Checkpoints Checkpoints The second component of the infrastructure is performing checkpoints of the log files. Performing checkpoints is necessary for two reasons. First, you ...
Dbstl miscellaneous notes Special notes about trivial methods Using correct container and iterator public types Dbstl miscellaneous notes Special notes about trivial method...
Locking without transactions Locking without transactions If an application runs with locking specified, but not transactions (for example, DB_ENV->open() is callsed with DB_I...
Cursor stability Cursor stability In the absence of locking, no guarantees are made about the stability of cursors in different threads of control. However, the Btree, Queue an...
Creating a database environment Creating a database environment The Berkeley DB environment is created and described by the db_env_create() and DB_ENV->open() interfaces. In ...
Synchronizing with a master Delaying client synchronization Client-to-client synchronization Blocked client operations Clients too far out-of-date to synchronize Synchroniz...
Performance Event Monitoring Using the DTrace Provider Using SystemTap Example Scripts Performance Events Reference Performance Event Monitoring The Performance Event Monit...
Locking granularity Locking granularity With the exception of the Queue access method, the Berkeley DB access methods do page-level locking. The size of pages in a database may...
Transaction FAQ Transaction FAQ What should a transactional program do when an error occurs? Any time an error occurs, such that a transactionally protected set of operation...