nested Procedures
Procedure Return Status
Object Identifiers
Temporary Tables and Procedures
Setting Options in Procedures
Extended Stored Procedures
Objects Dependent on Replaced Procedures
Getting Information About Procedures
create procedure (SQLJ)
create proxy_table
create role
create rule
create rule Restrictions
Binding Rules
create schema
create service
create table
Restrictions for create table
Creating Compressed Tables
Restrictions for Compression
Using Indexes
Renaming a Table or Its Columns
Restrictions on Compressing Tables That Use Large Object (LOB) Data
Column Definitions
Temporary Tables
Defining Integrity Constraints
Unique and Primary-Key Constraints
Referential Integrity Constraints
Using Cross-Database Referential Integrity Constraints
check Constraints
IDENTITY Columns
Specifying a Locking Scheme
Getting Information About Tables
Creating Tables with Partitions
Creating Tables With Computed Columns
Creating Tables with Encrypted Columns
Limitations When Creating Virtually Hashed Tables
Creating Tables for In-Memory and Relaxed Durability Databases
Restrictions for Shared-Disk Clusters
Space Management Properties
Using reservepagegap
Java-SQL Columns
Determining Values for hash_factor
create thread pool
create trigger
Triggers and Referential Integrity
The deleted and inserted Logical Tables
Trigger Restrictions
Triggers and Performance
Setting Options Within Triggers
Dropping a Trigger
Actions That Do Not Cause Triggers to Fire
Nesting Triggers and Trigger Recursion
Restrictions for instead of
Getting Information About Triggers
Triggers and Transactions
Inserting and Updating Triggers
instead of and for Triggers
create view
Restrictions on Views
View Resolution
Modifying Data Through Views
IDENTITY Columns and Views
group by Clauses and Views
distinct Clauses and Views
Creating Views from SQL-Derived Tables
Objects Dependent on Replaced Views
dbcc
Using dbcc quorum (clusters only)
Restrictions on dbcc checkstorage for Shared-Disk Clusters
Using dbcc complete_xact
Checking Performed by dbcc checkcatalog
Using dbcc checktable
deallocate cursor
deallocate locator
declare
declare cursor
Using Scrollable Cursors
Cursor select Statements
Cursor Scope
Result Set
Updatable Cursors
Releasing Locks at Cursor Close
delete
delete Restrictions
Deleting All Rows from a Table
delete and Transactions
Using the where current of Parameter
Using readpast
delete statistics
disk init
Using dsync with disk init
Creating Devices for In-Memory and Relaxed Durability Databases
disk mirror
disk refit
disk reinit
Using dsync with Disk Reinit
disk remirror
disk resize
disk unmirror
drop database
drop default
drop encryption key
drop function
drop function (SQLJ)
drop index
drop login
drop login profile
drop precomputed result set
drop procedure
drop role
drop rule
drop service
drop table
Restrictions for drop table
Dropping Tables with Cross-Database Referential Integrity Constraints
drop thread pool
drop trigger
drop view
dump configuration
dump database
Commands and System Procedures Used to Back Up Databases
Scheduling Dumps
Specifying Dump Devices
Restrictions for dump database
Dumping Databases with Devices That Are Mirrored
Dumping the System Databases
Dump Files
Volume Names
Changing Dump Volumes
Appending to or Overwriting a Volume
File Names and Archive Names
dump database Performance
Compressed Dumps for an Archive Database
Compatibility Issues for a Compressed Dump
Encrypted Columns and dump database
dump transaction
dump transaction Restrictions
Copying the Log After Device Failure
Dumping Databases Without Separate Log Segments
Dumping Only Complete Transactions
Dumping Without the Log
Scheduling Dumps
Using Thresholds to Automate dump transaction
Specifying Dump Devices
Determining Tape Device Characteristics
Backup Servers
Dump Files
Volume Names
Changing Dump Volumes
Appending To or Overwriting a Volume
Dumping Logs Stored on Mirrored Devices
Fully Recoverable DDL and dump transaction
execute
fetch
Status Information
fetch Restrictions
Using Scrollable Cursors with fetch_direction
Multiple Rows per Fetch
Rules for Positioning the Scrollable Cursor
goto label
grant
grant all Object Creation Privileges
Using the with grant option Parameter
Users and User Groups
Using the grant Command's granted by Option
Privileges for grant
Grant Access to Roles
Granting Default Permissions on System Tables
Granting Permissions for update statistics, delete statistics, and truncate table
Granting Proxies and Session Authorizations
Granting a Privilege to a Role
grant role
group by and having Clauses
How group by and having Queries with Aggregates Work
Standard group by and having Queries
Transact-SQL Extensions to group by and having
group by and having Clauses and Sort Orders
How group by Works With the Optimizer
if...else
insert
The Column List
Validating Column Values
Treatment of Blanks
Inserting Rows Selected from Another Table
Inserting Rows in Bulk
Transactions and insert
Inserting Values into IDENTITY Columns
Inserting Data Through Views
Partitoning Tables for Improved Insert Performance
kill
load database
Commands and System Procedures to Restore Databases
Restrictions for load database
Locking Out Users During Loads
Upgrading Database and Transaction Log Dumps
Specifying Dump Devices
Backup Servers
Volume Names
Changing Dump Volumes
Restoring the System Databases
Disk Mirroring
Materializing an Archive Database
Using load database with norecovery
Using Logical Devices with an Archive Database
load database Limitations with an Archive Database
load database and Encrypted Columns
Loading Compressed Data
load transaction
load transaction Restrictions
Restoring a Database
Recovering a Database to a Specified Time
Locking Users Out During Loads
Upgrading Database and Transaction Log Dumps
Specifying Dump Devices
Backup Servers
Volume Names
Changing Dump Volumes
Disk Mirroring
Loading a Transaction Log into an Archive Database
lock table
merge
mount
online database
open
order by clause
order by Clause Restrictions
Behavior of order by When Identical Table Column Name and Column Alias Name Exist
Collating Sequences
Sort Rules
Descending Scans
prepare transaction
print
quiesce database
Encrypted Columns and quiesce database
quiesce database in a Clustered Environment
raiserror
readtext
Using the readpast Option
Using readtext with unitext Columns
reconfigure
refresh precomputed result set
remove java
reorg
return
revoke
Using the revoke Command's granted by Option
Revoking set proxy and set session authorization
Revoking Default Permissions on System Tables
Revoking Permissions for update statistics, delete statistics, and truncate table
Using the cascade Option
revoke role
rollback
rollback trigger
save transaction
select
Using select into
Converting the NULL Properties of a Target Column with select...into
Specifying a Compression Level
Parameter Interactions with Data Compression
Using select for update
Specifying in-row LOB Columns
Specifying a Lock Scheme Using select...into
Specifying a Partition Strategy Using select...into
Using index, prefetch, and lru | mru
Using Encrypted Columns
Using parallel
Using readpast
Expanded select * Syntax
Using select with Variables, Global Variables, and Constants
set
set Options That Can Be Grouped Together
Compile-Time Changes for Some set Parameters
Aggregate Behavior
Comparison Behavior
Roles and set Options
In-Memory and Relaxed-Durability Databases
Setting Compression for a Session
Using Predicated Privileges
Distributed Transactions, CIS, and set Options
Using Proxies
Using lock wait
Repeatable-Reads Transaction Isolation Level
Using Simulated Statistics
Global Variables Affected by set Options
Using fipsflagger with Java in the Database
Restrictions for set tracefile
set Options That Save Diagnostic Information to a Trace File
Restrictions for show_sqltext
Exporting set Options from a Login Trigger
Delimited Identifiers
Bracketed Identifiers
setuser
shutdown
Specifying a Wait Time
transfer table
truncate lob
truncate precomputed result set
truncate table
union operator
unmount
update
Using update with Transactions
Using Joins in Updates
Using update with Character Data
Using update with Cursors
Updating IDENTITY Columns
Updating Data Through Views
Using index, prefetch, or lru | mru
Using readpast
Using Variables in update Statements
update all statistics
update index statistics
update statistics
Types of Scans Performed During update statistics
update statistics and Sampling
create index and Stored Procedures
Using Hash-Based Statistics
update table statistics
use
waitfor
where clause
while
writetext
Interactive SQL Commands
clear
configure
connect
disconnect
exit
input
output
parameters
read
set connection
start logging
stop logging
system
Reference Manual: Procedures 16.0
System Procedures
Permissions on System Procedures
Auditing System Procedures
Executing System Procedures
Entering Parameter Values
Messages
System Procedure Tables
sp_activeroles
sp_add_qpgroup
sp_add_resource_limit
sp_add_time_range
sp_addalias
sp_addauditrecord
sp_addaudittable
sp_addengine
sp_addexeclass
sp_addextendedproc
sp_addexternlogin
sp_addgroup
sp_addlanguage
System Table Changes
Dates for Languages Added with sp_addlanguage
sp_addlogin
sp_addmessage
sp_addobjectdef
sp_addremotelogin
sp_addsegment
sp_addserver
sp_addthreshold
Creating Additional Thresholds
Executing Threshold Procedures
Changing or Deleting Thresholds
Disabling Free-Space Accounting
The Last-Chance Threshold
Creating Threshold Procedures
sp_addtype
sp_addumpdevice
sp_adduser
sp_altermessage
sp_audit
sp_audit and Security
sp_autoconnect
sp_autoformat
sp_bindcache
sp_bindefault
sp_bindexeclass
sp_bindmsg
sp_bindrule
sp_cacheconfig
Data Cache Memory
Creating Cache for In-Memory or Relaxed Durability Databases
Changing Existing Caches
Using Cache Partitions
Dropping Caches
sp_cachestrategy
Overrides
sp_changedbowner
sp_changegroup
sp_checknames
sp_checkreswords
Handling Reported Instances of Reserved Words
Changing Identifiers
Using sp_rename to Change Identifiers
Changing Other Identifiers
Using Delimited Identifiers
sp_checksource
sp_chgattribute
sp_cleanpwdchecks
sp_clearpsexe
sp_clearstats
sp_client_addr
sp_cluster
sp_clusterlockusage
sp_cmp_all_qplans
sp_cmp_qplans
sp_commonkey
sp_companion
sp_compatmode
sp_config_dump
sp_confighistory
sp_configure
The sp_configure number of checkpoint tasks Parameter
The sp_configure max concurrently recovered db Parameter
Setting Configuration Parameters for Clusters Using sp_configure
sp_copy_all_qplans
sp_copy_qplan
sp_countmetadata
sp_cursorinfo
sp_dbextend
sp_dboption
Full Logging and sp_dboption
Shrinking the Log
Allowing Wide Rows Using sp_dboption
Asynchronous Log Service (ALS) Options
Considerations for Using enforce dump tran sequence
Database Options and sp_dboption
sp_dbrecovery_order
sp_dbremap
sp_defaultloc
sp_deletesmobj
sp_depends
Java Methods
sp_deviceattr
sp_diskdefault
sp_displayaudit
sp_displaylevel
sp_displaylogin
sp_displayroles
sp_downgrade
sp_dropalias
sp_drop_all_qplans
sp_drop_qpgroup
sp_drop_qplan
sp_drop_resource_limit
sp_drop_time_range
sp_dropdevice
sp_dropengine
sp_dropexeclass
sp_dropextendedproc
sp_dropexternlogin
sp_dropglockpromote
sp_ dropglockpromote_ptn
sp_dropgroup
sp_dropkey
sp_droplanguage
sp_droplogin
sp_dropmessage
sp_dropobjectdef
sp_dropremotelogin
sp_droprowlockpromote
sp_droprowlockpromote_ptn
sp_dropsegment
sp_dropserver
sp_dropthreshold
sp_droptype
sp_dropuser
sp_dump_history
sp_dump_info
sp_dumpoptimize
Thresholds and sp_dumpoptimize
sp_encryption
sp_engine
Using sp_engine “offline” Versus sp_engine “shutdown”
sp_errorlog
sp_estspace
Estimating the Extra Space Required by a Column
sp_export_qpgroup
sp_extendsegment
sp_extengine
sp_extrapwdchecks
sp_familylock
sp_find_qplan
sp_fixindex
sp_flushstats
sp_forceonline_db
sp_forceonline_object
sp_forceonline_page
sp_foreignkey
sp_freedll
sp_getmessage
sp_grantlogin
sp_ha_admin
sp_help
Rules for Finding Objects
Precomputed Result Sets and sp_help
sp_help_resource_limit
sp_help_qpgroup
sp_help_qplan
sp_helpapptrace
sp_helpartition
Accuracy of Results and sp_helpartition
sp_helpcache
sp_helpcomputedcolumn
sp_helpconfig
Planning Metadata Cache Configuration with sp_helpconfig
Estimate Memory Requirements for compression info pool size
Using sp_helpconfig with sybdiagdb (SAP Product Support Only)
sp_helpconstraint
sp_helpdb
sp_helpdefrag
sp_helpdevice
sp_helpextendedproc
sp_helpexternlogin
sp_helpgroup
sp_helpindex
sp_helpjava
sp_helpjoins
sp_helpkey
sp_helplanguage
sp_helplog
sp_helpmaplogin
sp_helpobjectdef
sp_helpremotelogin
sp_helprotect
sp_helpsegment
sp_helpserver
sp_helpsort
sp_helptext
sp_helpthread
sp_helpthreshold
sp_helptrigger
sp_helpuser
sp_hidetext
sp_import_qpgroup
sp_indsuspect
sp_jreconfig
sp_ldapadmin
sp_listener
sp_listsuspect_db
sp_listsuspect_object
sp_listsuspect_page
sp_lmconfig
sp_lock
sp_locklogin
sp_logdevice
sp_logging_rate
sp_loginconfig
sp_logininfo
sp_logiosize
sp_logintrigger
sp_maplogin
sp_merge_dup_inline_default
sp_metrics
sp_modify_resource_limit
sp_modify_time_range
sp_modifylogin
sp_modifystats
sp_modifythreshold
Crossing a Threshold
The Last-Chance Threshold
Create Threshold Procedures with sp_modifythreshold
Execute Threshold Procedures with sp_modifythreshold
Disable Free-Space Accounting
sp_monitor
sp_monitorconfig
sp_monitor_server
sp_object_stats
sp_objectsegment
sp_opt_querystats
sp_optgoal
sp_options
sp_passthru
Return Parameters and sp_passthru
sp_password
sp_passwordpolicy
Login Password Complexity Checks and sp_passwordpolicy
High-Availability and Password Policy Options
sp_pciconfig
sp_placeobject
sp_plan_dbccdb
sp_poolconfig
Wash Percentage and sp_poolconfig
Local Asynchronous Prefetch Percentage and sp_poolconfig
sp_post_xpload
Handling Suspect Partitions in Cross-Pl