-
公开(公告)号:US11188555B2
公开(公告)日:2021-11-30
申请号:US16157015
申请日:2018-10-10
Applicant: Oracle International Corporation
Inventor: Santosh Shilimkar , Nagarajan Muthukrishnan , Ravi Thammaiah , Sumanta Chatterjee , Binoy Sukumaran
Abstract: Techniques are described herein for isolating a network stack in a multitenant container DBMS. A first and second pluggable database are established within a container database. A first network stack is assigned to the first pluggable database and a second network stack is assigned to the second pluggable database. A request is received to connect to the first pluggable database and a connection is established to the first pluggable database using the first network stack. A request is received to connect to the second pluggable database and a connection is established to the second pluggable database using the second network stack.
-
公开(公告)号:US12007941B2
公开(公告)日:2024-06-11
申请号:US16147314
申请日:2018-09-28
Applicant: Oracle International Corporation
Inventor: Kevin S. Neel , Carol L. Colrain , Tong Zhou , Arturo Ismael Quinto , Jonathan Giloni , Douglas Surber , Ravi Thammaiah
IPC: G06F16/14 , G06F11/20 , G06F16/11 , G06F16/21 , G06F16/25 , H04L67/141 , H04L67/142
CPC classification number: G06F16/122 , G06F11/2023 , G06F16/21 , G06F16/252 , H04L67/141 , H04L67/142 , G06F2201/80
Abstract: Techniques are disclosed herein for identifying, recording and restoring the state of a database session and various aspects thereof. A session template data structure is generated that includes session attribute values describing various aspects of the session that is established between a client system and a database management system (DBMS and enables the client system to issue to the DBMS commands for execution. Based on the session attribute values, DBMS may generate a template identifier corresponding to the session template data structure. The template identifier may be stored in an association with the session state that it partially (or in whole) represents. In an embodiment, when another state of a session is captured, if the template identifier for the state is the same, then rather than storing the attribute-value pairs for the other state, the template identifier is further associated with the other state. In an embodiment, a request boundary is detected where the session is known to be at a recoverable point. If recovery of the session is needed, the session state is restored, and replay of commands start from this point. Each command replayed is verified to produce the same session state as it produced by the original execution. If the session is determined to be a safe point, then all the commands recorded for replay prior to the safe point may be deleted. In an embodiment, the template is used to set the initial state when borrowing from a session pool. The state tracking is also used to identify that the session can be failed over safely during planned operation as the session is unlikely to drain by itself even when not used.
-
公开(公告)号:US10942945B2
公开(公告)日:2021-03-09
申请号:US16165996
申请日:2018-10-19
Applicant: Oracle International Corporation
Inventor: Santosh Shilimkar , Nagarajan Muthukrishnan , Ravi Thammaiah , Sumanta Chatterjee , Binoy Sukumaran
Abstract: Techniques are described herein for isolating runtime environments in a multitenant container DBMS. A CDB may contain a database dictionary that defines a plurality of pluggable databases and a respective database nest for each pluggable database. Each respective database nest of said each pluggable database is associated with different operating system privileges. When database sessions are established on a container DBMS, each database session is given access to a pluggable database by attaching the respective database nest of the pluggable database to each database session.
-
公开(公告)号:US11113110B2
公开(公告)日:2021-09-07
申请号:US16166035
申请日:2018-10-19
Applicant: Oracle International Corporation
Inventor: Ravi Thammaiah , Santosh Shilimkar , Nagarajan Muthukrishnan , Vijayendra Lakkundi
Abstract: Techniques are described herein for intelligent pooling and management of isolated hierarchical runtimes in a multi-tenant environment. In an embodiment, an allocation of operating system resources of a container database management system (CDBMS) is allocated to each generic nest of a pool of generic nests. The allocation includes a quota of one or more processors and a quota of memory. A configuration profile for a PDB in the CDBMS is then determined. Based on the configuration profile determined for the PDB, a matching generic nest from the pool of generic nests is determined. A matching generic nest is assigned to the PDB. The matching generic nest is then configured for the PDB.
-
公开(公告)号:US11556500B2
公开(公告)日:2023-01-17
申请号:US16147367
申请日:2018-09-28
Applicant: Oracle International Corporation
Inventor: Jonathan Giloni , Kevin S. Neel , Carol L. Colrain , Douglas Surber , Ravi Thammaiah , Tong Zhou , Arturo Ismael Quinto , Manoj Dhanapal
IPC: G06F16/00 , G06F16/11 , H04L67/141 , H04L67/142 , G06F16/21 , G06F16/25 , G06F11/20
Abstract: Techniques are disclosed herein for identifying, recording and restoring the state of a database session and various aspects thereof. A session template data structure is generated that includes session attribute values describing various aspects of the session that is established between a client system and a database management system (DBMS and enables the client system to issue to the DBMS commands for execution. Based on the session attribute values, DBMS may generate a template identifier corresponding to the session template data structure. The template identifier may be stored in an association with the session state that it partially (or in whole) represents. In an embodiment, when another state of a session is captured, if the template identifier for the state is the same, then rather than storing the attribute-value pairs for the other state, the template identifier is further associated with the other state. In an embodiment, a request boundary is detected where the session is known to be at a recoverable point. If recovery of the session is needed, the session state is restored, and replay of commands start from this point. Each command replayed is verified to produce the same session state as it produced at original execution. If the session is determined to be a safe point, then all the commands recorded for replay prior to the safe point may be deleted.
In an embodiment, the template is used to set the initial state when borrowing from a session pool The state tracking is also used to know that the session can be failed over safely during planned operation as the session is unlikely to drain by itself even when not used.-
公开(公告)号:US10241856B2
公开(公告)日:2019-03-26
申请号:US15261688
申请日:2016-09-09
Applicant: Oracle International Corporation
Inventor: Jonathan Giloni , William Habeck , Raunak Rungta , Ravi Thammaiah
Abstract: A method for memory quarantine comprises: in response to a memory error, determining an extent associated with the memory error, wherein the extent defines an amount of memory comprising a plurality of chunks; traversing, forward from a beginning chunk of the plurality chunks, the plurality of chunks until a first chunk is determined to be corrupt; traversing, in reverse from a last chunk of the plurality of chunks, the plurality of chunks until a second chunk is determine to be corrupt; flagging a subset of the plurality of chunks as quarantined, wherein the subset begins with the first chunk and ends with the second chunk, and wherein quarantine prevents the subset from being reallocated after being released.
-
公开(公告)号:US20180074885A1
公开(公告)日:2018-03-15
申请号:US15261688
申请日:2016-09-09
Applicant: Oracle International Corporation
Inventor: Jonathan Giloni , William Habeck , Raunak Rungta , Ravi Thammaiah
CPC classification number: G06F11/0793 , G06F3/0619 , G06F3/064 , G06F3/0673 , G06F11/073 , G06F11/0751 , G06F11/079 , G06F12/00
Abstract: A method for memory quarantine comprises: in response to a memory error, determining an extent associated with the memory error, wherein the extent defines an amount of memory comprising a plurality of chunks; traversing, forward from a beginning chunk of the plurality chunks, the plurality of chunks until a first chunk is determined to be corrupt; traversing, in reverse from a last chunk of the plurality of chunks, the plurality of chunks until a second chunk is determine to be corrupt; flagging a subset of the plurality of chunks as quarantined, wherein the subset begins with the first chunk and ends with the second chunk, and wherein quarantine prevents the subset from being reallocated after being released.
-
-
-
-
-
-