摘要:
A method, computer program product, and system for detecting and fencing off a failed entity instance so that failover time in the computing system is reduced. Upon detection of a failed entity, for example a failed process, a signal handler invokes an operating system interface to fence off the failed instance from modifying its persistent state, so that the entity may be re-instantiated prior to termination of the failed instance. This approach reduces failover time and eliminates split-brain problems without compromising access to the failed instance to obtain diagnostic information, core dumps, and the like.
摘要:
A method, computer program product, and system for detecting and fencing off a failed entity instance so that failover time in the computing system is reduced. Upon detection of a failed entity, for example a failed process, a signal handler invokes an operating system interface to fence off the failed instance from modifying its persistent state, so that the entity may be re-instantiated prior to termination of the failed instance. This approach reduces failover time and eliminates split-brain problems without compromising access to the failed instance to obtain diagnostic information, core dumps, and the like.
摘要:
There are disclosed systems, computer program products, and methods for self-tuning memory. In an embodiment, a method for self-tuning memory comprises setting a tuning interval and a target range for free memory for a memory pool. If memory consumption falls outside of the set target range for free memory during a tuning interval, a new target size for the memory pool is set based on the target range for free memory. Memory allocation for the memory pool is increased or decreased for the next tuning interval, such that the new target size for the memory pool is reached. A decrement rate may be used to provide a controlled decrease of the memory pool over a plurality of tuning intervals if necessary, until the new target size for the memory pool is reached.
摘要:
The use of a centralized version table allows for efficient object switching. Rather than synchronizing all database agents to recognize a newly created file as containing the most recent version of a given object, database agents requiring access to the given object need only consult the centralized version table to learn file identity information. That is, the database agents consult the centralized version table to determine which of the files associated with a given object contain the most recent version of the given object. Mechanisms associated with the use of the centralized version table also provide for efficient recovery from a failure that has occurred during an object switching transaction.
摘要:
A storage appliance system is disclosed which may include at least one application server for locally executing an application, and one or more storage servers in communication with the application server for I/O transmission therebetween. Also disclosed are an application server, a method, and a computer program product.
摘要:
Provided are a method, system, and program for handling access requests to a page while copying an updated page of data to storage. An update to a page in a memory is received and indication is made that the page has an exclusive lock. The update is applied to the page and an operation is initiated to copy the updated page to a physical log in a storage in response to applying the update to the page. Reads and writes are allowed to proceed against the page while the operation to copy the updated page to the physical log in the storage is occurring.
摘要:
A method and system for improving memory access patterns of software systems on NUMA systems discovers NUMA system resources where the NUMA system resources comprises a plurality of NUMA nodes; determines a plurality of database threads, processes, and objects for a database configuration; and generates a policy which assigns the plurality of database threads, processes, and objects to the plurality of NUMA nodes, wherein the generating of the policy is performed prior to initialization of the plurality of database threads, processes, and objects. The assignment of the database threads, processes, or objects to NUMA nodes is such that the amount of remote memory accesses is reduced. When the database thread, process, or object initializes, the database server queries the policy for its assigned NUMA node(s). The database thread, process, or object is then bound to the assigned NUMA node(s).
摘要:
According to one embodiment of the present invention, a method of detecting and correcting hot pages in a database system includes monitoring transactions involving pages in a database and determining if one of the transactions had to wait for access to one of the pages; incrementing a page contention counter each time one of the transactions had to wait for access to one of the pages. The method then determines if the page contention counter exceeds a predetermined threshold and monitors transactions on one of the pages for which the page contention count was exceeded. The method then determines if a row was accessed in the page for which the page contention count was exceeded and increments a reference count for the accessed row. The accessed rows are flagged when the reference count exceeds a second predetermined threshold. The flagged rows are moved to another page in the database.
摘要:
A storage appliance system is disclosed which may include at least one application server for locally executing an application, and one or more storage servers in communication with the application server for I/O transmission therebetween. Also disclosed are an application server, a method, and a computer program product.
摘要:
A method to enhance relational database management system resiliency and query operations by minimizing CPU overhead and database page access latency and by facilitating database restoration and query efficiency. The method includes creating a clean database page in a buffer pool of a relational database management system, granting exclusive access to the clean database page within the buffer pool to an application that transitions the clean database page to a dirty database page by altering data store thereon, immediately downgrading exclusive access to the dirty database page to shared access in response to receiving an exclusive access termination request from the application, writing the dirty database page to a physical log, and releasing share access to the dirty database page.