Writing Transactional Applications with Berkeley DB, Java Edition

Total Page:16

File Type:pdf, Size:1020Kb

Writing Transactional Applications with Berkeley DB, Java Edition Berkeley DB Transaction Processing for Java . Makers of Berkeley DB Legal Notice This documentation is distributed under the terms of the Sleepycat public license. You may review the terms of this license at: http://www.sleepycat.com/download/oslicense.html Sleepycat Software, Berkeley DB, Berkeley DB XML and the Sleepycat logo are trademarks or service marks of Sleepycat Software, Inc. All rights to these marks are reserved. No third-party use is permitted without the express prior written consent of Sleepycat Software, Inc. Java™ and all Java-based marks are a trademark or registered trademark of Sun Microsystems, Inc, in the United States and other countries. To obtain a copy of this document's original source code, please write to <[email protected]>. Published 12/20/2005 Table of Contents Preface .............................................................................................. iv Conventions Used in this Book ............................................................. iv For More Information .................................................................. v 1. Introduction ...................................................................................... 1 Transaction Benefits ......................................................................... 1 A Note on System Failure ............................................................. 2 Application Requirements ............................................................ 2 Multi-threaded and Multi-process Applications ................................... 4 Recoverability ................................................................................ 4 Performance Tuning ......................................................................... 5 2. Enabling Transactions ........................................................................... 6 Environments ................................................................................. 6 File Naming ............................................................................. 7 Specifying the Environment Home Directory ............................... 7 Specifying File Locations ....................................................... 7 Identifying Specific File Locations ............................................ 8 Error Support ........................................................................... 9 Shared Memory Regions ............................................................. 10 Regions Backed by Files ...................................................... 10 Regions Backed by Heap Memory ........................................... 10 Regions Backed by System Memory ......................................... 10 Security Considerations ............................................................. 11 Opening a Transactional Environment and Database ................................. 12 3. Transaction Basics ............................................................................. 15 Committing a Transaction ................................................................. 16 Non-Durable Transactions ........................................................... 18 Aborting a Transaction ..................................................................... 19 Auto Commit ................................................................................ 19 Nested Transactions ........................................................................ 21 Transactional Cursors ...................................................................... 21 Secondary Indices with Transaction Applications ...................................... 23 Configuring the Transaction Subsystem ................................................. 24 4. Concurrency .................................................................................... 27 Which JE Handles are Free-Threaded ................................................... 28 Locks, Blocks, and Deadlocks ............................................................. 28 Locks ................................................................................... 29 Lock Resources ................................................................. 29 Types of Locks ................................................................. 30 Lock Lifetime ................................................................... 30 Blocks .................................................................................. 30 Blocking and Application Performance ..................................... 31 Avoiding Blocks ................................................................. 32 Deadlocks .............................................................................. 33 The Locking Subsystem .................................................................... 34 Configuring the Locking Subsystem ................................................ 34 Configuring Deadlock Detection ................................................... 36 12/20/2005 Using Transactions with JE Page ii Resolving Deadlocks ................................................................. 38 Isolation ...................................................................................... 39 Supported Degrees of Isolation .................................................... 39 Reading Uncommitted Data ........................................................ 40 Committed Reads .................................................................... 43 Transactional Cursors and Concurrent Applications ................................... 45 Using Cursors with Uncommitted Data ............................................ 46 Read/Modify/Write ......................................................................... 47 No Wait on Blocks ........................................................................... 48 Reverse BTree Splits ....................................................................... 49 5. Managing JE Files .............................................................................. 51 Checkpoints .................................................................................. 51 Backup Procedures ......................................................................... 55 About Unix Copy Utilities ........................................................... 56 Offline Backups ....................................................................... 57 Hot Backup ............................................................................ 57 Incremental Backups ................................................................. 58 Recovery Procedures ....................................................................... 58 Normal Recovery ..................................................................... 59 Catastrophic Recovery ............................................................... 60 Designing Your Application for Recovery ................................................ 61 Recovery for Multi-Threaded Applications ....................................... 61 Recovery in Multi-Process Applications ........................................... 63 Effects of Multi-Process Recovery ........................................... 63 Process Registration ........................................................... 64 Using Hot Failovers ......................................................................... 64 Removing Log Files ......................................................................... 66 Configuring the Logging Subsystem ...................................................... 67 Setting the Log File Size ............................................................ 67 Configuring the Logging Region Size .............................................. 68 Configuring In-Memory Logging .................................................... 68 Setting the In-Memory Log Buffer Size ............................................ 70 6. Summary and Examples ....................................................................... 71 Anatomy of a Transactional Application ................................................ 71 Transaction Example ....................................................................... 72 TxnGuide.java ........................................................................ 73 PayloadData.java ..................................................................... 77 DBWriter.java ......................................................................... 78 In-Memory Transaction Example ......................................................... 84 12/20/2005 Using Transactions with JE Page iii Preface This document describes how to use transactions with your Berkeley DB, Java Edition applications. It is intended to describe how to transaction protect your application's data. The APIs used to perform this task are described here, as are the environment infrastructure and administrative tasks required by a transactional application. This book also describes multi-threaded and multi-process JE applications and the requirements they have for deadlock detection. This book is aimed at the software engineer responsible for writing a transactional JE application. This book assumes that you have already read and understood the concepts contained in Getting Started with Berkeley DB. Conventions Used in this Book The following typographical conventions are used within in this manual: Class names are represented in monospaced font, as are method names. For example: "The Environment() constructor returns an Environment class object." Variable or non-literal text is presented
Recommended publications
  • Oracle Berkeley DB Installation and Build Guide Release 18.1
    Oracle Berkeley DB Installation and Build Guide Release 18.1 Library Version 18.1.32 Legal Notice Copyright © 2002 - 2019 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Berkeley DB, and Sleepycat are trademarks or registered trademarks of Oracle. All rights to these marks are reserved. No third- party use is permitted without the express prior written consent of Oracle. Other names may be trademarks of their respective owners. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Oracle Solaris 10 910 Release Notes
    Oracle® Solaris 10 9/10 Release Notes Part No: 821–1839–11 September 2010 Copyright © 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms setforth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]
  • Oracle Technology Global Price List September 7, 2021
    Prices in USA (Dollar) Oracle Technology Global Price List September 7, 2021 This document is the property of Oracle Corporation. Any reproduction of this document in part or in whole is strictly prohibited. For educational purposes only. Subject to change without notice. 1 of 16 Section I Prices in USA (Dollar) Oracle Database Software Update Processor Software Update Named User Plus License & Support License License & Support Database Products Oracle Database Standard Edition 2 350 77.00 17,500 3,850.00 Enterprise Edition 950 209.00 47,500 10,450.00 Personal Edition 460 101.20 - - Mobile Server - - 23,000 5,060.00 NoSQL Database Enterprise Edition 200 44 10,000 2,200.00 Enterprise Edition Options: Multitenant 350 77.00 17,500 3,850.00 Real Application Clusters 460 101.20 23,000 5,060.00 Real Application Clusters One Node 200 44.00 10,000 2,200.00 Active Data Guard 230 50.60 11,500 2,530.00 Partitioning 230 50.60 11,500 2,530.00 Real Application Testing 230 50.60 11,500 2,530.00 Advanced Compression 230 50.60 11,500 2,530.00 Advanced Security 300 66.00 15,000 3,300.00 Label Security 230 50.60 11,500 2,530.00 Database Vault 230 50.60 11,500 2,530.00 OLAP 460 101.20 23,000 5,060.00 TimesTen Application-Tier Database Cache 460 101.20 23,000 5,060.00 Database In-Memory 460 101.20 23,000 5,060.00 Database Enterprise Management Diagnostics Pack 150 33.00 7,500 1,650.00 Tuning Pack 100 22.00 5,000 1,100.00 Database Lifecycle Management Pack 240 52.80 12,000 2,640.00 Data Masking and Subsetting Pack 230 50.60 11,500 2,530.00 Cloud Management
    [Show full text]
  • Developing and Deploying High Performance PHP Applications
    Developing and Deploying High Performance PHP Applications http://joind.in/3396 php|tek 2011 http://blogs.oracle.com/opal Christopher Jones [email protected] Oracle Development http://twitter.com/ghrd 1 This Talk - What to Expect • “State of the Nation” overview of PHP & Oracle Technology • (Some) Best Practices with Oracle Database – With live demos 2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 About Me • Work in Oracle's Linux & Virtualization Group • Focus on scripting languages – mostly PHP – Have PHP code check-in privileges • Also work on Oracle features that help scripting languages 4 <Insert Picture Here> In The News 5 In the News: NetBeans IDE • Free – GPL / CDDL • NetBeans is very popular for PHP – Strong, passionate community of users • Zend Framework, Symfony, XDebug, PHPUnit, PhpDoc • New! NetBeans 7.0 just released – Generate PhpDoc – Rename refactoring, Safe delete refactoring – Support for PHP 5.3 namespace aliases • See http://netbeans.org/features/php 6 In the News: Oracle Database • Beta Oracle 11.2 “XE” is available – Free – Windows 32 & 64, Linux 64 – Subset of Enterprise Edition features – Same code base as EE – XE
    [Show full text]
  • Data Sheet: Berkeley Database Products
    ORACLE DATA SHEET Oracle Berkeley Database Products The Oracle Berkeley DB product family consists of Berkeley DB, Berkeley DB Java Edition and Berkeley DB XML. All three are high performance, self- contained, software libraries which provide data storage services for applications, devices, and appliances. They deliver superior performance, scalability and availability for applications that must run unattended without administration. Overview The Oracle Berkeley DB family of high performance, self-contained databases provides CONSIDER BERKELEY DB WHEN: developers with a fast, transactional database solution with a track record of reliability, • You need an SQLite API compatible unmatched scalability and five-nines (99.999%) or better availability. Oracle Berkeley database within mobile, handheld or DB is well suited to Independent Software Vendors, device and equipment other hardware devices. manufacturers, and enterprises or software companies building solutions which need a • Performance, scalability, concurrency data management component. The Oracle Berkeley DB family of products provides fast, is important. local persistence with zero oversight administration. • Zero oversight administration in deployment is required Customers and end-users will experience an application that simply works, reliably • Flexibility to choose SQL, XQuery, manages data, scales under extreme load, and requires zero oversight in deployment. Java Object, or Key/Value data Your development team can focus on your application and be confident that Berkeley management. DB will manage your application’s data. • Mobile data synchronization with Oracle Database is a requirement. Storage Engine Design • Failure from recovery must be automatic and reliable The Berkeley DB products are self-contained software components which support your • High availability and fault tolerance are application.
    [Show full text]
  • Getting Started with Berkeley DB Java Edition
    Oracle Berkeley DB, Java Edition Getting Started with Berkeley DB Java Edition 12c Release 2 Library Version 12.2.7.5 Legal Notice Copyright © 2002 - 2017 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Berkeley DB, Berkeley DB Java Edition and Sleepycat are trademarks or registered trademarks of Oracle. All rights to these marks are reserved. No third-party use is permitted without the express prior written consent of Oracle. Other names may be trademarks of their respective owners. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations.
    [Show full text]
  • Forcepoint DLP Supported File Formats and Size Limits
    Forcepoint DLP Supported File Formats and Size Limits Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 This article provides a list of the file formats that can be analyzed by Forcepoint DLP, file formats from which content and meta data can be extracted, and the file size limits for network, endpoint, and discovery functions. See: ● Supported File Formats ● File Size Limits © 2021 Forcepoint LLC Supported File Formats Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 The following tables lists the file formats supported by Forcepoint DLP. File formats are in alphabetical order by format group. ● Archive For mats, page 3 ● Backup Formats, page 7 ● Business Intelligence (BI) and Analysis Formats, page 8 ● Computer-Aided Design Formats, page 9 ● Cryptography Formats, page 12 ● Database Formats, page 14 ● Desktop publishing formats, page 16 ● eBook/Audio book formats, page 17 ● Executable formats, page 18 ● Font formats, page 20 ● Graphics formats - general, page 21 ● Graphics formats - vector graphics, page 26 ● Library formats, page 29 ● Log formats, page 30 ● Mail formats, page 31 ● Multimedia formats, page 32 ● Object formats, page 37 ● Presentation formats, page 38 ● Project management formats, page 40 ● Spreadsheet formats, page 41 ● Text and markup formats, page 43 ● Word processing formats, page 45 ● Miscellaneous formats, page 53 Supported file formats are added and updated frequently. Key to support tables Symbol Description Y The format is supported N The format is not supported P Partial metadata
    [Show full text]
  • Abstract: Modern Open Source (“OS”) Software Projects Are Increasingly Funded by Commercial Firms That Expect to Earn a Profit from Their Investment
    GSPP10-006 Abstract: Modern open source (“OS”) software projects are increasingly funded by commercial firms that expect to earn a profit from their investment. This is usually done by bundling OS software with proprietary goods like cell phones or services like tech support. This article asks how judges and policymakers should manage this emerging business phenomenon. It begins by examining how private companies have adapted traditional OS institutions in a commercial setting. It then analyzes how OS methods change companies’ willingness to invest in software. On the one hand, OS cost-sharing often leads to increased output and benefits to consumers. On the other, these benefits tend to be limited. This is because sharing guarantees that no OS company can offer consumers better software than any other OS company. This suppresses incentives to invest much as a formal cartel would. In theory, vigorous competition from non-OS companies can mitigate this effect and dramatically increase OS output. In practice, however, de facto cartelization usually makes the OS sector so profitable that relatively few proprietary companies compete. This poses a central challenge to judges and policymakers. Antitrust law has long recognized that the benefits of R&D sharing frequently justify the accompanying cartel effect. This article argues that most commercial OS collaborations can similarly be organized in ways that satisfy the Rule of Reason. It also identifies two safe harbors where unavoidable cartel effects should normally be tolerated. That said, many OS licenses contain so-called “viral” clauses that require users who would prefer to develop proprietary products to join OS collaborations instead.
    [Show full text]
  • Oracle Berkeley DB Getting Started with the SQL Apis 12C Release 1
    Oracle Berkeley DB Getting Started with the SQL APIs 12c Release 1 Library Version 12.1.6.2 Legal Notice This documentation is distributed under an open source license. You may review the terms of this license at: http:// www.oracle.com/technetwork/database/berkeleydb/downloads/oslicense-093458.html Oracle, Berkeley DB, and Sleepycat are trademarks or registered trademarks of Oracle. All rights to these marks are reserved. No third-party use is permitted without the express prior written consent of Oracle. Other names may be trademarks of their respective owners. To obtain a copy of this document's original source code, please submit a request to the Oracle Technology Network forum at: https://forums.oracle.com/forums/forum.jspa?forumID=271 Published 4/13/2017 Table of Contents Preface ...................................................................................................... vi Conventions Used in this Book .................................................................... vi For More Information ............................................................................... vi Contact Us .................................................................................... vii 1. Berkeley DB SQL: The Absolute Basics .............................................................. 1 BDB SQL Is Nearly Identical to SQLite ........................................................... 1 Getting and Installing BDB SQL .................................................................... 1 On Windows Systems ........................................................................
    [Show full text]
  • Berkeley DB: Performance Metrics and Benchmarks
    Oracle Berkeley DB: Performance Metrics and Benchmarks ORACLE WHITE P A P E R | JANUARY 2017 Introduction This white paper presents performance measurements for Oracle Berkeley DB under various conditions on several major operating systems and platforms. Performance estimates presented here are intended to help you understand what to expect from Berkeley DB in some common configurations on commodity hardware running widely used operating systems. Your application performance depends on your data, data access patterns, cache size, other configuration parameters, operating system and hardware. Benchmarks are almost never representative of the performance of a particular application. They do, however, provide guidelines and help to set basic operational expectations. Oracle Berkeley DB is a database engine designed for any application requiring efficient and robust embedded data storage. Berkeley DB is a complete data management library, including support for concurrent access, ACID transactions and recovery, and replication for fault tolerance and high availability. Berkeley DB is designed to support any structured information model and has been incorporated into relational, object, network and hierarchical systems. Due to its scalability and minimal overhead, it has also been used in a number of reliable messaging, data streaming, caching, and data archival systems. Platforms and Testing Methodology All performance tests were run on the following commodity hardware and operating system combinations, without customized configuration, tuning or any other performance enhancing techniques. All tests were run on clean installations in multi-user mode systems that were otherwise quiescent. For the workloads presented, these are the results that can be obtained under actual use. Performance is often the first critical factor when selecting a database.
    [Show full text]
  • Serializable Isolation for Snapshot Databases
    Serializable Isolation for Snapshot Databases This thesis is submitted in fulfillment of the requirements for the degree of Doctor of Philosophy in the School of Information Technologies at The University of Sydney MICHAEL JAMES CAHILL August 2009 Copyright © 2009 Michael James Cahill All Rights Reserved Abstract Many popular database management systems implement a multiversion concurrency control algorithm called snapshot isolation rather than providing full serializability based on locking. There are well- known anomalies permitted by snapshot isolation that can lead to violations of data consistency by interleaving transactions that would maintain consistency if run serially. Until now, the only way to pre- vent these anomalies was to modify the applications by introducing explicit locking or artificial update conflicts, following careful analysis of conflicts between all pairs of transactions. This thesis describes a modification to the concurrency control algorithm of a database management system that automatically detects and prevents snapshot isolation anomalies at runtime for arbitrary ap- plications, thus providing serializable isolation. The new algorithm preserves the properties that make snapshot isolation attractive, including that readers do not block writers and vice versa. An implementa- tion of the algorithm in a relational database management system is described, along with a benchmark and performance study, showing that the throughput approaches that of snapshot isolation in most cases. iii Acknowledgements Firstly, I would like to thank my supervisors, Dr Alan Fekete and Dr Uwe Röhm, without whose guid- ance I would not have reached this point. Many friends and colleagues, both at the University of Sydney and at Oracle, have helped me to develop my ideas and improve their expression.
    [Show full text]
  • Berkeley DB and Sqlite
    Oracle Berkeley DB SQL API vs. SQLite API – Integration, Benefits and Differences ORACLE WHITE P A P E R | NOVEMBER 2 0 1 6 Introduction Oracle's Berkeley DB 12.1.6.2 release offers a perfect combination of technologies by including an SQL API that is fully compatible with SQLite. It is a great example of open source and commercial collaboration offering something for both camps. As a Berkeley DB developer, you now have a proven embedded SQL engine and C API to make application development even easier. And as an SQLite user, you have the option of a powerful, industry-supported storage engine that is built from the ground up for high-concurrency, and which includes powerful features like built-in replication and hot backup. The combination of the two technologies provides you with tremendous flexibility in that a single SQL API can now be used across a broad spectrum of applications ranging from the embedded space all the way up to large-scale transaction processing. For the most part, if you have written code using SQLite, it should be easy to put Berkeley DB's SQL API to use. However, as with all things, there are a few technical caveats you should be mindful of. This paper explores the benefits and potential issues for those familiar with SQLite wanting to test drive the new Oracle Berkeley DB. The Oracle Berkeley Database Architecture The first thing to consider is — what the Oracle Berkeley DB (BDB) SQL interface is and what it is not. If you have worked with MySQL, you may be tempted to think of this new feature as an alternate backend storage module for SQLite, like InnoDB is to MySQL.
    [Show full text]