Abstract:
Systems and methods include determination of a first encryption key associated with a data page of a row store database table stored in a volatile memory, based on a header of the data page, encryption of a body of the data page using the first encryption key, and storage of an encrypted data page comprising the header and the encrypted body in a persistent storage system.
Abstract:
A system, computer-implemented method, and computer-program product embodiments for rebuilding database indexes is disclosed. A pre-loader thread rebuilds a plurality of indexes in the background once a database is initialized. Simultaneously, a query processor receives queries from a user/client of a database. If an index that is required by the query processor has not yet been rebuilt by the pre-loader, a request to rebuild the index is sent to an asynchronous index loader. The asynchronous index loader places the request in a queue, processes the queue based on available system resources, and then rebuilds the requested indexes. Once the necessary indexes have been rebuilt, a wake-up signal is sent to the query processor which then proceeds to execute the query from a user/client.
Abstract:
Restoring a database image of a secondary database system comprises initializing the database image from a recovery image that includes metadata logs and non-metadata logs, of which at least one metadata log includes an undo log of non-committed data that is applied to the initialized database image. A first pagelist and first indexes are then rebuilt based on first data segments of the database image and the corresponding metadata objects. The database image is then updated by replaying the metadata redo log generated from the undo log, the metadata logs, and the non-metadata logs. Then, a second pagelist and second indexes for the database system are rebuilt based on second data segments of the database image and the corresponding non-metadata objects, while each of the first data segments is statically separated from the second data segments in physical memory space. Related apparatus, systems, techniques and articles are also described.
Abstract:
Systems and methods include storage of a plurality of encrypted data pages of a row store database table in a persistent storage system, determination of a first encryption key associated with one of the plurality of encrypted data pages based on a header of the one of the plurality of encrypted data pages, determination of whether the first encryption key has been revoked, and, if it is determined that the first encryption key has been revoked, adding of a portion of volatile memory allocated to the one of the plurality of data pages to a free list.