Robust end-of-log processing
First Claim
Patent Images
1. A method of invalidating a transaction log file in a first database, the method comprising:
- (a) reading discard log information from a storage area, the discard log information comprising an indicator that a discard log file exists, a starting point identifier of the discard log file, and an ending point identifier of the discard log file, the discard log file comprising at least one log block of transaction log that is to be discarded;
(b) writing an invalid data pattern into the at least one log block, wherein after writing, log block content is identifiable as invalid;
(c) resetting the discard log information, the reset clearing the indicator that the discard log file exists.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of invalidating an unused log file in a database includes examining a discard log information storage area and determining if a discard log exists. If the discard log exists, the log is invalidated. The headers of each of the log files that have been fully invalidated are then invalidated. The discard log is then fully invalidated and a new log file may be generated on top of the discarded log. The method may be interrupted by a failure, a changeover, or crash and will be repeated until it completes.
12 Citations
20 Claims
-
1. A method of invalidating a transaction log file in a first database, the method comprising:
-
(a) reading discard log information from a storage area, the discard log information comprising an indicator that a discard log file exists, a starting point identifier of the discard log file, and an ending point identifier of the discard log file, the discard log file comprising at least one log block of transaction log that is to be discarded;
(b) writing an invalid data pattern into the at least one log block, wherein after writing, log block content is identifiable as invalid;
(c) resetting the discard log information, the reset clearing the indicator that the discard log file exists. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of invalidating a transaction log file in a first database, the method comprising:
-
(a) reading discard log information from a storage area, the discard log information comprising an indicator that a discard log file exists, a starting point identifier of the discard log file, and an ending point identifier of the discard log file, the discard log file comprising at least one log block of transaction log that is to be discarded;
(b) writing an invalid pattern of data into a first log block, wherein the first log block content is invalidated by an identifiable pattern of invalid data;
(c) updating the starting point identifier of the discard log file to correspond to a next log block following the first log block; and
(d) receiving new log file record information from a second database. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable medium having computer-executable instructions for performing a method of invalidating a transaction log file in a first database, the method comprising:
-
(a) reading discard log information from a storage area, the discard log information comprising an indicator that a discard log file exists, a starting point identifier of the discard log file, and an ending point identifier of the discard log file, the discard log file comprising at least one log block of transaction log that is to be discarded;
(b) writing an identifiably invalid data pattern into the at least one log block, wherein log block content is rendered invalid;
(c) writing a pattern of identifiably invalid data into header information of the at least one log block; and
(d) resetting the discard log information, the reset clearing the indicator that the discard log file exists. (e) resuming the method from step (a) if a failover from the first database to a second database occurs in any of steps (a), (b), (c), and (d). - View Dependent Claims (17, 18, 19, 20)
-
Specification