Checkpoint-free in log mining for distributed information sharing
First Claim
Patent Images
1. A method comprising:
- on a source node, a capture process mining one or more transaction logs to generate logical change records at said source node;
said capture process transmitting said logical change records to an apply process running on a destination node for said apply process to apply the logical change records at said destination node;
wherein each logical change record of said logical change records is associated with a source logical time;
wherein said apply process of said destination node maintains a particular source logical time representing a bounded safe time point in the one or more transaction logs to begin mining on said source node with respect to said apply process, wherein said particular source logical time is based on logical change records received by said apply process at said destination node;
on said source node, a restarted capture process reestablishing an association with said apply process of said destination node;
said source node receiving, from said destination node, the particular source logical time;
in a checkpoint-free mode, said restarted capture process restarting mining of the one or more transaction logs based on said particular source logical time received from said destination node;
wherein said restarting mining in the checkpoint-free mode does not require checkpoints taken by the capture process;
wherein said method is performed by one or more computing devices.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for replicating data between database systems without taking checkpoints are provided. In an embodiment, a capture process restarts. Upon restarting, the capture process reestablishes an association with an apply process. A particular logical time maintained by the apply process is then communicated to the capture process. Upon receiving the particular logical time, the capture process restarts mining from this particular logical time.
-
Citations
20 Claims
-
1. A method comprising:
-
on a source node, a capture process mining one or more transaction logs to generate logical change records at said source node; said capture process transmitting said logical change records to an apply process running on a destination node for said apply process to apply the logical change records at said destination node; wherein each logical change record of said logical change records is associated with a source logical time; wherein said apply process of said destination node maintains a particular source logical time representing a bounded safe time point in the one or more transaction logs to begin mining on said source node with respect to said apply process, wherein said particular source logical time is based on logical change records received by said apply process at said destination node; on said source node, a restarted capture process reestablishing an association with said apply process of said destination node; said source node receiving, from said destination node, the particular source logical time; in a checkpoint-free mode, said restarted capture process restarting mining of the one or more transaction logs based on said particular source logical time received from said destination node; wherein said restarting mining in the checkpoint-free mode does not require checkpoints taken by the capture process; wherein said method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory machine-readable storage medium carrying one or more sequences of instructions which, when executed by one or more processors, causes the one or more processors to perform:
-
on a source node, a capture process mining one or more transaction logs to generate logical change records at said source node; said capture process transmitting said logical change records to an apply process running on a destination node for said apply process to apply the logical change records at said destination node; wherein each logical change record of said logical change records is associated with a source logical time; wherein said apply process of said destination node maintains a particular source logical time representing a bounded safe time point in the one or more transaction logs to begin mining on said source node with respect to said apply process, wherein said particular source logical time is based on logical change records received by said apply process at said destination node; on said source node, a restarted capture process reestablishing an association with said apply process of said destination node; said source node receiving, from said destination node, the particular source logical time; in a checkpoint-free mode, said restarted capture process restarting mining of the one or more transaction logs based on said particular source logical time received from said destination node wherein said restarting mining in the checkpoint-free mode does not require checkpoints taken by the capture process. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification