With the development and adoption of automatic storage the art of the redirected restore is going the way of the dinosaur. For those with systems that are running the tried and true (and deprecated) DMS (Database Managed Storage) table spaces a redirected restore can be a lifesaver.… Read the restContinue reading »
Like any software, DB2 requires frequent patching. A database should be one of the most secure parts of any enterprise, and keeping it secure means keeping up with the fixes that are delivered in fix packs.
DB2 delivers many things through fixpacks, including:
- Security Fixes
- Bug Fixes
- New Functionality – though IBM goes back and forth on this
IBM delivered Native Encryption in Fix Pack 5 of DB2 10.5.… Read the restContinue reading »
Isolation levels are such a critical concept to maximizing concurrency for transaction processing databases where ACID is so critical.
What is ACID?
ACID stands for Atomicity, Consistency, Isolation, Durability. This is a set of concepts that applies to any transaction processing system, whether it is a Relational Database Management System (like DB2) or not.… Read the restContinue reading »
The database directory is something many of us use every day. It includes informaiton for connecting to databases, both local and remote, as well as additional information like alternate servers and filesystems where database directories reside. Getting just the local database names out of it may take a bit of practice.… Read the restContinue reading »
Updated 11/22/2017: One-letter typo
If you only ever take the defaults, DB2 places all databases, data, and so forth on one filesystem – whatever filesystem is the home filesystem for the DB2 instance owner. If that is an isolated filesystem, this can be acceptable, but more often it is not, and this is a bad design.… Read the restContinue reading »
This post is not meant to be a comprehensive coverage of security, but an overview such that those newer to DB2 know what areas they may want to research further.
Users, Authentication, and Authorization
I’ve already covered this in some detail in DB2 Basics: Users, Authentication, and Authorization.… Read the restContinue reading »
I find the DB2 sample database useful for trying new things and proving to myself how things work.
Why Use the Sample Database?
The DB2 sample database is useful for a variety of reasons.
Sometimes when building a new database server, we need to test connectivity from an application server or some random client into the new server.… Read the restContinue reading »
DB2 doesn’t have any defaults for filesystems because that is an OS-level thing. However, there are a few sanity checks and some recommeded separation when installing DB2 on Linux and UNIX operating systems. These are my best practices for installations, in general terms.… Read the restContinue reading »
BLU has been all the hype for DB2 for the past year or more. What exactly is DB2 BLU? How does it work? What do you need to consider before jumping on the bandwagon?
What is DB2 BLU
BLU leverages the DB2 engine but is a significantly different animal in many ways from DB2 without BLU.… Read the restContinue reading »