Copyright
About this guide
Purpose of this guide
Audience
How this guide is organized
Part one: Derby Server Guide
Derby in a multi-user environment
Derby in a server framework
Connectivity configurations
Multiple-client features available in Derby
Row-level locking
Multiple concurrency levels
Multi-connection and multi-threading
Administrative tools
The Derby Network Server
Embedded servers
How to start an embedded server from an application
Embedded server example
About this guide and the Network Server documentation
Using the Network Server with preexisting Derby applications
The Network Server and JVMs
Installing required jar files and adding them to the classpath
Starting the Network Server
Altering the startNetworkServer script
Starting the Network Server without using the script
Starting the Network Server from a Java application
Shutting down the Network Server
Shutting down by using the command line
Shutting down by using the API
Obtaining system information
Obtaining system information by using the command line
Obtaining system information by using the API
Obtaining Network Server runtime information
Obtaining Network Server properties by using the getCurrent Properties method
Accessing the Network Server by using the network client driver
Network client security
Network client tracing
Network client driver examples
Accessing the Network Server by using the DB2 Universal Driver
Accessing the Network Server by using a DataSource
XA and the Network Server
Using XA with the network client driver
Using the Derby tools with the Network Server
Using the Derby ij tool with the Network Server
Using the Derby dblook tool with the Network Server
Differences between running Derby in embedded mode and using the Network Server
Differences between the embedded client and the network client driver
Updatable Result Sets
Error message differences
User authentication differences
Network Server user authentication when user authentication is on in Derby
Network Server user authentication when user authentication is off in Derby
Enabling the encrypted user ID and password security mechanism
Setting port numbers
Managing the Derby Network Server
Overview
Using the NetworkServerControl API
Setting Network Server properties
derby.drda.host
derby.drda.keepAlive
derby.drda.logConnections
derby.drda.maxThreads
derby.drda.minThreads
derby.drda.portNumber
derby.drda.startNetworkServer
derby.drda.timeslice
derby.drda.traceAll
derby.drda.traceDirectory
Verifying Startup
Managing the Derby Network Server remotely by using the servlet interface
Start-up page
Running page
Trace session page
Trace directory page
Set Network Server parameters
Derby Network Server advanced topics
Network Server security
Running the Network Server under the security manager
Configuring the Network Server to handle connections
Controlling logging by using the log file
Controlling tracing by using the trace facility
Turning on the trace facility
Turning off the trace facility
Derby Network Server sample programs
The NsSample sample program
Running the NsSample sample program
Network Server sample programs for embedded and client connections
Overview of the SimpleNetworkServerSample program
Running the SimpleNetworkServerSample program
Connecting a client to the Network Server with the SimpleNetworkClientSample program
Running the SimpleNetworkClientSample program
Part two: Derby Administration Guide
Checking database consistency
The SYSCS_CHECK_TABLE function
Sample SYSCS_CHECK_TABLE error messages
Sample SYSCS_CHECK_TABLE queries
Backing up and restoring databases
Backing up a database
Offline backups
Online backups
Using the backup procedure to perform an online backup
Using operating system commands with the freeze and unfreeze system procedures to perform an online backup
When the log is in a non-default location
Backing up encrypted databases
Restoring a database from a backup copy
Creating a database from a backup copy
Roll-forward recovery
Logging on a separate device
Using the logDevice attribute
Example of creating a log in a non-default location
Example of moving a log manually
Issues for logging in a non-default location
Obtaining locking information
Monitoring deadlocks
Reclaiming unused space
Trademarks