Online training "RedDatabase administration"

This online training helps you to learn about specific RedDatabase in production: administration, features of stored procedures and functions, transaction management and isolation levels, multiversion concurrency control, query optimisation, etc.The training requies basic knowledges of DBMS and SQL. It takes 8 days. We provide a certificate at the end by results of test.

Here you can check authenticity of a certificate: check a certificate.

  1. Installation, upgrade, removal
    1. Theoretical part
      1. Getting the distribution
      2. Installing on Windows
      3. Installation on Linux (RED OS)
      4. Installing the debugging symbols
      5. Access permissions for configuration files and database
      6. Network and local (embedded) connectivity
      7. Main file and utility overview
      8. Minor upgrade on Windows
      9. Minor update on Linux
      10. Concept of major upgrade
      11. Running simple queries
      12. Follow-up DBMS configuration
      13. Uninstalling the database on Windows
      14. Uninstalling the database on Linux
    2. Practical part
      1. Install the latest version of the database
      2. Install the previous minor version, copy the example database separately, run a simple query on it. Perform a minor upgrade to the actual version. Make sure that the employee database is not changed. Re-execute a simple query to a copy of the employee database.
      3. Uninstall the installed DBMS
  2. Backup and restore
    1. Theoretical part
      1. Types of backups
      2. Logical backup and restore
      3. Physical (incremental) backup and restore
      4. Default backup setup on site
      5. Backup error monitoring
      6. Check backups
      7. Optimization of described processes
      8. Database migration and major database updates
    2. Practical part
      1. Create a logical backup of the database. Change the data. Restore the database from the copy and view the changed data.
      2. Create a Level 0 physical copy. Modify the data. Create a Level 1 physical copy. Modify data. Restore data from a level 1 copy and view the data.
      3. Perform a typical backup setup in shortened intervals (every minute). Monitor performance for 10 minutes.
      4. Come back up and restore database through pipes with server shutdown.
  3. Monitor DBMS and database integrity
    1. Theoretical part
      1. The concept of database integrity
      2. Database file structure, metadata and monitoring tables
      3. Database crashes
      4. Log file analysis. Typical errors.
      5. Holistic integrity tool
      6. Watch integrity monitoring.
      7. Stypical configuration of Integrity Control on site
      8. Ways to restore database integrity
    2. Practical part
      1. Check the integrity of the database employee_b.fdb (beats gfix lookup but can't fix it. Require a backup restore) from the course materials.
      2. Restore its integrity
      3. Make a simple query
      4. Do a typical integrity control setup in short intervals (every minute)
  4. Collect garbage
    1. Theoretical part
      1. The concept of garbage and its effect on server performance
      2. Collaborative garbage collection
      3. Fono garbage collection
      4. Forced garbage collection (sweep)
      5. Junk monitoring. Database statistics.
      6. Debugging bottlenecks and their removal
      7. Definition of garbage collection on site
    2. Practical part
      1. Estimate the state of the database tpcc1.fdb
      2. Create the garbage collection
      3. Run the garbage collection on the teacher's booth, looking at the remote desktop (long transactions, nagenerated garbage through tpcc)
      4. Run typical garbage collection setup at shortened intervals (every minute). Monitor for 10 minutes.
  5. Performance
    1. Theoretical part
      1. Problems of performance
      2. OS performance
      3. Disk subsystem performance
      4. DBMS performance
      5. Query Audit
      6. Use monitoring tables
      7. Working with a lock table
      8. Working with process dumps, configuring automatic dumping
      9. Typical methodology for analyzing performance issues on a Linux RDBMS server
      10. Typical methodology for analyzing performance issues on a Windows database server
    2. Practical part
      1. Analyze the provided server for performance problems and optimize it. (you need to prepare a stand where to make cache settings, remove indexes from queries, trim the space for sorting, etc.).
  6. Security
    1. Theoretical part
      1. Security subsystem overview
      2. Database owner
      3. User management
      4. Roles
      5. Authentication methods. Multifactor authentication.
      6. Security policies
      7. Auditing security events
      8. Security settings
    2. Practical part
      1. Create a pair of roles and assign them access rights to a table
      2. Create a user and assign him the first role usually, the second by default.
      3. Check the effect of the rights
      4. Allow security events to be audited, provoke them by entering the wrong data, and verify that they are audited
      5. Make a security policy requiring two authentication factors to be specified. Show that this user can now authenticate only in this way and nothing else.
  7. Replication
    1. Theoretical part
      1. Concept and types of replication
      2. Setting up synchronous replication
      3. Setting up asynchronous replication
      4. Monitoring of replication
      5. Comparing the primary database and its replicas
      6. Replication problems and their solutions
      7. Typical mirror configuration based on asynchronous replication
    2. Practical part
      1. Set up synchronous replication of two databases
      2. Set up asynchronous replication of two databases
      3. Run simple queries to modify data in the primary database and check the appearance of these data in the replicas.
      4. Configure a typical mirror, run several queries, and compare the main database and its replica.
  8. Failover cluster
    1. Theoretical part
      1. Fundamentals of Failover Cluster
      2. Typical Failover Configuration
      3. Testing fault tolerance
      4. Monitoring of a Failover Cluster
      5. Troubles of the cluster and their solutions
    2. Practical part
      1. Configure the typical Failover cluster
      2. Failure the main database and ensure that database queries pass and are executed on the replica.
      3. Repower the primary database, make sure that the databases are in the same state, and the replication mode is established.
      4. Remote the slave, and then add it back in