O'Reilly logo

External Procedures, Triggers, and User-Defined Functions on IBM DB2 for i by Satid Singkorapoom, Daniel Lema, Fredy Cruz, Hernando Bedoya

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Triggers, referential integrity, and constraints
You can use IBM DB2 for i to define both referential integrity constraints and triggers on the same database table. This chapter explains the coexistence of triggers and referential integrity, with particular emphasis on the role that is played by commitment control in this scenario. The chapter starts with a description of transaction isolation and recovery before we describe the coexistence of triggers and referential integrity in detail.
This chapter describes these topics:

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required