In Search of a Key Value Store with High Performance and High Availability

04/17/2019
by   Huaibing Jian, et al.
0

In recent year, the write-heavy applications is more and more prevalent. How to efficiently handle this sort of workload is one of intensive research direction in the field of database system. The overhead caused by write operation is mainly issued by two reasons: 1) the hardware level, i.e., the IO cost caused by logging. We can't remove this cost in short period 2) the dual-copy software architecture and serial replay. The born of log as database architecture is originated to overcome the software defect. But existing systems treating log as database either are built on top of special infrastructure such as infiniband or NVRam (Non-Volatile Random access memory) which is far from widely available or are constructed with the help of other system such as Dynamo which is lack of flexibility. In this paper we build only write-once key-value system called LogStore from scratch to support our instant messenger business. The key features of LogStore include: 1) a single thread per partition executing mode, which eliminates the concurrency overhead; 2) log as database to enable write-once feature and freshness on the standby. We achieve high availability by embedding replication protocol other than dependent on other infrastructure; 3) fine-grained and low overhead data buffer pool management to effectively minimize IO cost. According to our empirical evaluations LogStore has good performance in write operation, recovery and replication

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/20/2022

Replicating Persistent Memory Key-Value Stores with Efficient RDMA Abstraction

Combining persistent memory (PM) with RDMA is a promising approach to pe...
research
11/19/2017

Cyclone: High Availability for Persistent Key Value Stores

Persistent key value stores are an important component of many distribut...
research
06/28/2022

Manu: A Cloud Native Vector Database Management System

With the development of learning-based embedding models, embedding vecto...
research
10/19/2021

Using RDMA for Efficient Index Replication in LSM Key-Value Stores

Log-Structured Merge tree (LSM tree) Key-Value (KV) stores have become a...
research
12/14/2019

Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems

Despite the deployment of preventive security mechanisms to protect the ...
research
03/16/2020

Hihooi: A Database Replication Middleware for Scaling Transactional Databases Consistently

With the advent of the Internet and Internet-connected devices, modern b...
research
06/09/2023

CAWL: A Cache-aware Write Performance Model of Linux Systems

The performance of data intensive applications is often dominated by the...

Please sign up or login with your details

Forgot password? Click here to reset