Online training "RedDatabase administration"
This online training helps you to learn about specific RedDatabase in production: administration, features of stored procedures and functions, transaction management and isolation levels, multiversion concurrency control, query optimisation, etc.The training requies basic knowledges of DBMS and SQL. It takes 8 days. We provide a certificate at the end by results of test.
Here you can check authenticity of a certificate: check a certificate.
Program
- Installation, upgrade, removal
- Theoretical part
- Getting the distribution
- Installing on Windows
- Installation on Linux (RED OS)
- Installing the debugging symbols
- Access permissions for configuration files and database
- Network and local (embedded) connectivity
- Main file and utility overview
- Minor upgrade on Windows
- Minor update on Linux
- Concept of major upgrade
- Running simple queries
- Follow-up DBMS configuration
- Uninstalling the database on Windows
- Uninstalling the database on Linux
- Practical part
- Install the latest version of the database
- Install the previous minor version, copy the example database separately, run a simple query on it. Perform a minor upgrade to the actual version. Make sure that the employee database is not changed. Re-execute a simple query to a copy of the employee database.
- Uninstall the installed DBMS
- Backup and restore
- Theoretical part
- Types of backups
- Logical backup and restore
- Physical (incremental) backup and restore
- Default backup setup on site
- Backup error monitoring
- Check backups
- Optimization of described processes
- Database migration and major database updates
- Practical part
- Create a logical backup of the database. Change the data. Restore the database from the copy and view the changed data.
- Create a Level 0 physical copy. Modify the data. Create a Level 1 physical copy. Modify data. Restore data from a level 1 copy and view the data.
- Perform a typical backup setup in shortened intervals (every minute). Monitor performance for 10 minutes.
- Come back up and restore database through pipes with server shutdown.
- Monitor DBMS and database integrity
- Theoretical part
- The concept of database integrity
- Database file structure, metadata and monitoring tables
- Database crashes
- Log file analysis. Typical errors.
- Holistic integrity tool
- Watch integrity monitoring.
- Stypical configuration of Integrity Control on site
- Ways to restore database integrity
- Practical part
- Check the integrity of the database employee_b.fdb (beats gfix lookup but can't fix it. Require a backup restore) from the course materials.
- Restore its integrity
- Make a simple query
- Do a typical integrity control setup in short intervals (every minute)
- Collect garbage
- Theoretical part
- The concept of garbage and its effect on server performance
- Collaborative garbage collection
- Fono garbage collection
- Forced garbage collection (sweep)
- Junk monitoring. Database statistics.
- Debugging bottlenecks and their removal
- Definition of garbage collection on site
- Practical part
- Estimate the state of the database tpcc1.fdb
- Create the garbage collection
- Run the garbage collection on the teacher's booth, looking at the remote desktop (long transactions, nagenerated garbage through tpcc)
- Run typical garbage collection setup at shortened intervals (every minute). Monitor for 10 minutes.
- Performance
- Theoretical part
- Problems of performance
- OS performance
- Disk subsystem performance
- DBMS performance
- Query Audit
- Use monitoring tables
- Working with a lock table
- Working with process dumps, configuring automatic dumping
- Typical methodology for analyzing performance issues on a Linux RDBMS server
- Typical methodology for analyzing performance issues on a Windows database server
- Practical part
- Analyze the provided server for performance problems and optimize it. (you need to prepare a stand where to make cache settings, remove indexes from queries, trim the space for sorting, etc.).
- Security
- Theoretical part
- Security subsystem overview
- Database owner
- User management
- Roles
- Authentication methods. Multifactor authentication.
- Security policies
- Auditing security events
- Security settings
- Practical part
- Create a pair of roles and assign them access rights to a table
- Create a user and assign him the first role usually, the second by default.
- Check the effect of the rights
- Allow security events to be audited, provoke them by entering the wrong data, and verify that they are audited
- Make a security policy requiring two authentication factors to be specified. Show that this user can now authenticate only in this way and nothing else.
- Replication
- Theoretical part
- Concept and types of replication
- Setting up synchronous replication
- Setting up asynchronous replication
- Monitoring of replication
- Comparing the primary database and its replicas
- Replication problems and their solutions
- Typical mirror configuration based on asynchronous replication
- Practical part
- Set up synchronous replication of two databases
- Set up asynchronous replication of two databases
- Run simple queries to modify data in the primary database and check the appearance of these data in the replicas.
- Configure a typical mirror, run several queries, and compare the main database and its replica.
- Failover cluster
- Theoretical part
- Fundamentals of Failover Cluster
- Typical Failover Configuration
- Testing fault tolerance
- Monitoring of a Failover Cluster
- Troubles of the cluster and their solutions
- Practical part
- Configure the typical Failover cluster
- Failure the main database and ensure that database queries pass and are executed on the replica.
- Repower the primary database, make sure that the databases are in the same state, and the replication mode is established.
- Remote the slave, and then add it back in