Database DBC | Teradata DSA - Database DBC - BAR - Data Stream Architecture

Teradata® DSA User Guide

Data Stream Architecture
Release Number
November 2022
English (United States)
Last Update
Product Category
Teradata Tools and Utilities

The DBC database contains critical system tables that define the user databases in the Analytics Database / Teradata Database.

The following table lists the tables that are archived for database DBC.

If a DBC user table is not listed as shown, it will not be archived for database DBC. Instead, use SQL to copy the DBC user table into a user-level table in another database for Teradata DSA to back up. The same table cannot be copied back to the DBC user table during a restore process.
Table Name Description
AccessRights Specifies all granted rights.
AccLogRuleTbl Defines access logging rules generated by executing BEGIN/END LOGGING statements.
Accounts Lists all authorized account numbers.
AsgdSecConstraints Stores information about the name and value pairs of security constraints that have been assigned to users or profiles.
BusinessCalendarException Stores information about days that are exceptions to the active business calendar pattern.
BusinessCalendarPattern Stores information about different patterns of business days and non-business days for a given calendar.
CollationTbl Defines MULTINATIONAL collation.
ConnectRulesTbl Contains information about CONNECT THROUGH privileges.
ConstraintFunctions Stores information about the UDFs for security constraint objects.
ConstraintValues Stores information about the name and value pairs for security constraint objects.
DBase Defines each database and user.
DBQLRuleCountTbl Is reserved for internal use only.
DBQLRuleTbl Specifies the rule table for DBQL.
Hosts Defines information about user-defined character sets used as defaults for client systems.
LogonRuleTbl Defines information about logon rules generated by a GRANT LOGON statement.
Maps Defines all sparse and contiguous maps.
MapGrants Stores information about hash map grants to users and roles.
NetSecPolicyLogRuleTbl Defines the rules when the network security policy components are to be logged.
Next Generates table, stored procedure, and database identifiers (internal table).
OldPasswords Lists passwords that are no longer in use, including user to whom the password was assigned, date the password was changed, and encrypted password string.
Owners Defines all databases owned by another.
Parents Defines all parent/child relationships between databases.
PasswordRestrictions Restricts a password from being created that contains any word listed in the table.
Profiles Defines the available roles and profiles on the Teradata machine.
RCConfiguration Records the configuration for RCEvent rows.
RCEvent Records all archive and recovery activities.
RCMedia Records all removable devices used in archive activities.
ReconfigDeleteOrderTbl Stores information about the order in which tables are processed during the Deletion phase of reconfiguration done using the Reconfig utility.
ReconfigInfoTbl Stores summary and status information about reconfiguration done using the Reconfig utility.
ReconfigRedistOrderTbl Stores information about the order in which tables are processed during the Redistribution phase of reconfiguration done using the Reconfig utility.
ReconfigTableStatsTbl Stores reconfig statistics about each table processed during the redistribution phase and the deletion phase of a reconfig.
RoleGrants Contains roles granted to users or other roles.
Roles Defines the available roles and profiles on the Teradata machine.
SecConstraints Stores information about security constraint objects.
SysSecDefaults Defines the system security defaults of an Analytics Database / Teradata Database, for example, the minimum and maximum characters allowed in a password.
Translation Defines hexadecimal codes that form translation tables for non-English character sets.
UDTCast Contains information on the source and target data types that are involved in the casting operation.
UDTInfo Captures the specifics contained within the CREATE TYPE statement.
UDTTransform Contains the transform group name and the routine identifiers.
Zones Defines all secure zones.
ZoneGrants Stores information about secure zone access grants to users and roles.
  • To archive the DBC, user must have DUMP access privilege on the DBC.
  • To restore the DBC:
    • DBC only logons must be enabled.
    • User must be DBC with RESTORE access to DBC.

If included in an archive operation, database DBC is always archived first, regardless of alphabetical order. If included in a restore or copy operation, database DBC is always restored or copied first. Refer to Full System Restore Using the BAR Portlets or Full System Restore Using the Command Line for specific instructions on restoring database DBC.