-
公开(公告)号:US20180246911A1
公开(公告)日:2018-08-30
申请号:US15444403
申请日:2017-02-28
Applicant: SAP SE
Inventor: Chul Won Lee , Daniel Booss , Jaeyoung Choi , Werner Thesing
CPC classification number: G06F16/21
Abstract: Receiving a statement including requests for database operations in a secondary database system storing data replicated from a primary database system by replaying transaction output generated by the primary database system; responsive to receiving the statement, requesting an allocation of memory from the secondary database system to support the requested database operations; generating an aggregated statement memory consumption value based on the amount of memory consumed by all statements executing in the secondary database system that are not associated with replaying the transaction logs; determining that the requested allocation of memory in addition to the aggregated statement memory consumption value exceeds a total statement execution memory limit indicating a total amount of memory that may be allocated to all database operations associated with statement execution in a secondary database system, and denying the requested allocation of memory. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US12242359B2
公开(公告)日:2025-03-04
申请号:US18185872
申请日:2023-03-17
Applicant: SAP SE
Inventor: Uwe Hahn , Eunsang Kim , Mihnea Andrei , Werner Thesing , Patrick Voelker , Ruediger Karl , Yong Sik Kwon , Jaeyoung Choi , Jian Luo , Hyunjun Kim , Andre Schefe , Urs Klingsporn , Norman May
Abstract: Systems and methods include reception of an instruction to recover a first database tenant of a first database instance to a first point in time, the first database tenant associated with first database artifacts of the first database instance, and the first database instance including two or more database tenants and, in response to the instruction, creation of a second database instance, selection of backup data of the first database instance based on the first point in time, execution of a recovery of the backup data on the second database instance, export of second database artifacts of the first database tenant from the second database instance to a storage, truncation of the first database artifacts from the first database instance, import of the second database artifacts from the storage to the first database instance, and deletion of the second database instance.
-
公开(公告)号:US20250045296A1
公开(公告)日:2025-02-06
申请号:US18228427
申请日:2023-07-31
Applicant: SAP SE
Inventor: Markus Behrens , Werner Thesing , Yue Zhu , Mitja Kleider , Omran Saleh , Jan Scheperski , Timo Sulg , Markus Glatz , Steffen Michael Wagner
IPC: G06F16/27
Abstract: Various examples described herein are directed to systems and methods for operating a database management system. A first host may be executed at a first container of a cloud environment. The first host may be configured according to a first set of operating parameters and may perform a source role. A second host may be executed at a second container of the cloud environment. The second host may be configured according to the first set of operating parameters and may perform a replica role or the source role. A request to modify at least one operating parameter of the first source may be received. A third host may be started at a third container and configured to perform at least one of the source role or the replica role for the source role. At least one of the first host or the second host may be shut down.
-
公开(公告)号:US20250045034A1
公开(公告)日:2025-02-06
申请号:US18228412
申请日:2023-07-31
Applicant: SAP SE
Inventor: Markus Behrens , Reiner Singer , Werner Thesing , Yue Zhu , Mitja Kleider , Omran Saleh , Timo Sulg , Jan Scheperski , Markus Glatz , Steffen Michael Wagner , Ahsan Nasir
Abstract: Various examples are directed to systems and methods for operating a database management system. A first host of a first version may be executed at a first container of a cloud environment. A second host of a second version may be executed at a second container of the cloud environment. The first host may be configured to perform a source role and the second host may be configured to perform a replica role corresponding to the source role. A network layer executing at the cloud environment may receive a request directed to the second host. The network layer may determine that the request is consistent with allowed request data describing allowed requests and may send the request to the second host.
-
公开(公告)号:US11416349B2
公开(公告)日:2022-08-16
申请号:US17008380
申请日:2020-08-31
Applicant: SAP SE
Inventor: Thorsten Glebe , Werner Thesing , Christoph Roterring
Abstract: Recovery of a database system by taking the database system offline is initiated. Thereafter, recovery operations specified by a redo log of the database system are replayed. A cleanup log is generated that identifies cleanup operations occurring during the replay of the recovery operations for garbage collection. Concurrent with the startup of the database, garbage collection of the cleanup operations as specified in the database savepoint is initiated. In addition, concurrent with the replay of the recovery operations, garbage collection of the cleanup operations specified by the cleanup log is initiated. The database system is later brought online after all of the recovery operations are replayed.
-
公开(公告)号:US20210303421A1
公开(公告)日:2021-09-30
申请号:US16834317
申请日:2020-03-30
Applicant: SAP SE
Inventor: Christoph Roterring , Reiner Singer , Werner Thesing
Abstract: A method, a system, and a computer program product for executing a takeover process. A takeover process of a primary computing system by a secondary computing system is triggered. The secondary computing system stores transaction data replicated from the primary computing system. Writing of a redo log of transaction data of one or more transactions into storage by the primary computing system is suspended. The redo log is written by the primary computing system prior to the suspending is transmitted to the secondary computing system. The takeover process of the primary computing system by the secondary computing system is executed upon receiving and persisting the redo log at the secondary computing system.
-
公开(公告)号:US10795779B2
公开(公告)日:2020-10-06
申请号:US15436535
申请日:2017-02-17
Applicant: SAP SE
Inventor: Thorsten Glebe , Werner Thesing , Christoph Roterring
Abstract: Recovery of a database system by taking the database system offline is initiated. Thereafter, recovery operations specified by a redo log of the database system are replayed. A cleanup log is generated that identifies cleanup operations occurring during the replay of the recovery operations for garbage collection. Concurrent with the startup of the database, garbage collection of the cleanup operations as specified in the database savepoint is initiated. In addition, concurrent with the replay of the recovery operations, garbage collection of the cleanup operations specified by the cleanup log is initiated. The database system is later brought online after all of the recovery operations are replayed.
-
公开(公告)号:US10558530B2
公开(公告)日:2020-02-11
申请号:US15646904
申请日:2017-07-11
Applicant: SAP SE
Inventor: Dirk Thomsen , Werner Thesing
Abstract: A savepoint is initiated in an in-memory database system that is associated with a plurality of modified pages and comprises a pre-critical phase, a critical phase, and a post-critical phase. Thereafter, as part of the critical phase, a physical page number is assigned to each page in the critical phase. Further, as part of the critical phase, each page assigned a physical page number is individually locked. Subsequently, each page is handed over from a corresponding first thread to a corresponding second thread to copy such page into a corresponding shadow page as part of the post-critical phase.
-
公开(公告)号:US10452636B2
公开(公告)日:2019-10-22
申请号:US15361760
申请日:2016-11-28
Applicant: SAP SE
Inventor: Kyu Hwan Kim , Juchang Lee , Beomsoo Kim , Chang Gyoo Park , Reiner Singer , Christoph Rottering , Werner Thesing , Michael Muehle
IPC: G06F16/00 , G06F16/23 , G06F16/245 , G06F16/27
Abstract: A computer implemented method is provided comprising receiving a group of transaction logs from a first database, allocating transaction logs from the group of transaction logs to a first queue and to a second queue, generating an end-of-group transaction log indicative of an end of the group of transaction logs, allocating the end-of-group log to the first queue and the second queue; replaying transaction logs from the first queue including the end-of-group transaction log allocated to the first queue, replaying transaction logs from the second queue including the end-of-group transaction log allocated to the second queue; and changing visibility of one or more transactions in response to replaying the end-of-group transaction log allocated to the first queue and the end-of-group transaction log allocated to the second queue. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US20180260425A1
公开(公告)日:2018-09-13
申请号:US15479094
申请日:2017-04-04
Applicant: SAP SE
Inventor: Dirk Thomsen , Werner Thesing
CPC classification number: G06F16/2282 , G06F11/1471 , G06F11/1474 , G06F11/2035 , G06F11/2097 , G06F16/2358 , G06F16/2365 , G06F2201/80 , G06F2201/82
Abstract: Execution of a page flusher is initiated in an in-memory database system in which pages are loaded into memory and which has associated physical disk storage. Thereafter, the page flusher identifies pages that were last modified outside a pre-defined time window. The page flusher then flushes the identified modified pages to the physical disk storage.
-
-
-
-
-
-
-
-
-