摘要:
Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.
摘要:
Architecture that addresses an end-to-end solution for logical transactional replication from a shared-nothing clustered database management system, which uses adaptive cloning for high availability. This can be time based using a global logical timestamp. The disclosed architecture, used for refreshing stale clones, does not preserve user transaction boundaries, which is a more complex situation than where the boundaries are preserved. In such a scenario it is probable that for a given data segment no clone of the segment may contain the complete user transaction history, and hence, the history has to be pieced together from the logs of multiple different clones. This is accomplished such that log harvesting is coordinated with the clone state transitions to ensure the correctness of logical replication.
摘要:
A method of updating a clone data map associated with a plurality of nodes of a computer system is disclosed. The clone data map includes node identification data and clone location data. A node failure event of a failed node of the computer system that supports a primary clone is detected. The clone data map is updated such that a secondary clone stored at a node other than the failed node is marked as a new primary clone. In addition, clone data maps may be used to perform node load balancing by placing a substantially similar number of primary clones on each node of a node cluster or may be used to increase or decrease a number of nodes of the node cluster. Further, data fragments that have a heavy usage or a large fragment size may be reduced in size by performing one or more data fragment split operations.
摘要:
A technique is described for storing data from a database across a plurality of data storage devices, wherein each data storage device is capable of being accessed only by a corresponding computer system in a group of interconnected computer systems. In accordance with the technique, an identifier of the database is received. An identifier of a storage tier instance is also received, wherein the storage tier instance comprises a logical representation of one or more storage locations within each of the data storage devices. Responsive to the receipt of the identifier of the database and the identifier of the storage tier instance, data from the database is stored in two or more of the storage locations logically represented by the storage tier instance, wherein each of the two or more storage locations in which data is stored is within a corresponding one of the data storage devices.
摘要:
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access between the single-item access components and the set-based access components.
摘要:
An operating system is provided. The system includes an agent components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.
摘要:
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.
摘要:
A file namespace hierarchy bypass and method to access files are provided. The bypass can be employed, for example, as a computer-readable medium with instructions for generating a unique identifier associated with a file and instructions for accessing the file based on the unique identifier and a specified search space. A computer-readable medium having instructions for obtaining the unique identifier and specified search space associated with the file and instructions for generating a path designation by combining the unique identifier and the specified search space used to access the file may also be employed. The method for bypassing the namespace hierarchy of the file, for example, may include passing the unique identifier and specified search space to a program and accessing the file based on a path designation generated by the program by combining the unique identifier and specified search space.
摘要:
A file stream exchange system and method are provided. The system can be employed, for example, with a storage system that supports transactions as a primary mechanism and employs a rich type system. The system provides a mechanism for the storage system to provide reliable updates to file streams while preserving the common criteria for security. The system includes a replace stream component which is a kernel mode mechanism that allows transactional exchange of stream data of two file-backed items without violating the common criteria for security.
摘要:
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access between the single-item access components and the set-based access components.