摘要:
Systems, methods, and other embodiments associated with producing a proximity display of correlated load metrics associated with members of a cluster are described. One example method includes acquiring metrics data (e.g., load data) from nodes in a cluster. The example method may also include determining a cluster element state based on the metrics data and determining relationships between members of the set of related cluster elements. The method may also include identifying element metric representations for cluster elements based on cluster element states and identifying locations on a proximity display at which element metric representations are to be displayed. The locations may depend on relationships between cluster element states. The method may also include displaying element metric representations at the computed locations to produce a proximity display of correlated load metrics.
摘要:
Techniques are provided for responding to the termination of a node by selecting another node, and assigning to the selected node the affinity relationships that existed between the terminated node and one or more objects. The resources that belong to the objects involved in the affinity relationships are remastered to the selected node. The selected node then performs recovery of the resources that had been opened by the terminated node and/or serves as a failover node to execute the transactions that had been executing on the terminated node.
摘要:
Described herein are techniques for dynamically monitoring process activeness of processes running on a computing node. Problems affecting processes to serve their designated functions on the computing node can be relatively quickly detected and dealt with, thereby making restoring process activeness on the computing node much more quickly than otherwise.
摘要:
Described herein are techniques for using super masters to coordinate accesses by nodes in a database server cluster to data stored in a database. In many cases, the number of inter-nodal messages is reduced, thereby saving the overheads attendant to coordinating accesses in such a system.
摘要:
Techniques are described for storing portions of files on different storage devices based on the devices' respective storage class. For example, different extents from a large file within a system, application, or database may be stored on different storage devices. The storage devices may be part of a single storage system that includes some storage devices that have different performance capabilities. The decision of where, within the storage classes, to store data may be based on the access patterns of the data. Access patterns regarding file extents are tracked using respective access bits, which are set when a memory block associated with an extent is accessed via an I/O operation. In one embodiment, an access bitmap is modified to account for cached blocks of file extents.
摘要:
Systems, methods, and other embodiments associated with producing a proximity display of correlated load metrics associated with members of a cluster are described. One example method includes acquiring metrics data (e.g., load data) from nodes in a cluster. The example method may also include determining a cluster element state based on the metrics data and determining relationships between members of the set of related cluster elements. The method may also include identifying element metric representations for cluster elements based on cluster element states and identifying locations on a proximity display at which element metric representations are to be displayed. The locations may depend on relationships between cluster element states. The method may also include displaying element metric representations at the computed locations to produce a proximity display of correlated load metrics.
摘要:
A method and mechanism is disclosed for implementing storage and compression in a computer system. Each granular portion of a file can be individually stored in either a compressed storage unit or an uncompressed storage unit. The storage units can be allocated apriori or on an as-needed basis.
摘要:
A method and system are provided for performing anticipatory changes to a resource governed by a locking mechanism. Entities (such as transactions in a database system) that want to modify a resource request permission to modify the resource. However, prior to receiving permission, they make anticipatory changes to a private version of the resource. The entities are prevented from making the anticipatory changes permanent until they receive permission to make the changes. Because they can make the changes, and proceed to other operations, before receiving permission, any delay in receiving permission has less adverse effect on their performance.
摘要:
Techniques are described herein for handling lock-related inconsistencies. As mentioned above, such inconsistencies occur when two or more sets of lock information, relating to the same resource, convey inconsistent information about locks requested and/or granted on that resource. In general, the techniques involve causing the locally-stored lock information about a resource to be sent to the master node of the resource. The master node of the resource compares the lock information thus received against the lock information maintained by the master node. Based on the comparison, the master node determines how to resolve the lock-related inconsistency, and sends messages to those nodes that need to change their local lock information for the resource. Once all of the lock information has been made consistent, the resource made available for access. Because the lock-related inconsistency is resolved without restarting nodes, the availability required to correct the inconsistency.
摘要:
Techniques are provided for mastering resources by assigning resources to mastery-eligible-sets. The resources that are assigned to a mastery-eligible-set may be mastered only at nodes that belong to the mastery-eligible-set. The membership of a mastery-eligible-set for a given set of related resources may be established based on which nodes have the highest affinity for the given set of related resources. Resource usage may be monitored, and the system may be periodically reconfigured, by changing membership of the mastery-eligible-sets, based on the usage information.