SQL/MX 3.2 Management Manual (H06.25+, J06.14+)

Table Of Contents
Dropping Triggers............................................................................................................174
Dropping Views...............................................................................................................174
8 Reorganizing SQL/MX Tables and Maintaining Data..................................176
Purging Dropped Tables From the DDL Directory.......................................................................176
Using FUP RELOAD to Reorganize Tables.................................................................................176
Reorganizing Table Files With FUP RELOAD........................................................................177
Determining the Status of a Reorganization With FUP STATUS................................................178
Suspending a Reorganization Operation.............................................................................178
DDL Lock Considerations for MODIFY, import, POPULATE INDEX, DUP, FASTCOPY, and
PURGEDATA........................................................................................................................179
Consequences of a Failed Utility Operation.........................................................................180
Using a Query to Obtain DDL Lock and Process ID Information..............................................180
Performing Recovery on Failed Utility Operations.................................................................181
Structure Changing Operations That Can Run With Active or Inactive DDL Locks Present............181
Using MODIFY to Manage Table and Index Partitions...............................................................182
MODIFY and EMS Messages............................................................................................182
Online and Offline Partition Management...........................................................................182
MODIFY and TMF...........................................................................................................183
MODIFY and Table Reloading...........................................................................................184
Recovering a Failed MODIFY Request and Resetting Flags.....................................................184
Using MODIFY to Manage Range-Partitioned Tables and Indexes..........................................186
Using MODIFY to Manage Hash-Partitioned Tables and Indexes............................................189
Managing System-Clustered Tables and Indexes...................................................................191
Using import to Load SQL/MX Tables......................................................................................191
Guidelines for Using import...............................................................................................191
Summary of import Options..............................................................................................192
Other import Features.......................................................................................................194
Recommended Practices for Improving import Performance....................................................195
Using import to Load Partitions..........................................................................................197
Support for restarting import..............................................................................................199
Examples of Using import to Load an SQL/MX Table............................................................199
Using import to Append Data to Tables or Partitions.............................................................202
Using DUP to Copy Tables Into Tables.....................................................................................204
Guidelines for Using DUP.................................................................................................204
Examples of Using DUP to Copy Tables..............................................................................205
Using FASTCOPY to Copy Tables into Tables............................................................................205
Guidelines for Using FASTCOPY........................................................................................205
Examples of Using FASTCOPY to Copy Tables.....................................................................206
DUP versus FASTCOPY......................................................................................................207
Using PURGEDATA to Delete Data From Tables.........................................................................207
Guidelines for Using PURGEDATA......................................................................................207
Examples of Using PURGEDATA to Delete Table Data...........................................................208
9 Managing Database Applications............................................................209
Writing SQL/MX Applications to Recover From Temporary Network or Hardware Service
Interruptions.........................................................................................................................209
Recovery for Read-Only Queries........................................................................................210
SQL/MX and SQL/MP Differences in Recovery Action for Read-Only Queries..........................210
Moving Programs From Development to Production...................................................................211
Reasons Not to Move a Program and Reuse Its Compiled Modules.........................................211
Moving a Program and Recompiling Modules.....................................................................212
Moving a Program and Reprocessing Modules Using the mxrpm Tool.....................................214
Distributing Programs Across Nodes........................................................................................215
Moving Applications to a Remote Node..............................................................................215
Running Applications on a Remote Node............................................................................215
8 Contents