摘要:
A method and system are provided for performing anticipatory changes to a resource governed by a locking mechanism. Entities (such as transactions in a database system) that want to modify a resource request permission to modify the resource. However, prior to receiving permission, they make anticipatory changes to a private version of the resource. The entities are prevented from making the anticipatory changes permanent until they receive permission to make the changes. Because they can make the changes, and proceed to other operations, before receiving permission, any delay in receiving permission has less adverse effect on their performance.
摘要:
Described herein are techniques for dynamically monitoring and managing resource usages of processes running on a node in a multi-node database system. High resource usages of processes can be proactively detected and alleviated, thereby making such a node to perform significantly better than otherwise.
摘要:
Described herein are techniques for dynamically monitoring and rebalancing priority levels of processes running on a computing node. Runaway processes and starved processes can be proactively detected and prevented, thereby making such a node to perform significantly better and more responsively than otherwise.
摘要:
A method and apparatus for selecting one or more instances to perform database recovery is provided. According to one aspect, one or more performance metrics are determined for each instance on each node in a cluster. Based on these performance metrics, which may be weighted to give one or more metrics more significance relative to the other metrics, an overall score is determined for each instance on each surviving node when a node in the cluster fails. One or more instances with the highest of these scores are selected. The selected instances are assigned the task of performing the database recovery process. Because instances best able to handle to database recovery process are selected, the database recovery process consumes less time, thereby making data accessible in less time after a node fails.
摘要:
Systems, methods, and other embodiments associated with producing a proximity display of correlated load metrics associated with members of a cluster are described. One example method includes acquiring metrics data (e.g., load data) from nodes in a cluster. The example method may also include determining a cluster element state based on the metrics data and determining relationships between members of the set of related cluster elements. The method may also include identifying element metric representations for cluster elements based on cluster element states and identifying locations on a proximity display at which element metric representations are to be displayed. The locations may depend on relationships between cluster element states. The method may also include displaying element metric representations at the computed locations to produce a proximity display of correlated load metrics.
摘要:
Techniques are described for storing portions of files on different storage devices based on the devices' respective storage class. For example, different extents from a large file within a system, application, or database may be stored on different storage devices. The storage devices may be part of a single storage system that includes some storage devices that have different performance capabilities. The decision of where, within the storage classes, to store data may be based on the access patterns of the data. Access patterns regarding file extents are tracked using respective access bits, which are set when a memory block associated with an extent is accessed via an I/O operation. In one embodiment, an access bitmap is modified to account for cached blocks of file extents.
摘要:
Systems, methods, and other embodiments associated with producing a proximity display of correlated load metrics associated with members of a cluster are described. One example method includes acquiring metrics data (e.g., load data) from nodes in a cluster. The example method may also include determining a cluster element state based on the metrics data and determining relationships between members of the set of related cluster elements. The method may also include identifying element metric representations for cluster elements based on cluster element states and identifying locations on a proximity display at which element metric representations are to be displayed. The locations may depend on relationships between cluster element states. The method may also include displaying element metric representations at the computed locations to produce a proximity display of correlated load metrics.
摘要:
A method and mechanism is disclosed for implementing storage and compression in a computer system. Each granular portion of a file can be individually stored in either a compressed storage unit or an uncompressed storage unit. The storage units can be allocated apriori or on an as-needed basis.
摘要:
A method and apparatus for managing shared resources in a clustered database management system is provided. In an embodiment, multiple master nodes exist in a database management system. A master node receives a lock request from a second node. The lock request is a request for a lock on a shared resource. The master node grants the lock request to the second node. While the second node holds the lock, the second node causes the master node to modify the shared resource.
摘要:
Techniques are described herein for synchronizing cluster time. According to one technique, a master node is appointed in a cluster. Other “slave” nodes periodically synchronize their clocks with the master node. To synchronize its clock with the master node, a slave node sends a timestamped message to the master node, which also timestamps the message and sends the message back to the slave node, which then timestamps the message again. Based on the timestamps, the slave node is able to determine the difference between the master node's clock's time and slave node's clock's time, compensating for the message travel time between master node and slave node. Depending on various circumstances, and based on the determined difference, the slave node adjusts its clock so that the time indicated by the slave node's clock at least begins to approach more closely the time indicated by the master node's clock.