Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Hash Partition

Posted on 2011-03-16
3
Medium Priority
?
443 Views
Last Modified: 2012-05-11
If I have a table with 45 columns what critera should I use to determine which columns to include in the partition by hash clause?
0
Comment
Question by:msimons4
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
Akenathon earned 2000 total points
ID: 35149653
You might be confusing hash partitioning methods with a hash cluster. What's your goal? Why are you choosing partitioning? Which business need are you trying to accomplish?
0
 

Author Comment

by:msimons4
ID: 35150132
I am trying to speed up full table scans. I thought when you hash partition a table you select which columns you want to partition:

CREATE TABLE invoices
(invoice_no    NUMBER NOT NULL,
 invoice_date  DATE   NOT NULL,
 comments      VARCHAR2(500))
PARTITION BY HASH (invoice_no)
(PARTITION invoices_q1 TABLESPACE users,
 PARTITION invoices_q2 TABLESPACE users,
 PARTITION invoices_q3 TABLESPACE users,
 PARTITION invoices_q4 TABLESPACE users);

in this case: PARTITION BY HASH (invoice_no)
If I have 45 columns what do I base which columns to PARTITION BY HASH
0
 
LVL 11

Assisted Solution

by:Akenathon
Akenathon earned 2000 total points
ID: 35151840
You won't speed up FTSs by hashing. On the contrary, (any kind of) hashing is useful when you are looking for exact matches.

If your table is big, you should aim to avoid FTSs and do indexed (or hashed) accesses. What's the query you'd like to speed up? Does it absolutely need a FTS? Prove it and we can talk about speeding up FTSs if you have no choice...
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Working with Network Access Control Lists in Oracle 11g (part 1) Part 2: http://www.e-e.com/A_9074.html So, you upgraded to a shiny new 11g database and all of a sudden every program that used UTL_MAIL, UTL_SMTP, UTL_TCP, UTL_HTTP or any oth…
Cursors in Oracle: A cursor is used to process individual rows returned by database system for a query. In oracle every SQL statement executed by the oracle server has a private area. This area contains information about the SQL statement and the…
This video shows how to Export data from an Oracle database using the Original Export Utility.  The corresponding Import utility, which works the same way is referenced, but not demonstrated.
This video explains what a user managed backup is and shows how to take one, providing a couple of simple example scripts.

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question