Manage your business. Not your computer. DB2 for i self managing capabilities are the cornerstone to the value of IBM i running on Power Systems. DB2’s self managing attributes, ultimate security, and built in analytical processing functions make it an ideal database server for today’s smarter computing applications. Some of the self management attributes.
Unlike many Relational Database Management Systems, DB2 for i requires limited configuration work prior to use. Because it is pre-loaded with IBM i, and doesn’t require any specific database installation procedures, the database itself is ready to go! Because of the unique Single Level Storage concepts of the system, database management tasks such as creation and monitoring of table spaces or complex partitioning of data across disk subsystems are not required. DB2 for i provides automatic data spreading and automatic storage allocation for all database objects.
DB2 for i contains a number of self-healing qualities. Systems Managed Access Path Protection (SMAPP) automatically journals (logs) high risk indexes (including Encoded Vector Indexes) to minimize the recovery time in the case of a system failure. Self-managed journal receivers allow the system to automatically monitor the capacity of a journal receiver (database transaction log), creating a new receiver and auto switching transaction logging to it should it become close to maximum capacity. Automatic restart of journal processing after a copy or restore operation further increase the autonomic capabilities of DB2!
Index rebalancing (or table reorgs), a common DBA task on other systems (because indexes can become unbalanced over time), is handled automatically by DB2 for i. DB2 will also automatically rebuild catalog views when necessary, eliminating the need for manual intervention.
Self-tuning has been a long time attribute of the IBM i operating system. An example of that is the auto tuner that auto adjusts resources to accommodate changing workload characteristics. The DB2 for i engine also contains many self-tuning features, such as the cost-based query optimizer which contains, among other things, advanced query rewrite techniques. In addition, the optimizer, while processing all of the SQL and query requests, can automatically detect changes to the database such as a new index or changes in system resources. This auto-detection allows the optimizer to rebuild query plans without user intervention in order to maximize performance.
The SQL Plan Cache is a key operational construct at the center of DB2 for i query operations. The plan cache exists on every IBM i machine and gets used to ensure that query implementation is done as efficiently as possible when SQL queries are executed with the SQL Query Engine (SQE). Access plans are stored in a database-wide cache where they become eligible to be reused by any job executing the same or a similar query.
Adaptive Query Processing (AQP), a function of the DB2 for i query optimizer, can make real-time plan adjustments—such as changing the join order or utilizing a new index—while the SQL request is running and without disrupting the application.
Statistics are used by the optimizer to assist in determining the most efficient method of accessing the data. Global Statistics Manager collects and maintains statistics automatically by DB2 for i during normal database processing. Administrators on other databases often have to collect and refresh statistics manually.
The performance analysis components (included with IBM i) allow you to easily analyze and improve database performance. Index advice is provided for both traditional indexes as well as Encoded Vector Indexes (EVIs). But DB2 for i can also create temporary indexes that can be shared across all jobs all on its own if it senses these can improve performance.
DB2 for i is very well positioned in this area because of the object-based structure of IBM i, which DB2 leverages. In addition to the rock-solid security that is made possible by the object-based security model, other self protecting attributes that are built into the operating system and available to use include:
In addition to the self-protecting security features, the operating system and DB2 for i include built-in encryption capabilities that enable customers to add an extra-layer of security around their data.