Using message-passing with procedural code in a database kernel

ABSTRACT

Each of a plurality of database objects can be assigned to a specific message-passing worker of a plurality of message-passing workers, each executing on a first logical core that shares with at least a second logical core one or more resources of a physical processor core of a plurality of physical processor cores. The second logical core can execute a job worker of a plurality of job workers that implement procedural code. Exclusive write access can be provided to a database object of the plurality of database objects via a message-passing worker of the plurality of message-passing workers while read-only access is provided to any database object of the plurality of database objects via any of the plurality of job workers. Operations can be executed by the message-passing worker in an order in which request messages are received in a message queue of the message-passing worker.

TECHNICAL FIELD

The subject matter described herein relates to computing and processing operations, for example computing and processing operations relating to database management frameworks.

BACKGROUND

Access to shared data structures, for example in a database management system, can generally be implemented either through locking or message-passing. In a locking approach, exclusive access to shared data is given to a thread that is currently acting on the data structure. Other threads needing access to that data structure are required to wait.

Many currently available software programs are written and optimized for execution on a single central processing unit (CPU) or perhaps more than one but relatively few CPU physical cores in a procedural approach that includes synchronization via locks and deep call stacks. Procedural programming approaches generally include use of procedures (e.g. routines, subroutines, methods, functions, etc.) containing a series of computational steps to be carried out as part of one or more operations to be performed on one or more data structures. Procedural programming can be considered as a list of operations for the CPU to perform in a linear order of execution, optionally with loops, branches, etc. Locks are a type of synchronization mechanism for enforcing limits on access to a resource in an environment where there are many threads of execution. A lock enforces a mutual exclusion concurrency control policy, for example to ensure that correct results for concurrent operations are generated as quickly as possible.

In contrast, approaches for heavily parallelized operation more typically employ message-passing, in which multiple CPU cores communicate over fast interconnect channels (e.g. in a same machine or between two or more discrete machines). In message-passing, a “requester” sends a message (which can, for example, include data structures, segments of code, raw data, or the like) to a designated message-passing worker, and the message-passing worker returns a message (which can, for example, include an operated-on data structure, segment of code, raw data, or the like). Processes can be synchronized in this manner, for example by requiring that a process wait for receipt of a message before proceeding. The code for processing a single message in a message-passing arrangement is generally lock-free and uses a very shallow stack. A lock-free algorithm (also referred to as a non-blocking algorithm) ensures that threads competing for a shared resource do not have their execution indefinitely postponed by mutual exclusion.

Generally speaking, a stack is a section of memory used for temporary storage of information. Message-passing approaches generally provide superior performance to procedural code, for example because data are properly partitioned and no additional synchronization besides message queues is generally required. Message-passing operations can be performed by a message-passing worker, which, as used herein, is intended to refer to a type of thread or other operator for performing a set of instructions that implement a message-passing approach.

SUMMARY

In one aspect, algorithms using message-passing and algorithms using procedural coding approaches can coexist in a single system or group of systems implementing features of a data management framework. In some examples, logical cores of the physical processor cores available within the system or group of systems can be divided between designation as message-passing workers or for execution of procedural code. Database objects can be assigned to one message-passing worker such that any operations to be performed on the database object are executed by the logical core designated to the message-passing worker to which the database object is assigned.

In another aspect, exclusive write access to a database object of a plurality of database objects is provided via a message-passing worker of a plurality of message-passing workers to which the database object is assigned. Read-only access is provided to any database object of the plurality of database objects via any of a plurality of job workers that implement procedural code. Operations can be executed by the message-passing worker in an order in which request messages are received in a message queue of the message-passing worker.

Implementations of the current subject matter can include, but are not limited to, methods consistent with the descriptions provided herein as well as articles that comprise a tangibly embodied machine-readable medium operable to cause one or more machines (e.g., computers, etc.) to result in operations implementing one or more of the described features. Similarly, computer systems are also described that may include one or more processors and one or more memories coupled to the one or more processors. A memory, which can include a computer-readable storage medium, may include, encode, store, or the like one or more programs that cause one or more processors to perform one or more of the operations described herein. Computer implemented methods consistent with one or more implementations of the current subject matter can be implemented by one or more data processors residing in a single computing system or multiple computing systems. Such multiple computing systems can be connected and can exchange data and/or commands or other instructions or the like via one or more connections, including but not limited to a connection over a network (e.g. the Internet, a wireless wide area network, a local area network, a wide area network, a wired network, or the like), via a direct connection between one or more of the multiple computing systems, etc.

The details of one or more variations of the subject matter described herein are set forth in the accompanying drawings and the description below. Other features and advantages of the subject matter described herein will be apparent from the description and drawings, and from the claims. While certain features of the currently disclosed subject matter are described for illustrative purposes in relation to an enterprise resource software system or other business software solution or architecture, it should be readily understood that such features are not intended to be limiting. The claims that follow this disclosure are intended to define the scope of the protected subject matter.

DESCRIPTION OF DRAWINGS

The accompanying drawings, which are incorporated in and constitute a part of this specification, show certain aspects of the subject matter disclosed herein and, together with the description, help explain some of the principles associated with the disclosed implementations. In the drawings,

FIG. 1 shows a diagram illustrating features of a database management system architecture consistent with at least some implementations of the current subject matter;

FIG. 2 shows a process flow chart illustrating features of a method consistent with implementations of the current subject matter;

FIG. 3 shows a diagram illustrating an example of handling of operations by message-passing workers and procedural code job consistent with at least some implementations of the current subject matter;

FIG. 4 shows a process flow chart illustrating features of a method consistent with implementations of the current subject matter;

FIG. 5 shows a chart illustrating a comparison of processor performance using mutual exclusion and message-passing approaches based on number of operations performed and processor cycle consumption; and

FIG. 6 shows a chart illustrating a comparison of processor performance using mutual exclusion and message-passing approaches based on a number of operations performed per physical processor core.

When practical, similar reference numbers denote similar structures, features, or elements.

DETAILED DESCRIPTION

Use of message-passing for at least for some operation types in data processing applications can be desirable. Use of message-passing for all operations in a complicated database management framework may not be immediately possible, in particular in cases whether a large amount of legacy code would need to be rewritten to implant such an approach. However, proper resource distribution can be a non-trivial concern in systems or groups of interconnected systems in which both procedural coding approaches and message-passing approaches are used. For example, assigning or reserving one or more physical processor cores for use in implementing a message-passing worker can require that those physical processor cores be made unavailable for other processing tasks. Accordingly, performance of procedural code, in particular parallelized procedural code executing concurrently, can be negatively affected.

Implementations of the current subject matter describe techniques, methods, systems, articles or manufacture, and the like that can allow procedural approaches and message-passing approaches to coexist on modern computing architectures while maintaining satisfactory resource distribution. For example, some modern computer processors (e.g. central processing units or the like) are capable of simultaneous multi-threading (SMT) operations, which is also referred to as hyper-threading. Using SMT, for each available physical processor core, the operating system addresses two or more virtual or logical cores, and shares the workload between them when possible. Two or more threads being executed by the two or more virtual or logical cores sharing the physical processor core's resources, but each of the virtual or logical cores has its own registers. Registers are not a part of a stack, but rather an internal state of the CPU. A program uses the stack to store spilled-out CPU registers if there are not sufficient registers available and to store registers of the caller routine.

Registers are used by the physical processor core when it runs a particular thread. When processing is switched between a first thread and s second thread (for example by a program, operating system, etc., the current values of a thread's register is saved into an area of system memory specific to the first thread. Values in any previously saved register for the second can be loaded prior to running of the second thread in a context switch. Simultaneous multi-threading can improve performance of a physical processor core in certain situations, for example by facilitating use of resources for other operations when a first thread is currently stalled or not making full use of the available resources of the physical processor core. An advantage provided by SMT is to decrease the number of dependent instructions on the pipeline, for example through use of superscalar architectures which enable multiple instructions to operate on separate data in parallel. The two or more logical cores can appear to an operating system or application as two or more processors, so the operating system or application can schedule two or more processes at once. In addition two or more processes can use the same resources. If one process fails then the resources can be readily re-allocated. In some examples, a performance improvement of as much as 10-30% relative to a comparable physical processor core not using SMT is generally achievable depending on the nature of the operations being performed by the physical processor core.

FIG. 1 shows a diagram 100 illustrating features of a computing system 102 that includes multiple physical processor cores 104A-C. While the computing system 102 is shown as a single, co-located system with multiple physical processor cores, distributed architectures or computing frameworks in which multiple systems each having one or more physical processor cores are linked or otherwise in communication are also within the scope of the current subject matter. The computing system 102 can be accessible by one or more client machines 108A-D, either via a direct connection, a local terminal, or over a network 110 (e.g. a local area network, a wide area network, a wireless network, the Internet, or the like).

A repository (e.g., a database such as a relational database) 112 accessed by or maintained within the computing system 102 can store any kind of data, potentially including but not limited to definitions of business scenarios, business processes, and one or more business configurations as well as transactional data, metadata, master data, etc. relating to instances or definitions of the business scenarios, business processes, and one or more business configurations, and/or concrete instances of data objects and/or business objects that are relevant to a specific instance of a business scenario or a business process, and the like. Tables of the database or ranges within tables can be assigned to different database partitions that are assigned to different hosts, for example data distribution and/or scalability reasons. Such a configuration can be used for large, on-premise or stand-alone systems with high performance requirements. Each physical processor core 104A-C can support two (or optionally more) logical cores 114A-F, which can share resources 116A-C of the physical core. As discussed above, the logical cores 114A-F of each physical processor core 104A-C can be divided between executing message-passing workers 118A-C and executing procedural algorithms 120A-C. The repository includes database objects 122A-G, which can include, but are not limited to tables, parts of tables, data objects, business objects, user interface objects, indexes, stored procedures, sequences, views, or other types of data structures for holding or reviewing data. Each database object 122A-G is assigned to a specific message-passing worker of the message-passing workers 118A-C supported on the various physical processor cores 104A-C of the computing system 102.

A repository (e.g., a database such as a relational database) 112 accessed by or maintained within the computing system 102 can store any kind of data, potentially including but not limited to definitions of business scenarios, business processes, and one or more business configurations as well as transactional data, metadata, master data, etc. relating to instances or definitions of the business scenarios, business processes, and one or more business configurations, and/or concrete instances of data objects and/or business objects that are relevant to a specific instance of a business scenario or a business process, and the like. Tables of the database or ranges within tables can be assigned to different database partitions that are assigned to different hosts, for example data distribution and/or scalability reasons. Such a configuration can be used for large, on-premise or stand-alone systems with high performance requirements. Each physical processor core 104 can support two (or optionally more) logical cores 114, which can share resources 116 of the physical core. As discussed above, the logical cores 114 of each physical processor core 104 can be divided between executing message-passing workers 118 and executing procedural algorithms 120. The repository includes database objects 122, which can include, but are not limited to tables, parts of tables, data objects, business objects, user interface objects, indexes, stored procedures, sequences, views, or other types of data structures for holding or reviewing data. Each database object 122 is assigned to a specific message-passing worker of the message-passing workers 118 supported on the various physical processor cores 104 of the computing system 102.

Consistent with a first aspect of the current subject matter, an example of which is illustrated in FIG. 1, a method as illustrated in the process flow chart 200 of FIG. 2 can include the use of physical processor cores capable of supporting simultaneous multi-threading, which is also referred to as hyper threading. At 202, a first logical core of a plurality of logical cores supported on each of a plurality of physical processor cores in a computing system is designated for execution of a message-passing worker of a plurality of message workers, and at 204, a second logical core of the plurality of logical cores supported on each of the plurality of physical processor cores is designated for execution of procedural code such that resources of a respective physical processor core supporting the first logical core and the second logical core are shared between the first logical core and the second logical core. At 206, a database object in a repository is assigned to one message-passing worker of the plurality of message-passing workers. At 210, an operation for execution on the database object is delivered to the one message-passing worker, while at 212 other, procedurally coded operations are processed using the second logical core on one or more of the plurality of physical processor cores. A plurality of database objects that includes the database object referenced at 206 can be assigned to the one message-passing worker, and each of the plurality of database objects can have its own register maintained by the message-passing worker to which the database object is assigned.

Approaches such as those described above can allow concurrent use in one database kernel of lock-based data operations as well as parallelized message-passing operations, and thereby improve the overall performance of a computing system implementing a database management system. Currently available approaches can support either lock-based or message-passing operations individually, but not in the same kernel. In some examples, table operations, which can generally be performed using a data manipulation language (DML), can be handled via message-passing workers. While significant improvements in parallel processing are possible with this approach, legacy database management systems with millions or more lines of procedural code are not readily converted. Implementations of the current subject matter can advantageously allow use of the more efficient parallel processing possible with message-passing while still supporting those parts of the code that are written procedurally. Procedural code can be heavily stream oriented. For example, data can be loaded from main memory so that a processing stream can be built from it. Such operations are typically less memory intensive, but do require significant processing resources. In contrast, DML operations can be more typically characterized as random access operations, for example in which access to discrete, separate parts of the memory are required (e.g., in writing a data dictionary). The efficiency of such operations can be largely drive by cache misses (e.g., if data needed for an operation are missing from the processor cache and therefore need to be loaded from main memory). However, DML operations may not require as much processor resources or bandwidth. Accordingly, sharing of the physical processor core resources between message-passing operations and procedural code execution as described herein can be advantageous.

In another aspect of the current subject matter, database objects can be mapped to message-passing workers for facilitating data access in a mixed-mode environment in which message-passing and mutual exclusion-based approaches (e.g. procedural coding) are used concurrently within a same database kernel.

As noted above, available logical cores in the computing system 102 (which can optionally include more than one discrete system) can be partitioned for use by message-passing workers and procedural code. Internal structures of a database object can be implemented as versioned objects, for example as described in co-pending U.S. application Ser. No. 13/770,901, filed Feb. 19, 2013 and entitled “Lock-free, Scalable Read Access to Shared Data Structures Using Garbage Collection,” the disclosure of which is incorporated by reference herein in its entirety.

Consistent with implementations of the current subject matter, each database object (such as a table, part of a table, one or more table columns, other data structures, or the like) is assigned to a specific message-passing worker. Advantageously, this assignment remains fixed for a significant part of the database object's existence. The assigning of a database object to a specific message-passing worker also binds that database object to a single physical processor core and thereby can allow less re-reading of cached data. In cases in which a database object is being frequently operated upon, the chances of the cached data being re-usable are increased when the same physical processor core handles all operations for a given database object.

Operations modifying the database object can be posted into the message queue of the message-passing worker to which the database object is assigned. The operations in the message queue can then be performed sequentially by the assigned message-passing worker. Operations reading the database object can be executed directly by procedural code. Data consistency can be ensured using versioned objects and multi-version concurrency control (MVCC) to filter rows visible to a transaction. In this manner 100% scalability for the reader can be ensured.

Versioning of data objects, table control structures used by readers, etc. can include disallowing readers from acquiring locks on a data structure. Instead, a reader works with a current version of a data structure until a query or query plan operator ends. With this arrangement, old versions only remain for a short period of time (e.g., sub-seconds). As versioned objects are typically small, memory overhead is also small. In addition, even with OLTP systems, incompatible changes are rare (i.e., there are not many concurrent versions, etc.).

MVCC ensures transaction isolation and consistent reading. Each row of a database table can be associated with a unique, monotonically-increasing identifier (RowID). When a new version of the record is created, this new version can also become a new RowID. The old version of the record can also be kept for parallel readers and can be cleaned (e.g. marked for deletion) during garbage collection after a commit operation. Certain operations, like locking using embedded MVCC information, can be executed directly in a reader.

FIG. 3 shows a diagram 300 illustrating some features consistent with implementations of the current subject matter. Two message-passing workers 302, 304 are shown. As discussed above are supported on separate logical cores of physical processor cores of a computing system. Each message-passing worker 302, 304 has a message queue 306, 310. Also included in FIG. 3 are two job workers 312, 314, which can be supported on different separate logical cores than the message-passing workers 302, 304. Messages can be directed to a message queue 306 or 310 of a message-passing worker 302 or 304 by other message-passing workers or by job workers indicated by the dashed lines.

Each message-passing worker 302 or 304 can have exclusive write access to a set of database objects as designated by the solid arrows. For example, the first message-passing worker 302 can have exclusive write access to a first table (T₁), a first column in the first table (T₁C₁), and a second column in a second table (T₂C₂) while the second message-passing worker can have exclusive write access to a second table (T₂), a first column in the second table (T₂C₁), and a second column in the first table (T₁C₂). Overlap of data objects is possible as shown in FIG. 3 in that write access to a table can be available from one message-worker while write access to a column within that table can be available from another message-worker. The job workers 312, 314 can have read-only access to any of the data objects via versioned structures as indicated by the dotted lines. This read-only access can be via a dirty read with no locks, for example with data consistency ensured using versioned objects and multi-version concurrency control to filter visible rows.

FIG. 4 shows a process flow chart 400 illustrating features of a method consistent with implementations of the current subject matter. At 402, each of a plurality of database objects in a database management system is assigned to a specific message-passing worker of a plurality of message-passing workers. Each of the plurality of message-passing workers executes on a first logical core that shares with at least a second logical core one or more resources of a physical processor core of a plurality of physical processor cores. The second logical core executes a job worker of a plurality of job workers that implement procedural code. In other words, as discussed above, the physical processor cores of the computing system or systems each support SMT such that two or more logical cores share resources of each physical processor core. A first logical core of each physical processor core supports a message-passing worker and a second logical core of each physical processor core support a job worker that implements procedural code.

At 404, exclusive write access to a database object of the plurality of database objects is provided via a message-passing worker of the plurality of message-passing workers to which the database object is assigned. Read-only access to any database object of the plurality of database objects is provided via any of the plurality of job workers at 406. At 410, operations are executed by the message-passing worker in an order in which request messages are received in a message queue of the message-passing worker. In this manner, locking is not required to maintain exclusivity of write access to a database object, because all write operations on the database object occur via a single message-passing worker, and the worker performs requested operations sequentially according to its message queue.

Database objects can be assigned to specific message-passing worker in a random or round-robin fashion. Performance statistics can be maintained and monitored for each database object (such as, for example, one or more of access frequency, processor time spent, etc.) and each queue (such as, for example, queue length, etc.). A rebalancing operation can run periodically to reassign database objects for equalizing the load on individual message-passing workers. Various approaches to rebalancing can be applied. After rebalancing, it is possible that a message-passing worker may receive a request for an operation on a database object that is no longer assigned to the message-passing worker. In such a case, the receiving message-passing worker can post the request message into a proper message queue of a second message-passing worker that to which the database object is now assigned new owner (e.g. via a forwarding operation).

With a message-passing approach such as is described herein, in which a given database object can be assigned to a single message-passing worker that consistently effectively serializes operations on a single database object, locking of internal structures is not necessary to maintain concurrency. Furthermore, since a database object is accessed only from a single thread on a single logical core, improved data locality is provided, for example because the database object can be easily kept in physical processor-local memory in a non-uniform memory access system. Also, a hit rate for cached data can be improved. While procedural code running in parallel and handling other objects may degrade cache performance for message-passing workers, the overall effect is a net positive for many examples of typical database management system use cases.

In general, processing a same amount of operations using message-passing technique requires much less CPU time in total than processing them using parallel threads competing for a lock (depending on system configuration, up to order of magnitude). FIG. 5 and FIG. 6 show charts 500, 600 illustrating features of mutual exclusion and message-passing approaches consistent with locking algorithms typically used in procedural coding for database operations.

As shown in the chart 500 of FIG. 5, the number of operations per second that can be performed by a physical processor core using message-passing (as shown by the first line 502 connecting the triangle icons) peaks at a relatively low number of total threads and then drops off while a mutual exclusion approach (as shown by the second line 504 connecting the diamond icons) shows less decline in performance with increased number of threads. However, the mutual exclusion approach results in a progressively increasing amount of processor cycle usage (as shown by the third line 506 connecting the square icons) with increasing number of threads while processor cycle usage for the message-passing approach (as shown by the fourth line 510 connecting the diamond icons) is mostly unchanged by the thread count. FIG. 6 shows a chart 600 comparing an amount of useful work that can be accomplished by the two approaches as a function of thread count. As shown in FIG. 6, the number of operations per second per physical processor core achievable by message processing (as shown by the solid bars 602A-F) is much greater overall and decreases less significantly with increasing numbers of threads than the mutual exclusion approach (as shown by the hashed bars 604A-F).

The measurement results represented in the charts 500, 600 of FIG. 5 and FIG. 6, respectively, reflect the effect of the two approaches on large numbers of relatively simple operations, such as for example a simple increment or the like. For a smaller number of more complex, long-running operations, the performance benefits will still occur but may be less pronounced. The approach discussed herein with regards to the use of message passing workers can generally result in improvements to the processing efficiency of smaller operations (such as for example single DML operations), which are more complex than simple increment operations, but are nonetheless fairly fast in terms of CPU consumption. The benefits of the approaches described herein are therefore significant.

One or more aspects or features of the subject matter described herein can be realized in digital electronic circuitry, integrated circuitry, specially designed application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs) computer hardware, firmware, software, and/or combinations thereof. These various aspects or features can include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which can be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device. The programmable system or computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.

These computer programs, which can also be referred to programs, software, software applications, applications, components, or code, include machine instructions for a programmable processor, and can be implemented in a high-level procedural language, an object-oriented programming language, a functional programming language, a logical programming language, and/or in assembly/machine language. As used herein, the term “machine-readable medium” refers to any computer program product, apparatus and/or device, such as for example magnetic discs, optical disks, memory, and Programmable Logic Devices (PLDs), used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term “machine-readable signal” refers to any signal used to provide machine instructions and/or data to a programmable processor. The machine-readable medium can store such machine instructions non-transitorily, such as for example as would a non-transient solid-state memory or a magnetic hard drive or any equivalent storage medium. The machine-readable medium can alternatively or additionally store such machine instructions in a transient manner, such as for example as would a processor cache or other random access memory associated with one or more physical processor cores.

To provide for interaction with a user, one or more aspects or features of the subject matter described herein can be implemented on a computer having a display device, such as for example a cathode ray tube (CRT) or a liquid crystal display (LCD) or a light emitting diode (LED) monitor for displaying information to the user and a keyboard and a pointing device, such as for example a mouse or a trackball, by which the user may provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well. For example, feedback provided to the user can be any form of sensory feedback, such as for example visual feedback, auditory feedback, or tactile feedback; and input from the user may be received in any form, including, but not limited to, acoustic, speech, or tactile input. Other possible input devices include, but are not limited to, touch screens or other touch-sensitive devices such as single or multi-point resistive or capacitive trackpads, voice recognition hardware and software, optical scanners, optical pointers, digital image capture devices and associated interpretation software, and the like.

The subject matter described herein can be embodied in systems, apparatus, methods, and/or articles depending on the desired configuration. The implementations set forth in the foregoing description do not represent all implementations consistent with the subject matter described herein. Instead, they are merely some examples consistent with aspects related to the described subject matter. Although a few variations have been described in detail above, other modifications or additions are possible. In particular, further features and/or variations can be provided in addition to those set forth herein. For example, the implementations described above can be directed to various combinations and subcombinations of the disclosed features and/or combinations and subcombinations of several further features disclosed above. In addition, the logic flows depicted in the accompanying figures and/or described herein do not necessarily require the particular order shown, or sequential order, to achieve desirable results. Other implementations may be within the scope of the following claims. 

What is claimed is:
 1. A computer program product comprising a non-transitory machine-readable medium storing instructions that, when executed by at least one programmable processor that comprises at least one physical core and a plurality of logical cores, cause the at least one programmable processor to perform operations comprising: designating a first logical core from the plurality of logical cores for use by a first message-passing worker of a plurality of message-passing workers; designating a second logical core from the plurality of logical cores for use by a first job worker of a plurality of job workers, the first and second logical cores sharing one or more resources of the at least one physical core; designating an additional logical core from the plurality of logical cores for use by a second message-passing worker of the plurality of message-passing workers; assigning a first set of database objects from a plurality of database objects in a database management system to the first message-passing worker such that the first message-passing worker has exclusive write access to the first set of database objects; assigning a second set of database objects from the plurality of database objects in the database management system to the second message-passing worker such that the second message-passing worker has exclusive write access to the second set of database objects, the first set of database objects and the second set of database objects having at least one database object in common; providing read-only access to the plurality of database objects via the first job worker; executing operations by the first message-passing worker in an order in which request messages are received in a message queue of the first message-passing worker; running a rebalancing operation to reassign the plurality of database objects to equalize a load across the plurality of message-passing workers; receiving, by a rebalanced message-passing worker of the plurality of message-passing workers after the running of the rebalancing operation, a new request message pertaining to a reassigned database object of the plurality of database objects, the reassigned database object formerly being assigned to the rebalanced message-passing worker but currently being assigned to a new message-passing worker of the plurality of message-passing workers; and posting, by the rebalanced message-passing worker, the new request message into a message queue of the new message-passing worker.
 2. A computer program product as in claim 1, wherein the assigning comprises at least one of a round-robin assignment of the plurality of database objects to the plurality of message-passing workers and a random assignment of the plurality of database objects to the plurality of message-passing workers.
 3. A computer program product as in claim 1, wherein the operations further comprise determining when to run the rebalancing operation, the determining comprising maintaining and monitoring performance statistics for each database object of the plurality of database objects.
 4. A computer program product as in claim 1, wherein the read-only access is provided via a dirty read with no locks, and wherein data consistency are ensured using versioned objects and multi-version concurrency control to filter visible rows.
 5. A system comprising: at least one programmable processor comprising at least one physical core and a plurality of logical cores; and a non-transitory machine-readable medium storing instructions that, when executed by the at least one programmable processor, cause the at least one programmable processor to perform operations comprising: designating a first logical core from the plurality of logical cores for use by a first message-passing worker of a plurality of message-passing workers; designating a second logical core from the plurality of logical cores for use by a first job worker of a plurality of job workers, the first and second logical cores sharing one or more resources of the at least one physical core; designating an additional logical core from the plurality of logical cores for use by a second message-passing worker of the plurality of message-passing workers; assigning a first set of database objects from a plurality of database objects in a database management system to the first message-passing worker such that the first message-passing worker has exclusive write access to the first set of database objects; assigning a second set of database objects from the plurality of database objects in the database management system to the second message-passing worker such that the second message-passing worker has exclusive write access to the second set of database objects, the first set of database objects and the second set of database objects having at least one database object in common; providing read-only access to the plurality of database objects via the first job worker; executing operations by the first message-passing worker in an order in which request messages are received in a message queue of the first message-passing worker; running a rebalancing operation to reassign the plurality of database objects to equalize a load across the plurality of message-passing workers; receiving, by a rebalanced message-passing worker of the plurality of message-passing workers after the running of the rebalancing operation, a new request message pertaining to a reassigned database object of the plurality of database objects, the reassigned database object formerly being assigned to the rebalanced message-passing worker but currently being assigned to a new message-passing worker of the plurality of message-passing workers; and posting, by the rebalanced message-passing worker, the new request message into a message queue of the new message-passing worker.
 6. A system as in claim 5, wherein the assigning comprises at least one of a round-robin assignment of the plurality of database objects to the plurality of message-passing workers and a random assignment of the plurality of database objects to the plurality of message-passing workers.
 7. A system as in claim 5, wherein the operations further comprise determining when to run the rebalancing operation, the determining comprising maintaining and monitoring performance statistics for each database object of the plurality of database objects.
 8. A system as in claim 5, wherein the read-only access is provided via a dirty read with no locks, and wherein data consistency are ensured using versioned objects and multi-version concurrency control to filter visible rows.
 9. A computer-implemented method comprising: designating a first logical core from a plurality of logical cores of a data processor for use by a first message-passing worker of a plurality of message-passing workers; designating a first logical core from the plurality of logical cores for use by a first message-passing worker of a plurality of message-passing workers; designating a second logical core from the plurality of logical cores for use by a first job worker of a plurality of job workers, the first and second logical cores sharing one or more resources of the at least one physical core; designating an additional logical core from the plurality of logical for use by a second message-passing worker of the plurality of message-passing workers; assigning a first set of database objects from a plurality of database objects in a database management system to the first message-passing worker such that the first message-passing worker has exclusive write access to the first set of database objects; assigning a second set of database objects from the plurality of database objects in the database management system to the second message-passing worker such that the second message-passing worker has exclusive write access to the second set of database objects, the first set of database objects and the second set of database objects having at least one database object in common; providing read-only access to the plurality of database objects via the first job worker; executing operations by the first message-passing worker in an order in which request messages are received in a message queue of the first message-passing worker; running a rebalancing operation to reassign the plurality of database objects to equalize a load across the plurality of message-passing workers; receiving, by a rebalanced message-passing worker of the plurality of message-passing workers after the running of the rebalancing operation, a new request message pertaining to a reassigned database object of the plurality of database objects, the reassigned database object formerly being assigned to the rebalanced message-passing worker but currently being assigned to a new message-passing worker of the plurality of message-passing workers; and posting, by the rebalanced message-passing worker, the new request message into a message queue of the new message-passing worker.
 10. A computer-implemented method as in claim 9, wherein the assigning comprises at least one of a round-robin assignment of the plurality of database objects to the plurality of message-passing workers and a random assignment of the plurality of database objects to the plurality of message-passing workers.
 11. A computer-implemented method as in claim 9, wherein the operations further comprise determining when to run the rebalancing operation, the determining comprising maintaining and monitoring performance statistics for each database object of the plurality of database objects.
 12. A computer-implemented method as in claim 9, wherein the read-only access is provided via a dirty read with no locks, and wherein data consistency are ensured using versioned objects and multi-version concurrency control to filter visible rows.
 13. A computer-implemented method as in claim 9, wherein the assigning, the providing of exclusive write access to the database object, the providing of read-only access, and the executing are performed by at least one system comprising at least one programmable processor. 