Teradata DBA Assistant

Upgrade your skills with our Video Modules and become a proficient Teradata DBA ready to excel in any organization.

Click to play video

Teradata Access Logging And Monitoring

1. What is Access Logging

Teradata Access Logging involves capturing information about user logins, queries executed, data modifications, and other database operations for auditing, monitoring, and security purposes. It refers to the process of logging access and activity within a Teradata Database system. Access Logging in Teradata typically involves several components and mechanisms. Explore more in this video tutorial.

Click to play video

2. Begin / End Teradata Query Logging on Users

Learn how to start or end logging on a Teradata User with this informative video tutorial. Compliance with security team requirements is crucial for implementing Teradata User Access logging, providing valuable assistance in scenarios such as accidental or intentional data deletion.

Click to play video

3. Teradata DBQLs (Database Query Logs)

This video tutorial is about Teradata database query logs a set of Teradata Dictionary Tables which stores all the logs in Teradata Database DBC and these logs are kept for different numbers of month depending on your organization security policy and based on these logs further PDCR (Performance Data Collection Reports) are generated which really helps creating capacity planning, resources consumption reports.

Click to play video

4. Teradata Viewpoint Monitoring

Teradata Viewpoint is a web-based management and monitoring tool designed for Teradata Database systems. It provides a centralized interface for database administrators (DBAs) and system operators to monitor, manage, and optimize the performance of Teradata systems.

Click to play video

5. Teradata DBC Tables

In Teradata, the DBC (Data Dictionary) tables play a crucial role as special system tables that hold metadata about the database system, its objects, users, privileges, and configuration settings. These tables are essential for system administration, monitoring, and troubleshooting. Some key DBC tables frequently utilized by database administrators (DBAs) and developers are: DBC.Databases, DBC.Tables, DBC.Columns, DBC.Users, and DBC.AccessRights. DBC.RoleMembers, DBC.Indices, DBC.TableSizeV, DBC.LogonOff, and DBC.DBQLTables. These tables provide essential information for system administration, monitoring, and metadata management. DBAs and developers utilize these tables to analyze usage patterns, troubleshoot performance, and gain insights into the database system.