The DBC database contains critical system tables that define the user databases in the Teradata Database.
The following table lists the tables that are archived for database DBC.
If a DBC user table is not listed below, it will not be archived for database DBC. Instead, use SQL to copy the DBC user table into a user-level table in another database for Teradata ARC to back up. The information cannot be copied back to the DBC user table during a restore process.
Table Name | Description |
---|---|
AccessRights | Specifies all granted rights. |
AccLogRuleTbl | Defines access logging rules generated by executing BEGIN/END LOGGING statements. |
Accounts | Lists all authorized account numbers. |
AsgdSecConstraints | Stores information about the name and value pairs of security constraints that have been assigned to users or profiles. |
BusinessCalendarException | Stores information about days that are exceptions to the active business calendar pattern. |
BusinessCalendarPattern | Stores information about different patterns of business days and non-business days for a given calendar. |
CollationTbl | Defines MULTINATIONAL collation. |
ConnectRulesTbl | Contains information about CONNECT THROUGH privileges. |
ConstraintFunctions | Stores information about the UDFs for security constraint objects. |
ConstraintValues | Stores information about the name and value pairs for security constraint objects. |
DBase | Defines each database and user. |
DBQLRuleCountTb1 | Is reserved for internal use only. |
DBQLRuleTb1 | Specifies the rule table for DBQL. |
Hosts | Defines information about user-defined character sets used as defaults for client systems. |
LogonRuleTbl | Defines information about logon rules generated by a GRANT LOGON statement. |
Maps | Defines all hash maps. |
MapGrants | Stores information about hash map grants to users and roles. |
NetSecPolicyLogRuleTbl | Defines the rules when the network security policy components are to be logged. |
Next | Generates table, stored procedure, and database identifiers (internal table). |
OldPasswords | Lists passwords that are no longer in use, including the user to which the password was assigned, the date the password was changed, and encrypted password string. |
Owners | Defines all databases owned by another. |
Parents | Defines all parent/child relationships between databases. |
PasswordRestrictions | Restricts a password from being created that contains any word listed in the table. |
Profiles | Defines the available roles and profiles on the Teradata machine. |
RCConfiguration | Records the configuration for RCEvent rows. |
RCEvent | Records all archive and recovery activities. |
RCMedia | Records all removable devices used in archive activities. |
ReconfigDeleteOrderTbl | Stores information about the order in which tables are processed during the Deletion phase of reconfiguration done using the Reconfig utility. |
ReconfigInfoTbl | Stores summary and status information about reconfiguration done using the Reconfig utility. |
ReconfigRedistOrderTbl | Stores information about the order in which tables are processed during the Redistribution phase of reconfiguration done using the Reconfig utility. |
ReconfigTableStatsTbl | Stores reconfig statistics about each table processed during the redistribution phase and the deletion phase of a reconfig. |
RoleGrants | Defines the available roles and profiles on the Teradata machine. |
Roles | Defines the available roles and profiles on the Teradata machine. |
SecConstraints | Stores information about security constraint objects. |
SysSecDefaults | Defines the system security defaults of a Teradata Database, for example, the minimum and maximum characters allowed in a password. |
Translation | Defines hexadecimal codes that form translation tables for non-English character sets. |
UDTCast | Contains information on the source and target data types that are involved in the casting operation. |
UDTInfo | Captures the specifics contained within the CREATE TYPE statement. |
UDTTransform | Contains the transform group name and the routine identifiers. |
Zones | Defines all secure zones. |
ZoneGrants | Stores information about secure zone access grants to users and roles. |
Full access privileges are required for archiving or restoring DBC. If DBC does not have full privileges, they need to be granted prior to performing the archive. If the source system is not available, such as restoring from tape, then once DBC has been restored, full access privileges have to be explicitly granted for each DBC object, view, and macro before running the post_dbc_restore script and DIP.
If included in an archive operation, database DBC is always archived first, regardless of alphabetical order. If included in a restore or copy operation, database DBC is always restored or copied first. Refer to Restoring the Database DBC for specific instructions on restoring database DBC.
For a list of individual object types and whether they can be restored or copied under different conditions, see Restoring and Copying Objects.