DB2 has one or two ports that it is listening on for each and every Db2 instance. Two Db2 instances cannot share a port to listen on. Remember that Db2 allows multiple instances per server and also multiple databases per instance, and has for years.… Read the restContinue reading »
To list the database authorities held by an ID or group – authorities, not privileges. This information is not available in sysibmadm.privileges. The format of syscat.dbauth has columns with ‘Y’ or ‘N’ in them, and reading that quickly to answer the question “What permissions does this ID have?” can be a bit frustrating.… Read the restContinue reading »
Some of my clients, instead of engaging me for day-to-day support, engage me for expert assistance only when it all really hits the fan. This issue occurred for one of those clients, who had other support performing the HADR failovers while the Linux kernel was upgraded.… Read the restContinue reading »
What is Db2? This article is one of my few that is not directed at a Db2 DBA or someone trying to fill some of the roles of a Db2 DBA. This is directed, as much as I can manage, at any technologist trying to understand what Db2 is and the role it plays in an IT organization.… Read the restContinue reading »
Once IBM made the Request For Enhancement (RFE) program workable last year, I blogged about it and tweeted about it, but now that we’ve seen more action on it, I thought I’d share some additional details.
What is an RFE?
First off, an RFE is a request for some feature or functionality in Db2 that does not exist today.… Read the restContinue reading »
This is the third time I have written this post. It keeps changing, so I keep sharing.
I work from home, so downloading software to my laptop and then uploading it to a server is not very efficient. Download speeds aren’t bad, but uploading can take 8 hours or more, depending on the client.… Read the restContinue reading »
Edit: 01/23/2018 – corrected one word not in an SQL statement.
I have written several other articles on security and permissions, but I thought I would write one from a purely practical perspective. If you don’t understand the basics of how DB2 handles users, authentication, authorization, and privileges, please read Db2 Basics: Users, Authentication, and Authorization.… Read the restContinue reading »
Why Should a Database be Highly Available?
It is significantly easier to implement high availability at other levels than it is at the database level. Often the database server is one of the more powerful servers in an environment, and without some fancy footwork there can be only one live copy of data.… Read the restContinue reading »