1 / 29

Crash Recovery

Crash Recovery. Chapter 18. Review: The ACID properties. A tomicity: All actions of the Xact happen, or none happen. C onsistency: If each Xact is consistent, and the DB starts consistent, it ends up consistent. I solation: Execution of one Xact is isolated from that of other Xacts.

iden
Télécharger la présentation

Crash Recovery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Crash Recovery Chapter 18

  2. Review: The ACID properties • Atomicity: All actions of the Xact happen, or none happen. • Consistency: If each Xact is consistent, and the DB starts consistent, it ends up consistent. • Isolation: Execution of one Xact is isolated from that of other Xacts. • Durability: If a Xact commits, its effects persist. • The Recovery Manager guarantees Atomicity & Durability.

  3. Failure and Recovery • Failure and consistency • Transaction failures • System failures • Media failures • Principle of recovery • Redundancy • Database can be protected by ensuring that its correct state can be reconstructed from information stored redundantly in the system • Recovering database – restart operation • Bringing the stable DB to a consistent state by removing effects of uncommitted transactions and applying missing effects of committed transactions.

  4. Recovery and Restart • Types of storage media • Volatile storage: fast , but not surviving system failures • Non-volatile storage • Stable storage: information never lost (practically) • Recovery • Ideally, stable DB should contain, for each data item, the last value written by committed transaction • Practically, stable DB may contain values written by uncommitted transactions, or may not contain the last committed values. • Why? • Updating of uncommitted T • Buffering of committed values in the cache

  5. Function of Recovery Manager • Atomicity: • Transactions may abort (“Rollback”). • Durability: • What if DBMS stops running? (Causes?) • Desired Behavior after system restarts: • T1, T2 & T3 should be durable. • T4 & T5should be aborted (effects not seen). crash! T1 T2 T3 T4 T5

  6. Recovery Management • Design rules for recovery manager • Undo rule: committed values must be saved before overwritten by uncommitted values in the stable DB • Redo rule: before commit, new values it wrote must be in the stable storage (DB or log) • Restart activity • Preparation: during normal operation • Actual recovery: after failure • Preparation • Logging • Checkpointing

  7. Cache Manager • Two operations: fetch and flush • Use dirty bit for deciding flushing operation • Flush: if the slot in cache is not dirty, do nothing; otherwise, copy the value into stable storage • Fetch: select a slot, using replacement algorithm if full (and flush if necessary), copy the value into slot, reset dirty bit, update cache directory • When to flush? • Depends on recovery strategy of the system • Different recovery algorithms use different strategies • Idempotence of restart • Any sequence of incomplete execution, followed by a complete execution of restart has the same effect of just one complete execution

  8. Doctors  Quotes from medical records as dictated by physicians: 1. The patient has been depressed ever since she began seeing me in 1983. 2. The patient refused an autopsy. 3. The patient has no past history of suicides. 4. The patient's past medical history has been remarkably insignificant with only a 40 lb weight gain in the last 3 days. 5. She slipped on the ice and apparently her legs went in different directions in early December. 6. The patient had waffles for breakfast and anorexia for lunch. 7. She is numb from her toes down. 8. While in the ER, she was examined, x-rated and sent home. 9. Occasional, constant, infrequent headaches. 10. Coming from Detroit, this man has no children.

  9. Handling the Memory Pool • Write to disk: force/no-force • Cache page: steal/no-steal • Force every write to disk? • Poor response time. • But provides durability. • Steal buffer-pool frames from uncommited Xacts? • If not, poor throughput. • If so, how can we ensure atomicity? No Steal Steal Force Trivial Desired No Force

  10. More on Steal and Force • STEAL (why enforcing Atomicity is hard) • To steal frame F:Current page in F (say P) is written to disk; some Xact holds lock on P. • What if the Xact with the lock on P aborts? • Must remember the old value of P at steal time (to support UNDOing the write to page P). • NO FORCE(why enforcing Durability is hard) • What if system crashes before a modified page is written to disk? • Write as little as possible, in a convenient place, at commit time, to support REDOing modifications.

  11. Recovery Algorithms • Undo/redo algorithm • Most complicated of the four recovery algorithms • Flexible in deciding when to flush (no-force) • Maximize efficiency during normal operation at the expense of less efficient recovery • Comparison with other recovery algorithms • Issues: disk I/O, log space, recovery time • No-redo requires more frequent flush (force) • Uncommitted transaction is allowed to replace dirty slot for in-place update – undo might be necessary • Restart procedure • Process log forward and backward for redo and undo

  12. Undo/Redo Recovery • A transaction T writes vale V to data object X. What will happen? • System fetches X if it is not already in cache • Record V in the log and in X’s slot C • No need for the cache manager to flush C • If cache manager replaces C (steal), and either T aborts or system fails before T commits, undo is required • If T commits and system fails before C is flushed (no force), redo is required

  13. Restart Procedure for Undo/Redo Recovery • Discard all cache slots • Scan the log to analyze which transactions committed, aborted, or active, to determine data for redo/undo • Redo all actions that were committed but not recorded in the stable DB • Undo all actions of transactions that were aborted or active at the time of failure

  14. Undo/No-redo Recovery • It records all the updates of a transaction in the stable DB before commit • Before adding T to the commit list, flush each data updated by T in the cache • Commit procedure • Flush all updated by T • Add T to the commit list • Acknowledge commitment of T • Delete T from active list • Log records for update after images not necessary • Increase response time for increased I/O workload

  15. Break Time • OFFICE ARITHMETIC • Smart boss + smart employee = profit • Smart boss + dumb employee = production • Dumb boss + smart employee = promotion • Dumb boss + dumb employee = overtime • SHOPPING MATH • A man will pay $2 for a $1 item he needs. • A woman will pay $1 for a $2 item that she doesn't need.

  16. Key Idea: Logging • Record REDO and UNDO information, for every update, in a log. • Sequential writes to log (put it on a separate disk). • Minimal info written to log, so multiple updates fit in a single log page. • Log: An ordered list of REDO/UNDO actions • Log record contains: <XID, pageID, offset, length, old data, new data> • and additional control info (which we’ll see soon).

  17. Write-Ahead Logging (WAL) • The Write-Ahead Logging Protocol: • Must force the log record for an update before the corresponding data page gets to disk. • Must write all log records for a Xact beforecommit. • #1 guarantees Atomicity. How? • #2 guarantees Durability. How? • Exactly how is logging and recovery done? • Example: ARIES algorithms.

  18. Crash Recovery: Big Picture Oldest log rec. of Xact active at crash • Start from a checkpoint (found via master record). • Three phases. Need to: • Figure out which Xacts committed since checkpoint, which failed (Analysis). • REDOall actions. • (repeat history) • UNDO effects of failed Xacts. Smallest recLSN in dirty page table after Analysis Last chkpt CRASH A R U

  19. DB RAM LSNs pageLSNs flushedLSN pageLSN ARIES • Each log record has a unique Log Sequence Number (LSN). • LSNs always increasing. • Each data pagecontains a pageLSN. • The LSN of the most recent log record for an update to that page. • System keeps track of flushedLSN. • The max LSN flushed so far. • WAL:Before a page is written, • pageLSN £ flushedLSN Log records flushed to disk “Log tail” in RAM

  20. prevLSN XID type pageID length offset before-image after-image Log Records LogRecord fields: Possible log record types: • Update • Commit • Abort • End (signifies end of commit or abort) • Compensation Log Records (CLRs) • for UNDO actions update records only

  21. Other Log-Related State • Transaction Table: • One entry per active Xact. • Contains XID, status (running/commited/aborted), and lastLSN. • Dirty Page Table: • One entry per dirty page in buffer pool. • Contains recLSN -- the LSN of the log record which firstcaused the page to be dirty.

  22. Normal Execution of an Xact • Series of reads & writes, followed by commit or abort. • We will assume that write is atomic on disk. • In practice, additional details to deal with non-atomic writes. • Strict 2PL. • STEAL, NO-FORCE buffer management, with Write-Ahead Logging.

  23. Checkpointing • Periodically, the DBMS creates a checkpoint, in order to minimize the time taken to recover in the event of a system crash. Write to log: • begin_checkpointrecord: Indicates when chkpt began. • end_checkpoint record: Contains current Xact table and dirty page table. This is a `fuzzy checkpoint’: • Other Xacts continue to run; so these tables accurate only as of the time of the begin_checkpoint record. • No attempt to force dirty pages to disk; effectiveness of checkpoint limited by oldest unwritten change to a dirty page. (So it’s a good idea to periodically flush dirty pages to disk!) • Store LSN of chkpt record in a safe place (master record).

  24. Now I know why Prof. X gets good evaluations…

  25. Summary of Logging/Recovery • Recovery Manager guarantees Atomicity & Durability. • Use WAL to allow STEAL/NO-FORCE w/o sacrificing correctness. • LSNs identify log records; linked into backwards chains per transaction (via prevLSN). • pageLSN allows comparison of data page and log records.

  26. Summary, Cont. • Checkpointing: A quick way to limit the amount of log to scan on recovery. • Recovery works in 3 phases: • Analysis: Forward from checkpoint. • Redo: Forward from oldest recLSN. • Undo: Backward from end to first LSN of oldest Xact alive at crash. • Upon Undo, write CLRs. • Redo “repeats history”: Simplifies the logic!

More Related