IBM DB2 Agenda
Programming
Duration: 40 HRS / 5 DAYS)
Delivery Method: Classroom-based, Virtual Instructor Led Training
Description
Agenda
Day 1:
· Describe the system platforms supported by the DB2 Family of products
· Compare the features available with different DB2 LUW product editions
· Select the appropriate DB2 client software to support application client or server systems
· Choose a method to install your DB2 LUW product edition and plan migrations of existing DB2 LUW servers to the latest release
· Compare cloud-based DB2 options to a locally installed DB2 server
· Utilize the DB2 Command Line Processor to run DB2 commands, SQL statements and command scripts
· Invoke the CLPPlus command line processor to connect databases and to define, edit, and run statements, scripts, and commands
· List some of the ways IBM Data Server Manager can be used to support DB2 database administration and SQL execution with DB2 LUW servers
· Specify the key features of an instance
· Create and drop a DB2 instance
· Use db2start and db2stop commands to manage a DB2 instance
· Display and set DB2 registry variables
· Describe and modify the database manager configuration
· Plan the initial storage allocations for a database including catalog tables and log files
· Create a new database using DB2 native encryption
· Explore the System Catalog tables and views
· Check and update Database configuration parameter settings
· Compare DMS and Automatic Storage management for table spaces
· Describe how to setup and manage a DB2 database with Automatic Storage enabled
· Define Storage Groups to manage databases with different classes of storage available
· Differentiate between table spaces, containers, extents, and pages
· Create and alter table spaces
· Use DB2 commands and SQL statements to display current table space statistics and status information
· Describe the DB2 object hierarchy
· Create the following objects:
· Schema, Table, View, Alias, Index
· Review the use of temporary tables
· Explore the use and implementation of check constraints, referential integrity and triggers
· Utilize BLU Acceleration, column-organized tables to improve analytics query performance
· Explain the difference between system-period temporal tables and Application-period temporal tables
· List the types of compression available for tables and indexes
Day 2
· Use the db2look utility to export database structures for future use
· Discuss using the INSERT SQL statement to populate tables
· Explain the differences between IMPORT and LOAD processing
· Explain the EXPORT, IMPORT, and LOAD command options
· Create and use Exception Tables and Dump-Files
· Check table status using LOAD QUERY
· Describe the ANALYZE phase of LOAD command processing used for loading BLU Acceleration, column-organized tables.
· Check the Load Pending and Set Integrity Pending status for a table
· Use the SET INTEGRITY command
· Discuss the db2move and db2look commands
· Use the ADMIN_MOVE_TABLE procedure to move a table to different table spaces
· List some of the features of the Ingest utility for continuous data ingest
· Describe the major principles and methods for backup and recovery
· State the three types of recovery used by DB2
· Explain the importance of logging for backup and recovery
· Describe how data logging takes place, including circular logging and archival logging
· Use the BACKUP, RESTORE, ROLLFORWARD and RECOVER commands
· Perform a table space backup and recovery
· Restore a database to the end of logs or to a point-in-time
· Discuss the configuration parameters and the recovery history file and use these to handle various backup and recovery scenarios
· Create an encrypted backup image to improve data security
· Explain the facility of the DB2 RESTORE command to recover table spaces to different containers
· Use the SET TABLESPACE CONTAINERS command to define new containers during a redirected restore
· Utilize the SET STOGROUP PATHS command to change the storage paths for automatic storage tablespaces in storage groups
· Plan the use of redirected restore as part of a disaster recovery
Day 3
· Plan the use of RUNSTATS, REORGCHK and REORG utilities for maintaining database efficiency
· Configure the DB2 instance to set the location for diagnostic data and message severity levels for basic problem analysis
· Describe the methods that can be used for monitoring database and application activity including db2pd commands, Event Monitors and using SQL statements to access statistics
· Describe the function of EXPLAIN and use this facility to assist basic analysis
· Use the db2advis command to analyze a workload for potential performance improvements
· Use the db2fodc command to collect diagnostic data for a system hang
· Explain why locking is needed
· List objects that can be locked
· Describe and discuss the various lock modes and their compatibility
· Explain four different levels of data protection
· Set isolation level and lock time out for current activity
· Explain lock conversion and escalation
· Describe the situation that causes deadlocks
· Create a LOCKING EVENT monitor to collect lock related diagnostics
· Set database configuration options to control locking event capture
· Describe the infrastructure used to support monitoring
· Configure a database to collect the activity, request and object metrics returned by the Monitoring Table functions
· Investigate current application activity that might indicate performance problems using SQL statements
· Use the DB2-provided views and functions in SQL to evaluate efficient use of database memory for locks, sorting and database buffer pools
· Check database health indicators, like log space available and table space utilization using CLP queries using Monitor functions and views
Day 4
· Use DB2 access control mechanisms to implement security within the database
· Explain the tasks performed by the SYSADM user, the SECADM user and a DBADM user
· Compare the use of database roles to user groups for security
· Describe privileges required for binding and executing an application package
· Describe the difference between explicit privileges and implicit privileges
· List the methods for implementing encryption for database connections
· List the advantages of creating a Trusted Context for a three-tier application system
· Review the considerations of using standard DB2 database recovery options
· Explain the capabilities of the REBUILD option for the RESTORE command
· List the types of information included in each DB2 backup image and describe how it is used to support rebuilding a database
· Plan for supporting database and disaster recovery scenarios using DB2 database and table space backups using the RESTORE command with a REBUILD option
· Utilize LIST UTILITIES SHOW DETAIL to monitor progress of a RESTORE utility during database rebuilding
Day 5
· Db2 HADR Concepts and implementation
· Db2 HADR Standby database management
· Db2 Cluster Management Concepts