Tibero  Administrator's Guide

Tibero 6


Restricted Rights Legend

All TmaxData Software (Tibero®) and documents are protected by copyright laws and international convention. TmaxData software and documents are made available under the terms of the TmaxData License Agreement and this document may only be distributed or copied in accordance with the terms of this agreement. No part of this document may be transmitted, copied, deployed, or reproduced in any form or by any means, electronic, mechanical, or optical, without the prior written consent of TmaxData Co., Ltd. Nothing in this software document and agreement constitutes a transfer of intellectual property rights regardless of whether or not such rights are registered) or any rights to TmaxData trademarks, logos, or any other brand features.

This document is for information purposes only. The company assumes no direct or indirect responsibilities for the contents of this document, and does not guarantee that the information contained in this document satisfies certain legal or commercial conditions. The information contained in this document is subject to change without prior notice due to product upgrades or updates. The company assumes no liability for any errors in this document.

Trademarks

Tibero® is a registered trademark of TmaxData Co., Ltd. Other products, titles or services may be registered trademarks of their respective companies.

Open Source Software Notice

Some modules or files of this product are subject to the terms of the following licenses. : OpenSSL, RSA Data Security, Inc., Apache Foundation, Jean-loup Gailly and Mark Adler, Paul Hsieh's hash

Detailed Information related to the license can be found in the following directory : ${INSTALL_PATH}/license/oss_licenses

Document Information

Title: Tibero  Administrator's Guide

Publication Date: 2020-03-13

Software Version: Tibero 6 (FixSet07)

Edition: v2.1.7.4


Table of Contents

About This Document
1. Introduction to Tibero
1.1. Overview
1.2. Key Features
1.3. Basic Properties
1.4. Row Level Locking
1.5. Process Structure
1.5.1. Listener
1.5.2. Worker Process
1.5.3. Background Process
1.6. Directory Structure
2. Basic Database Administration
2.1. User Types
2.1.1. DBA
2.1.2. SYS
2.1.3. System Administrators
2.1.4. Application Developers
2.1.5. Database Users
2.2. Installation Environment
2.3. tbSQL Utility Usage
2.4. Creating Users and Tables
2.5. Startup and Shutdown
2.5.1. tbboot
2.5.2. tbdown
2.6. Using Binary TIP
3. File and Data Management
3.1. Data Storage Structure
3.2. Tablespaces
3.2.1. Tablespace Structures
3.2.2. Creating and Deleting Tablespaces
3.2.3. Changing Tablespaces
3.2.4. Viewing Tablespace Data
3.3. Log Files
3.3.1. Redo Log File Structure
3.3.2. Creating and Deleting Log Files
3.3.3. Viewing Log File Data
3.4. Control Files
3.4.1. Modifying Control Files
3.4.2. Viewing Control File Data
4. Schema Object Management
4.1. Overview
4.2. Tables
4.2.1. Creating, Altering, and Dropping Tables
4.2.2. Efficient Table Management
4.2.3. Viewing Table Data
4.2.4. Compressing Tables
4.2.5. INDEX ORGANIZED TABLE
4.3. Constraints
4.3.1. Declaring, Changing, and Removing Constraints
4.3.2. Constraint States
4.3.3. Viewing Constraint Data
4.4. Disk Blocks
4.4.1. PCTFREE Parameter
4.4.2. INITRANS Parameter
4.4.3. Parameter Settings
4.5. Indexes
4.5.1. Creating and Deleting Indexes
4.5.2. Efficient Index Management
4.5.3. Viewing Index Data
4.5.4. Monitoring Index Usage
4.6. Views
4.6.1. Creating, Changing, and Deleting Views
4.6.2. Viewing View Data
4.7. Sequences
4.7.1. Creating, Changing, and Deleting Sequences
4.7.2. Viewing Sequence Data
4.8. Synonyms
4.8.1. Creating and Deleting Synonyms
4.8.2. Creating and Deleting Public Synonyms
4.8.3. Viewing Synonym Data
4.9. Triggers
4.9.1. Creating and Deleting Triggers
4.10. Partitions
4.10.1. Creating Partitions
4.10.2. Creating Composite Partitions
4.10.3. Creating Index Partitions
4.10.4. Viewing Partition Data
5. User Management and Database Security
5.1. Managing User Accounts
5.1.1. Creating, Modifying, and Removing Users
5.1.2. Viewing User Data
5.1.3. Locking and Unlocking User Accounts
5.1.4. Creating an OS Authenticated User
5.2. Privileges
5.2.1. Schema Object Privileges
5.2.2. System Privileges
5.2.3. Viewing Privilege Data
5.2.4. Additional Privileges
5.3. Profiles
5.3.1. Creating, Changing, and Deleting Profiles
5.3.2. Specifying a Profile
5.3.3. Viewing Profile Data
5.3.4. VERIFY_FUNCTION
5.4. Roles
5.4.1. Creating, Granting, and Revoking Roles
5.4.2. Predefined Roles
5.4.3. Default Roles
5.4.4. Viewing Role Data
5.5. Network Access Control
5.5.1. Full Network Access Control
5.5.2. IP-based Network Access Control
5.5.3. Dynamically Adding and Deleting a Listener Port
5.6. Auditing
5.6.1. Enabling and Disabling Auditing
5.6.2. Audit Trails
5.6.3. Auditing SYS User
6. Backup and Recovery
6.1. Component Files in Tibero
6.2. Backups
6.2.1. Backup Types
6.2.2. Performing a Backup
6.3. Recovery
6.3.1. Recovery for Each Boot Mode
6.3.2. Crash Recovery
6.3.3. Media Recovery
6.3.4. Online Media Recovery
6.4. Recovery Manager (RMGR)
6.4.1. Basic Functions
6.4.2. RMGR Options
6.4.3. Backup and Recovery Examples
6.4.4. Example of Deleting a Backup
7. Distributed Transactions
7.1. XA
7.2. Two-phase Commit Mechanism
7.3. In-Doubt Transaction Processing of XA
7.3.1. DBA_2PC_PENDING View
7.4. Database Links (DBLinks)
7.4.1. Creating and Removing DBLinks
7.4.2. Remote Database Connections
7.4.3. Gateway Settings
7.4.4. Using DBLinks
7.4.5. Global Consistency
7.4.6. In-Doubt Transaction Processing of DBLink
7.4.7. Viewing DBLink Data
8. Tibero Standby Cluster
8.1. Overview
8.2. Processes
8.3. Log Transmission Methods
8.4. Primary Settings and Operations
8.5. Configuring and Operating Standby Databases
8.5.1. Standby Read-Only Mode
8.6. Configuring TAC-TSC
8.7. Database Role Switchover
8.7.1. Switchover
8.7.2. Failover
8.8. Client Configuration
8.9. Standby Redo Log Group
8.10. Viewing Tibero Standby Cluster Data
8.11. Constraints
9. Tibero Cluster Manager
9.1. Overview
9.2. Environment Variables and Initialization Parameters
9.2.1. Environment Variables
9.2.2. Initialization Parameters
9.2.3. CM Startup
9.3. Commands
9.3.1. cmrctl
9.3.2. crfconf
9.4. Cluster Resource ROOT Mode
9.5. TAC Configuration
9.6. TAS-TAC Configuration
9.7. High Availability (HA) Configuration
10. Tibero Active Cluster
10.1. Overview
10.2. Components
10.3. Processes
10.4. Configuring a TAC Environment
10.5. Creating a Database for TAC
10.6. Executing TAC
10.6.1. Preparation for Execution
10.6.2. Creating a Database
10.6.3. Starting TAC
10.6.4. Monitoring TAC
11. Data Encryption
11.1. Overview
11.2. Configuring an Environment
11.3. Encrypting a Column
11.3.1. Creating a Table with Encrypted Columns
11.3.2. Adding an Encrypted Column to a Table
11.3.3. Changing a General Column to an Encrypted Column
11.3.4. Changing an Encrypted Column to a General Column
11.3.5. Changing an Encryption Algorithm for All Encrypted Columns
11.3.6. Index on Encrypted Column
11.4. Encrypting a Tablespace
11.4.1. Creating an Encrypted Tablespace
11.4.2. Changing an Encrypted Tablespace
11.4.3. Using an Encrypted Tablespace
11.4.4. Viewing Encrypted Tablespace Data
11.4.5. Indexing Encrypted Column in Encrypted Tablespaces
12. Communication Encryption
12.1. Overview
12.2. Configuring an Environment
12.2.1. Creating a Private Key and a Certificate
12.2.2. Specifying Locations for the Private Key and the Certificate
12.2.3. Specifying a Client
13. Parallel Execution
13.1. Overview
13.2. Degree of Parallelism
13.2.1. Determining DOP
13.2.2. Allocating a Working Thread Based on the DOP
13.3. Operation Principle
13.3.1. 2-Set Structure
13.3.2. Distributing a TPS
13.4. Types of Parallelism
13.4.1. Parallel Queries
13.4.2. Parallel DDL
13.4.3. Parallel DML
13.5. Views for Parallel Execution Performance Analysis
14. Tibero Performance Repository
14.1. Overview
14.2. Using TPR
14.2.1. Specifying a tip File
14.2.2. Related Tables and Views
14.2.3. Creating a Snapshot Manually
14.2.4. Creating a Report
15. Separation of Duties
15.1. Overview
15.1.1. System Administrator
15.1.2. Security Administrator
15.1.3. System Auditor
15.2. Installation
15.3. Changes and Precautions
A. tbdsn.tbr
A.1. tbdsn.tbr Structure
A.2. Configuring a Replication Server
A.3. Specifying Load Balancing
A.4. Specifying Failover
B. V$SYSSTAT
C. Troubleshooting
C.1. Accessing a Database
D. Client Environment Variables
Index

List of Figures

[Figure 1.1] Tibero's Process Structure
[Figure 3.1] Logical Structure of a Tablespace
[Figure 3.2] Physical Structure of a Tablespace
[Figure 3.3] Redo Log Structure
[Figure 3.4] Log Member Multiplexing
[Figure 3.5] Log Group Multiplexing
[Figure 3.6] Control File Multiplexing
[Figure 7.1] XA Operation (Application, TM, and DB Interaction)
[Figure 8.1] Tibero Standby Cluster's Operation
[Figure 10.1] TAC Structure
[Figure 13.1] Parallel Execution
[Figure 13.2] Parallel Operations

List of Examples

[Example 2.1] tbSQL Utility Execution
[Example 2.2] Database Connection Using tbSQL
[Example 2.3] LS Command Execution
[Example 2.4] LS Command Execution - User Lookup
[Example 2.5] LS Command Execution - Tablespace Lookup
[Example 2.6] SQL Statement Execution (1)
[Example 2.7] SQL Statement Execution (2)
[Example 2.8] Creating a User
[Example 2.9] Creating a Table
[Example 3.1] Archive Log Directory Configuration
[Example 4.1] Creating a Table
[Example 4.2] Altering a Table - Column Attribute
[Example 4.3] Altering a Table - Column Name
[Example 4.4] Altering a Table - Disk Block Parameter
[Example 4.5] Dropping a Table
[Example 4.6] Creating a Compressed Table
[Example 4.7] Creating a Table with Compressed Partitions
[Example 4.8] Checking the Compression Status of a Table
[Example 4.9] Compressing or Decompressing a Table
[Example 4.10] Changing the Compression of Additional DML
[Example 4.11] Creating an INDEX ORGANIZED TABLE
[Example 4.12] Deleting an INDEX ORGANIZED TABLE
[Example 4.13] Specifying a Name for a Constraint
[Example 4.14] Declaring Constraints - Column Unit
[Example 4.15] Constraint Declaration - Table Unit
[Example 4.16] Changing a Constraint's Name
[Example 4.17] Adding New Constraints
[Example 4.18] Constraint Removal
[Example 4.19] Changing a Constraint State - ENABLE
[Example 4.20] Changing a Constraint State - DISABLE
[Example 4.21] Changing a Constraint State - VALIDATE
[Example 4.22] Creating an Index
[Example 4.23] Deleting an Index
[Example 4.24] Composite Key Search
[Example 4.25] View Creation
[Example 4.26] View Change
[Example 4.27] View Deletion
[Example 4.28] Sequence Creation
[Example 4.29] Sequence Change
[Example 4.30] Sequence Deletion
[Example 4.31] Synonym Creation
[Example 4.32] Synonym Deletion
[Example 4.33] Public Synonym Creation
[Example 4.34] Public Synonym Deletion
[Example 4.35] Trigger Creation
[Example 4.36] Trigger Deletion
[Example 4.37] Partition Creation
[Example 4.38] Creating Local Partition Indexes
[Example 4.39] Creating Global Partition Indexes
[Example 6.1] Physical Backup for Control Files
[Example 6.2] Logical Backup for Control Files
[Example 6.3] Backed-up CREATE CONTROLFILE Statement
[Example 6.4] Specifying the Location of a Control File
[Example 6.5] Control File Lookup
[Example 6.6] Data File Lookup
[Example 6.7] Online Log File Lookup
[Example 6.8] Inconsistent Backup - Selecting a Tablespace
[Example 6.9] Inconsistent Backup - Using the 'begin backup' and 'end backup' Commands
[Example 6.10] Starting the Database with RESETLOGS
[Example 6.11] Online Full Backup Scenario
[Example 6.12] Example of Online Full Backup Using Compress and Skip Unused Options
[Example 6.13] Example of Online Full Backup Using Archive Log Option
[Example 6.14] Example of Incremental Backup Using Archive Log Option
[Example 6.15] Example of Recovery Using Online Full Backup
[Example 6.16] Example of Recovery Using Online Full and Archive Log Backups
[Example 6.17] Example of Recovery Using Incremental and Archive Log Backups
[Example 6.18] Example of Tablespace Recovery
[Example 6.19] Deleting a Backup Using a Backup Set ID
[Example 6.20] Deleting a Backup Using a Backup Date
[Example 7.1] Looking up DBA_2PC_PENDING
[Example 8.1] Changing the $TB_SID.tip File Path in Standby
[Example 8.2] Standby Control File Configuration
[Example 8.3] Starting Up Standby
[Example 8.4] Standby Read-Only Continue Recovery
[Example 8.5] Changing Back to RECOVERY Mode
[Example 8.6] Switchover Command Execution
[Example 10.1] Viewing Global View - GV$SESSION
[Example 11.1] Creating a Security Wallet
[Example 11.2] Specifying a Location for a Security Wallet: <$TB_SID.tip>
[Example 11.3] Opening a Security Wallet
[Example 11.4] Closing a Security Wallet
[Example 11.5] Creating a Table With Encrypted Columns with Default Encryption Options (AES192, SALT)
[Example 11.6] Creating a Table With Encrypted Columns with AES256 and No SALT
[Example 11.7] Adding an Encrypted Column
[Example 11.8] Changing a General Column to an Encrypted Column
[Example 11.9] Changing an Encrypted Column to a General Column
[Example 11.10] Changing an Encryption Algorithm for All Encrypted Columns
[Example 11.11] Index on Encrypted Column
[Example 11.12] Creating an Encrypted Tablespace with the 3DES168 Algorithm
[Example 11.13] Encrypted Tablespace - Creation Failure
[Example 11.14] Encrypted Tablespace - Adding a Data File
[Example 11.15] Encrypted Tablespace - Creating a Table
[Example 11.16] Indexing Encrypted Column in Encrypted Tablespaces
[Example 12.1] Creating a Private Key and a Certificate
[Example 12.2] Specifying Locations for a Private Key and a Certificate
[Example 12.3] Specifying a Client