Partner Certification & Solutions Catalog


eXtremeDB Transaction Logging v 8.0

eXtremeDB Transaction Logging provides recovery capabilities for McObject's in-memory embedded database in the event of device or system failure. When transaction logging is active and enabled, all updates to the data objects are logged to a set of files on disk, or on a network device. If the memory content is damaged or destroyed, the exact state of the database is restored by an automatic roll forward procedure.
With the eXtremeDB embedded database version 2.3, McObject increases the options for persistence with the introduction of transaction logging - a process that journals changes made to a database (by transactions), as they are made. With transaction logging enabled, the eXtremeDB runtime captures database changes and writes them to a file known as a transaction log. In the event of a hardware or software failure, the eXtremeDB runtime can recover the database using the log. Logging is performed through periodic checkpoints, where the image of the in-memory database is saved to persistent storage, and all intermediate changes to the database are written to the log files. In this way, the RAM database is made persistent.

Transaction logging does not alter the all-in-memory architecture of eXtremeDB, which retains a performance advantage over disk-based databases. Read performance is unaffected by transaction logging and write performance will far exceed write performance of traditional disk-based databases.

The reason is simple: eXtremeDB transaction logging requires exactly one write to the file system for one database transaction. A disk-based database, however, will perform many writes per transaction (data pages, index pages, transaction log, etc) and the larger the transaction and the more indexes that are modified, the more writes that are necessary.

To minimize the performance impact, eXtremeDB equips developers with all the controls they need to tune their applications with persistence and performance in mind. Many eXtremeDB transaction logging features are parameterized so that programmers can invoke the features most appropriate for their application scenario. For example, transaction logging may be turned on or off at runtime and, when turned on, logging may be set to different levels of transaction durability, allowing system designers to make intelligent trade offs between performance and risk for unrecoverable transactions.
  • Category Data Management & Analysis
  • Highlights
  • Platform SLES 15
  • Hardware Architecture x86-64
  • Certification SUSE "Ready" Verified
  • Platform SLES 15
  • Hardware Architecture System z
  • Certification SUSE "Ready" Verified
  • Platform SLES 15
  • Hardware Architecture Power
  • Certification SUSE "Ready" Verified
  • Platform SLES 15
  • Hardware Architecture ARM
  • Certification SUSE "Ready" Verified
  • Platform SLES 12
  • Hardware Architecture x86
  • Certification SUSE "Ready" Verified
  • Platform SLES 12
  • Hardware Architecture x86-64
  • Certification SUSE "Ready" Verified
  • Platform SLES 12
  • Hardware Architecture System z
  • Certification SUSE "Ready" Verified
  • Platform SLES 12
  • Hardware Architecture Power
  • Certification SUSE "Ready" Verified
  • Platform SLES 12
  • Hardware Architecture ARM
  • Certification SUSE "Ready" Verified

Other Versions

eXtremeDB Transaction Logging Unversioned

  • Platform SLES 12
  • Hardware Architecture x86, x86-64, System z, Power, ARM
  • Certification SUSE "Ready" Verified
  • Highlights