ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzajq_5.4.0.1/cpi432f.htm

83 lines
5.0 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="reference" />
<meta name="DC.Title" content="CPI432F - Access path suggestion for file &amp;1" />
<meta name="DC.Relation" scheme="URI" content="pimes.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="cpi432f" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>CPI432F - Access path suggestion for file &amp;1</title>
</head>
<body id="cpi432f"><a name="cpi432f"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">CPI432F - Access path suggestion for file &amp;1</h1>
<div>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" frame="border" border="1" rules="all"><thead align="left"><tr valign="bottom"><th colspan="2" align="center" valign="bottom" id="d0e16">CPI432F</th>
</tr>
</thead>
<tbody><tr valign="middle"><td valign="middle" width="26.02040816326531%" headers="d0e16 ">Message Text:</td>
<td valign="middle" width="73.9795918367347%" headers="d0e16 ">Access path suggestion for file &amp;1.</td>
</tr>
<tr valign="middle"><td valign="middle" width="26.02040816326531%" headers="d0e16 ">Cause Text:</td>
<td valign="middle" width="73.9795918367347%" headers="d0e16 ">To improve performance the query optimizer is suggesting a permanent
access path be built with the key fields it is recommending. The access path
will access records from member &amp;3 of file &amp;1 in library &amp;2.
<p></p>
In the list of key fields that follow, the query optimizer is
recommending the first &amp;10 key fields as primary key fields. The remaining
key fields are considered secondary key fields and are listed in order of
expected selectivity based on this query. Primary key fields are fields that
significantly reduce the number of keys selected based on the corresponding
selection predicate. Secondary key fields are fields that may or may not significantly
reduce the number of keys selected. It is up to the user to determine the
true selectivity of secondary key fields and to determine whether those key
fields should be used when creating the access path. <p></p>
The query
optimizer is able to perform key positioning over any combination of the primary
key fields, plus one additional secondary key field. Therefore it is important
that the first secondary key field be the most selective secondary key field.
The query optimizer will use key selection with any remaining secondary key
fields. While key selection is not as fast as key positioning it can still
reduce the number of keys selected. Hence, secondary key fields that are fairly
selective should be included. When building the access path all primary key
fields should be specified first followed by the secondary key fields which
are prioritized by selectivity. The following list contains the suggested
primary and secondary key fields: <p></p>
&amp;11. <p></p>
If file &amp;1
in library &amp;2 is a logical file then the access path should be built over
member &amp;9 of physical file &amp;7 in library &amp;8.</td>
</tr>
<tr valign="middle"><td valign="middle" width="26.02040816326531%" headers="d0e16 ">Recovery Text:</td>
<td valign="middle" width="73.9795918367347%" headers="d0e16 ">If this query is run frequently, you may want to create the suggested
access path for performance reasons. It is possible that the query optimizer
will choose not to use the access path just created. <p></p>
For more
information, refer to <a href="rzajqdta.htm#rzajqdta">Data access on DB2 UDB for iSeries: data access paths and methods</a>.</td>
</tr>
</tbody>
</table>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="pimes.htm" title="You can evaluate the structure and performance of the given SQL statements in a program using informational messages put in the job log by the database manager.">Query optimization performance information messages</a></div>
</div>
</div>
</body>
</html>