The DBC database contains critical system tables that define the user databases in the Analytics Database / Teradata Database.
The following table lists the tables that are archived for database DBC.
If a DBC user table is not listed as shown, it will not be archived for database DBC. Instead, use SQL to copy the DBC user table into a user-level table in another database for Teradata DSA to back up. The same table cannot be copied back to the DBC user table during a restore process.
|AccessRights||Specifies all granted rights.|
|AccLogRuleTbl||Defines access logging rules generated by executing BEGIN/END LOGGING statements.|
|Accounts||Lists all authorized account numbers.|
|AsgdSecConstraints||Stores information about the name and value pairs of security constraints that have been assigned to users or profiles.|
|BusinessCalendarException||Stores information about days that are exceptions to the active business calendar pattern.|
|BusinessCalendarPattern||Stores information about different patterns of business days and non-business days for a given calendar.|
|CollationTbl||Defines MULTINATIONAL collation.|
|ConnectRulesTbl||Contains information about CONNECT THROUGH privileges.|
|ConstraintFunctions||Stores information about the UDFs for security constraint objects.|
|ConstraintValues||Stores information about the name and value pairs for security constraint objects.|
|DBase||Defines each database and user.|
|DBQLRuleCountTbl||Is reserved for internal use only.|
|DBQLRuleTbl||Specifies the rule table for DBQL.|
|Hosts||Defines information about user-defined character sets used as defaults for client systems.|
|LogonRuleTbl||Defines information about logon rules generated by a GRANT LOGON statement.|
|Maps||Defines all sparse and contiguous maps.|
|MapGrants||Stores information about hash map grants to users and roles.|
|NetSecPolicyLogRuleTbl||Defines the rules when the network security policy components are to be logged.|
|Next||Generates table, stored procedure, and database identifiers (internal table).|
|OldPasswords||Lists passwords that are no longer in use, including user to whom the password was assigned, date the password was changed, and encrypted password string.|
|Owners||Defines all databases owned by another.|
|Parents||Defines all parent/child relationships between databases.|
|PasswordRestrictions||Restricts a password from being created that contains any word listed in the table.|
|Profiles||Defines the available roles and profiles on the Teradata machine.|
|RCConfiguration||Records the configuration for RCEvent rows.|
|RCEvent||Records all archive and recovery activities.|
|RCMedia||Records all removable devices used in archive activities.|
|ReconfigDeleteOrderTbl||Stores information about the order in which tables are processed during the Deletion phase of reconfiguration done using the Reconfig utility.|
|ReconfigInfoTbl||Stores summary and status information about reconfiguration done using the Reconfig utility.|
|ReconfigRedistOrderTbl||Stores information about the order in which tables are processed during the Redistribution phase of reconfiguration done using the Reconfig utility.|
|ReconfigTableStatsTbl||Stores reconfig statistics about each table processed during the redistribution phase and the deletion phase of a reconfig.|
|RoleGrants||Contains roles granted to users or other roles.|
|Roles||Defines the available roles and profiles on the Teradata machine.|
|SecConstraints||Stores information about security constraint objects.|
|SysSecDefaults||Defines the system security defaults of an Analytics Database / Teradata Database, for example, the minimum and maximum characters allowed in a password.|
|Translation||Defines hexadecimal codes that form translation tables for non-English character sets.|
|UDTCast||Contains information on the source and target data types that are involved in the casting operation.|
|UDTInfo||Captures the specifics contained within the CREATE TYPE statement.|
|UDTTransform||Contains the transform group name and the routine identifiers.|
|Zones||Defines all secure zones.|
|ZoneGrants||Stores information about secure zone access grants to users and roles.|
- To archive the DBC, user must have DUMP access privilege on the DBC.
- To restore the DBC:
- DBC only logons must be enabled.
- User must be DBC with RESTORE access to DBC.
If included in an archive operation, database DBC is always archived first, regardless of alphabetical order. If included in a restore or copy operation, database DBC is always restored or copied first. Refer to Full System Restore Using the BAR Portlets or Full System Restore Using the Command Line for specific instructions on restoring database DBC.