Cross-compilation, orchestration, and scheduling for in-memory databases as a service

ABSTRACT

In an example embodiment, a new solution is provided for an in-memory database provided in a cloud as a service that enables “job cross running” instead of “parallel job running.” Specifically, job scripts are clustered based on a shared service. A primary job script in the cluster is compiled and executed, but secondary job scripts in the cluster are not compiled until after the execution of the primary job script has begun. A mock library is inserted into each of the secondary job scripts to cause service calls for the shared service in the secondary job scripts to be replaced with mock service calls. The secondary job scripts are then scheduled and executed, and upon completion the primary job script is permitted to delete the shared service.

TECHNICAL FIELD

This document generally relates to in-memory database as a serviceadministration. More specifically, this document relates tocross-compilation, orchestration, and scheduling for in-memory databasesas a service on a cloud platform.

BACKGROUND

An in-memory database as a service (also known as an in-memory databaseas a service management system on a cloud platform) is a type ofdatabase management system that primarily relies on main memory forcomputer data storage and computation.

BRIEF DESCRIPTION OF DRAWINGS

The present disclosure is illustrated by way of example and notlimitation in the figures of the accompanying drawings, in which likereferences indicate similar elements.

FIG. 1 is a block diagram illustrating a system for scheduling jobs foran in-memory database in a cloud environment, in accordance with anexample embodiment.

FIG. 2 is a block diagram illustrating a programmatic PDB controller inaccordance with an example embodiment.

FIG. 3 is a workflow diagram illustrating cross-compiled jobs inaccordance with an example embodiment.

FIG. 4 is a workflow diagram illustrating cross-compiled jobs that arealso scheduled based on clustering of the APIs used to call the jobs, inaccordance with an example embodiment.

FIG. 5 is a flow diagram illustrating a method for scheduling compiledjob scripts in a computer system in accordance with an exampleembodiment.

FIG. 6 is a block diagram illustrating an architecture of software,which can be installed on any one or more of the devices describedabove.

FIG. 7 illustrates a diagrammatic representation of a machine in theform of a computer system within which a set of instructions may beexecuted for causing the machine to perform any one or more of themethodologies discussed herein, according to an example embodiment.

DETAILED DESCRIPTION

The description that follows discusses illustrative systems, methods,techniques, instruction sequences, and computing machine programproducts. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide anunderstanding of various example embodiments of the present subjectmatter. It will be evident, however, to those skilled in the art, thatvarious example embodiments of the present subject matter may bepracticed without these specific details.

It is contrasted with database management systems that employ a diskstorage mechanism. In-memory databases are traditionally faster thandisk storage databases because disk access is slower than memory access.One example in-memory database is the HANA® database from SAP SE, ofFrankfurt Germany.

One implementation of in-memory databases is to place them in a cloudand allow access to the cloud database as a service. For the HANA®cloud, this is known as HANA® as a service (HaaS). This allows customersto leverage the in-memory data processing and advanced analyticcapabilities in the cloud.

Such services may allow applications to be developed using specializedin-memory database extended application services and deployed to a CloudFoundry environment. Cloud Foundry is an open source, multi-cloudapplication platform as a service that allows for continuous delivery asit supports a full application development lifecycle, from initialdeployment through testing stages to deployment. Container cloud Foundryutilizes a container-based architecture that runs application in anyprogramming language over a variety of cloud service providers.

Job scheduling in Cloud Foundry can be technically challenging. Amonolithic cluster schedule architecture is used to manage thescheduling of all possible jobs simultaneously, which makes it difficultto scale as the complexity (and number of concurrent users) ofapplications and services becomes greater. These monolithic schedulersuse a single, centralized scheduling algorithm for all jobs. Analternative would be a two-level scheduler that have a single activeresource manager that offers computing resources to multiple paralleland independent scheduler frameworks. This encounters technicalproblems, however, as it only works well for resource allocation.Specifically, in-memory database service creation and deletion alwaystakes too long a time. The other problem is that some resource requestsfrom some jobs cannot be satisfied because the independent schedulerframework believes there are no available resources when anotherindependent scheduler framework could offer the same resource, as adeveloper may not provide a configuration file for detailed resourcerequest, thus it is difficult for such a scheduler to estimate theresource quota.

What is needed is a solution that solves these technical problems.

In an example embodiment, a new solution is provided for an in-memorydatabase provided in a cloud as a service that enables “job crossrunning” instead of “parallel job running.” Specifically, job scriptsare clustered based on a shared service. A primary job script in thecluster is compiled and executed, but secondary jobs scripts in thecluster are not compiled until after the execution of the primary jobscript has begun. A mock library is inserted into each of the secondaryjob scripts to cause service calls for the shared service in thesecondary job scripts to be replaced with mock service calls. Thesecondary job scripts are then scheduled and executed, and uponcompletion the primary job script is permitted to delete the sharedservice.

In one example embodiment, each instance of the in-memory database isembedded in a running container, such as a Docker® container.Configuration files are embedded in a container runtime. In thisembodiment, a cross-scheduling strategy is used that clusters jobs withsimilar service requests. A job request may include the operations ofservice creation, deletion, start, stop, backup, restore, and/or others.

FIG. 1 is a block diagram illustrating a system 100 for scheduling jobsfor an in-memory database in a cloud environment, in accordance with anexample embodiment. A client 100 is a computing device that runs anapplication 102. The client 100 computing device may be, for example, adesktop computer, a laptop computer, or a mobile device such as a tabletor smart phone. The application 102 may be, for example, a front endportion of an application that runs on a server device (not pictured) ina cloud 104. In other embodiments, however, the application 102 may be aself-contained full application.

In the cloud 104, one or more access interfaces 106 may receive requestsfrom the application 102 on the client 100 (as well as from requestsfrom applications on other clients). The one or more access interfaces106 may take the form of one or more application program interfaces(APIs) that are called by the application 102. The one or more accessinterfaces 106 may cause the invocation of one or more jobs which thenneed to be scheduled for execution. Each of these jobs may berepresented by a different job script that defines the instructions thatare executed when the corresponding job is executed. These jobs may besent to a cross-scheduler 108. The cross-scheduler includes aprogrammatic debugging library 110, a cross-compiler 112, and a centralscheduler 114. The cross-compiler 112 compiles job scripts that share asimilar service request, such as calling the same in-memory databaseinstance.

As described in more detail later, the cross-compiler 112 compiles aprimary job script from a cluster of job scripts, but waits to compilethe secondary job scripts in the cluster of job scripts until after theprimary job script has begun execution. Furthermore, the cross-compiler112 adds code from the programmatic debugging library 110, specificallya mock library of code, to each of the secondary job scripts. This mocklibrary of code causes certain service calls, such as service creationand service deletion calls, corresponding to the shared service in thecluster, to be replaced with mock calls. The central scheduler 114analyzes the job scripts, causes execution of the primary job script byan execution engine 116, but hold completion of execution of the primaryjob script (specifically halting the execution of the primary job scriptjust before a service deletion call in the primary job script isexecuted). The secondary job scripts are then executed by the executionengine 116, and their mock deletion calls to the shared service aretracked so that the central scheduler 114 knows when all of thesecondary job scripts have completed their mock deletion calls to theshared service. Once these have been completed, the central schedulerpermits the primary job script to delete the shared service.

In FIG. 1, the shared service is access to the same in-memory database118, and thus the primary job script and the secondary job scripts inthis cluster all make calls to the in-memory database. In a morespecific example embodiment, the in-memory database may be a HANAinstance or a HaaS instance.

In an example embodiment, job scripts are written in the Pythonlanguage. In an example embodiment, a python debugger (PDB) is used tointeractively control the job execution automatically. Specifically, theprogrammatic interface library 104 controls the PDB execution, whichsends commands and fetches output with a specific Application ProgramInterface (API).

In the programmatic interface library 104, PDB is run as a subprocess,which sends commands and receives structured output. When a new objectis created, the PDB subprocess is created by default by the initialconstructor function, and this PDB subprocess is attached to the jobscript needed to be “debugged.” The reason “debugged” is in quotes isthat in an example embodiment the PDB subprocess is not just used todebug the job script but to actively modify it to allow forcross-scheduling of jobs. FIG. 2 is a block diagram illustrating aprogrammatic PDB controller in accordance with an example embodiment.Specifically, the programmatic PDB controller acts as a PDB wrapper 200around the PDB 202. Commands, such as those received from a scheduler,are received by the programmatic PDB wrapper 200 and used to have thePDB 202 generate input to the appropriate job script 204 to modify thejob script 204. The job script 204 then sends output to the programmaticPDB wrapper 200.

Some of these modifications are general in nature. Specifically, theoriginal input/output streams can be replaced. While the input/outputhere is in block mode, the standard error descriptor (stderr) cannot bedistinguished from the standard output descriptor (stdout). Thus, themodes of these two descriptors is changed to nonblock mode, which makesthe output not buffered in the operating system. The output can be readdirectly in an output PIPE. Additionally, the srdin/stdout/stderrdescriptors are distinguished as the file handler. Each input/output isbundled with a specific file handler so that every time the input/outputis read, the file handler is scanned and used to read the specificcontent.

In some instances the outputs cannot be obtained in the limited amountof time provided as the job keeps running and there is continuousoutput. In such cases, a timeout flag can be set.

Additionally, several signals, such as SIGINT, can be used toterminate/recycle the PDF subprocess immediately so that it does notbecome an orphan process.

In accordance with an example embodiment, a solution is provided thatshares the in-memory database instances between as many jobs aspossible, to increase the scheduling performance dramatically. In orderto accomplish this, in an example embodiment the job script that createsa service that includes an in-memory database instance needs to bemodified to not delete the service right after the job execution.Subsequent job scripts that utilize the same service need to be modifiedto reuse the previously created service instead of creating their own.For simplicity, the first job script that uses a particular servicecontaining a particular in-memory database will be called the primaryjob script for that service, while subsequent job scripts that utilizethe same service will be called the secondary job scripts.

In practice, this may be performed by first clustering all of the jobscripts that utilize the same in-memory database instance. Aconfiguration file may be used to select a primary job script from thejob scripts in a cluster, and the remaining job scripts in the clusterare secondary job scripts. The primary job script is compiled. Thesecondary job scripts within each cluster can have its codeautomatically modified by importing a mock library at the beginning ofthe scripts, and compilation of the secondary job scripts are delayed.This mock library acts to, within the secondary job scripts, facilitatethe modification of actual service creation calls into mock servicecreation calls and the modification of actual deletion calls into mockservice deletion calls. These mock calls only simulate the originalfunction calls but do not actually perform any of their executions. Assuch, the deletion of the service in the primary job scripts issimulated but not actually performed.

This essentially blocks service creation and deletion (for the in-memorydatabase services, anyway) in the secondary job scripts.

This process may be called cross compilation, because compilation stopsafter the primary service is created and then the secondary job scriptsare compiled at runtime.

The primary job script does not get modified, but is carefullyscheduled. Specifically, the scheduler (and the PDB controller in someembodiments) will control the primary job's execution such as by, forexample, holding its execution right before it gets to the deleteservice call in the primary job script. The scheduler counts thesuccesses of the secondary job script executions and decide whether tolet the primary job script delete its service.

At runtime, the jobs may be clustered, this time based on a differentfactor than used to cluster the job scripts for cross compilation. In anexample embodiment, this factor may be the general function of the job(as indicated by the API used to call each job). In an exampleembodiment, three function categories may be used: read-only, databasewrites, and in-memory database as-a-service writes. Job scheduling canthen be performed based on these job types. This is called cross runningjob scheduling. For example, read-only jobs may be scheduled in parallelas they do not interfere with each others' running, and write jobs maybe scheduled after the read-only jobs. Since all the job scripts exceptthe primary one are compiled dynamically, once all of the secondary jobscripts have executed their mock deletion, the scheduler can perform areal deletion of the service.

This process is depicted in FIGS. 3 and 4. FIG. 3 is a workflow diagramillustrating cross-compiled jobs in accordance with an exampleembodiment. Here, primary job 300 is invoked first, and the job scriptassociated with the primary job 300 causes a particular service creationfor a service utilized by secondary job 302A, 302B, and 302C. The jobscripts corresponding to the secondary jobs 302A, 302B, and 302C arethen dynamically compiled to cause mock service creation, reusing theservice created by the primary job 300. A count may be maintained of allof these mock service creations. This count may then be decremented aseach of the secondary jobs 302A, 302B, and 302C perform mock deletion ofthe service. Once that count indicates that all of the secondary jobs302A, 302B, 302C have performed mock deletion, then the service may bedeleted.

FIG. 4 is a workflow diagram illustrating cross-compiled jobs that arealso scheduled based on clustering of the APIs used to call the jobs, inaccordance with an example embodiment. Here, the secondary jobs 302A and302B were classified as read-only jobs, and thus are scheduled inparallel and prior to secondary job 302C, which is a database write orin-memory database-as-a-service write.

FIG. 5 is a flow diagram illustrating a method 500 for schedulingcompiled job scripts in a computer system in accordance with an exampleembodiment. At operation 502, a plurality of job scripts are clusteredtogether based on each of the plurality of job scripts invoking aparticular service. In an example embodiment this particular service maybe an in-memory database instance. At operation 504, a primary jobscript may be identified in the plurality of job scripts, with all otherjob scripts in the plurality of job scripts being secondary job scripts.This operation may be aided by the use of a configuration filespecifying rules for election of the primary job script. At operation506, the primary job script may be compiled.

At operation 508, a mock library may be inserted into each of thesecondary job scripts, the mock library including script commands that,when compiled, modify any service creation calls for the particularservice in the corresponding secondary job script into mock servicecreation calls and modify any service deletion calls for the particularservice in the corresponding secondary job into mock service deletioncalls.

At operation 510, the compiled primary job script is executed. Atoperation 512, the secondary job scripts are compiled after execution ofthe compiled primary job script has been initiated, causing thecorresponding service calls in the secondary job scripts to be replacedwith mock service calls. At operation 514, the secondary job scripts maybe scheduled.

At operation 516 the execution of the compiled primary job script ishalted before reaching the service deletion call in the compiled primaryjob script. At operation 518, the compiled secondary job scripts areexecuted. At operation 520, it is determined whether all of the compiledsecondary job scripts have been executed and their mock service deletioncalls for the particular service have been executed. If not, the method500 loops back to operation 518. If so, execution of the compiledprimary job script is resumed at operation 522, causing the execution ofthe service deletion call.

EXAMPLES

Example 1. A system comprising:

at least one hardware processor; and

a computer-readable medium storing instructions that, when executed bythe at least one hardware processor, cause the at least one hardwareprocessor to perform operations comprising:

clustering a plurality of job scripts together based on each of theplurality of job scripts invoking a particular service, each job scriptincluding a plurality of instructions to be executed by a computer toexecute a job;

identifying a primary job script in the plurality of job scripts, withall other job scripts in the plurality of job scripts being secondaryjob scripts;

compiling the primary job script;

inserting a mock library into each of the secondary job scripts, themock library including script commands that, when compiled, modify anyservice creation calls for the particular service in the correspondingsecondary job script into mock service creation calls and modify anyservice deletion calls for the particular service in the correspondingsecondary job into mock service deletion calls;

executing the compiled primary job script;

compiling the secondary job scripts after execution of the compiledprimary job script has been initiated; and

scheduling the secondary job scripts.

Example 2. The system of Example 1, wherein the compiled primary jobscript includes a service deletion call for the particular service andthe operations further comprise:

halting execution of the compiled primary job script before reaching theservice deletion call in the compiled primary job script;

determining that all of the compiled secondary job scripts have beenexecuted and their mock service deletion calls for the particularservice have been executed; and

in response to the determination, resuming execution of the compiledprimary job script.

Example 3. The system of Example 2, wherein the determining includesmaintaining a count of compiled secondary job scripts and decrementingthe count each time a compiled secondary job script has itscorresponding mock service deletion call for the particular serviceexecuted, wherein when the count reaches zero it is determined that allof the mock service deletion calls for the particular service in thecompiled secondary job scripts have been executed.Example 4. The system of any of Examples 1-3, wherein the schedulingcomprises clustering the compiled secondary job scripts based on jobtype.Example 5. The system of Example 4, wherein the job types includeread-only jobs and database write jobs.Example 6. The system of Example 4, wherein the job type is determinedbased on which application program interface (API) was used to call thecorresponding compiled secondary job script.Example 7. The system of any of Examples 1-6, wherein the particularservice is an in-memory database service.Example 8. A method comprising:

clustering a plurality of job scripts together based on each of theplurality of job scripts invoking a particular service, each job scriptincluding a plurality of instructions to be executed by a computer toexecute a job;

identifying a primary job script in the plurality of job scripts, withall other job scripts in the plurality of job scripts being secondaryjob scripts;

compiling the primary job script;

inserting a mock library into each of the secondary job scripts, themock library including script commands that, when compiled, modify anyservice creation calls for the particular service in the correspondingsecondary job script into mock service creation calls and modify anyservice deletion calls for the particular service in the correspondingsecondary job into mock service deletion calls;

executing the compiled primary job script;

compiling the secondary job scripts after execution of the compiledprimary job script has been initiated; and

scheduling the secondary job scripts.

Example 9. The method of Example 8, wherein the compiled primary jobscript includes a service deletion call for the particular service andthe method further comprises:

halting execution of the compiled primary job script before reaching theservice deletion call in the compiled primary job script;

determining that all of the compiled secondary job scripts have beenexecuted and their mock service deletion calls for the particularservice have been executed; and

in response to the determination, resuming execution of the compiledprimary job script.

Example 10. The method of Example 9, wherein the determining includesmaintaining a count of compiled secondary job scripts and decrementingthe count each time a compiled secondary job script has itscorresponding mock service deletion call for the particular serviceexecuted, wherein when the count reaches zero it is determined that allof the mock service deletion calls for the particular service in thecompiled secondary job scripts have been executed.Example 11. The method of any of Examples 8-10, wherein the schedulingcomprises clustering the compiled secondary job scripts based on jobtype.Example 12. The method of Example 11, wherein the job types includeread-only jobs and database write jobs.Example 13. The method of Example 11, wherein the job type is determinedbased on which application program interface (API) was used to call thecorresponding compiled secondary job script.Example 14. The method of any of Examples 8-13, wherein the particularservice is an in-memory database service.Example 15. A non-transitory machine-readable medium storinginstructions which, when executed by one or more processors, cause theone or more processors to perform operations comprising:

clustering a plurality of job scripts together based on each of theplurality of job scripts invoking a particular service, each job scriptincluding a plurality of instructions to be executed by a computer toexecute a job;

identifying a primary job script in the plurality of job scripts, withall other job scripts in the plurality of job scripts being secondaryjob scripts;

compiling the primary job script;

inserting a mock library into each of the secondary job scripts, themock library including script commands that, when compiled, modify anyservice creation calls for the particular service in the correspondingsecondary job script into mock service creation calls and modify anyservice deletion calls for the particular service in the correspondingsecondary job into mock service deletion calls;

executing the compiled primary job script;

compiling the secondary job scripts after execution of the compiledprimary job script has been initiated; and

scheduling the secondary job scripts.

Example 16. The non-transitory machine-readable medium of Example 15,wherein the compiled primary job script includes a service deletion callfor the particular service and the operations further comprise:

halting execution of the compiled primary job script before reaching theservice deletion call in the compiled primary job script;

determining that all of the compiled secondary job scripts have beenexecuted and their mock service deletion calls for the particularservice have been executed; and

in response to the determination, resuming execution of the compiledprimary job script.

Example 17. The non-transitory machine-readable medium of Example 16,wherein the determining includes maintaining a count of compiledsecondary job scripts and decrementing the count each time a compiledsecondary job script has its corresponding mock service deletion callfor the particular service executed, wherein when the count reaches zeroit is determined that all of the mock service deletion calls for theparticular service in the compiled secondary job scripts have beenexecuted.Example 18. The non-transitory machine-readable medium of any ofExamples 15-17, wherein the scheduling comprises clustering the compiledsecondary job scripts based on job type.Example 19. The non-transitory machine-readable medium of Example 18,wherein the job types include read-only jobs and database write jobs.Example 20. The non-transitory machine-readable medium of Example 18,wherein the job type is determined based on which application programinterface (API) was used to call the corresponding compiled secondaryjob script.

FIG. 6 is a block diagram 600 illustrating a software architecture 602,which can be installed on any one or more of the devices describedabove. FIG. 6 is merely a non-limiting example of a softwarearchitecture, and it will be appreciated that many other architecturescan be implemented to facilitate the functionality described herein. Invarious embodiments, the software architecture 602 is implemented byhardware such as a machine 700 of FIG. 7 that includes processors 710,memory 730, and input/output (I/O) components 750. In this examplearchitecture, the software architecture 602 can be conceptualized as astack of layers where each layer may provide a particular functionality.For example, the software architecture 602 includes layers such as anoperating system 604, libraries 606, frameworks 608, and applications610. Operationally, the applications 610 invoke API calls 612 throughthe software stack and receive messages 614 in response to the API calls612, consistent with some embodiments.

In various implementations, the operating system 604 manages hardwareresources and provides common services. The operating system 604includes, for example, a kernel 620, services 622, and drivers 624. Thekernel 620 acts as an abstraction layer between the hardware and theother software layers, consistent with some embodiments. For example,the kernel 620 provides memory management, processor management (e.g.,scheduling), component management, networking, and security settings,among other functionality. The services 622 can provide other commonservices for the other software layers. The drivers 624 are responsiblefor controlling or interfacing with the underlying hardware, accordingto some embodiments. For instance, the drivers 624 can include displaydrivers, camera drivers, BLUETOOTH® or BLUETOOTH® Low-Energy drivers,flash memory drivers, serial communication drivers (e.g., UniversalSerial Bus (USB) drivers), Wi-Fi® drivers, audio drivers, powermanagement drivers, and so forth.

In some embodiments, the libraries 606 provide a low-level commoninfrastructure utilized by the applications 610. The libraries 606 caninclude system libraries 630 (e.g., C standard library) that can providefunctions such as memory allocation functions, string manipulationfunctions, mathematic functions, and the like. In addition, thelibraries 606 can include API libraries 632 such as media libraries(e.g., libraries to support presentation and manipulation of variousmedia formats such as Moving Picture Experts Group-4 (MPEG4), AdvancedVideo Coding (H.264 or AVC), Moving Picture Experts Group Layer-3 (MP3),Advanced Audio Coding (AAC), Adaptive Multi-Rate (AMR) audio codec,Joint Photographic Experts Group (JPEG or JPG), or Portable NetworkGraphics (PNG)), graphics libraries (e.g., an OpenGL framework used torender in 2D and 3D in a graphic context on a display), databaselibraries (e.g., SQLite to provide various relational databasefunctions), web libraries (e.g., WebKit to provide web browsingfunctionality), and the like. The libraries 606 can also include a widevariety of other libraries 634 to provide many other APIs to theapplications 610.

The frameworks 608 provide a high-level common infrastructure that canbe utilized by the applications 610, according to some embodiments. Forexample, the frameworks 608 provide various graphical user interface(GUI) functions, high-level resource management, high-level locationservices, and so forth. The frameworks 608 can provide a broad spectrumof other APIs that can be utilized by the applications 610, some ofwhich may be specific to a particular operating system 604 or platform.

In an example embodiment, the applications 610 include a homeapplication 650, a contacts application 652, a browser application 654,a book reader application 656, a location application 658, a mediaapplication 660, a messaging application 662, a game application 664,and a broad assortment of other applications, such as a third-partyapplication 666. According to some embodiments, the applications 610 areprograms that execute functions defined in the programs. Variousprogramming languages can be employed to create one or more of theapplications 610, structured in a variety of manners, such asobject-oriented programming languages (e.g., Objective-C, Java, or C++)or procedural programming languages (e.g., C or assembly language). In aspecific example, the third-party application 666 (e.g., an applicationdeveloped using the ANDROID™ or IOS™ software development kit (SDK) byan entity other than the vendor of the particular platform) may bemobile software running on a mobile operating system such as IOS™,ANDROID™, WINDOWS® Phone, or another mobile operating system. In thisexample, the third-party application 666 can invoke the API calls 612provided by the operating system 604 to facilitate functionalitydescribed herein.

FIG. 7 illustrates a diagrammatic representation of a machine 700 in theform of a computer system within which a set of instructions may beexecuted for causing the machine 700 to perform any one or more of themethodologies discussed herein, according to an example embodiment.Specifically, FIG. 7 shows a diagrammatic representation of the machine700 in the example form of a computer system, within which instructions716 (e.g., software, a program, an application, an applet, an app, orother executable code) for causing the machine 700 to perform any one ormore of the methodologies discussed herein may be executed. For example,the instructions 716 may cause the machine 700 to execute the methods ofFIG. 5. Additionally, or alternatively, the instructions 716 mayimplement FIGS. 1-5 and so forth. The instructions 716 transform thegeneral, non-programmed machine 700 into a particular machine 700programmed to carry out the described and illustrated functions in themanner described. In alternative embodiments, the machine 700 operatesas a standalone device or may be coupled (e.g., networked) to othermachines. In a networked deployment, the machine 700 may operate in thecapacity of a server machine or a client machine in a server-clientnetwork environment, or as a peer machine in a peer-to-peer (ordistributed) network environment. The machine 700 may comprise, but notbe limited to, a server computer, a client computer, a personal computer(PC), a tablet computer, a laptop computer, a netbook, a set-top box(STB), a personal digital assistant (PDA), an entertainment mediasystem, a cellular telephone, a smart phone, a mobile device, a wearabledevice (e.g., a smart watch), a smart home device (e.g., a smartappliance), other smart devices, a web appliance, a network router, anetwork switch, a network bridge, or any machine capable of executingthe instructions 716, sequentially or otherwise, that specify actions tobe taken by the machine 700. Further, while only a single machine 700 isillustrated, the term “machine” shall also be taken to include acollection of machines 700 that individually or jointly execute theinstructions 716 to perform any one or more of the methodologiesdiscussed herein.

The machine 700 may include processors 710, memory 730, and I/Ocomponents 750, which may be configured to communicate with each othersuch as via a bus 702. In an example embodiment, the processors 710(e.g., a central processing unit (CPU), a reduced instruction setcomputing (RISC) processor, a complex instruction set computing (CISC)processor, a graphics processing unit (GPU), a digital signal processor(DSP), an application-specific integrated circuit (ASIC), aradio-frequency integrated circuit (RFIC), another processor, or anysuitable combination thereof) may include, for example, a processor 712and a processor 714 that may execute the instructions 716. The term“processor” is intended to include multi-core processors that maycomprise two or more independent processors (sometimes referred to as“cores”) that may execute instructions 716 contemporaneously. AlthoughFIG. 7 shows multiple processors 710, the machine 700 may include asingle processor 712 with a single core, a single processor 712 withmultiple cores (e.g., a multi-core processor 712), multiple processors712, 714 with a single core, multiple processors 712, 714 with multiplecores, or any combination thereof.

The memory 730 may include a main memory 732, a static memory 734, and astorage unit 736, each accessible to the processors 710 such as via thebus 702. The main memory 732, the static memory 734, and the storageunit 736 store the instructions 716 embodying any one or more of themethodologies or functions described herein. The instructions 716 mayalso reside, completely or partially, within the main memory 732, withinthe static memory 734, within the storage unit 736, within at least oneof the processors 710 (e.g., within the processor's cache memory), orany suitable combination thereof, during execution thereof by themachine 700.

The I/O components 750 may include a wide variety of components toreceive input, provide output, produce output, transmit information,exchange information, capture measurements, and so on. The specific I/Ocomponents 750 that are included in a particular machine will depend onthe type of machine. For example, portable machines such as mobilephones will likely include a touch input device or other such inputmechanisms, while a headless server machine will likely not include sucha touch input device. It will be appreciated that the I/O components 750may include many other components that are not shown in FIG. 7. The I/Ocomponents 750 are grouped according to functionality merely forsimplifying the following discussion, and the grouping is in no waylimiting. In various example embodiments, the I/O components 750 mayinclude output components 752 and input components 754. The outputcomponents 752 may include visual components (e.g., a display such as aplasma display panel (PDP), a light-emitting diode (LED) display, aliquid crystal display (LCD), a projector, or a cathode ray tube (CRT)),acoustic components (e.g., speakers), haptic components (e.g., avibratory motor, resistance mechanisms), other signal generators, and soforth. The input components 754 may include alphanumeric inputcomponents (e.g., a keyboard, a touch screen configured to receivealphanumeric input, a photo-optical keyboard, or other alphanumericinput components), point-based input components (e.g., a mouse, atouchpad, a trackball, a joystick, a motion sensor, or another pointinginstrument), tactile input components (e.g., a physical button, a touchscreen that provides location and/or force of touches or touch gestures,or other tactile input components), audio input components (e.g., amicrophone), and the like.

In further example embodiments, the I/O components 750 may includebiometric components 756, motion components 758, environmentalcomponents 760, or position components 762, among a wide array of othercomponents. For example, the biometric components 756 may includecomponents to detect expressions (e.g., hand expressions, facialexpressions, vocal expressions, body gestures, or eye tracking), measurebiosignals (e.g., blood pressure, heart rate, body temperature,perspiration, or brain waves), identify a person (e.g., voiceidentification, retinal identification, facial identification,fingerprint identification, or electroencephalogram-basedidentification), and the like. The motion components 758 may includeacceleration sensor components (e.g., accelerometer), gravitation sensorcomponents, rotation sensor components (e.g., gyroscope), and so forth.The environmental components 760 may include, for example, illuminationsensor components (e.g., photometer), temperature sensor components(e.g., one or more thermometers that detect ambient temperature),humidity sensor components, pressure sensor components (e.g.,barometer), acoustic sensor components (e.g., one or more microphonesthat detect background noise), proximity sensor components (e.g.,infrared sensors that detect nearby objects), gas sensors (e.g., gasdetection sensors to detect concentrations of hazardous gases for safetyor to measure pollutants in the atmosphere), or other components thatmay provide indications, measurements, or signals corresponding to asurrounding physical environment. The position components 762 mayinclude location sensor components (e.g., a Global Positioning System(GPS) receiver component), altitude sensor components (e.g., altimetersor barometers that detect air pressure from which altitude may bederived), orientation sensor components (e.g., magnetometers), and thelike.

Communication may be implemented using a wide variety of technologies.The I/O components 750 may include communication components 764 operableto couple the machine 700 to a network 780 or devices 770 via a coupling782 and a coupling 772, respectively. For example, the communicationcomponents 764 may include a network interface component or anothersuitable device to interface with the network 780. In further examples,the communication components 764 may include wired communicationcomponents, wireless communication components, cellular communicationcomponents, near field communication (NFC) components, Bluetooth®components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and othercommunication components to provide communication via other modalities.The devices 770 may be another machine or any of a wide variety ofperipheral devices (e.g., coupled via a USB).

Moreover, the communication components 764 may detect identifiers orinclude components operable to detect identifiers. For example, thecommunication components 764 may include radio-frequency identification(RFID) tag reader components, NFC smart tag detection components,optical reader components (e.g., an optical sensor to detectone-dimensional bar codes such as Universal Product Code (UPC) bar code,multi-dimensional bar codes such as QR code, Aztec code, Data Matrix,Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and otheroptical codes), or acoustic detection components (e.g., microphones toidentify tagged audio signals). In addition, a variety of informationmay be derived via the communication components 764, such as locationvia Internet Protocol (IP) geolocation, location via Wi-Fi® signaltriangulation, location via detecting an NFC beacon signal that mayindicate a particular location, and so forth.

The various memories (i.e., 730, 732, 734, and/or memory of theprocessor(s) 710) and/or the storage unit 736 may store one or more setsof instructions 716 and data structures (e.g., software) embodying orutilized by any one or more of the methodologies or functions describedherein. These instructions (e.g., the instructions 716), when executedby the processor(s) 710, cause various operations to implement thedisclosed embodiments.

As used herein, the terms “machine-storage medium,” “device-storagemedium,” and “computer-storage medium” mean the same thing and may beused interchangeably. The terms refer to a single or multiple storagedevices and/or media (e.g., a centralized or distributed database,and/or associated caches and servers) that store executable instructionsand/or data. The terms shall accordingly be taken to include, but not belimited to, solid-state memories, and optical and magnetic media,including memory internal or external to processors. Specific examplesof machine-storage media, computer-storage media, and/or device-storagemedia include non-volatile memory, including by way of examplesemiconductor memory devices, e.g., erasable programmable read-onlymemory (EPROM), electrically erasable programmable read-only memory(EEPROM), field-programmable gate array (FPGA), and flash memorydevices; magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and CD-ROM and DVD-ROM disks. The terms“machine-storage media,” “computer-storage media,” and “device-storagemedia” specifically exclude carrier waves, modulated data signals, andother such media, at least some of which are covered under the term“signal medium” discussed below.

In various example embodiments, one or more portions of the network 780may be an ad hoc network, an intranet, an extranet, a virtual privatenetwork (VPN), a local-area network (LAN), a wireless LAN (WLAN), awide-area network (WAN), a wireless WAN (WWAN), a metropolitan-areanetwork (MAN), the Internet, a portion of the Internet, a portion of thepublic switched telephone network (PSTN), a plain old telephone service(POTS) network, a cellular telephone network, a wireless network, aWi-Fi® network, another type of network, or a combination of two or moresuch networks. For example, the network 780 or a portion of the network780 may include a wireless or cellular network, and the coupling 782 maybe a Code Division Multiple Access (CDMA) connection, a Global Systemfor Mobile communications (GSM) connection, or another type of cellularor wireless coupling. In this example, the coupling 782 may implementany of a variety of types of data transfer technology, such as SingleCarrier Radio Transmission Technology (1×RTT), Evolution-Data Optimized(EVDO) technology, General Packet Radio Service (GPRS) technology,Enhanced Data rates for GSM Evolution (EDGE) technology, thirdGeneration Partnership Project (3GPP) including 3G, fourth generationwireless (4G) networks, Universal Mobile Telecommunications System(UMTS), High-Speed Packet Access (HSPA), Worldwide Interoperability forMicrowave Access (WiMAX), Long-Term Evolution (LTE) standard, othersdefined by various standard-setting organizations, other long-rangeprotocols, or other data transfer technology.

The instructions 716 may be transmitted or received over the network 780using a transmission medium via a network interface device (e.g., anetwork interface component included in the communication components764) and utilizing any one of a number of well-known transfer protocols(e.g., Hypertext Transfer Protocol (HTTP)). Similarly, the instructions716 may be transmitted or received using a transmission medium via thecoupling 772 (e.g., a peer-to-peer coupling) to the devices 770. Theterms “transmission medium” and “signal medium” mean the same thing andmay be used interchangeably in this disclosure. The terms “transmissionmedium” and “signal medium” shall be taken to include any intangiblemedium that is capable of storing, encoding, or carrying theinstructions 716 for execution by the machine 700, and include digitalor analog communications signals or other intangible media to facilitatecommunication of such software. Hence, the terms “transmission medium”and “signal medium” shall be taken to include any form of modulated datasignal, carrier wave, and so forth. The term “modulated data signal”means a signal that has one or more of its characteristics set orchanged in such a manner as to encode information in the signal.

The terms “machine-readable medium,” “computer-readable medium,” and“device-readable medium” mean the same thing and may be usedinterchangeably in this disclosure. The terms are defined to includeboth machine-storage media and transmission media. Thus, the termsinclude both storage devices/media and carrier waves/modulated datasignals.

What is claimed is:
 1. A system comprising: at least one hardwareprocessor; and a computer-readable medium storing instructions that,when executed by the at least one hardware processor, cause the at leastone hardware processor to perform operations comprising: clustering aplurality of job scripts together based on each of the plurality of jobscripts invoking a particular service, each job script including aplurality of instructions to be executed by a computer to execute a job;identifying a primary job script in the plurality of job scripts, withall other job scripts in the plurality of job scripts being secondaryjob scripts; compiling the primary job script; inserting a mock libraryinto each of the secondary job scripts, the mock library includingscript commands that, when compiled, modify any service creation callsfor the particular service in the corresponding secondary job scriptinto mock service creation calls and modify any service deletion callsfor the particular service in the corresponding secondary job into mockservice deletion calls; executing the compiled primary job script;compiling the secondary job scripts after execution of the compiledprimary job script has been initiated; and scheduling the secondary jobscripts; wherein the compiled primary job script includes a servicedeletion call for the particular service and the operations furthercomprise: halting execution of the compiled primary job script beforereaching the service deletion call in the compiled primary job script;determining that all of the compiled secondary job scripts have beenexecuted and their mock service deletion calls for the particularservice have been executed; and in response to the determination,resuming execution of the compiled primary job script.
 2. The system ofclaim 1, wherein the determining includes maintaining a count ofcompiled secondary job scripts and decrementing the count each time acompiled secondary job script has its corresponding mock servicedeletion call for the particular service executed, wherein when thecount reaches zero it is determined that all of the mock servicedeletion calls for the particular service in the compiled secondary jobscripts have been executed.
 3. The system of claim 1, wherein thescheduling comprises clustering the compiled secondary job scripts basedon job type.
 4. The system of claim 3, wherein the job types includeread-only jobs and database write jobs.
 5. The system of claim 3,wherein the job type is determined based on which application programinterface (API) was used to call the corresponding compiled secondaryjob script.
 6. The system of claim 1, wherein the particular service isan in-memory database service.
 7. A method comprising: clustering aplurality of job scripts together based on each of the plurality of jobscripts invoking a particular service, each job script including aplurality of instructions to be executed by a computer to execute a job;identifying a primary job script in the plurality of job scripts, withall other job scripts in the plurality of job scripts being secondaryjob scripts; compiling the primary job script; inserting a mock libraryinto each of the secondary job scripts, the mock library includingscript commands that, when compiled, modify any service creation callsfor the particular service in the corresponding secondary job scriptinto mock service creation calls and modify any service deletion callsfor the particular service in the corresponding secondary job into mockservice deletion calls; executing the compiled primary job script;compiling the secondary job scripts after execution of the compiledprimary job script has been initiated; and scheduling the secondary jobscripts; wherein the compiled primary job script includes a servicedeletion call for the particular service and the operations furthercomprise: halting execution of the compiled primary job script beforereaching the service deletion call in the compiled primary job script;determining that all of the compiled secondary job scripts have beenexecuted and their mock service deletion calls for the particularservice have been executed; and in response to the determination,resuming execution of the compiled primary job script.
 8. The method ofclaim 7, wherein the determining includes maintaining a count ofcompiled secondary job scripts and decrementing the count each time acompiled secondary job script has its corresponding mock servicedeletion call for the particular service executed, wherein when thecount reaches zero it is determined that all of the mock servicedeletion calls for the particular service in the compiled secondary jobscripts have been executed.
 9. The method of claim 7, wherein thescheduling comprises clustering the compiled secondary job scripts basedon job type.
 10. The method of claim 9, wherein the job types includeread-only jobs and database write jobs.
 11. The method of claim 9,wherein the job type is determined based on which application programinterface (API) was used to call the corresponding compiled secondaryjob script.
 12. The method of claim 7, wherein the particular service isan in-memory database service.
 13. A non-transitory machine-readablemedium storing instructions which, when executed by one or moreprocessors, cause the one or more processors to perform operationscomprising: clustering a plurality of job scripts together based on eachof the plurality of job scripts invoking a particular service, each jobscript including a plurality of instructions to be executed by acomputer to execute a job; identifying a primary job script in theplurality of job scripts, with all other job scripts in the plurality ofjob scripts being secondary job scripts; compiling the primary jobscript; inserting a mock library into each of the secondary job scripts,the mock library including script commands that, when compiled, modifyany service creation calls for the particular service in thecorresponding secondary job script into mock service creation calls andmodify any service deletion calls for the particular service in thecorresponding secondary job into mock service deletion calls; executingthe compiled primary job script; compiling the secondary job scriptsafter execution of the compiled primary job script has been initiated;and scheduling the secondary job scripts; wherein the compiled primaryjob script includes a service deletion call for the particular serviceand the operations further comprise: halting execution of the compiledprimary job script before reaching the service deletion call in thecompiled primary job script; determining that all of the compiledsecondary job scripts have been executed and their mock service deletioncalls for the particular service have been executed; and in response tothe determination, resuming execution of the compiled primary jobscript.
 14. The non-transitory machine-readable medium of claim 13,wherein the determining includes maintaining a count of compiledsecondary job scripts and decrementing the count each time a compiledsecondary job script has its corresponding mock service deletion callfor the particular service executed, wherein when the count reaches zeroit is determined that all of the mock service deletion calls for theparticular service in the compiled secondary job scripts have beenexecuted.
 15. The non-transitory machine-readable medium of claim 13,wherein the scheduling comprises clustering the compiled secondary jobscripts based on job type.
 16. The non-transitory machine-readablemedium of claim 15, wherein the job types include read-only jobs anddatabase write jobs.
 17. The non-transitory machine-readable medium ofclaim 15, wherein the job type is determined based on which applicationprogram interface (API) was used to call the corresponding compiledsecondary job script.