-
公开(公告)号:US12282470B2
公开(公告)日:2025-04-22
申请号:US17938083
申请日:2022-10-05
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland , James E. Mace
IPC: G06F16/22
Abstract: Techniques are disclosed relating to backing up skip list data structures to facilitate a subsequent recovery. In various embodiments, a computing system creates a checkpoint of a skip list including a plurality of key-value records that include pointers to others of the plurality of key-value records. Creating the checkpoint includes scanning the skip list to identify ones of the plurality of key-value records that are relevant to the checkpoint and storing the identified key-value records in a storage such that the identified key-value records include pointers modified to exclude ones of the plurality of key-value records that are not relevant to the checkpoint. The computing system can then recover the skip list based on the created checkpoint.
-
公开(公告)号:US20250061133A1
公开(公告)日:2025-02-20
申请号:US18940347
申请日:2024-11-07
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland , David Edward DeHaan
IPC: G06F16/28 , G06F16/22 , G06F16/2457
Abstract: Techniques are disclosed pertaining to layered filtering. A computer system may store records in a hierarchy of levels. The computer system may receive a request to perform a key range search to locate records that fall within a key range and satisfy selection criteria. The computer system may perform the key range search. As part of processing a particular level, the computer system may receive a first set of records associated with another level and select a second set of records from the particular level that fall within the key range and satisfy the selection criteria. The computer system may merge the first and second sets of records into a third set of records, which may include not inserting, into the third set, any record of the first set of records for which there is a newer version in the particular level that does not satisfy the selection criteria.
-
公开(公告)号:US20240193186A1
公开(公告)日:2024-06-13
申请号:US18064112
申请日:2022-12-09
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland , David Edward DeHaan
IPC: G06F16/28 , G06F16/22 , G06F16/2457
CPC classification number: G06F16/282 , G06F16/2246 , G06F16/24573
Abstract: Techniques are disclosed pertaining to layered filtering. A computer system may store records in a hierarchy of levels. The computer system may receive a request to perform a key range search to locate records that fall within a key range and satisfy selection criteria. The computer system may perform the key range search. As part of processing a particular level, the computer system may receive a first set of records associated with another level and select a second set of records from the particular level that fall within the key range and satisfy the selection criteria. The computer system may merge the first and second sets of records into a third set of records, which may include not inserting, into the third set, any record of the first set of records for which there is a newer version in the particular level that does not satisfy the selection criteria.
-
公开(公告)号:US20230244649A1
公开(公告)日:2023-08-03
申请号:US17938083
申请日:2022-10-05
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland , James E. Mace
IPC: G06F16/22
CPC classification number: G06F16/2255 , G06F16/2272
Abstract: Techniques are disclosed relating to backing up skip list data structures to facilitate a subsequent recovery. In various embodiments, a computing system creates a checkpoint of a skip list including a plurality of key-value records that include pointers to others of the plurality of key-value records. Creating the checkpoint includes scanning the skip list to identify ones of the plurality of key-value records that are relevant to the checkpoint and storing the identified key-value records in a storage such that the identified key-value records include pointers modified to exclude ones of the plurality of key-value records that are not relevant to the checkpoint. The computing system can then recover the skip list based on the created checkpoint.
-
公开(公告)号:US20250036654A1
公开(公告)日:2025-01-30
申请号:US18779287
申请日:2024-07-22
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland
IPC: G06F16/27 , G06F16/22 , G06F16/23 , G06F16/2455
Abstract: Techniques are disclosed relating to a database system. The database system includes multiple coordinator nodes storing replicas of a partition. Each partition describes the state of locks and transactions for keys covered by that partition of keys. Each partition is, in turn, replicated. The multiple coordinator nodes receive, from multiple worker nodes, requests to grant a lock for a key to permit a worker node to write a record for the key as part of executing a transaction. A given coordinator node of the multiple coordinator nodes sends an approval response for the lock to at most one of the worker nodes. A single worker node acquires the lock in response to receiving approval responses from a majority of the multiple coordinator nodes, and none of the multiple worker nodes acquire the lock in response to none of them receiving approval responses from a majority of the multiple coordinator nodes.
-
公开(公告)号:US12153603B2
公开(公告)日:2024-11-26
申请号:US18064112
申请日:2022-12-09
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland , David Edward DeHaan
IPC: G06F16/00 , G06F16/22 , G06F16/2457 , G06F16/28
Abstract: Techniques are disclosed pertaining to layered filtering. A computer system may store records in a hierarchy of levels. The computer system may receive a request to perform a key range search to locate records that fall within a key range and satisfy selection criteria. The computer system may perform the key range search. As part of processing a particular level, the computer system may receive a first set of records associated with another level and select a second set of records from the particular level that fall within the key range and satisfy the selection criteria. The computer system may merge the first and second sets of records into a third set of records, which may include not inserting, into the third set, any record of the first set of records for which there is a newer version in the particular level that does not satisfy the selection criteria.
-
公开(公告)号:US20240111746A1
公开(公告)日:2024-04-04
申请号:US18535805
申请日:2023-12-11
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland
CPC classification number: G06F16/2246 , G06F16/2379 , G06F16/284 , G06F16/289 , G06F21/6227 , G06F2221/2145
Abstract: Techniques are disclosed relating to the distribution of database key permissions. A database system may distribute first permission information to a plurality of database nodes that identifies a distribution of key range permissions to ones of the plurality of database nodes. A given key range permission being distributed to a given database node may permit that database node to write records whose keys fall within a key range associated with the given key range permission. The database system may receive, from a first database node, a request for a first key range permission provisioned to a second database node. The database system may modify the first permission information to derive second permission information that provisions the first key range permission to the first database node instead of the second database node. The database system may distribute the second permission information to ones of the plurality of database nodes.
-
公开(公告)号:US20230237035A1
公开(公告)日:2023-07-27
申请号:US17938078
申请日:2022-10-05
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland , James E. Mace
IPC: G06F16/22
CPC classification number: G06F16/2272 , G06F16/2255
Abstract: Techniques are disclosed relating to efficiently managing skip list data structures. In various embodiments, a computing system stores a skip list including a plurality of key-value records that include one or more pointers to others of the plurality of key-value records. The computing system scans the skip list for a location associated with a particular key. The scanning includes using a prefix of the particular key to identify a particular portion of the skip list, where the particular portion includes key-value records having keys with the same prefix. The scanning also further includes initiating a scan for the location within the identified portion. In some embodiments, the computing system inserts a key-value record into the skip list at the location associated with the particular key in response to the scan identifying the location.
-
公开(公告)号:US12164494B2
公开(公告)日:2024-12-10
申请号:US18535805
申请日:2023-12-11
Applicant: Salesforce, Inc.
Inventor: Patrick James Helland
Abstract: Techniques are disclosed relating to the distribution of database key permissions. A database system may distribute first permission information to a plurality of database nodes that identifies a distribution of key range permissions to ones of the plurality of database nodes. A given key range permission being distributed to a given database node may permit that database node to write records whose keys fall within a key range associated with the given key range permission. The database system may receive, from a first database node, a request for a first key range permission provisioned to a second database node. The database system may modify the first permission information to derive second permission information that provisions the first key range permission to the first database node instead of the second database node. The database system may distribute the second permission information to ones of the plurality of database nodes.
-
-
-
-
-
-
-
-