摘要:
A computer system is selectively quiesced by preventing selected resource consumers from starting new activity on a computer system, while allowing already-running activity to continue. Resource consumers are divided into resource consumer groups, and some groups are prevented from starting new activity while other groups are allowed to start new activity. A scheduler is used to alternate between resource plans, including a quiescence plan and an operations plan.
摘要:
Described herein are techniques for synchronizing access to resources in a multi node system by establishing a resource as a read-mostly resource based on one or more criteria, and allowing a node to acquire a shared lock, not granted by the master, on the read-mostly resource where no anti-lock exists for the resource.
摘要:
Techniques are described herein for returning a repository to a prior state. The repository may be, for example a database, and the prior state may be, for example the consistent state that the database had at a particular point in time in the past. When a operator-caused error has been introduced to the database by changes made by an already-committed transaction, the techniques described herein may be used to recover from the error by returning the database to a point in time prior to the commit time of the transaction that introduced the error. The techniques involve the generation of “physical undo” information, and the use of the physical undo information in conjunction with physiological undo and physiological redo to efficiently return a repository to the prior state.
摘要:
Techniques are described herein for returning a repository to a prior state. The repository may be, for example a database, and the prior state may be, for example the consistent state that the database had at a particular point in time in the past. When a operator-caused error has been introduced to the database by changes made by an already-committed transaction, the techniques described herein may be used to recover from the error by returning the database to a point in time prior to the commit time of the transaction that introduced the error. The techniques involve the generation of “physical undo” information, and the use of the physical undo information in conjunction with physiological undo and physiological redo to efficiently return a repository to the prior state.
摘要:
A method and apparatus for determining a mapping of a database object to storage layers is provided. According to one aspect, a database server generates views that represent which components of each storage layer store parts of the object. The views are based on information that the database server automatically gathers from one or more vendor libraries. Each library implements a common API. Each storage layer is associated with a library. The database server passes the object's identifier to each library's implementation of a get-mapping routine of the API. A process that is associated with the storage layer that recognizes the object's identifier responds with the identity of one or more components of the storage layer that store one or more parts of the object. The database server recursively uses this information to obtain mappings between storage layer components and underlying storage layer components.
摘要:
In accordance with an embodiment of the present invention, a transaction tracking mechanism is provided by a database server cluster to keep track of a global state of a distributed transaction. The global state of the distributed transaction comprises one or more statuses that are associated with one or more transaction branches that are part of the distributed transaction. The global state may be associated with a global lock. Through using the global state in association with the global lock, problems such as partial commits, data inconsistency, access contentions and deadlocks may be avoided when the database server cluster processes the distributed transaction.
摘要:
Techniques are provided for performing changes to a resource governed by a locking mechanism. An entity (such as a server instance in a database system cluster) requests permission to modify the resource. In response to the request, the entity receives a first lock on the resource, which grants permission to perform the change to the resource without making the change permanent. After receiving the first lock, the entity performs the change to a copy of the resource that resides in shared memory without making another copy of the resource. After performing the change and until receiving permission to make the change permanent, the entity prevents the change to the resource from becoming permanent. After performing the change, the entity receives a second lock on the resource, which grants the entity permission to make the change permanent. After receiving the second lock, the entity ceases to prevent the change to the resource from becoming permanent.
摘要:
Access to computer system resources is regulated by computing an estimated execution time for an operation which seeks to use the resources. Once computed, the estimated execution time is used to make decisions about granting the operation access to the computer system resources. Operations which have an estimated execution time greater than a user-supplied maximum estimated execution time allowable for the operation are denied access to the computer system resources. Operations which are denied access are rescheduled for later operation, queued, or aborted.
摘要:
A system and method for enabling a second database instance to more quickly process a request to execute a database statement that has previously been executed by a first database instance is described. In one embodiment, the method involves sending the database statement from the first database instance to the second database instance, and generating by the second database instance one or more structures needed to prepare the statement for execution, such as a parse tree and an execution plan for the statement. If at some point in the future, the second database instance receives a request to execute the same statement, the above structures can be used for execution, thereby eliminating the need for one or more potentially time-consuming operations, such as generation of a parse tree or execution plan for the statement.
摘要:
Allocation of memory is optimized across multiple pools of memory, based on minimizing the time it takes to successfully retrieve a given data item from each of the multiple pools. First data is generated that indicates a hit rate per pool size for each of multiple memory pools. In an embodiment, the generating step includes continuously monitoring attempts to access, or retrieve a data item from, each of the memory pools. The first data is converted to second data that accounts for a cost of a miss with respect to each of the memory pools. In an embodiment, the second data accounts for the cost of a miss in terms of time. How much of the memory to allocate to each of the memory pools is determined, based on the second data. In an embodiment, the steps of converting and determining are automatically performed, on a periodic basis.