In daily DB2 O M, we often encounter slow execution of Several SQL statements, but the cpu and memory usage of the database server is not high, similar problems are basically caused by locks, sorting, and other reasons. Next we will analyze how to quickly locate the lock wait problem from an instance and lock the table.
I. Lock information in logs
When you find a large amount of sqlcode reports 911 informa
In oracle, INSERT corresponds to the LOCATE function usage in db2. The SQL code www.2cto.com eg: SELECT CONCAT (FIRST_NAME, LAST_NAME) FROM T1 eg: SELECT CONCAT (FIRST_NAME, LAST_NAME) FROM T1 INSERT function Syntax: the INSERT (ARG1, POS, SIZE, ARG2) function returns a string, which deletes the SIZE of ARG1 from the POS and inserts ARG2 into the position. SQL code eg:
BKJIA: From DB2 9.7, you can use the following query to check indexes not used in DB2:
SELECTINDSCHEMA,INDNAME,TABNAME
FROMSYSCAT.INDEXES
WHERELASTUSED='01/01/0001';
The LASTUSED column tells you the last access time of the index in DB2, but this method does not guarantee that returns an accurate value, because D
Analyze the causes of full DB2 Activity logs and solutions to full DB2 logs, db2 logs
Log usage
Displays the usage of logs under concurrent transaction conditions
There are three concurrent programs: Process 1, Process 2, and Process 3. Each program has two transactions. Blue blocks represent SQL statements, red blocks represent commit operations, and green bloc
Linux uses the locate command to locate a file
From: http://linux-blog.org/finding-files-with-locate/
FIND command
Many Linux users like to use the find command to find files. For example, they usually like this:
Find/-name 'pattern'
Indeed, the powerful function of find is not only used to find files, but also to locate
Find commandMany Linux users like to use the Find command to find files, for example they usually like to do this:Find/-name ' pattern 'The powerful feature of find is not only used to find files, it can be used to locate more detailed things, such as you want to find in a directory to give its owners and administrators can write permissions (if you wanted to find files which is writable by both T Heir owner and their group), you can do this:Find/-per
Full-text excerpt translated from: http://linux-blog.org/finding-files-with-locate/Find commandMany Linux users prefer to find files using the Find command, For example they usually like to do this:Find/-name ' pattern 'The powerful feature of find is not only used to find files, it can be used to locate more detailed things, such as you want to find in a directory to give its owners and administrators can
First, the method of locating elements
ID: Preferred recognition attribute, the standard recommended for each element of the page set a unique id attribute,
If it is not and it is difficult to find the unique attribute, workaround: (1) Find the development to add the ID or name. If not, the solution can be:1. Find the feature of the button, such as the text of the button is submit;2. Using XPath to locate, you can write://button[@value =
Locate can position the current cursor on a qualified record. The first parameter of locate is the condition field, and the second parameter is the condition.Value. The third parameter indicates whether the search is case-sensitive and partially matched. You can set multiple conditions for locate as follows:Table1.locate
Use gdb to quickly locate the "segment error" and gdb to locate the segment Error
Sometimes, when we operate on an invalid memory in a section of C/C ++ code, the "Segmentation fault (core dumped) "-- segment error.
I think many people will often encounter this problem. This problem is very speechless, just prompts "segment error", and then there is nothing. If we blindly look at the code to find it too p
which
Find a file in an environment variable
-A finds all content, not the first file
-n
-p
-W Specifies the width of the field when output.
-V Displays version information.
Cases:
The code is as follows:
[Zhangy@blackghost download]$ which find
/usr/bin/find
Whereis
Syntax of the Whereis command: Whereis [-BMSU] [BMS directory name-f] File name
The options for the Whereis command have the following meanings:
-B locates the executable file.
-M
Locate and z-index, locate z-index
Positioning
Location used to control the element
The positioning keyword is position and position has four values: relative, absolute, static, and fixed. After the element is located, the element has four values available: left, right, top, bottom.
I will use the following examples to demonstrate the absolute location of absolute and relative location of relative.
1. I def
Tags: database DB2DB2 Zostalking about-DB2 LUWVSDB2 ZosOverview:you may have DB2 LUW knows a lot, but little is known about DB2 Zos(Big Machine operating system) because IBM 's internal data has always been relatively closed, especially for products we rarely see on the market, such as Zos Operating system, generally in the bank's internal staff and IBM employee
Http://hi.baidu.com/wader2006/blog/item/78406b60b51f8b47ebf8f8f0.html
DB2 Common Command Set----DB2 maintenance 2007-09-09 10:10 in the DB2 development process, the whole development process also has a very important part of the work is the maintenance of the database, for the maintenance of a huge information system is very necessary; Leave a simple maintenance
: MI: SS 'yyyy', 'mm', 'dd', 'hh12', 'hh24', 'mi', and 'ss;
■ Changing the date format in DB2: Current timestamp 'current date', 'current time', and so on;
NOTE 2:
■ Changing the Data Type of SQL Server to "data type parameters": int and varchar;
■ Oracle Data Type Change functions: to_char (), to_date (), to_number (), and so on;
■ DB2 data type change functions: varchar (), INT (), date (), time (), etc;
Many technicians can easily discuss the details of DB2 technology and confidently talk about query parallelism, data compression, WebSphere MQ integration, large object management, JDBC and ado.net drivers, data sharing on mainframe Parallel Sysplex, DB2 for Lin UX, Unix, and Windows (LUW) multidimensional clusters, and so on. But what happens if the person who talks is a member of the management? The main
to create an index when scanning. (Sometimes running runstats with distribution and detailed indexes also provides a solution .)
The sample output of "get snapshot for tables on DBNAME" is as follows:
1 Snapshot timestamp = 09-25-2000
2 4:47:09. 970811
3 Database name = DGIDB
4 Database path =/fs/inst1/inst1/NODE0000/SQL00001/
5 Input database alias = DGIDB
6 Number of accessed tables = 8
7 Table List
8 Table Schema = INST1
9 Table Name = DGI _
10 SALES _ LOGS_TB
11 Table Type = Use
Author: gnuhpcSource: http://www.cnblogs.com/gnuhpc/
1. Level correspondence• Environment variables at the operating system level• The DB2 profile registry variables at the operating system and instance levels• The Database Manager (DBM) configuration file at the instance level• The Database (db) configuration file at the database levelThe DB2 environment consists of the following parts:1)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.