Simulating multi-user activity while maintaining original linear request order for asynchronous transactional events

ABSTRACT

A method of maintaining the original order of a sequence of transactions originating from a source database and being replicated to a target database is provided. A lockable object is associated with each transaction of the sequence of transactions from the source database. Each transaction has one or more transactional events. The transactions of the sequence of transactions have an order. The order is a commit order of the transactions in the source database. The lockable object is based on the commit order. A lock is attempted to be obtained on one or more lockable objects associated with one or more transactions of the sequence of transactions which precede a particular transaction of the sequence of transactions. In response to being unable to obtain the lock, the one or more transactional events of the one or more transactions which precede the particular transaction are serially processed.

CROSS REFERENCE TO RELATED APPLICATIONS

Co-pending U.S. application Ser. No. 11/061,072 entitled “Replication-Only Triggers,” filed concurrently herewith, by Clarence Madison Pruet III, assigned to the assignee of the present invention, is incorporated herein by reference in its entirety.

Co-pending U.S. application Ser. No. 11/060,986 entitled “Support for Schema Evolution in a Multi-Node Peer-to-Peer Replication Environment,” filed concurrently herewith, by Nagaraju Inturi and Clarence Madison Pruet III, assigned to the assignee of the present invention, is incorporated herein by reference in its entirety.

Co-pending U.S. application Ser. No. 11/060,924 entitled “Online Repair of a Replicated Table,” filed concurrently herewith, by Rajesh Govind Naicken, Clarence Madison Pruet III, and Konduru Israel Rajakumar, assigned to the assignee of the present invention, is incorporated herein by reference in its entirety.

BACKGROUND OF THE INVENTION

1.0. Field of the Invention

This invention relates to a database management system; and in particular, this invention relates to replicating data in a database management system.

2.0. Description of the Related Art

Database management systems allow large volumes of data to be stored and accessed efficiently and conveniently in a computer system. In a database management system, data is stored in database tables which organize the data into rows and columns. FIG. 1 depicts an exemplary database table 20 which has rows 22 and columns 24. To more quickly access the data in a database table, an index may be generated based on one or more specified columns of the database table. In a relational database management system, specified columns are used to associate tables with each other.

The database management system responds to user commands to store and access the data. The commands are typically Structured Query Language statements such as SELECT, INSERT, UPDATE and DELETE, to select, insert, update and delete, respectively, the data in the rows and columns. The SQL statements typically conform to a SQL standard as published by the American National Standards Institute (ANSI) or the International Standards Organization (ISO).

Departments within an enterprise may have their own database management systems, typically at different sites. An enterprise typically wants to share data throughout the enterprise. A technique called replication is used to share data among multiple database management systems.

A replication system manages multiple copies of data at one or more sites, which allows the data to be shared. Data may be replicated synchronously or asynchronously. In synchronous data replication, a two-phase commit technique is used. In a two-phase commit, a transaction is applied only if all interconnected distributed sites agree to accept the transaction. Typically all hardware components and networks in the replication system must be available at all times in for synchronous replication.

Asynchronous data replication allows data to be replicated, at least on a limited basis, and thus allows for system and network failures. In one type of asynchronous replication system, referred to as primary-target, all database changes originate at the primary database and are replicated to the target databases. In another type of replication system, referred to as update-anywhere, updates to each database are applied at all other databases of the replication system.

An insert, update or delete to the tables of a database is a transactional event. A transaction comprises one or more transactional events that are treated as a unit. A commit is another type of transactional event which indicates the end of a transaction and causes the database to be changed in accordance with any inserts, updates or deletes associated with the transaction.

In some database management systems, a log writer updates a log as transactional events occur. Each transactional event is associated with an entry in the log. Each entry in the log is associated with a value representing a log position.

When a replication system is used, a user typically specifies the types of transactional events which cause data to be replicated. In addition, the user typically specifies the data which will be replicated, such as certain columns or an entire row of a table. In some embodiments, the log writer of the database management system marks certain transactional events for replication in accordance with the specified types of transactional events. The replication system reads the log, retrieves the marked transactional events, and transmits the transactional events to one or more specified target servers. The target server applies the transactional events to the replicated table(s) on the target server.

Typically, there are many events in a database management system that are processed asynchronously which also need to adhere to order. In replication processing, since transactional events are usually posted in parallel by multiple users of the database, it is difficult to maintain the linear order of the posting of the events without processing the events serially.

Therefore, there is a need for a technique to maintain order. In addition, the technique should also maintain order while allowing events to be processed, if possible, in parallel.

SUMMARY OF THE INVENTION

To overcome the limitations in the prior art described above, and to overcome other limitations that will become apparent upon reading and understanding the present specification, various embodiments of a method, system and article of manufacture maintain the order of a sequence of transactions originating from a source database and being replicated to a target database are provided. A lockable object is associated with each transaction of the sequence of transactions from the source database. Each transaction has one or more transactional events. The transactions of the sequence of transactions have an order. The order is a commit order of the transactions in the source database. The lockable object is based on the commit order. A lock is attempted to be obtained on one or more lockable objects associated with one or more transactions of the sequence of transactions which precede a particular transaction of the sequence of transactions. In response to being unable to obtain the lock, the one or more transactional events of the one or more transactions which precede the particular transaction are serially processed.

In this way, a technique to maintain order is provided. The technique also maintains order while allowing transactional events to be processed, if possible, in parallel.

BRIEF DESCRIPTION OF THE DRAWINGS

The teachings of the present invention can be readily understood by considering the following description in conjunction with the accompanying drawings, in which:

FIG. 1 depicts a block diagram of an illustrative table of a database management system;

FIG. 2 depicts a diagram of an embodiment of a replication environment suitable for use with the present invention;

FIG. 3 depicts a diagram of an embodiment of processing transactions, and their associated transactional events, so that the original linear request order of the transactions can be maintained;

FIG. 4 comprises FIGS. 4A, 4B and 4C which collectively depict a flowchart of an embodiment of processing transactions, and their associated transactional events, so that the original linear request order of the transactions can be maintained; and

FIG. 5 depicts an embodiment of an illustrative computer system which uses various embodiments of the present invention.

To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to some of the figures.

DETAILED DESCRIPTION

After considering the following description, those skilled in the art will clearly realize that the teachings of the various embodiments of the present invention can be utilized to replicate data in a database management system. A method, system and article of manufacture maintain the original order of a sequence of transactions originating from a source database and being replicated to a target database. A lockable object is associated with each transaction of the sequence of transactions from the source database. Each transaction has one or more transactional events. The transactions of the sequence of transactions have an order. The order is a commit order of the transactions in the source database. The lockable object is based on the commit order. A lock is attempted to be obtained on one or more lockable objects associated with one or more transactions of the sequence of transactions which precede a particular transaction of the sequence of transactions. In response to being unable to obtain the lock, the one or more transactional events of the one or more transactions which precede the particular transaction are serially processed.

A database server is a software application which implements a database management system. A replication server is a database server that participates in data replication. Multiple database servers can execute on the same physical server computer, and each database server can participate in replication.

In replication, changes to one or more tables of a database on a source replication server are collected, transported and applied to one or more corresponding tables on replication target servers. A replication application implements the replication server functionality.

To replicate data, a user defines a replicate, that is, the user provides a replicate definition. A replicate is associated with one or more replication servers, also referred to as participants, a table to replicate among the participants, and the columns of the table that will be replicated. The replicate is also associated with various attributes which describe how to replicate the data among the participants, such as conflict resolution rules.

The replication server maintains replication information in a replicate definition that comprises one or more tables in the global catalog. The replicate definition comprises information specifying the replicate configuration and environment, information specifying what data is to be replicated, for example, whether to replicate particular columns or an entire row, and information specifying the conditions under which the data should be replicated. The replicate definition also specifies various attributes of the replicate such as a description of how to handle any conflicts during replication.

The replication application creates the global catalog when the replication application is initialized. In embodiments which use the IBM Informix Dynamic Server, the global catalog is called the syscdr database.

Each replication server typically has its own local copy of the global catalog and maintains one or more tables in the global catalog to keep track of replicate definition and state. The global catalog is created when a database server is defined as a replication server. The tables in a global catalog on one replication server are typically automatically replicated to the global catalogs of the other replication servers.

FIG. 2 depicts a diagram of an embodiment of a replication environment suitable for use with the present invention. A source replication server 30 and a target replication server 32 are participants, or nodes, in a replicate. The source replication server 30 and the target replication server 32 will be referred to as a source server and a target server. The source server 30 and the target server typically execute on different computer systems. In the source server 30, one or more user applications 34 are accessing and changing the tables of a database 36. The changes to the database 36 are stored in a log 38. The changes are transactional events. The replication application comprises a snooper 40 and a grouper 42. The snooper 40 reads the log 38 and captures various transactional events in accordance with the replicate definition. The grouper 42 assembles the captured changes in accordance with their associated transactions to provide transaction replication data 43 and places the transaction replication data 43 in a queue 44 to send to the target server 32 via the network interface (NIF) 50. Transaction replication data is also referred to as replication data or replicated data. As indicated by arrows 45, the queue 44 can be used to send and receive data. The queue 44 comprises a send queue to send data to the target server 32, and a receive queue to receive data from the target server 32.

In the target server 32, the transaction replication data 51 is received in a queue 52. An apply component 54 retrieves the transaction replication data 51 from the queue 52 and applies the replication data 51 to the appropriate table and column(s) in the database 56. For example, if the transaction replication data comprises an insert operation, the apply component performs the insert operation on a table of the replicate.

The source and target servers, 30 and 32, have global catalogs, 62 and 64, and a replication application command line interface, 66 and 68, respectively. The replication application command line interface 66 and 68 receives commands for the replication application. The replication application command line interface 66 and 68 is also used to update the global catalogs 62 and 64, respectively.

In various embodiments, the replication application on a replication server typically comprises a snooper, grouper and apply component. In this way, data can be replicated both to and from the replication server.

In some embodiments, a computer system executing the replication application comprises multiple central processing units or processors, and various portions of the replication operation are executed concurrently. For example, the apply component may execute on one or more processors and each portion of the apply component that executes on one processor is referred to as an apply thread.

In various embodiments, the transactional events of the log are operation requests. An operation request may be an insert, update or delete operation, or a post commit trigger request. In some embodiments, the log is a linear file.

It is desirable to process some transactions at a target database server in similar order to the original transactions on a source database server. The phrase “linear request order” refers to the processing of transactions, and therefore the transactional events associated with the transactions, in the same order as the original transactions. In various embodiments, the linear request order is the commit order of the transactions.

In various embodiments, linear ordered asynchronous transactional events have one or more common characteristics. One characteristic is that the transactional events of a transaction are not propagated to the other participants until the transaction that entered the transactional event request issues a commit. If the transactional events are propagated before the transaction has committed, it is possible that the transactional event will be performed on a transaction that will rollback. Therefore, the propagation of the transactional event is deferred until the original transaction has committed.

Another characteristic is that the transactional event is ordered by the associated transaction's commit in the log. As a transaction is executed, transactional event requests are placed directly into the log. These transactional event requests may comprise requests for post-commit trigger execution or replication.

Yet another characteristic is that the transactional event is executed only once. For example, the transactional event should not be repeatedly processed in the case of recovery of the database server. In various embodiments, to ensure that the transactional event is processed only once, a record of which specific transactional events have been processed is maintained in persistent storage.

The transactional events will often occur concurrently from multiple users. To continuously process incoming transactional event requests, the multi-user processing of the transactional events is simulated while maintaining the original linear order as defined by transaction commit order of the transactional events.

In various embodiments, transactions, and therefore their transactional events, are processed in parallel by using a commit progress table to record the progress of the processing of the asynchronous events. In some embodiments, the commit progress table is the post-commit progress table of co-pending U.S. application Ser. No. 11/061,072 entitled “Replication-Only Triggers,” filed concurrently herewith, by Clarence Madison Pruet III. In various embodiments, the transactional events within a transaction are processed, the commit progress table is updated for the transactional events, and the transaction is committed. The processing of the transactional events can be performed in parallel, but the maintenance of the commit progress table and the commit of the transactions are serialized and are in proper order. The original transactional ordering is re-established as the last step in processing the transactional events.

FIG. 3 depicts a diagram of an embodiment of the processing of transactions, that is, one or more transactional events of a transaction, which were sent from the source server to the target server. Various embodiments of simulating multi-user activity will be described with reference to FIG. 3 as follows.

New transactions 80, comprising new transactional event requests, are received at the target server. A pending list 82 of transactions 84 and 86 to be processed is maintained. As the transactions are received, the transactions are placed at the tail 88 of the pending list 82. As the transactions are allowed to be processed, the transactions are moved from the head 90 of the pending list 82 to the tail 92 of an active list 94. While on the active list 94, the transactions 96-1, 96-2 and 96-3, are processed in parallel using separate parallel threads. The block 96-1 labeled “Transactional Events-1” comprises one or more transactional events associated with a first transaction. The block 96-2 labeled “Transactional Events-2” comprises one or more transactional events associated with a second transaction. The block 96-3 labeled “Transactional Events-3” comprises one or more transactional events associated with a third transaction. When a processing thread for a transaction is finished, that processing thread waits until the transaction reaches the head of the active list 94. When the transaction reaches at the head of the active list 94, the thread is allowed to update the commit progress table 58 and commit the transactional events of the transaction. Block 300 represents a module that updates the commit progress table 58.

In the technique described above, a thread processing a subsequent transaction may complete its activity prior to a thread processing a previous transaction. In that case, the subsequent transaction's thread waits for the previous transaction to be processed. For example, the transactional events-1 of the first transaction committed first on the source server, the transactional events-2 of the second transaction occurred next on the source server, and the transactional events-3 of the third transaction occurred last. Each thread is executing on a separate processing unit. Suppose that thread-1 is processing transactional events-1, thread-2 is processing transactional events-2, and thread-3 is processing transactional events-3. It is possible that thread-3 could complete prior to thread-1, and thus thread-3 waits for thread-1 to complete.

In another example, suppose that thread-3 is holding a resource that thread-1 also needs to obtain. In this example, a form of a deadly embrace has occurred. This deadly embrace is not a classic deadly embrace which occurs often in a multi-user database when rows and/or pages are locked by various transactions. Rather this deadly embrace is between a commit order of the transactions, and the resources to process the transactional events associated with those transactions.

Typically, a database management system has a lock manager. In various embodiments, as a transactional event, such as an insert, update or delete, is processed, the lock manager locks the row(s) associated with that transactional event. In a classic deadly embrace, the lock manager is used to determine if a row or page is currently available for update. Based on the rows and/or pages being accessed, the lock manager detects if two transactions are in a deadly embrace and will cause at least one of the transactions enter rollback mode to resolve the blockage.

It is desirable to detect a deadly embrace between the commit order of a transaction and a resource. In various embodiments, a resource is simulated by associating the order of a transaction with a lockable object, such as a pseudo-row or alternately a row of a table, which can be locked using the lock manager. Using the lockable object, the lock manager can be used to detect a deadly embrace between the commit order of a transaction and a resource. Various embodiments of the invention will be described with respect to a lockable object that is a pseudo-row; however, in other embodiments, the lockable object is a row of a table rather than a pseudo-row.

The pseudo-row can be obtained by using the commit order as though it were a row identifier. As the transactional events of transaction containing events are placed on the pending list, the transaction is assigned, or associated with, a row identifier, that is, a “rowid,” based on the order that that the transactional events of the transaction are placed on the pending list. In some embodiments, the row identifier is a pseudo-rowid. Continuing the above example, Transactional Events-1 of the first transaction is associated with a pseudo-rowid having a value of one. Transactional Events-2 of the second transaction is associated with a pseudo-rowid having a value of two. Transactional Events-3 of the third transaction is associated with a pseudo-rowid having a value of three.

To detect whether a deadly embrace involving the commit order has occurred, the thread which is applying the transactional events of a transaction performs the following. The thread obtains an exclusive lock on the pseudo-rowid associated with the transaction which that thread is executing. The thread processes the transactional events of the transaction. The thread then attempts to obtain shared locks on all of the pseudo-rowids of the transactions preceding the transaction that the thread is processing in the active list. If a shared lock cannot be obtained, a deadly embrace between the commit order and a resource has occurred and the transactional events of preceding transactions in the active list are processed serially. Once the transaction reaches the top of the active list, the thread updates the progress table recording the identity of this transaction that the thread is processing. In some embodiments, the thread stores a timestamp of when the transaction was committed in the progress table. The thread commits the execution of the transactional events associated with the transaction. Since the commit will free all locks held by the transaction, this will also free the exclusive lock on the pseudo-rowid associated with the transaction that the thread is executing. By removing the exclusive lock on the pseudo-rowid, subsequent transactions will be able to obtain a shared lock on the same pseudo-rowid. In this way, the lock manager can be used to detect that a deadly embrace has occurred between the commit order of the transactions and resources held by the threads processing the transactional events of the transactions.

FIG. 4 comprises FIGS. 4A, 4B and 4C which collectively depict a flowchart of an embodiment of processing transactions, and their associated transactional events, so that the original linear request order of the transactions can be maintained. In various embodiments, the flowchart of FIG. 4 is implemented in the apply component of the replication application.

In FIG. 4A, in step 110, the pending list is locked. The pending list is locked when moving a transaction, and the associated transactional events, from the pending list to the active list. In step 112, the processing of the transaction begins by associating the transaction with a thread, and also associating a pseudo-row with a transaction to be moved from the pending list to the active list, the pseudo-row having a pseudo-rowid. The thread processes the transaction. In step 114, the pseudo-rowid associated with the transaction is exclusively locked. In step 116, the transaction is moved from the pending list to the active list.

In step 118, the transaction is processed. In particular, the transactional events of the transaction are processed. After the transactional events associated with a transaction are processed, but prior to committing the transaction and its associated transactional events, in step 120, the thread processing the transaction attempts to obtain shared locks on other threads. In various embodiments, the thread processing the transaction attempts to obtain a shared lock on the respective pseudo-rowids associated with preceding transactions being processed by other threads in the active list.

Step 122 determines whether a deadlock was detected in response to attempting to obtain the shared locks. If at least one shared lock was not obtained, then a deadlock has been detected. If the shared lock(s) were obtained then no deadlock was detected, and in step 124, the thread processing the transaction waits until the transaction moves to the top of the active list. In step 126, the commit progress table is updated. In various embodiments, the commit progress table contains a single row which indicates the log position associated with the commit of the last instruction which was committed on the target database. The commit progress table is updated with a log position of the commit of the transaction. In step 128, the transaction, with its associated transaction events, is committed. In step 130, the transaction is removed from the active list.

Step 132 determines whether a global serial mode flag set and whether the transaction is the last entry on the active list. If so, in step 134, the global serial flag is cleared and proceeds to step 110 to process another transaction on the pending list. At this point, because the global serial mode flag and the transaction serial flags are deactivated, the threads will process the transactional events of the transactions in parallel, that is, concurrently. If step 132 determines that the global serial mode flag is set or that the transaction is not the last entry on the active list, the flowchart proceeds to step 110 to process another transaction on the pending list.

FIG. 4B depicts a flowchart of an embodiment of the process transaction block 118 of FIG. 4A. The process transaction block 118 of FIG. 4A starts at step 140 of FIG. 4B. Step 140 determines whether there are any transactional events of the transaction to process. If not, step 140 returns to via Continuator C to step 120 of FIG. 4A. If step 140 determines that there is at least one transactional event of the transaction to process, in step 142, a next transactional event within the transaction is processed.

Step 144 determines whether a deadlock was detected. If not, step 146 determines whether the transaction serial flag is set for the transaction. If not, step 146 proceeds to step 140 to determine if there are more transactional events in the transaction to process.

In response to step 144 determining that a deadlock was detected, in step 148, serial mode is set. The global serial flag is set to indicate that the transactions in the active list, and their associated transactional events, should be processed serially. In addition, each transaction in the active list is also associated with a transaction serial flag, and the transaction serial flag associated with the transactions in the active list is set to serial mode. In step 150, the transactions in the active list are processed serially, and step 150 proceeds to step 140 to determine if there are more transactional events of the transaction to process.

In response to step 122 of FIG. 4A determining that a deadlock was detected, step 122 proceeds via Continuator B to step 148 of FIG. 4B to set serial mode and process transactions serially. The thread sets a global serial flag and also sets a transaction serial flag is set, that is activated, for each preceding transaction to the transaction being processed by the thread. The transactional events of the transactions for which a transaction serial flag is set, that is, activated, will be processed serially.

FIG. 4C depicts a flowchart of an embodiment of block 150 of FIG. 4B which performs serial processing. In step 152, the transaction is rolled back. Step 354 waits until the transaction reaches the top of the active list. In step 156, the transaction serial flag associated with the transaction is deactivated. The transaction serial flag for the transaction is turned off to avoid re-entering serial mode for that transaction. Step 158 repositions to the first transactional event of the transaction. Step 160 begins working on the transaction. Step 162 exclusively locks the pseudo-row id associated with the transaction.

FIG. 5 depicts an embodiment of an illustrative computer system which uses various embodiments of the present invention. The computer system 200 comprises processor(s) 202, display 204, input interfaces (I/F) 206, communications interface 208, memory 210 and output interface(s) 212, all conventionally coupled by one or more buses 214. The input interfaces 206 comprise a keyboard 216 and a mouse 218. The output interface 212 comprises a printer 220. The communications interface 208 is a network interface (NI) that allows the computer 200 to communicate via a network 222. The communications interface 208 may be coupled to the network 222 via a transmission medium 224 such as a network transmission line, for example twisted pair, coaxial cable or fiber optic cable. In another embodiment, the communications interface 208 provides a wireless interface, that is, the communications interface 208 uses a wireless transmission medium.

The memory 210 generally comprises different modalities, illustratively semiconductor memory, such as random access memory (RAM), and disk drives. In various embodiments, the memory 210 stores an operating system 230, a database server 232, database tables 234, a log 236, and a replication application 240. In various embodiments the replication application 240 comprises a global catalog 242, a replication application command line interface module 244, a snooper 246, a grouper 248, an apply component 250, a queue 252, a pending list 254, an active list 256 and a commit progress table 258.

In various embodiments, the specific software instructions, data structures and data that implement various embodiments of the present invention are typically incorporated in the replication application 240. Generally, an embodiment of the present invention is tangibly embodied in a computer-readable medium, for example, the memory 210, and is comprised of instructions which, when executed by the processor 202, cause the computer system 200 to utilize the present invention. The memory 210 may store the software instructions, data structures and data for any of the operating system 230, a database server 232, database tables 234, a log 236, and a replication application 240 in semiconductor memory, in disk memory, or a combination thereof. Other computer memory devices presently known or that become known in the future, or combination thereof, may be used for memory 210.

The operating system 230 may be implemented by any conventional operating system such as AIX® (Registered Trademark of International Business Machines Corporation), UNIX® (UNIX is a registered trademark of the Open Group in the United States and other countries), Windows® (Registered Trademark of Microsoft Corporation), Linux® (Registered trademark of Linus Torvalds), Solaris® (Registered trademark of Sun Microsystems Inc.) and HP-UX® (Registered trademark of Hewlett-Packard Development Company, L.P.).

In various embodiments, the database server 232 is the IBM Informix Dynamic Server. However, the invention is not meant to be limited to the IBM Informix Dynamic Server and may be used with other database management systems.

In various embodiments, the present invention may be implemented as a method, system, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. The term “article of manufacture” (or alternatively, “computer program product”) as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier or media. In addition, the software in which various embodiments are implemented may be accessible through the transmission medium, for example, from a server over the network. The article of manufacture in which the code is implemented also encompasses transmission media, such as the network transmission line and wireless transmission media. Thus the article of manufacture also comprises the medium in which the code is embedded. Those skilled in the art will recognize that many modifications may be made to this configuration without departing from the scope of the present invention.

The exemplary computer system illustrated in FIG. 5 is not intended to limit the present invention. Other alternative hardware environments may be used without departing from the scope of the present invention.

The foregoing detailed description of various embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teachings. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended thereto. 

1. A method of maintaining order of a plurality of transactions originating from a source database and being replicated to a target database, comprising: receiving, at said target database, a first transaction and a second transaction of said plurality of transactions, wherein said first transaction was committed prior to said second transaction at said source database; assigning, at said target database, a first lockable object to said first transaction; prior to committing said second transaction at said target database, attempting, at said target database, to obtain a lock on said first lockable object, wherein being unable to obtain said lock on said first lockable object indicates that said second transaction and said first transaction will not be committed at said target database in a same order as at said source database; in response to being unable to obtain said lock, causing said second transaction to be committed after said first transaction at said target database; prior to said attempting to obtain said lock on said first lockable object, committing said first transaction, wherein said committing said first transaction unlocks said first lockable object; and in response to no deadlock being detected in response to said attempting to obtain said lock, committing said second transaction in said target database, wherein said no deadlock being detected in response to said attempting to obtain said lock indicates that said second transaction will be committed in said target database in the same order as in said source database.
 2. The method of claim 1 wherein said attempting to obtain said lock attempts to obtain a shared lock on said first lockable object.
 3. The method of claim 2 further comprising: exclusive locking said first lockable object, at said target database, prior to said attempting to obtain said shared lock.
 4. The method of claim 1 wherein said first lockable object is a pseudo-row.
 5. The method of claim 1 wherein said first lockable object is a row of a table.
 6. The method of claim 1 wherein said first transaction is associated with a post-commit trigger request.
 7. The method of claim 1 further comprising: exclusive locking, at said target database, said first lockable object; after said exclusive locking, processing said first transaction at said target database; processing said second transaction at said target database, wherein said first and second transactions are processed in parallel; wherein said causing said second transaction to be committed after said first transaction at said target database comprises rolling back said second transaction, and serially processing said first transaction, wherein said first and second transactions are not processed in parallel.
 8. The method of claim 1 further comprising: updating a commit progress table to indicate a last transaction which was committed on said target database.
 9. The method of claim 7 wherein said causing said second transaction to be committed after said first transaction at said target database comprises: committing said first transaction, wherein said first lockable object is unlocked in response to said committing; after said committing said first transaction, processing said second transaction at said target database; and committing said second transaction in said target database.
 10. The method of claim 1 wherein said being unable to obtain said lock causes a deadlock to be detected at said target database, and said causing said second transaction to be committed after said first transaction at said target database is performed in response to said deadlock.
 11. The method of claim 1 wherein said first lockable object is external to said transaction.
 12. A computer-implemented method of maintaining order of a plurality of transactions originating from a source database and being replicated to a target database, comprising: receiving, at said target database, said plurality of transactions comprising a first transaction and a second transaction, wherein said first transaction was committed prior to said second transaction at said source database; after receiving said first transaction, assigning, at said target database, a first lockable object to said first transaction; exclusive locking, at said target database, said first lockable object; after said exclusive locking of said first lockable object, processing, at said target database, said first transaction of said plurality of transactions; after receiving said second transaction, assigning, at said target database, a second lockable object to said second transaction; exclusive locking, at said target database, said second lockable object; after said exclusive locking said second lockable object, processing, at said target database, said second transaction, wherein said first transaction and said second transaction are processed in parallel; prior to committing said second transaction at said target database, attempting, at said target database, to obtain a shared lock on at least one lockable object associated with at least one transaction received prior to said second transaction, wherein said attempting attempts to obtain a shared lock on said first lockable object; in response to detecting a deadlock based on being unable to obtain said shared lock at said target database, rolling back, at said target database, said second transaction; serially processing, at said target database, said first transaction, wherein said second transaction is not processed; after committing said first transaction in said target database, processing said second transaction at said target database; and committing said second transaction in said target database, whereby said first and second transactions are committed in said target database in a same order as in said source database. 