Semantic replication

ABSTRACT

Replicating data in a distributed database having a plurality of nodes is disclosed. Replicating includes receiving a semantic command at a local version of the database at a node, interpreting the semantic command, and applying the semantic command to the local version of the database.

CROSS REFERENCE TO OTHER APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/608,284, entitled SEMANTIC REPLICATION, filed Sep. 10, 2012, which isa continuation of U.S. patent application Ser. No. 11/232,465, now U.S.Pat. No. 8,290,910, entitled SEMANTIC REPLICATION, filed Sep. 21, 2005both of which are incorporated herein by reference for all purposes.

BACKGROUND OF THE INVENTION

A distributed database is a database in which portions of the databaseare stored on more than one computer within a network. A localapplication or user has read access to the portion of the database atthat location. To keep the various locations synchronized, writes (e.g.,inserts, updates, and deletes) to the database are typically replicatedbetween the various locations, as applicable. A typical distributeddatabase is either centralized or partitioned.

FIG. 1A is a diagram illustrating a centralized distributed databasesystem 100. System 100 is shown to include master 102 and members 104,106, and 108. Reads can be performed at any node. For example, each nodemaintains a read only cache. Writes must be performed through master102. Write requests are sent to master 102, and the database in master102 is updated. The data is replicated to the members by propagating thechanged data (e.g., changed columns and/or rows) to each of members 104,106, and 108. Each member receives the data and places it in its cache(or local version of the database). This approach can be bandwidthintensive when a large amount of data needs to be propagated. Forexample, if 5 million records with “infoblox.com” need to be changed to“infoblox.xyz.com”, those 5 million changed records would need to beshipped. A centralized database is difficult to scale. All changed datais transmitted, which can consume high bandwidth and can overwhelm thesystem. All writes must go through the master, which increases latency,particularly in a highly distributed system. In addition, the master canbecome a bottleneck.

FIG. 1B is a diagram illustrating a partitioned distributed databasesystem 120. System 120 is partitioned into three portions each with alocal master and members. Each master has full write authority for thatpartition. However, writes to each partition are generally notcoordinated. For example, a host name may be added to partition 140 thatmay already exist in partition 122, resulting in inconsistent databetween the two partitions. Some sort of coordination between eachpartition is needed if such inconsistencies are to be avoided. If asingle overall master is selected, that master could become a bottlenecksince it would need to approve all transactions. It would be desirableto have a faster and more scalable distributed database.

In addition, a member can comprise a high availability (HA) pair, or anactive node and a passive (or redundant) node, where the passive nodeserves as a backup to the active node in case of failure. Currently datais not reliably consistent between the active and the passive nodes.Thus, if there is a failure of one node, there can be a loss of data. Itwould therefore also be desirable to have a more reliable distributeddatabase.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of the invention are disclosed in the followingdetailed description and the accompanying drawings.

FIG. 1A is a diagram illustrating a centralized distributed databasesystem 100.

FIG. 1B is a diagram illustrating a partitioned distributed databasesystem 120

FIG. 2A is a diagram of a system for performing semantic replication. Inthis example, system 200 is a distributed database.

FIG. 2B is a flowchart illustrating a method of performing semanticreplication. In this example, a database change is received at a node(250).

FIG. 2C is a diagram of a system for performing semantic replicationwhere one or more nodes have different database semantics.

FIG. 3A is a diagram illustrating a system for provisionally writingdata in a distributed database

FIG. 3B is a flowchart illustrating a method of provisionally writingdata in a distributed database.

FIGS. 4A-4C are diagrams illustrating a DHCP example of provisionallywriting data in a distributed database.

FIGS. 5A-5B are diagrams illustrating a DNS example of provisionallywriting data in a distributed database.

FIGS. 6A-6B are diagrams illustrating a RADIUS example of provisionallywriting data in a distributed database.

FIG. 7A is a diagram illustrating a system for reconciling provisionallywritten data in a distributed database.

FIG. 7B is a flowchart illustrating a method of provisionally writingdata in a distributed database at a member

FIG. 7C is a flowchart illustrating a process for propagating an itemfrom a journal queue to a master.

FIG. 7D is a flowchart illustrating a method of reconcilingprovisionally written data in a distributed database at a master.

FIG. 7E is a flowchart illustrating a process for propagating an itemfrom a journal queue to a member.

FIG. 7F is a flowchart illustrating a method of receiving an item on thereplication stream at an originating member.

FIG. 7G is a flowchart illustrating a method of receiving an item on thereplication stream at a non-originating member.

FIG. 8 is a diagram illustrating a system for performing atomictransactions in a distributed database.

FIG. 9A is a diagram illustrating a system for provisionally writingdata using atomic transactions in a distributed database.

FIG. 9B is a block diagram illustrating how a markup languagerepresentation of a database is transformed into a specific databaseschema.

FIG. 10 is a diagram illustrating the relationships between variousstructures that can be defined using ref-types.

FIG. 11 is a flowchart illustrating a method of generating a databaseschema from a markup language representation of the database.

FIG. 12 is a diagram illustrating an example of generating an SQL tablefrom an RTXML representation of the table.

FIG. 13 is a flowchart illustrating a method of generating an in memoryrepresentation of an RTXML structure.

FIG. 14 is a flowchart illustrating a method of generating an SQL tablefrom an in memory representation of a structure.

FIG. 15 is a flowchart illustrating a method of enforcing a referenceduring an insert.

FIG. 16 is a flowchart illustrating a method of enforcing a referenceduring a delete.

FIG. 17 is a diagram illustrating five versions of a database, v1 to v5.

FIG. 18 is a diagram illustrating various versions of a database.

FIG. 19 is a flowchart illustrating a method of converting a databasefrom a first version to a second version.

FIG. 20 is a diagram of a translation graph.

FIG. 21 is a flowchart illustrating a method of applying translationsteps to arrive at a desired database version.

FIG. 22 is a flowchart illustrating a method of translating a databasefrom one version to the next version.

FIG. 23 is a block diagram illustrating a system used in one embodimentto manage a database cluster having multiple database versions.

FIG. 24 is a flowchart illustrating a method of propagating an updatefrom a first database to a second database with a different version.

DETAILED DESCRIPTION

The invention can be implemented in numerous ways, including as aprocess, an apparatus, a system, a composition of matter, a computerreadable medium such as a computer readable storage medium or a computernetwork wherein program instructions are sent over optical or electroniccommunication links. In this specification, these implementations, orany other form that the invention may take, may be referred to astechniques. In general, the order of the steps of disclosed processesmay be altered within the scope of the invention.

A detailed description of one or more embodiments of the invention isprovided below along with accompanying figures that illustrate theprinciples of the invention. The invention is described in connectionwith such embodiments, but the invention is not limited to anyembodiment. The scope of the invention is limited only by the claims andthe invention encompasses numerous alternatives, modifications andequivalents. Numerous specific details are set forth in the followingdescription in order to provide a thorough understanding of theinvention. These details are provided for the purpose of example and theinvention may be practiced according to the claims without some or allof these specific details. For the purpose of clarity, technicalmaterial that is known in the technical fields related to the inventionhas not been described in detail so that the invention is notunnecessarily obscured.

Replicating data in a distributed database is disclosed. A semanticcommand is received at a local database. The command is interpreted andapplied to the local database. In some embodiments, the semantic commandis translated at the local database.

FIG. 2A is a diagram of a system for performing semantic replication. Inthis example, system 200 is a distributed database. For example, thedistributed database may provide a network identity service, such asDNS, DHCP, RADIUS, or LDAP. System 200 is shown to include master 204and two members 208 and 210. Any number of members may be included inother embodiments. Each of master 204 and members 208 and 210 may resideon a computer, appliance, or any other appropriate device. Master 204and members 208 and 210 may be physically co-located or separated.Master 204 is shown to include semantic processor 214 and a masterversion of the database 216. Member 208 is shown to include semanticprocessor 218 and a local version of the database 220. Member 210 isshown to include semantic processor 224 and a local version of thedatabase 216 (or local database 216).

In some embodiments, the semantic processor is considered part of thelocal database. Semantic processors 214, 218, and 224 communicate over asemantic replication channel (SRC) 230 a and 230 b and a semantic changechannel (SCC) 232 a and 232 b as shown. Databases 216, 220, and 226 maycommunicate over a data replication channel (DRC) 234 a and 234 b. Adatabase change request is received at master 204. A database change (ordatabase write) request is a request that modifies the database in anyway when executed. The write request may be expressed as a command,instruction, function, query or operation. For example the change may bean operation such as insert, update, or delete. Semantic processor 214interprets the change and applies the change to database 216. The changeis propagated to semantic processors 218 and 224 over SCC 230 a and 230b, respectively. Semantic processors 218 and 224 interpret the changeand apply the change to databases 220 and 226, respectively.

In some embodiments, the change is expressed as a semantic command thatis one of a predefined set of commands. A semantic command, as usedherein, is a write request expressed semantically. The semantic commandcan be defined by operations, instructions, other semantic commands, orin any other appropriate way. In some embodiments, the semantic commandis defined by one or more operations. Semantic commands may be describedin a markup language, such as XML. In one embodiment, the semanticcommands are specified in RTXML, as described below and in U.S. patentapplication Ser. No. 10/950,357 entitled MARKUP LANGUAGE SPECIFICATIONOF A DATABASE SCHEMA, which is incorporated herein by reference for allpurposes. In some embodiments, the data (e.g., objects) in the databaseis described in a markup language such as XML (e.g., RTXML) and semanticprocessors 214, 218, and 224 each include an XML engine or interpreter.

In this example, databases 216, 220, and 226 each have the same versionof data. In one embodiment, the data in each of the databases isexpressed in the same version of RTXML. Semantic processors 214, 218,and 224 are each capable of interpreting the same set of commands withina group of semantic processors. For example, the commands are expressedin the same version of RTXML. Individual processors may interpretcommands differently. Different interpretations of the semanticprocessors can be reconciled. In some embodiments, a map of semanticinterpretation and members is maintained.

A system upgrade may be performed where the semantic processors 214,218, and 224 and databases 216, 220, and 226 are upgraded. In someembodiments, first the master is migrated. For example, database 216 ismigrated and semantic processor 214 is upgraded. In one embodiment,database 216 is migrated as described below and in U.S. patentapplication Ser. No. 10/950,192 entitled DATABASE MIGRATION, which isincorporated herein by reference for all purposes. The new version ofdatabase 216 is then replicated over data replication channel 234 a and234 b to databases 220 and 226. Semantic processors 218 and 224 areupgraded over semantic change channels 232 a and 232 b. In someembodiments, each of nodes 204, 208, and 210 is independently migrated.For example, database 220 and database 226 are each migrated usingMDXML.

FIG. 2B is a flowchart illustrating a method of performing semanticreplication. In this example, a database change is received at a node(250). For example, the node could be master 204, member 208, or member210 in FIG. 2A. The change may be expressed as a semantic command, asdescribed above. For example, the command could be defined by one ormore database operations. The change is interpreted (252). For example,one or more operations that can be used to implement the change aredetermined. In some embodiments, a semantic processor determines one ormore database operations that can be used to execute a semantic command.The change is applied (256). For example, the semantic processor couldapply one or more database operations to the local database.

The node may either be the master or a member. When the node is amaster, the change may originate at the master or at a member. Forexample, the change can be received at a member and sent to the master.The change can be received directly at the master. For example, anapplication running on the master requests the change.

When the node is a member, the change may originate at a master, anothermember, or the same member. For example, the change can be received atthe master, applied to the database on the master, and sent to themember. The change can be received at another node, propagated to themaster, applied to the master, and sent to the member. The change can bereceived at the member, sent to the master, applied to the master, andsent back to the member. In this case, the change can be applied to themember the first or second time the change is received. For example, thechange can be applied to the member before forwarding it to the master.Later, the change is sent to the master for reconciliation with thedatabase on the master. In this case, the member has provisional writeauthority, as more fully described below. In some embodiments, eachmember is an HA pair including an active node and a passive node. Thechange is applied to the HA pair as a single atomic transaction, as morefully described below.

In some embodiments, changes may be interpreted differently by differentprocessors. Different semantic interpretations may be captured in amarkup language description, such as RTXML, as described below and inU.S. patent application Ser. No. 10/950,357 entitled MARKUP LANGUAGESPECIFICATION OF A DATABASE SCHEMA, which was previously incorporated byreference. In this example, semantics refers to application semantics.Application specific semantics in the database can be captured andapplied in an efficient way.

FIG. 2C is a diagram of a system for performing semantic replicationwhere one or more nodes have different database semantics. System 250 isshown to include master 280 and two members 282 and 284. Any number ofmembers may be included in other embodiments. Master 280 is shown toinclude semantic translation processor 260, semantic processor 270 and amaster version of the database 264. Member 282 is shown to includesemantic translation processor 258, semantic processor 272 and a localversion of the database 266. Member 284 is shown to include semantictranslation processor 262, semantic processor 262 and a local version ofthe database 268. In some embodiments, the semantic processor isconsidered part of the local database. Semantic translation processors260, 258, and 262 communicate over a semantic replication channel (SRC)286 a and 286 b.

In this example, each of databases 264, 266 and 268 express data usingdifferent semantics. Also, each semantic processor is capable ofinterpreting a different set of (semantic) commands. Thus, each semanticprocessor is different. In some embodiments, each database expressesdata in a different version of RTXML and each semantic processorunderstands commands from a different version of RTXML. In this example,semantic processor 270 and database 264 use version 1, semanticprocessor 272 and database 266 use version 2, and semantic processor 274and database 268 use version 3.

The semantic translation processor is connected between the semanticprocessor and the semantic replication channel. The semantic translationprocessor translates semantic commands so that they can be processed bya local semantic processor. For example, on node 284, semantic processor274 includes an ability to translate a semantic command from node 280 toa semantic command that can be processed by semantic processor 274.Similarly, semantic processor 272 includes an ability to translate asemantic command from node 280 to a semantic command that can beprocessed by semantic processor 272. On node 280, semantic processor 260includes an ability to translate a semantic command (e.g., sent over SRC286 a) from node 282 to a semantic command that can be processed bysemantic processor 270. Semantic processor 260 also includes an abilityto translate a semantic command (e.g., sent over SRC 286 b) from node284 to a semantic command that can be processed by semantic processor270.

For example, a database change may be received at master 280. The changeis expressed in version 1 (e.g., of RTXML). Semantic processor 270interprets the change and applies the change to database 264. The changeis propagated to members 282 and 284. Semantic translation processors258 and 262 receive the change and translate the change to a locallyunderstood semantic command. For example, semantic translation processor258 translates the change so that it is expressed in version 2. In someembodiments, the translation is described in a markup language, such asXML. In some embodiments, the translation is performed using MDXML, asdescribed below and in U.S. patent application Ser. No. 10/950,184entitled MULTIVERSION DATABASE CLUSTER MANAGEMENT, which is incorporatedherein by reference for all purposes. Semantic processors 272 and 274interpret the change and apply the change to databases 266 and 268,respectively.

FIG. 3A is a diagram illustrating a system for provisionally writingdata in a distributed database. In this example, system 300 is shown toinclude master 304 and members 306, 308, and 310. Each of members 306,308, and 310 has provisional write authority. In other words, a writerequest received at any one of members 306, 308, and 310 can be appliedto a local database before the change is propagated to master 304. Themaster gives a “contract” to the member to write to its local databasewithout having to consult the master. The contract gives permission (orauthority) to write to a space under the condition that the write isreconciled with the master database in the future.

More than one member can have authority to write to the same space(e.g., the whole or a portion of the database). In this example, acontract to write to the same space has been given to both members 306and 308. A conflict can occur when both members 306 and 308provisionally write to the same record. The conflict may be a dataconsistency or application logic conflict. For example, a conflictoccurs when member 306 deletes a record and member 308 writes to therecord. The conflict is discovered when the delete and write arepropagated to the master. The conflict may be resolved according to apolicy. For example, the master may ignore the write. Member 308 isnotified and responds to the conflict as appropriate. For example, themember may back out the write. Further examples are provided below.

FIG. 3B is a flowchart illustrating a method of provisionally writingdata in a distributed database. In some embodiments, this process isperformed at one of members 306, 308, or 310. In this example, a writerequest is received at a member (330). The write request can beexpressed in any appropriate way. In one embodiment, the write requestis expressed as a change, such as a semantic command, as describedabove. In one embodiment, the write request is expressed as data, e.g.,the write request is made by sending the changed columns and/or rows. Insome embodiments, a changed data item is sent. The changed data item maybe denoted by a reference associated with an index. The write isperformed on the member (332). For example, the write may be performedaccording to the process shown in FIG. 2B. The write request is sent tothe master (334).

In some embodiments, some or all of the data can be identified by areference. References may be contextual to a particular index. In someembodiments, all indexes are described in a global data description. Theglobal data description may be described in a markup language, such asRTXML.

It is determined whether performing the write would cause a conflict(336). For example, the write may be to a record that has been deleted.If it is determined that there would not be a conflict, the write isperformed on the master (338). For example, the write may be performedaccording to the process shown in FIG. 2B. If it is determined thatthere would be a conflict, the conflict is reconciled (340). Forexample, the write request can be ignored or other actions can be taken.For example, if the write is to a record that has been deleted, a usercan be prompted regarding whether to insert the record. In someembodiments, a conflict management system specifies how conflicts shouldbe reconciled, e.g., in a markup language.

An indication of the status of the write request is sent to the member(342). The indication could be implicit. For example, the indicationcould be the write request (in the case where there is no conflict) orinstructions for resolving the conflict (in the case where there isconflict). For example, if there is no conflict on the master, in someembodiments, a write request is sent to all the members. In someembodiments, the member stores the write requests it sends to the masterand upon receiving an indication of success (of the write request on themaster), the member removes that write request from where it is stored.As such, the member can verify the merging of the write requests (withthe master). If there is conflict on the master, in some embodiments,status is sent only the originating member. In some embodiments, uponreceiving an indication of conflict, the originating member reverses thewrite.

Thus, in a distributed database, a local version of a database may bewritten to optimistically (i.e., by assuming the local version iscorrect) without consulting a master version of the database.Provisional or optimistic write authority can decrease latency,particularly in a highly distributed system.

FIGS. 4A-4C are diagrams illustrating a DHCP example of provisionallywriting data in a distributed database. In this example, system 400 isshown to include master 402, members 404 and 410, routers 406 and 412,and host devices 408 and 414. Members 404 and 410 are servers orappliances that provide DHCP service. Master 402 has a master copy of aDHCP database. Each member 404 and 410 has a local copy of the DHCPdatabase. DHCP member 404 serves router 406 and device 408 in thisexample. Similarly, DHCP member 410 serves router 412 and device 414.Devices 408 and 414 are network devices each requesting an IP addressassignment using DHCP. Router 406 is the first upstream network devicefrom device 408. Router 412 is the first upstream network device fromdevice 414.

In FIG. 4A, device 408 is shown requesting an IP address. The request isreceived by router 406 and forwarded to DHCP member 404. DHCP member 404accesses its local copy of the DHCP database and assigns IP address“10.5.34.2” to device 408. Member 404 writes to its local copy of theDHCP database to reflect the assignment. Member 404 sends the assignmentto router 406, which forwards the assignment to device 408. Device 408operates using IP address “10.5.34.2”. Similarly, device 414 is shownrequesting an IP address. The request is received by router 412 andforwarded to DHCP member 410. DHCP member 410 accesses its local copy ofthe DHCP database and assigns IP address “10.5.34.2” to device 414.Member 410 writes to its local copy of the DHCP database to reflect theassignment. Member 410 sends the assignment to router 412, which forwardthe assignment to device 414. Device 414 operates using IP address“10.5.34.2”.

In FIG. 4B, member 404 sends a write request (corresponding to the IPaddress assignment of “10.5.34.2” to device 408) to master 402. Master402 receives the write request and updates the master copy of thedatabase accordingly. At a later time, member 410 sends a write request(corresponding to the IP address assignment of “10.5.34.2” to device414) to master 402. Master 402 receives the write request and determinesthat there is a conflict. In this case, both devices 408 and 414 cannotbe assigned the same IP address. The conflict is resolved. An indicationof the conflict is sent to member 410. Member 410 assigns a new IPaddress “10.5.34.3” to device 414. The new assignment is sent to router412. Router 412 is updated so that IP address “10.5.34.2” is mapped to“10.5.34.3” via network address translation (NAT) as shown in FIG. 4C.For example, packets arriving at router 412 with destination address“10.5.34.3” are redirected to “10.5.34.2”. The source address in eachpacket from device arriving at router 412 may also be mapped from“10.5.34.2” to “10.5.34.3”. Device 414 does not need to be aware thatits IP address is being remapped by router 412. Device 414 can keep itscurrent IP address assignment until it renews its lease. As such, thedistributed database is self adaptive (or self healing).

FIGS. 5A-5B are diagrams illustrating a DNS example of provisionallywriting data in a distributed database. In this example, system 500 isshown to include master 502, members 504 and 510, and devices 508 and514. Members 504 and 510 are servers or appliances that provide DNSservice. Master 502 has a master copy of a DNS database. Each member 504and 510 has a local copy of the DNS database. DNS member 504 servesdevice 508 and DNS member 510 serves device 514 in this example. Devices508 and 514 are network devices each registering a host name and IPaddress using the DNS protocol.

Device 508 is shown registering hostname “name1” and IP address“10.31.5.2” on member 504. Member 504 writes to its local copy of theDNS database to reflect the hostname, IP address pair. Similarly, device514 is shown registering hostname “name1” and IP address “10.31.5.3” onmember 510. Member 510 writes to its local copy of the DNS database toreflect the hostname, IP address pair.

In FIG. 5B, member 504 sends a write request (corresponding toregistration of “name1”, “10.31.5.2”) to master 502. Master 502 receivesthe write request and updates the master database accordingly. Later,member 510 sends a write request (corresponding to the registration of“name1”, “10.31.4.3”) to master 502. Master 502 receives the writerequest and determines that there is a conflict. In this case, hostname“name1” cannot be registered by two devices. The conflict is resolved.In one embodiment, a notification is sent to an administrator. Theadministrator responds to the conflict as appropriate. For example, theadministrator could change the hostname on device 514 to “name2” toresolve the conflict.

FIGS. 6A-6B are diagrams illustrating a RADIUS example of provisionallywriting data in a distributed database. In this example, system 600 isshown to include master 602, members 604 and 610, routers 606 and 612,and host devices 608 and 614. Members 604 and 610 are servers orappliances that provide RADIUS service. Master 602 has a master copy ofa RADIUS database. Each member 604 and 610 has a local copy of theRADIUS database. RADIUS member 604 serves router 606 and device 608 inthis example. Similarly, RADIUS member 610 serves router 612 and device614. Each of devices 608 and 614 is a network device, such as a computeror a laptop. A user of device 608 is prompted for credentials by router606, in response to a network access attempt, for example. Similarly, auser of device 614 is prompted for credentials by router 612. Router 606is the first upstream network device from device 608. Router 612 is thefirst upstream network device from device 614. Router 606 blocks trafficto/from device 608 until the user of device 608 isauthorized/authenticated, e.g., using 802.1X policy enforcement.Similarly, router 612 blocks traffic to/from device 614 until the userof device 614 is authorized/authenticated.

In FIG. 6A, device 608 is shown sending credentials. The credentials arereceived by router 606 and forwarded to RADIUS member 604. RADIUS member604 determines whether to authorize and authenticate the user. Forexample, RADIUS member 604 accesses its local copy of the RADIUSdatabase and determines whether the credentials are correct and/orwhether the user is authorized. In some embodiments, the user isauthorized if the user has not authorized previously within some timeperiod. Member 604 writes to its local copy of the RADIUS database toreflect the authorization and/or authentication. Member 604 sends theupdate to router 606, which then allows traffic flow to/from device 608.Similarly, device 614 is shown sending credentials. The credentials arereceived by router 612 and forwarded to RADIUS member 610. RADIUS member610 determines whether to authorize and authenticate the user. Forexample, RADIUS member 610 accesses its local copy of the RADIUSdatabase and determines whether the credentials are correct and/orwhether the user is authorized. Member 610 writes to its local copy ofthe RADIUS database to reflect the authorization and/or authentication.Member 610 sends the update to router 612, which then allows trafficflow to/from device 614.

In FIG. 6B, member 604 sends a write request (corresponding to theauthorization/authentication of the user on device 608) to master 602.Master 602 receives the write request and updates the master copy of thedatabase accordingly. At a later time, member 610 sends a write request(corresponding to the authorization/authentication of the user on device614) to master 602. Master 602 receives the write request and determinesthat there is a conflict. In this case, assume that both write requestswere made within a certain time period and that the same user cannot beauthorized more than once within a certain time period. For example, theuser was already authenticated within a certain time period, which couldindicate a distributed attack. In one embodiment, an indication of theconflict, such as a revocation list, is sent to routers 606 and 612.Routers 606 and 612 are updated to revoke authorization for that user.In some embodiments, related information such as the length of time theuser has been logged in is logged. In some embodiments, provisionalwrites are disabled for that user for a certain length of time. In otherwords, a write received from that user at a member is not applied to themember without first consulting the master.

In another example, provisional write authority in a RADIUS distributeddatabase can reduce sign-on, or the number of times a user needs to signon. For example, if a particular user has been authorized/authenticatedat device 608, and the user attempts to access the network using device614, the user does not need to sign on again. Router 612 forwards therequest to RADIUS member 610, which recognizes that the user is alreadyauthorized/authenticated at device 608. RADIUS member 610 writes to itslocal database to authorize/authenticate the user at device 614, sends amessage back to the switch, and the switch allows the user to access thenetwork via device 614.

FIG. 7A is a diagram illustrating a system for reconciling provisionallywritten data in a distributed database. In this example, system 700 isshown to include master 704 and two members 708 and 710. Any number ofmembers may be included in other embodiments. Master 704 is shown toinclude journal queue 702, semantic processor 714, and a master versionof the database 716. Member 708 is shown to include journal queue 706,semantic processor 718, and a local version of the database 720. Member710 is shown to include semantic journal queue 704, processor 724 and alocal version of the database 726. In some embodiments, semanticprocessor 714, 718, and 724 are not needed, e.g., in a system thatperforms replication by propagating data rather than semantics. In thisexample, nodes 704, 708, and 710 communicate over merge stream 730 a and730 b and replication stream 732 a and 732 b.

Each of members 708 and 710 has provisional write authority. In otherwords, a write request (e.g., update) received at any one of members 708and 710 is optimistically applied to the local (member) database withouthaving to consult the master. At a later time, the local database andmaster database are reconciled, as more fully described below. Forexample, a write request received at member 708 is applied to database720 and placed in journal queue 706. In some embodiments, writing todatabase 720 and writing to journal queue 706 are performed as a singleatomic transaction. Later, the write is propagated to the master overmerge stream 730 a to reconcile the write with the master. At a latertime, the master propagates the write request (or conflict status) overreplication streams 732 a and 732 b to members 708 and 710,respectively.

In some embodiments, the journal queue is stored as a file. A write maybe stored in the journal queue in any appropriate way. In someembodiments, the journal queue is a database of items (or records). Anitem, as used herein, refers to a write request, transaction, command,instruction, function, data, operation or any other unit appropriate forstoring the write. In some embodiments, a semantic command is decomposedinto primitives and the primitives are stored. For example, primitivesmay include insert, update, delete, or an aggregate group of operationsthat are interdependent. For example, a command to update a singlerecord may be stored, or a single command associated with updating 5million records (e.g., from “infoblox.com” to “infoblox.abc.com”) may bestored. In some embodiments, a markup language is used to store items inthe journal queue. In some embodiments, data is stored in the journalqueue and data is pushed up the merge stream to the master. In someembodiments, all the nodes share the same semantics, e.g., they are allrelational databases, and relational database commands are stored in thejournal queue.

FIG. 7B is a flowchart illustrating a method of provisionally writingdata in a distributed database at a member. In some embodiments, thisprocess is performed at one of members 708 or 710. In this example, awrite request is received at a member (740). As used herein, this memberis referred to as the member who originated the request, or the“originating member”. The write request may be received from a commandline interface or an application, for example. In some embodiments, thewrite request is expressed as a change, such as a semantic command, asdescribed above. In some embodiments, the write request is expressed asdata, i.e., the write request is expressed by the changed columns and/orrows. The write is applied to the member database and journal queue as asingle atomic transaction (742). For example, if the write is receivedat member 710, it is applied to database 726 and journal queue 704 inone atomic transaction. In some embodiments, Berkeley DB, such as aversion made by Sleepycat Software in Lincoln, Mass., or anothertransactional subsystem that ensures atomicity of transactions is used.The write request may be applied according to the process shown in FIG.2B, or the write may be performed by placing data in the database. Thewrite may be stored in the journal queue as one or more items, asdescribed above.

FIG. 7C is a flowchart illustrating a process for propagating an itemfrom a journal queue to a master. In some embodiments, this process isperformed at one of members 708 or 710 by a journal replicator (orjournal replication process). This process may be performed in parallelwith the process of FIG. 7B. In this example, the journal queue is read(746). In some embodiments, the journal queue is stored as a databaseand the journal replicator performs a database transaction to read fromthe queue. One or more items may be read from the journal queue. In someembodiments, the item(s) is removed from the journal queue after it isread. In other embodiments, the item(s) remains in the journal queueuntil a response is later received from the master, as more fullydescribed below. The item(s) is sent to the master on the merge stream(748). Items may be read from the journal queue at regular intervals orat other times.

FIG. 7D is a flowchart illustrating a method of reconcilingprovisionally written data in a distributed database at a master. Insome embodiments, this process is performed at master 704 in response toreceiving an item on the merge stream from a member, as in (748)described above. In this example, an item is received on the mergestream (752). For example, the item may be the item sent in (748). Theitem may be a write request, or a component of a write request, such asa primitive, as described above. In some embodiments, more than one itemis received and combined into a higher level write request. It isdetermined whether executing the item would cause a conflict on themaster (754). If it is determined that there would not be a conflict(754), the item is executed on the master and written to the masterjournal queue in one atomic transaction (756). If it is determined thatthere would be a conflict on the master, the conflict is reconciled(760). For example, there may be a conflict resolution system thatspecifies how conflicts should be reconciled. In some embodiments,status information is sent to the originating member over thereplication stream. In some embodiments, status information (indicatinga conflict) is placed in the journal queue for sending back to theoriginating member at a later time, as more fully described below.

FIG. 7E is a flowchart illustrating a process for propagating an itemfrom a journal queue to a member. In some embodiments, this process isperformed at master 704 by a journal replicator (or journal replicationprocess). The journal replicator reads the queue and sends item(s) tothe member(s). This process may be performed in parallel with theprocess of FIG. 7D. In this example, the journal queue is read (762). Insome embodiments, the journal queue is stored as a database and thejournal replicator performs a database transaction to read from thequeue. One or more items may be read from the journal queue. Forexample, the item may be a write request or status information(indicating whether there was a conflict). In some embodiments, theitem(s) is removed from the journal queue after it is read. The item(s)is sent to the member on the replication stream (764). Items may be readfrom the journal queue at regular intervals or at other times. The itemmay be sent to the originating member and/or any other member(s). Forexample, if the item is status information indicating that there was aconflict on the master, the item would be sent to the originatingmember. If the item is a write request (indicating that there was noconflict on the master), the item would be propagated to all members. Inthis case, the item is “lazily” replicated over the merge stream tomembers.

FIG. 7F is a flowchart illustrating a method of receiving an item on thereplication stream at an originating member. In some embodiments, thisprocess is performed on one of members 708 or 710 in response toreceiving an item on the replication stream from a master, as describedabove. In this example, the item is received from the master over thereplication stream (768). The item is removed from the journal queue(772). In other words, the member recognizes its own write request andgarbage collects the journal queue. In this way, the journal queue canbe used to verify that a write request has been reconciled with themaster. It is determined whether there was a conflict (774) on themaster. If it is determined that there was a conflict, the conflict ismanaged (778). For example, the corresponding transaction, operation, orsemantic command may be backed out of the member database. If it isdetermined that there was not a conflict, the process ends (776). Insome embodiments, removing the item from the journal queue and managingthe conflict are performed as one atomic transaction. This way, if theconflict is not handled, the journal queue is still aware of that fact.In some embodiments, removing the item from the journal queue isoptional. In this case, the item may have been removed from the journalqueue when it was originally sent over the merge stream.

FIG. 7G is a flowchart illustrating a method of receiving an item on thereplication stream at a non-originating member. In some embodiments,this process is performed on one of members 708 or 710 in response toreceiving an item on the replication stream from a master, as describedabove. In this example, an item is received from the master over thereplication stream (780). For example, the item was applied to themaster without conflict and the item has been sent to the member forreplication. The write is applied to the member database (782). In someembodiments, this process is performed on all non-originating members tosynchronize the member databases with the master database.

In some embodiments, the processes described above are performed withinsystem 700. For example, if member 708 is the originating member, theprocesses of FIGS. 7B, 7C, and 7F are performed on member 708. Theprocesses of FIGS. 7D and 7E are performed on master 704. The process ofFIG. 7G is performed on non-originating member 710. In one embodiment,member 708 receives a write request in the form of a semantic commandand the semantic command is processed by semantic processor 718.Semantic processor 718 interprets the semantic command and appliesappropriate operations to database 720. In the same atomic transaction,the semantic command is placed in journal queue 706. The semanticcommand is decomposed into primitives and the primitives are stored injournal queue 706. The primitives are propagated over merge stream 730 ato be reconciled with the master. If there is a conflict, master 704notifies member 708. If there is not a conflict, master 704 applies theprimitives and propagates the primitives to members 708 and 710 overreplication stream 732 a and 732 b. In some embodiments, this is donevia journal queue 706. Member 708 receives the primitives and removesthem from journal queue 706. Member 710 receives the primitives andapplies them to local database 726.

FIG. 8 is a diagram illustrating a system for performing atomictransactions in a distributed database. In this example, system 800 isshown to include master 804 and two members 808 and 810. Master 804 isshown to be an HA pair including an active node and a passive node.Similarly each of members 808 and 810 is an HA pair including an activenode and a passive node. The active node provides access to the databaseand the passive node serves as a backup to the active node.

If, master 804 receives a write request, the write request is applied tothe active node (written to the database in the active node) and to thepassive node as a single atomic transaction. In other words, the writeis transactionally replicated to the passive node. Thus, the active andpassive nodes are transactionally consistent. If a node fails, there isno data loss. The write is then propagated to the members. Each memberapplies the write to the active node and the passive node in a singleatomic transaction. The write may be expressed in any appropriate way,such as a semantic or other command or instruction. The write may beexpressed as data that is to be pushed to (written to) the database, inthe case of data replication.

In this example, members 808 and 810 may or may not have provisionalwrite authority. In the case where members 808 and 810 have provisionalwrite authority, a write request received at a member is applied to theactive and passive nodes within the member as an atomic transaction. Thewrite is then propagated to the master.

FIG. 9A is a diagram illustrating a system for provisionally writingdata using atomic transactions in a distributed database. In thisexample, system 900 is shown to include master 904 and two members 908and 910. Any number of members may be included in other embodiments.Master 904 is shown to include an active node and a passive node.Similarly, each of members 908 and 910 includes an active node and apassive node. The active node provides access to the local database. Forexample, when a read (e.g., select) request is received at member 908,active database 920 is read. The passive node serves as a backup to theactive node. In the event of failure of the active node, the passivenode handles database access at that member. Each node includes ajournal queue and a local version of the database. In some embodiments,each node includes a semantic processor and/or semantic translationprocessor.

In some embodiments, members 908 and 910 each have provisional writeauthority. A write request received at member 908 is applied to localdatabase 920 and placed in journal queue 906 in a single atomictransaction. The write request is also applied to the passive node,i.e., the write request is applied to local database 921 and placed injournal queue 907 in a single atomic transaction. In some embodiments,the write to the active node (to database 920 and to journal queue 906)and the write to the passive node (to database 921 and to journal queue907) are part one atomic transaction. In other words, the write istransactionally replicated to the passive node. Thus, the databases andjournal queues on both the active and the passive nodes aretransactionally consistent.

Later, the write (e.g., journal queue item(s)) is propagated fromjournal queue 906 to the master over merge stream 930 a to reconcile thewrite with database 916 on the master. In other words, the write islazily replicated to the master. If there is no conflict on the master,the write request is applied to active database 916 and placed injournal queue 902 in a single atomic transaction. The write request isalso applied to the passive node, i.e., the write request is applied tolocal database 917 and placed in journal queue 903 in a single atomictransaction. In some embodiments, the write to the active node (todatabase 916 and to journal queue 902) and the write to the passive node(to database 917 and to journal queue 903) are part of one atomictransaction.

At a later time, master 904 propagates the write request (or conflictstatus) over replication streams 932 a and 932 b. In the case of noconflict, the write request is replicated to all members in someembodiments. In other words, the write is lazily replicated to themembers. In some embodiments, the write is replicated to all membersexcept the originating member. In the case of conflict, a conflictindication is sent to the originating member. In some embodiments, theconflict indication is sent to all members. This may be the case forease of implementation, for example.

As described above, each member receives the information over itsrespective replication stream. The originating member 908 confirms thewrite (in the case where there is no conflict) and manages the conflict(e.g., backs out the transaction) in the case where there is a conflict.The corresponding item(s) is removed from the journal queue on theactive node and on the passive node. In some embodiments, removing theitem(s) from the journal queue occurs on the active and passive node ina single atomic transaction. The non-originating member 910 applies thewrite (as it has not seen the write before), in the case where there wasno conflict on the master. Member 910 manages the conflict in the casewhere there is a conflict. For example, if the conflict was that a writerequest was received for an object that was deleted, the conflictresolution may specify that the request should be ignored.

In this example, a write to a first version of the database in the nodeand a write to an entity representative of a state of the first versionof the database are performed in one atomic transaction. The entitycould be a journal queue or a second version of the database in apassive node.

In case of network segmentation or failure, having transactionalreplication between the active and passive nodes means that the activeand passive versions (copies) of the database are transactionallyconsistent. As such, there is no data loss in the event of a nodefailure. In addition, having the journal queue write and database writeon each node also be transactionally consistent means that there is noloss of data being merged with the master. If a member gets disconnectedfrom the master, the journal queue can continue to fill up locally.

Markup Language Specification of a Database Schema

Databases may be organized in a particular schema, such as an objectoriented or a relational schema, each of which is specific to a databaselanguage. Routines to access and manage the data are implemented in aspecific database language, which requires intricate knowledge of thelanguage. Further, existing schemas typically do not provide astraightforward way to handle relationships between various objects inthe database. Logical data consistency of these relationships ismaintained by implementing database language specific routines, which istime consuming and prone to error. A more robust method of implementinga database schema is needed.

Generating a database schema is disclosed. The database schema isspecified in a markup language and translated into an in memoryrepresentation. Specific database language code is generated from the inmemory representation. Database relationships may be enforced byspecifying within a database schema a reference type that associates twostructures and specifies the relationship between the two structures,and automatically generating code that checks the relationship betweenthe two structures.

FIG. 9B is a block diagram illustrating how a markup languagerepresentation of a database is transformed into a specific databaseschema. In this example, a markup language based on Extensible MarkupLanguage (XML) specifies a database schema. This markup language isreferred to as Runtime XML (RTXML). RTXML specifies the objects in thedatabase and the logical relationships between objects in the database.RTXML also provides mechanisms to check values in the database forconsistency. Using RTXML to specify the database schema provides a layerof abstraction from the target database language, which can greatlysimplify development time and effort. In this example, XML 9502 isprocessed by a front end compiler 9504 into an internal representation9506. For example, the XML structures may be represented by compiled Ccode. A backend code generator 9508 processes internal representation906 and generates a database language specific representation of thestructures. For example, Structured Query Language (SQL) 9510, ObjectQuery Language (OQL) 9512, or Berkeley DB 9514 (e.g., a version made bySleepycat Software) are examples of some of the database schema that maybe generated. In some embodiments, backend code generator 9508 includesa separate code generator for each database language that may bedesired.

The following is an example of RTXML code (Example 1):

<package name=“.com.infoblox.dns”> <structure name=“host”> <membername=“zone” type=“.com.infoblox.dns.zone” ref-type=“deep”key-type=“key”> <syntax string_length=“64”/> </member> <membername=“host_name” type=“rtxml.string” key-type=“key”> <syntaxstring_length=“64”/> </member> <member name=“ip_address”type=“rtxml.string”> <syntax “ip_address”/> </member> </structure><function name=“insert_host”> <argument name=“zone”/> <argumentname=“host_name”/> <argument name=“ip_address”/> <return name=“host”query=“INSERT INTO host (zone, host_name, ip_address) values(‘${zone}’,‘${host_name}’,‘${ip_address})”> </return> </function></package>

In this example, one structure and one function are specified within apackage “.com.infoblox.dns”. Structure is an example of a tag defined inRTXML. The structure has a name “host” and is a host structure. The hoststructure includes three members: a zone, a host_name, and anip_address. The zone member includes three attributes: a type, aref-type, and a key-type. The existence of the ref-type attributeindicates that the structure refers to another structure of typeindicated by the type attribute. In this case, the type is“.com.infoblox.dns.zone”, so the host structure refers to a zonestructure (not shown) defined in the package .com.infoblox.dns.

The ref-type attribute, in this case “deep”, indicates the type ofrelationship between this structure and a parent structure (thestructure to which this structure refers) or child structures(structures referring to this structure). A ref-type of “deep” indicatesthat if the parent structure does not exist, the structure cannot exist.In this case, the host structure cannot exist unless the parent zonestructure exists. A ref-type of “shallow” indicates that it is notnecessary for a parent or a child of the structure to exist. A ref-typeof “pinned” indicates that the structure cannot be deleted if there is achild structure referring to it. A key-type of “key” indicates that themember is part of the key for that structure. The key is a uniqueidentifier of the structure. In some embodiments, the key is aconcatenation of the values of all members tagged as keys. In this case,members host_name and zone are tagged as keys. If the host_name is“mail” and the zone is “infoblox.com”, the key would be“mail.infoblox.com”. A syntax tag is also shown within the zone member,indicating that member zone must follow the specified syntax rule (inthis case, the zone value is of maximum length 64). Similarly, membershost_name and ip_address have various attributes to describe theircharacteristics. Any number of other structures may also be defined.

The function has a name “insert_host” and includes three arguments:“zone”, “host_name”, and “ip_address”. The “return” tag indicates thefunction to be generated. For example, if this code were part of XML9502 from FIG. 9A, SQL 9510 would include the SQL table of the hoststructure and an SQL function (“insert_host(zone, host_name,ip_address”) that is provided, for example, as part of a supplementallibrary.

Any other function can be represented in RTXML. For example, databasefunctions, such as update, insert, delete, and select, can similarly bedefined in RTXML.

FIG. 10 is a diagram illustrating the relationships between variousstructures that can be defined using ref-types. In this example, eachnode 1010-1020 represents a structure. Three zone structures 1010, 1012,and 1020 and two host structures 1014 and 1016 are shown. Each noderepresenting a host structure shows the host_name and type. For example,host structure 1014 has host_name “mail” and type “infoblox”. The typeindicates the referenced structure, or parent structure. In the case ofhost structure 1014, the parent structure is zone structure 1012 withzone_name “infoblox”. Similarly, zone structure 1012 has type “com”,indicating that zone structure 1012 references zone structure 1010 withzone_name “com”. Zone structure 1010 has type “.”, indicating that thereis no zone above zone 1010. A structure can thus refer to a structure ofthe same type, as shown by the zone structure in this example. Alsoshown are the parent and child relationships that can exist betweenstructures. In this case, zone 1010 is the parent of zone 1012 and zone1020, zone 1012 is the parent of host 1014 and host 1016, host 1014 andhost 1016 are children of zone 1012, and zone 1012, and zone 1020 arechildren of zone 1010.

FIG. 11 is a flowchart illustrating a method of generating a databaseschema from a markup language representation of the database. In thisexample, structures in a markup language are received (1102). Forexample, a markup language such as RTXML is specified where thespecification includes various structures and functions. (e.g., XML 9502in FIG. 9B). An in memory representation of the structures is generated(1104). (e.g., internal representation 9506 in FIG. 9B) For example, afront end compiler may generate the in memory representation, as morefully described below. Language specific structures and functions aregenerated (1106). (e.g., specific database blocks 9510-9514) Forexample, a back end code generator may take the in memory representationof the structures and generate the equivalent database language specificcode, such as SQL code, as more fully described below. The functions maybe provided as part of a library to the developer, for example.

FIG. 12 is a diagram illustrating an example of generating an SQL tablefrom an RTXML representation of the table. In this example, the firstportion of RTXML code from Example 1 (RTXML 1202) is shown. From RTXML1202 an in memory representation is generated, as described in step1104. In some embodiments, the in memory representation of thestructures is represented by compiled C code 1204. For example, astructure in RTXML would be equivalent to a structure in C. There aremany other ways in which in memory structures can be stored, such as ina hash table, for example. For simplicity, additional code that may alsobe included is not shown in this example. For example, code representingthe ref-type and key information is not shown. Compiled C code 1204 isused to generate an SQL representation of the host structure 1206, asdescribed in step 1106. For example, a structure in C would beequivalent to a table in SQL. Alternatively, to generate an OQLdatabase, assuming the equivalent to an RTXML structure in OQL is afield, code to create an OQL field would be shown instead of code 1206.Similarly, in the case of a Berkeley DB database, the appropriateBerkeley DB syntax would be generated to insert the in memory structureand its associated key into a Berkeley DB database.

An RTXML function, such as “insert_host” shown above, would be similarlystored as an in memory structure and then converted to a specificdatabase language, such as SQL. In some embodiments, certain functionsare implicit in a structure definition. For example, for each structure,insert, delete, update, and select functions may be generatedautomatically.

FIG. 13 is a flowchart illustrating a method of generating an in memoryrepresentation of an RTXML structure. In some embodiments, this processcan be used to perform step 1104 from FIG. 11. In this example, an XMLfile is parsed. For each XML structure, the start of a structure isgenerated in an intermediate language (1302), such as C or Java. Forexample, assuming RTXML 1202 is being parsed, the following code wouldbe generated in C:

struct host {

For each member of each XML structure, the member is generated in theintermediate language (1304). For example, assuming RTXML 1202 is beingparsed, the following code would be generated in C:

char zone[64];

char host_name[64];

char ip_address[64];

For each XML structure, a close of structure is generated in theintermediate language (1306). For example, assuming RTXML 1202 is beingparsed, “};” would be generated in C:

As such, C code 1204 would be generated by this process. Theintermediate language is compiled to generate an in memoryrepresentation (1308). In this example, a C compiler could be used togenerate the in memory representation of the host structure.

FIG. 14 is a flowchart illustrating a method of generating an SQL tablefrom an in memory representation of a structure. In some embodiments,this process can be used to perform step 1106 from FIG. 11. In thisexample, in memory structures are parsed. For each in memory structure,SQL code is generated to create a table. For example, assuming the inmemory representation of code 1204 is being parsed, the following codewould be generated in SQL to indicate the beginning of a table creation:

create table host = (

For each member within each in memory structure, an SQL column isgenerated. For example, assuming the in memory representation of code1204 is being parsed, the following code would be generated in SQL:

zone varchar(63),

host_name varchar(63),

ip_address varchar(63),

For each structure, SQL code closing the table is generated (1406). Forexample, assuming the in memory representation of code 1204 is beingparsed, “)” would be generated in SQL to indicate the end of the tablecreation.

As such, the SQL code 1206 would be generated by this process. Forsimplicity, additional code that may also be included is not shown inthis example. For example, code representing the ref-type and keyinformation is not shown.

FIG. 15 is a flowchart illustrating a method of enforcing a referenceduring an insert. For example, a host is of ref-type “deep”, so logicmust be provided to ensure that a host is not inserted unless it has aparent. This logic would execute each time a request to insert a host(or add a host) is received. A request to insert a host is received(1602). For example, a user may enter in SQL (or another target databaselanguage) the following:

insert_host(“infoblox.com”, “mail”, “10.0.0.1”)

The zone structure (i.e., table, in the case of SQL) that is beingreferenced is found (1504). It is determined whether the specified zoneexists in the structure. In the above example, it is determined whetherthe specified zone “infoblox.com” exists. If the specified zone does notexist, the insert is disallowed (1508). If it is determined that thespecified zone does exist, the host is inserted (1512).

FIG. 16 is a flowchart illustrating a method of enforcing a referenceduring a delete. For example, other structures such as host have aref-type “deep” to zone, so logic must be provided to ensure that when azone is deleted, structures referring to the zone are deleted tomaintain logical database consistency. This logic would execute eachtime a request to delete a zone is received. A request to delete a zoneis received (1502). For example, a user may enter in SQL (or anothertarget database language) the following:

delete_zone(“infoblox.com”)

All structures referring to the zone are found (1604). For example,“mail.infoblox.com” and “www.infoblox.com” may be found in the aboveexample. The referring structures are deleted (1606). i.e.,“mail.infoblox.com” and “www.infoblox.com” would be deleted in the aboveexample. Other types of structures may also be found and deleted. Forexample, if the zone to be deleted were “.com”, zone structure“infoblox.com” would also be found and deleted. The zone is deleted(1608).

In some embodiments, not all referring structures are deleted. Forexample, if a referring structure has ref-type “shallow”, there is norequirement for a parent of a child to exist. As such, any structurereferring to the structure to be deleted would have its referenceremoved (e.g., nullified).

In some embodiments, it is not possible to delete all referringstructures. For example, if a referring structure has ref-type “pinned”,the structure may not be deleted if there is a child structure referringto it. As such, the attempt to delete would be disallowed.

In some embodiments, the logic described in FIGS. 15 and 16 is generatedin step 1106 by a backend code generator. In one embodiment, the logicis integrated in functions provided in a supplemental library in step1106 from FIG. 11. For example, the logic described in FIG. 15 would beprovided in the “insert_host” function. The logic described in FIG. 16would be provided in the “delete_zone” function. In other embodiments,the logic is provided implicitly by the target database language. Forexample, some target database languages may provide a way to specify andenforce these relationships.

Database Migration and Multiversion Database Cluster Management

A database schema describes the organization and structure of data in adatabase. Typically the schema of a database is modified incrementallywith each new software release. FIG. 17 is a diagram illustrating fiveversions of a database, v1 to v5. For example, a first version (v1) of acustomer database may include first name, last name, and SSN fields. Inthe next version (v2), a date of birth field may be added. As moreversions are released, a customer site may end up with multipledatabases each having different versions of software. Maintaining thelogic to migrate the various existing versions to newer versions becomesincreasingly difficult. For example, in FIG. 1, specific logic must bemaintained to translate from v1 to v2, v1 to v3, v1 to v4, v1 to v5, v3to v5, v2 to v3, v2 to v4, v4 to v5, and v2 to v5. In addition, it isdifficult to express translations that span more than one version, suchas a translation from v1 to v3. It would be desirable to have a simplermethod for translating databases.

Converting a first version of a database to a second version isdisclosed. Available translation steps are determined, a translationpath from the first version of the database to the second version isselected, and translation steps in the translation path are executed.

FIG. 18 is a diagram illustrating various versions of a database. Inthis example, Version 1 of the database includes a Customer object withthree members: LastName, FirstName, and SSN. Version 2 of the databaseincludes a customer object with four members: LastName, FirstName, SSN,and DOB_US_Format (i.e., month-date-year). Version 3 of the databaseincludes a customer object with three members: LastName.FirstName, SSN,and DOB_Euro_Format (i.e., date-month-year). Version 2, patch 1 of thedatabase includes a customer object with four members: LastName,FirstName, SSN, and DOB_Std_Format. Although objects are described inthis example, any other appropriate data structures, such as tables orstructures, may also be used.

t1 represents the translation from version 1 to version 2. t1 includes anew member translation for the Customer object, where the new member isDOB_US_Format. t2 represents the translation from version 1 to version2, patch 1. t2 includes a new member translation for the Customerobject, where the new member is DOB_Std_Format. t3 represents thetranslation from version 2 to version 3. t3 includes two member valuetransform translations for the Customer object. The first member valuetransform concatenates LastName and FirstName. The second member valuetransform reformats DOB_US_Format to DOB_Euro_Format. t4 represents thetranslation from version 2, patch 1 to version 3. t4 includes two membervalue transform translations for the Customer object. The first membervalue transform concatenates LastName and FirstName. The second membervalue transform reformats DOB_Std_Format to DOB_Euro_Format. Forexample, to migrate a database from version 1 to version 3, either t1and t3, or t2 and t4 can be applied. The translations are lossless andany available translation path can be taken. In one embodiment, eachtranslation t1-t4 is expressed in a markup language such as XML, as morefully described below.

The following is an example of an XML description of a database (Example1):

<database version=”2.0.0_R18″/> <object> <property name=”name”value=”127.0.0.1″/> <property name=”_(——)type”value=”.com.infoblox.one.node”/> <property name=”first_name”value=”John”/> <property name=”last_name” value=”Doe”/> </object><object> <property name=”name” value=”com″/> <property name=”_(——)type”value=”.com.infoblox.one.zone”/> </object> . . . </database>

In this example, the specification describes version 2.0.0_R18 of adatabase. The database includes a plurality of objects. Each objectincludes one or more members, where a member includes a name value pair.For example, the first object has four members: name “127.0.0.1”, type“.com.infoblox.one.node”, first_name “John”, and last_name “Doe”. Thefirst object is a node object. The second object has two members: name“com” and type “.com.infoblox.one.zone”. The second object is a zoneobject. Any number of objects can be specified. In one embodiment, theXML description of the database used is RTXML, a markup languagedescribed above and in U.S. patent application Ser. No. 10/950,357,which was previously incorporated by reference.

The following is an example of a Migration Description XML (MDXML)specification of a translation (Example 2):

<STRUCTURE-TRANSFORM STRUCT-NAME=”.com.infoblox.one.node”><MEMBER-NAME-CHANGE PRE-XFORM-VALUE=”name”POST-XFORM-VALUE=”node_name”/> <MEMBER-VALUE-CHANGE MEMBER-NAME=”name”PRE-XFORM-VALUE=”127.0.0.1″ POST-XFORM-VALUE=”192.168.1.2”/><MEMBER-VALUE-CHANGE MEMBER-NAME=”name” PRE-XFORM-VALUE=”127.0.0.2″POST-XFORM-VALUE=”192.168.1.3”/> <NEW-MEMBER MEMBER=”DOB”DEFAULT-VALUE=”Jan 1, 1970″ <MEMBER-VALUE-XFORM> <concat> <first_name><last_name> </concat> <destination full_name/> </MEMBER-VALUE-XFORM></STRUCTURE-TRANSFORM>

For example, MDXML may be used to describe a translation such as t1, t2,t3, or t4. In this example, the translation to be applied to structuresof type “.com.infoblox.one.node” is specified. The translation mayinclude a set of translations (or transforms), such as the following:

MEMBER-NAME-CHANGE changes the name of a member. For example, if thename of the structure was previously “name”, it would be changed to“node_name”.

MEMBER-VALUE-CHANGE changes the value of a member. For example, if thevalue of the name of the structure was previously “127.0.0.1”, it wouldbe changed to “192.168.1.2”.

NEW-MEMBER adds a new member to the structure. For example, a new memberwith name “DOB” and value “Jan. 1, 1970” would be created in thestructure.

MEMBER-VALUE-XFORM transforms the value of a member. For example,first_name and last_name values would be transformed according to theconcat tag, where the concat tag could indicate a concatenation of thefirst_name and last_name values.

Other types of translations may also be specified for objects of type“.com.infoblox.one.node”. Translations for other types of objects mayalso be specified.

The following is an example of an XML description of a database afterthe translation shown in Example 2 is applied to the database shown inExample 1 (Example 3):

<database version=”2.0.0_R19″/> <object> <property name=”node_name”value=”192.168.1.2″/> <property name=”_(——)type”value=”.com.infoblox.one.node”/> <property name=”dob” value=”Jan 1,1970″/> <property name=”full_name” value=”John.Doe”/> </object> <object> <property name=”name” value=”com″/> <property name=”_(——)type”value=”.com.infoblox.one.zone”/> </object> . . . </database>

As shown, “node” has become “node_name”. The member with name “_type” isunchanged. “dob” is a new member. “full_name” is a new member whosevalue is the concatenation of the first_name and last_name values. Thezone object is the same, since there were no translations described forthe zone object in the MDXML translation shown in Example 2.

FIG. 19 is a flowchart illustrating a method of converting a databasefrom a first version to a second version. In this example, a graph isbuilt based on a map list and MDXML files (1902). The following is anexample of a map list (Example 4):

<rtxml-version-map-list> <RTXML-VERSION-MAP version=”2.0.0-R18″md5=”2bf689e0aa69ab0663147908250cacc0″/> <RTXML-VERSION-MAPversion=”2.0.0-R19″ md5=”79fcd96045cb43147845d8336892a835″/></rtxml-version-map-list>

The map list uniquely maps a content based key to a database version. Inone embodiment, the content based key is a hash value, such as an MD5sum, of the database schema. In the example shown, the first mapping isfrom version “2.0.0-R18” to key “2bf689e0aa69ab0663147908250cacc0”. Thekey was obtained by taking a hash of the version “2.0.0-R18” databaseschema. Using the map list, the database version can be determined andthe appropriate translation graph can be constructed. FIG. 20 is adiagram of a translation graph. A translation graph describes theavailable paths that may be used to translate a database from oneversion to another version. In this example, the translation graph showsthe available paths that may be used to translate a database fromversion “2.0.0_R18” to version “2.0.0_R24”. (“2.0.0_Roff” might be aspecial release created for a particular customer.) For example,translations t1, t2, t3, t9, translations t4, t5, or translations t6,t7, t8, t9 may be applied to translate the database from version2.0.0_R18 to version 2.0.0_R24. In one embodiment, for each translationstep t1-t9, there is an MDXML file that describes the translation. Thus,if there is an MDXML file available for a particular translation, thattranslation is available for use as a step in a translation path.

Returning to FIG. 19, a translation path is selected (1904). Forexample, the shortest path (e.g., t4, t5) or the first path found (e.g.,t1, t2, t3, t9) may be selected. The appropriate translation steps inthe path are applied to the database (1906). For example, if theshortest path was selected in step 1904, the MDXML file for t4 and theMDXML file for t5 would be used to translate the database, as more fullydescribed below.

FIG. 21 is a flowchart illustrating a method of applying translationsteps to arrive at a desired database version. In one embodiment, thismethod is used to perform step 1906 of FIG. 19. In this example, an XMLdump of the database is performed (2102). For example, the databasecould be a relational, object-oriented, or any other type of database.That database would be dumped into an XML file, e.g., formattedsimilarly to the file shown in Example 1. In one embodiment, thedatabase is already described in XML. The database is translated fromthe current version to the next version (2104) using the appropriateMDXML file. In one embodiment, the MDXML file is parsed into in memorystructures based on the type of structure, e.g., there is one in memorystructure describing the translations for each type of structure. It isdetermined whether the database version is the desired version (2106).If the database version is the desired version, the process ends (2108).If the database version is not the desired database version, the processreturns to step 2104 in which the database is translated from thecurrent version to the next version using the appropriate MDXML file.For example, if the next step is to perform translation t2 in FIG. 4,“t2.mdxml” is used. In this example, the database is translated from oneversion to another incrementally, i.e., the database is translated oneversion at a time until the desired version is reached. In oneembodiment, each time a new database version is released, an MDXML fileis released to describe the incremental translation from the previousversion.

FIG. 22 is a flowchart illustrating a method of translating a databasefrom one version to the next version. In one embodiment, this process isused to perform step 2104 of FIG. 21. In this example, the first objectis read (2202). In one embodiment, the first object in an XML filerepresenting a database is read. For example, returning to Example 1,the first object read would be the node object with name “127.0.0.1” andtype “.com.infoblox.one.node”. It is determined whether there are anytranslations for that object type. For example, if the object is a nodeobject, it is determined whether there are any translations for the nodeobject. In some embodiments, the in memory structures of the MDXML fileparsed in step 2104 are consulted for translations corresponding to theobject. For example, if the MDXML file looked like Example 2, it wouldbe determined that there are translations for the node object, as thestructure transform shown is for an object (or structure) of type node(“.com.infoblox.one.node”). If it is determined that there aretranslation(s) for that object type, the translation is applied to theobject (2206). For example, if the structure transform for objects oftype node shown in Example 2 is applied to the node object shown inExample 1, the resulting object would look like the node structure shownin Example 3. The resulting object is written to a file (2208), e.g.,tmp.xml. It is determined whether the object is the last object in thedatabase XML file (2210). If the object is the last object, the processends (2212). If the object is not the last object, the process returnsto step 2202 and the next object is read. Returning to step 2204, ifthere are no translations for that object type, the object is written tothe file (2208) and the process continues as described above. Theresulting file (e.g., tmp.xml) is the XML file associated with thetranslated database. The resulting file may be used to generate the newdatabase, such as an object oriented or relational database. In someembodiments, rather than translating one object at a time, objects aretranslated in groups.

In addition to database migration, the system and methods describedherein may also be used for other purposes. For example, in oneembodiment the techniques described above are used to manage a databasecluster having multiple versions of a database.

FIG. 23 is a block diagram illustrating a system used in one embodimentto manage a database cluster having multiple database versions. In thisexample, the system includes five databases 2302-2310. Databases 2302and 2304 have version 1 software. Databases 2306 and 2308 have version 2software, and database 2310 has version 3 software. Such a scenario, inwhich multiple database versions exist within a cluster, can occurduring a system upgrade process. For example, rather than upgrading allthe databases to the latest version at once, the databases may bemigrated one at a time. In one embodiment, databases 2302-2310 serve asbackups of each other. If one database fails, there are four remainingbackup databases that are available. All the databases would need tofail before the cluster failed. If any one of databases 2302-2310 isupdated, the other databases would also need to be updated.

t1 represents the translation from version 1 to version 2. t1′represents the translation from version 2 to version 1. t3 representsthe translation from version 2 to version 3. t3′ represents thetranslation from version 3 to version 2. For example, an update sentfrom database 2302 to database 2306 would be translated using t1. Anupdate from sent from database 2306 to database 2304 would be translatedusing t1′. An update sent from database 2304 to database 2308 would betranslated using t1. An update sent from database 2304 to database 2310would be translated using t1 and t3. Each of translations t1, t1′, t3,and t3′ may be described by an XML file, such as an MDXML file.

FIG. 24 is a flowchart illustrating a method of propagating an updatefrom a first database to a second database with a different version. Inthis example, an update is received (2402). For example, an update isreceived at database 2302 in FIG. 23. The update could be any writerequest, such as update, delete, or insert. The version of the databaseis determined (2404). For example, a content based key, such as a hashvalue, is generated based on the first database schema. A map list canbe consulted to determine the version of the database from the contentbased key, as described above. A translation path is determined (2406).In one embodiment, a translation graph is consulted to determine thetranslation path. For example, to propagate an update from database 2304(version 1) to database 2310 (version 3), there may be two availabletranslation paths: t1, t3 or t2, t4. The translation path may bedetermined based on any appropriate criteria, such as the shortest pathor the first path found. The translation path may be predetermined. Forexample, translation path t1, t3 may be the predetermined path; that is,when an update is received at database 2310, translation path t1, t3 isautomatically used to translate the update. In some embodiments, thetranslation occurs at database 2304. For example, a translation from v2to v1 may occur at database 2304. The updates are sequentially applied(2408). For example, t1 is applied followed by t3 if translation patht1, t3 is selected. Similarly, the update could be propagated to theother databases in the cluster.

Although the foregoing embodiments have been described in some detailfor purposes of clarity of understanding, the invention is not limitedto the details provided. There are many alternative ways of implementingthe invention. The disclosed embodiments are illustrative and notrestrictive.

What is claimed is:
 1. A method of replicating IP address assignmentchanges in a distributed database having a plurality of nodes,comprising: receiving a semantic command at a first node having a firstlocal version of the database, wherein the semantic command comprises asemantically expressed request to modify one or more IP addressassignments in the database that allows for provisional modification ofthe first local version of the database before sending the semanticcommand to a master node having a master version of the database; andprovisionally applying the semantic command to the first local versionof the database using a processor before sending the semantic command tothe master node, wherein the provisional applying the semantic commandto the first local version of the database comprises modifying the firstlocal version of the database before reconciling the modification withthe master node, and wherein if the semantic command includes any IPaddress assignment changes that would result in an IP address assignmentconflict with IP address assignment data stored in the master version ofthe database on the master node, then the semantic command is notapplied to the master node.
 2. A method as recited in claim 1, furtherincluding reconciling the semantic command with the master version ofthe database, wherein reconciling the semantic command with the masterversion of the database includes determining whether the semanticcommand includes any IP address assignment changes that would result inan IP address assignment conflict with IP address assignment data storedin the master version of the database on the master node.
 3. A method asrecited in claim 1, further including interpreting the semantic command,including determining an operation associated with the semantic command,wherein the semantic command is defined by one or more instructions oroperations.
 4. A method as recited in claim 1, further including sendingthe semantic command to the master node to reconcile the semanticcommand with the master version of the database based on any IP addressassignment changes associated with the semantic command.
 5. A method asrecited in claim 1, wherein the first node is a passive node in a highavailability pair.
 6. A method as recited in claim 1, further includingtranslating the semantic command into a set of one or more semanticcommands, wherein the semantic command has a meaning in a first contextthat is characteristic of a first node, and wherein the set of commandshas a meaning in a second context that is characteristic of a secondnode.
 7. A method as recited in claim 1, wherein each of the pluralityof nodes includes a semantic processor configured to interpret thesemantic command and apply the semantic command to the local version ofthe database.
 8. A method as recited in claim 1, wherein each of theplurality of nodes includes a semantic processor configured to interpretthe semantic command and apply the semantic command to the local versionof the database, and wherein a semantic change channel between eachsemantic processor is used to upgrade the semantic processor.
 9. Amethod as recited in claim 1, wherein each of the plurality of nodesincludes a semantic processor configured to interpret the semanticcommand and apply the semantic command to the local version of thedatabase, and wherein a semantic replication channel between eachsemantic processor is used to send and receive semantic commands.
 10. Amethod as recited in claim 1, wherein the semantic command is receivedover a semantic replication channel.
 11. A method as recited in claim 1,wherein each of the plurality of nodes includes a semantic translationprocessor configured to translate the semantic command so that it can beprocessed by a local semantic processor.
 12. A method as recited inclaim 1, wherein the semantic command is determined not to have aconflict with the master version of the database, and furthercomprising: sending the semantic command to a second node having asecond local version of the database to replicate any IP addressassignment changes associated with the semantic command on the secondnode.
 13. A method as recited in claim 1, wherein the semantic commandis determined to result in a conflict with the master version of thedatabase and further comprising: sending conflict status information tothe first node, wherein the first node manages the conflict includingbacking out any of the IP address assignment changes associated with thesemantic command.
 14. A computer program product for replicating IPaddress assignment changes in a distributed database having a pluralityof nodes, the computer program product being embodied in anon-transitory computer readable medium and comprising computerinstructions for: receiving a semantic command at a first node having afirst local version of the database, wherein the semantic commandcomprises a semantically expressed request to modify one or more IPaddress assignments in the database that allows for provisionalmodification of the first local version of the database before sendingthe semantic command to a master node having a master version of thedatabase; and provisionally applying the semantic command to the firstlocal version of the database before sending the semantic command to themaster node, wherein the provisional applying the semantic command tothe first local version of the database comprises modifying the firstlocal version of the database before reconciling the modification withthe master node, and wherein if the semantic command includes any IPaddress assignment changes that would result in an IP address assignmentconflict with IP address assignment data stored in the master version ofthe database on the master node, then the semantic command is notapplied to the master node.
 15. A computer program product as recited inclaim 14, reconciling the semantic command with the master version ofthe database, wherein reconciling the semantic command with the masterversion of the database includes determining whether the semanticcommand includes any IP address assignment changes that would result inan IP address assignment conflict with IP address assignment data storedin the master version of the database on the master node.
 16. A computerprogram product as recited in claim 14, the computer program productfurther comprising further including interpreting the semantic command,including determining an operation associated with the semantic command,wherein the semantic command is defined by one or more instructions oroperations.
 17. A computer program product as recited in claim 14, thecomputer program product further comprising further including sendingthe semantic command to the master node to reconcile the semanticcommand with the master version of the database based on any IP addressassignment changes associated with the semantic command.
 18. A computerprogram product as recited in claim 14, wherein the first node is apassive node in a high availability pair.
 19. A computer program productas recited in claim 14, the computer program product further comprisingcomputer instructions for translating the semantic command into a set ofone or more semantic commands, wherein the semantic command has ameaning in a first context that is characteristic of a first node, andwherein the set of commands has a meaning in a second context that ischaracteristic of a second node.
 20. A computer program product asrecited in claim 14, wherein the semantic command is determined not tohave a conflict with the master version of the database, and furthercomprising instructions for: sending the semantic command to a secondnode having a second local version of the database to replicate any IPaddress assignment changes associated with the semantic command on thesecond node.
 21. A computer program product as recited in claim 14,wherein the semantic command is determined to result in a conflict withthe master version of the database and further comprising instructionsfor: sending conflict status information to the first node, wherein thefirst node manages the conflict including backing out any of the IPaddress assignment changes associated with the semantic command.
 22. Asystem for replicating IP address assignment changes in a distributeddatabase having a plurality of nodes, comprising: a processor configuredto: receive a semantic command at a first node having a first localversion of the database, wherein the semantic command comprises asemantically expressed request to modify one or more IP addressassignments in the database that allows for provisional modification ofthe first local version of the database before sending the semanticcommand to a master node having a master version of the database; andprovisionally apply the semantic command to the first local version ofthe database before sending the semantic command to the master node,wherein the provisional applying the semantic command to the first localversion of the database comprises modifying the first local version ofthe database before reconciling the modification with the master node,and wherein if the semantic command includes any IP address assignmentchanges that would result in an IP address assignment conflict with IPaddress assignment data stored in the master version of the database onthe master node, then the semantic command is not applied to the masternode; and a memory coupled with the processor, wherein the memoryprovides the processor with instructions.
 23. A system as recited inclaim 22, reconcile the semantic command with the master version of thedatabase, wherein reconciling the semantic command with the masterversion of the database includes determining whether the semanticcommand includes any IP address assignment changes that would result inan IP address assignment conflict with IP address assignment data storedin the master version of the database on the master node.
 24. A systemas recited in claim 22, wherein the processor is further configured tointerpret the semantic command, including determining an operationassociated with the semantic command, wherein the semantic command isdefined by one or more instructions or operations.
 25. A system asrecited in claim 22, wherein the processor is further configured to sendthe semantic command to the master node to reconcile the semanticcommand with the master version of the database based on any IP addressassignment changes associated with the semantic command.
 26. A system asrecited in claim 22, wherein the first node is a passive node in a highavailability pair.
 27. A system as recited in claim 22, wherein theprocessor is further configured to translate the semantic command into aset of one or more semantic commands, wherein the semantic command has ameaning in a first context that is characteristic of a first node, andwherein the set of commands has a meaning in a second context that ischaracteristic of a second node.
 28. A system as recited in claim 22,wherein the semantic command is determined not to have a conflict withthe master version of the database, and wherein the processor is furtherconfigured to: send the semantic command to a second node having asecond local version of the database to replicate any IP addressassignment changes associated with the semantic command on the secondnode.
 29. A system as recited in claim 22, wherein the semantic commandis determined to result in a conflict with the master version of thedatabase, and wherein the processor is further configured to: sendconflict status information to the first node, wherein the first nodemanages the conflict including backing out any of the IP addressassignment changes associated with the semantic command.