Determining integrity of database workload transactions
Abstract:
Evaluating integrity of database workloads includes receiving transactional database lock commands from concurrent users and identifying a usage pattern of lock actions when results of an execution of the transactional database lock commands match a usage pattern for a data integrity rule. The data integrity rule is added to a set of one or more data integrity rules for the transactional database lock commands. The transactional database lock commands and the set of one or more data integrity rules are forwarded from a primary database server to a duplicate database server that is equivalent to the primary database server and configured to execute the transactional database lock commands while applying the one or more data integrity rules. Anomalies indicating a data integrity problem may be detected based on a comparison of the results of the executions at the primary database server and the duplicate database server.
Public/Granted literature
Information query
Patent Agency Ranking
0/0