Home
|
Previous Page
|
Next Page
Contents
Introduction
In This Introduction
About This Manual
Types of Users
Software Dependencies
Assumptions About Your Locale
Demonstration Database
New Features in Dynamic Server, Version 10.0
Database Server Security and Usability Enhancements
New Features in Previous Versions of Dynamic Server
Features in Dynamic Server, Version 9.4
Features in Dynamic Server, Version 9.3
Features in Dynamic Server, Version 9.21
Organizational Changes to This Manual In Version 9.2
Documentation Conventions
Typographical Conventions
Feature, Product, and Platform Markup
Syntax Diagrams
Example Code Conventions
Additional Documentation
IBM Informix Information Center
Installation Guides
Online Notes
Informix Error Messages
Manuals
Online Help
Accessibility
IBM Informix Dynamic Server Version 10.0 and CSDK Version 2.90 Documentation Set
Compliance with Industry Standards
IBM Welcomes Your Comments
The Database Server
Installing and Configuring the Database Server
In This Chapter
Planning for the Database Server
Considering Your Priorities
Considering Your Environment
Configuring the Operating System
Configuring Windows Memory
Modifying UNIX Kernel Parameters
Allocating Disk Space
Using Large Chunks
Creating Chunk Files on UNIX
Providing NTFS Partitions in Windows
Setting Permissions, Ownership, and Group
Creating Standard Device Names (UNIX)
Setting Environment Variables
Setting GLS Environment Variables
Setting Environment Variables on UNIX
Setting Environment Variables on Windows
Configuring Connectivity
The sqlhosts File on UNIX
The sqlhosts Registry on Windows
Configuring Connectivity Using ISA
Configuring the Database Server
Preparing the ONCONFIG Configuration File
Using Server Setup in ISA to Customize Your Configuration
Using IBM Informix Server Administrator to Update the ONCONFIG File
Using the Instance Manager to Create a New Database Server Instance (Windows)
Using the Instance Manager to Rename a Database Server Instance (Windows)
Configuring Java Support
Starting and Administering the Database Server
Starting the Database Server and Initializing Disk Space
Preparing for Automatic Startup
Preparing to Connect to Applications
Creating Storage Spaces and Chunks
Supporting Large Chunks
Setting Up Your Backup System and Storage
Performing Routine Administrative Tasks
Changing Database Server Modes
Backing Up Data and Logical-Log Files
Monitoring Activity
Checking for Consistency
Performing Additional Administrative Tasks
Using Mirroring
Managing Database-Logging Status
Managing the Logical Log
Managing the Physical Log
Managing Shared Memory
Managing Virtual Processors
Managing Parallel Database Query
Using Data Replication
Using Auditing
Using Distributed Queries
Monitoring Database Server Activity
Event Alarms
IBM Informix Server Administrator (ISA)
Message Log
ON-Monitor (UNIX)
oncheck Utility
onperf Tool (UNIX)
onstat Utility
SMI Tables
System Console
UNIX Operating-System Tools
Windows Event Viewer
Windows Performance Monitor
Windows Utilities
Configuration Parameters
In This Chapter
Database Server Identification Parameters
Disk-Space Parameters
Root Dbspace
Mirror of Root Dbspace
Other Space-Management Parameters
Logging Parameters
Logical Log
Physical Log Parameters
Rollback and Recovery Parameters
Backup and Restore Parameters
Message-Log Parameters
Shared-Memory Parameters
Shared-Memory Size Allocation
Shared-Memory Space Allocation
Shared-Memory Buffer Control
SQL Statement Cache Usage
Decision-Support Parameters
Database Server Process Parameters
Virtual Processor Parameters
Time Intervals
Restore Parameters
High-Availability Data-Replication Parameters
Event-Alarm Parameters
Dump Parameters (UNIX)
Directives Parameters
Connection Parameters
Security-Related Parameters
Specialized Parameters
Auditing Parameters (UNIX)
Optical Media Parameters
UNIX Parameters
Monitoring Configuration Information
Client/Server Communications
In This Chapter
Client/Server Architecture
Network Protocol
Network Programming Interface
Windows Network Domain
Database Server Connection
Multiplexed Connection
Connections That the Database Server Supports
Local Connections
Shared-Memory Connections (UNIX)
Stream-Pipe Connections (UNIX)
Named-Pipe Connections (Windows)
Local-Loopback Connections
Communication Support Services
Connectivity Files
Network-Configuration Files
Network Security Files
The sqlhosts File and the SQLHOSTS Registry Key
The sqlhosts Information
Connectivity Information
Group Information
Alternatives for TCP/IP Connections
Dynamic Server Support for IPv6 Addresses
ONCONFIG Parameters for Connectivity
DBSERVERNAME Configuration Parameter
DBSERVERALIASES Configuration Parameter
NETTYPE Configuration Parameter
Environment Variables for Network Connections
Examples of Client/Server Configurations
Using a Shared-Memory Connection (UNIX)
Using a Local-Loopback Connection
Using a Network Connection
Using Multiple Connection Types
Accessing Multiple Database Servers
Using IBM Informix MaxConnect
Initializing the Database Server
In This Chapter
Types of Initialization
Initializing Disk Space
Initialization Steps
Process Configuration File
Create Shared-Memory Portions
Initialize or Restart Shared-Memory
Initialize Disk Space
Start All Required Virtual Processors
Make Necessary Conversions
Start Fast Recovery
Start a Checkpoint
Document Configuration Changes
Create the oncfg_servername.servernum File
Drop Temporary Tblspaces
Set Forced Residency If Specified
Return Control to User
Create sysmaster Database and Prepare SMI Tables
Create the sysutils Database
Monitor Maximum Number of User Connections
Database Server Operating Modes
Changing Database Server Operating Modes
Users Permitted to Change Modes
ISA Options for Changing Modes
ON-Monitor Options for Changing Modes (UNIX)
Command-Line Options for Changing Modes
Security
In This Chapter
Server Utility Security Before Starting on UNIX and Linux
Disabling Security Checking
Securing an Insecure Environment
Warning and Error Messages for Utility Security Checks
INFORMIXDIR Directory Permissions
Users and Group Membership for Running Dynamic Server Utilities
Setting Up Security for Local Connections to a Host
Auditing Database Events
3
3
Setting Permission to Create Databases
User Roles
Default Roles
Limiting Denial-of-Service Flood Attacks
Using the LISTEN_TIMEOUT and MAX_INCOMPLETE_CONNECTIONS Parameters
Using the onmode -wm and onmode -wf Options to Change Parameter Values
Encryption
Overview of Encryption and Encryption Options
Using Communication Support Modules (CSMs) for Password and Data Transmission Encryption
Using Column-Level Encryption
Authentication Modules
Pluggable Authentication Modules for Systems Running on UNIX or Linux
LDAP Authenti e="ToC_1050" href="admin664.htm#sii22uhdr985885" class="toclink">Managing Virtual Processors
Managing Shared Memory
Replicating an Index to the Secondary Database Server
Changing the Database Server Mode
Changing the Database Server Type
Monitoring HDR Status
Using Command-Line Utilities
Using SMI Tables
Using ON-Monitor (UNIX)
Restoring Data After Media Failure Occurs
Restoring After a Media Failure on the Primary Database Server
Restoring After a Media Failure on the Secondary Database Server
Replicating An Index to the Secondary Server
Restarting HDR After a Failure
Restarting After Critical Data Is Damaged
Restarting If Critical Data Is Not Damaged
Consistency Checking
In This Chapter
Performing Periodic Consistency Checking
Verifying Consistency
Monitoring for Data Inconsistency
Retaining Consistent Level-0 Backups
Dealing with Corruption
Finding Symptoms of Corruption
Fixing Index Corruption
Fixing I/O Errors on a Chunk
Collecting Diagnostic Information
Disabling I/O Errors
Monitoring the Database Server for Disabling I/O Errors
Using the Message Log to Monitor Disabling I/O Errors
Using Event Alarms to Monitor Disabling I/O Errors
Using No Bad-Sector Mapping
Distributed Data
Multiphase Commit Protocols
In This Chapter
Transaction Managers
Using the TP/XA Library With a Transaction Manager
Using Microsoft Transaction Server (MTS/XA)
3
3
Using Dynamic Server Transaction Support for XA-Compliant, External Data Sources
Using Loosely-Coupled and Tightly-Coupled Modes
Two-Phase Commit Protocol
When the Two-Phase Commit Protocol Is Used
Two-Phase Commit Concepts
Phases of the Two-Phase Commit Protocol
How the Two-Phase Commit Protocol Handles Failures
Presumed-End Optimization
Independent Actions
Situations That Initiate Independent Action
Possible Results of Independent Action
The Heuristic Rollback Scenario
The Heuristic End-Transaction Scenario
Monitoring a Global Transaction
Two-Phase Commit Protocol Errors
Two-Phase Commit and Logical-Log Records
Logical-Log Records When the Transaction Commits
Logical-Log Records Written During a Heuristic Rollback
Logical-Log Records Written After a Heuristic End Transaction
Configuration Parameters Used in Two-Phase Commits
Function of the DEADLOCK_TIMEOUT Parameter
Function of the TXTIMEOUT Parameter
Heterogeneous Commit Protocol
Gateways That Can Participate in a Heterogeneous Commit Transaction
Enabling and Disabling of Heterogeneous Commit
How Heterogeneous Commit Works
Implications of a Failed Heterogeneous Commit
Recovering Manually from Failed Two-Phase Commit
In This Chapter
Determining If Manual Recovery Is Required
Determining If a Transaction Was Implemented Inconsistently
Determining If the Distributed Database Contains Inconsistent Data
Deciding If Action Is Needed to Correct the Situation
Example of Manual Recovery
Appendixes
Appendix. Accessibility
Notices
Index
Home
| [
Top of Page
|
Previous Page
|
Next Page
|
Contents
|
Index
]