Altering In-Flight Streamed Data from a Relational Database

ABSTRACT

A database which receives input from a data streaming application may include in-flight streamed data within the scope of a command which alters database data. Preferably, the streaming application produces data tuples for input to at least one table of the database. A user submitting modify data commands to apply to multiple tuples meeting some specified logical parameters may define the command scope to include in-flight data in the streaming application, causing the database manager to forward the command to the streaming application. A streaming application manager invokes database agents in respective nodes of the streaming application, which identify in-flight data meeting the specified logical parameters of the command, and apply the modify data operation to such data.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of copending U.S. patent applicationSer. No. 15/339,819, filed Oct. 31, 2016, entitled “Altering In-FlightStreamed Data from a Relational Database”, which is herein incorporatedby reference.

The present application is also related to commonly assigned U.S. patentapplication Ser. No. 15/339,772, entitled “Projecting Effect ofIn-Flight Streamed Data on a Relational Database”, filed Oct. 31, 2016,and to commonly assigned U.S. patent application Ser. No. 15/339,800,entitled “Querying In-Flight Streamed Data from a Relational Database”,filed Oct. 31, 2016, both of which are herein incorporated by reference.

FIELD

This disclosure generally relates to stream computing, and inparticular, to computing applications that receive streaming data andprocess the data as it is received.

BACKGROUND

In the latter half of the twentieth century, there began a phenomenonknown as the information revolution. While the information revolution isa historical development broader in scope than any one event or machine,no single device has come to represent the information revolution morethan the digital electronic computer. The development of computersystems has surely been a revolution. Each year, computer systems growfaster, store more data, and provide more applications to their users.

Modern computer systems may be used to support a variety ofapplications, but one common use is the maintenance of large relationaldatabases, from which information may be obtained. A large relationaldatabase is often accessible to multiple users via a network, any one ofwhom may query the database for information and/or update data in thedatabase.

Database systems are typically configured to separate the process ofstoring data from accessing, manipulating, or using data stored in adatabase. More specifically, database systems use a model in which datais first stored and indexed in a memory before subsequent querying andanalysis. In general, database systems may not be well suited forperforming real-time processing and analyzing streaming data. Inparticular, database systems may be unable to store, index, and analyzelarge amounts of streaming data efficiently or in real time.

Stream-based computing, also called data streaming, has been used tomore effectively handle large volumes of incoming data in real time. Ina data streaming application, data moves through a connected network of“processing elements” called a “graph”, each processing elementperforming some function or functions with respect to the data.

Many data streaming applications produce data which is ultimatelyintegrated with a relational database, i.e., it becomes new or updatedentries in one or more tables in a relational database. Due to thecapability of a data streaming application to handle large volumes ofdata, there could be a large number of new or updated entries in adatabase table, so large that it could be significant in comparison todata already in the table.

Conventional database query and other management techniques take noaccount of data which is likely to change in the near future, and inparticular, of in-flight data in a streaming application which mayaffect the future character of the database. This may cause queryresults to be obsolete or misleading, or may cause certain managementdecisions or actions to be based on stale information.

A need exists, not necessarily recognized, for improved databasemanagement techniques which take account of future database changes, andin particular, which take account of in-flight data in a data streamingapplication that will or is likely to become part of the database.

SUMMARY

A data streaming application provides input to a database. A databasecommand which alters database data can be extended to alter in-flightstreamed data of the data streaming application.

In one or more embodiments, a data streaming application produces datatuples as output, which are entered into at least one table of arelational database. A database user can edit or delete tuples in thedatabase, either individually or by submitting modify data commands toapply to multiple tuples meeting some specified logical parameters. Auser may optionally define the scope of a modify data command to includein-flight data in the data streaming application. If the command scopeincludes in-flight data, the database manager transmits the command tothe data streaming application. Responsive to receiving the command, adatabase agent within a stream manager of the data streaming applicationinvokes one or more database agents residing within the computer systemor systems supporting the streaming application. The database agentsidentify in-flight data tuples held in one or more buffers of the datastreaming application which meet the specified logical parameters of thecommand, and apply the modify data operation (e.g. delete or edit) toany such tuples.

In one or more embodiments, the stream manager uses operator graphprofile data, which may be acquired by tracing or otherwise, todetermine likely paths of data tuples through an operator graph of thedata streaming application and select nodes to be searched for tuplesmeeting the logical parameters of the command.

By including in-flight data within the scope of a modify data command, adatabase system can reduce unnecessary processing of streamed dataand/or apply changes to streamed data in a more timely manner, therebyimproving the efficiency of the database and/or data streamingapplication.

The details of the present invention, both as to its structure andoperation, can best be understood in reference to the accompanyingdrawings, in which like reference numerals refer to like parts, and inwhich:

BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 illustrates a computing infrastructure configured to execute astream computing application according to various embodiments.

FIG. 2 is a high-level block diagram of the major hardware components ofa representative general purpose computer system which could be used toperform the role of any of several functional elements, according tovarious embodiments.

FIG. 3 is a conceptual illustration of certain software components inmemory of a compute node of FIG. 1, according to various embodiments.

FIG. 4 is a conceptual representation of a set of tuples in a streamingdata application buffer, according to various embodiments.

FIG. 5 is a conceptual illustration of certain software components inmemory of the management system of FIG. 1 according to variousembodiments.

FIG. 6 is a conceptual illustration of certain software components inmemory of the compiler system of FIG. 1 according to variousembodiments.

FIG. 7 illustrates an operator graph for a stream computing applicationaccording to various embodiments.

FIG.8 is a conceptual illustration of the major software components inmemory of a database server computer system, according to variousembodiments.

FIG. 9 is a conceptual representation of the structure of a databasetable, according to various embodiments.

FIG. 10 is a conceptual representation of an altered tuple of a datastreaming application altered for supporting profile analysis, accordingto various embodiments.

FIG. 11 is a flow diagram illustrating at a high level a process ofcollecting profile data for a data streaming application, according tovarious embodiments.

FIG. 12 is a conceptual illustration of the structure of an exemplaryset of profile summary records, according to various embodiments.

FIG. 13 is a flow diagram illustrating at a high level a process ofanalyzing profile data to produce a set of profile summary records,according to various embodiments.

FIG. 14 is a flow diagram illustrating at a high level the operation ofvarious system components in executing a database query, according tovarious embodiments.

FIG. 15 is a flow diagram illustrating in greater detail a process ofquerying streamed data in a data streaming application, according tovarious embodiments.

FIG. 16 is a flow diagram illustrating at a high level the operation ofvarious system components in executing a modify data command, accordingto various embodiments.

FIG. 17 is a flow diagram illustrating in greater detail a process ofmodifying streamed data in a data streaming application, according tovarious embodiments.

DETAILED DESCRIPTION Streams Processing Overview

Stream-based computing and stream-based database computing are emergingas a developing technology for database systems. Products are availablewhich allow users to create applications that process and querystreaming data before it reaches a database file. With this emergingtechnology, users can specify processing logic to apply to inbound datarecords while they are “in flight,” with the results available in a veryshort amount of time, often in fractions of a second. Constructing anapplication using this type of processing has opened up a newprogramming paradigm that will allow for development of a broad varietyof innovative applications, systems, and processes, as well as presentnew challenges for application programmers and database developers.

In a stream computing application, stream operators are connected to oneanother such that data flows from one stream operator to the next (e.g.,over a TCP/IP socket). When a stream operator receives data, it mayperform operations, such as analysis logic, which may change the tupleby adding or subtracting attributes, or updating the values of existingattributes within the tuple. When the analysis logic is complete, a newtuple is then sent to the next stream operator. Scalability is achievedby distributing an application across nodes by creating executables(i.e., processing elements), as well as replicating processing elementson multiple nodes and load balancing among them. Stream operators in astream computing application can be fused together to form a processingelement that is executable. Doing so allows processing elements to sharea common process space, resulting in much faster communication betweenstream operators than is available using inter-process communicationtechniques (e.g., using a TCP/IP socket). Further, processing elementscan be inserted or removed dynamically from an operator graphrepresenting the flow of data through the stream computing application.A particular stream operator may or may not reside within the sameoperating system process as other stream operators. In addition, streamoperators in the same operator graph may be hosted on different nodes,e.g., on different compute nodes or on different cores of a computenode.

Data flows from one stream operator to another in the form of a “tuple.”A tuple is a sequence of one or more attributes associated with anentity. Attributes may be any of a variety of different types, e.g.,integer, float, Boolean, string, etc. The attributes may be ordered. Inaddition to attributes associated with an entity, a tuple may includemetadata, i.e., data about the tuple. A tuple may be extended by addingone or more additional attributes or metadata to it. As used herein,“stream” or “data stream” refers to a sequence of tuples. Generally, astream may be considered a pseudo-infinite sequence of tuples.

Tuples are received and output by stream operators and processingelements. An input tuple corresponding with a particular entity that isreceived by a stream operator or processing element, however, isgenerally not considered to be the same tuple that is output by thestream operator or processing element, even if the output tuplecorresponds with the same entity or data as the input tuple. An outputtuple need not be changed in some way from the input tuple.

Nonetheless, an output tuple may be changed in some way by a streamoperator or processing element. An attribute or metadata may be added,deleted, or modified. For example, a tuple will often have two or moreattributes. A stream operator or processing element may receive thetuple having multiple attributes and output a tuple corresponding withthe input tuple. The stream operator or processing element may onlychange one of the attributes so that all of the attributes of the outputtuple except one are the same as the attributes of the input tuple.

Generally, a particular tuple output by a stream operator or processingelement may not be considered to be the same tuple as a correspondinginput tuple even if the input tuple is not changed by the processingelement. However, to simplify the present description and the claims, anoutput tuple that has the same data attributes or is associated with thesame entity as a corresponding input tuple will be referred to herein asthe same tuple unless the context or an express statement indicatesotherwise.

Stream computing applications handle massive volumes of data that needto be processed efficiently and in real time. For example, a streamcomputing application may continuously ingest and analyze hundreds ofthousands of messages per second and up to petabytes of data per day.Accordingly, each stream operator in a stream computing application maybe required to process a received tuple within fractions of a second.Unless the stream operators are located in the same processing element,it is necessary to use an inter-process communication path each time atuple is sent from one stream operator to another. Inter-processcommunication paths can be a critical resource in a stream computingapplication. According to various embodiments, the available bandwidthon one or more inter-process communication paths may be conserved.Efficient use of inter-process communication bandwidth can speed upprocessing.

FIG. 1 illustrates one exemplary computing infrastructure 100 that maybe configured to execute a stream computing application, according tosome embodiments. The computing infrastructure 100 includes a managementsystem 105 and two or more compute nodes 110A-110D (herein genericallyreferred to as feature 110)—i.e., hosts—which are communicativelycoupled to each other using one or more communications networks 120. Thecommunications network 120 may include one or more servers, networks, ordatabases, and may use a particular communication protocol to transferdata among compute nodes 110. A compiler system 102 may becommunicatively coupled with the management system 105 and the computenodes 110 either directly or via the communications network 120.Additionally, a database system 115 containing a database 140 may becommunicatively coupled to network 120 for communication with managementsystem 105 and/or compute nodes 110.

The communications network 120 may include a variety of types ofphysical communication channels or “links.” The links may be wired,wireless, optical, or any other suitable media. In addition, thecommunications network 120 may include a variety of network hardware andsoftware for performing routing, switching, and other functions, such asrouters, switches, or bridges. The communications network 120 may bededicated for use by a stream computing application or shared with otherapplications and users. The communications network 120 may be any size.For example, the communications network 120 may include a single localarea network or a wide area network spanning a large geographical area,such as the Internet. The links may provide different levels ofbandwidth or capacity to transfer data at a particular rate. Thebandwidth that a particular link provides may vary depending on avariety of factors, including the type of communication media andwhether particular network hardware or software is functioning correctlyor at full capacity. In addition, the bandwidth that a particular linkprovides to a stream computing application may vary if the link isshared with other applications and users. The available bandwidth mayvary depending on the load placed on the link by the other applicationsand users. The bandwidth that a particular link provides may also varydepending on a temporal factor, such as time of day, day of week, day ofmonth, or season.

Computer System Hardware Components

FIG. 2 is a high-level block diagram of the major hardware components ofa representative general purpose computer system 200. In one or moreembodiments, compiler system 102, management system 105, compute nodes110, and database system 115 are each physically embodied as respectiveone or more general purpose computer systems, system 200 being arepresentation of any such general purpose computer system.

Computer system 200 includes one or more general-purpose programmableprocessors (CPU) 201 which execute instructions and process data frommain memory 202. Main memory 202 is preferably a volatile random accessmemory comprising at least one, and typically multiple, semiconductorintegrated circuit chip modules, using any of various memorytechnologies, in which data is loaded from storage or otherwise forprocessing by CPU(s) 201.

One or more communications buses 205 provide a data communication pathfor transferring data among CPU(s) 201, main memory 202 and variousinterface units 211, 212, 213, which may also be known as I/O processors(IOPs) or I/O adapters (IOAs). The interface units support communicationwith a variety of storage, I/O devices, and/or networks. For example,storage interface unit(s) 211 supports the attachment of one or morestorage devices 221-223 providing non-volatile storage of data which canbe loaded into memory as required. Such storage devices may includewell-known rotating magnetic hard disk drive storage devices, solidstate devices (SSD), removable memory cards, optical storage, flashmemory, and so forth, and could further include network attached storage(NAS), devices attached via a storage area network (SAN), and/or arraysof disk drives and/or other storage devices configured to appear as asingle large storage device to a host. Storage may further include cloudstorage devices accessible via one or more networks. I/O deviceinterface unit(s) 212 may support the attachment of any of various othertypes of I/O devices, such as user terminals, displays, keyboards orother input devices, printers, and so forth, it being understood thatother or additional types of I/O devices could be used. Networkinterface adapter(s) 213 may support connections to one or more externalnetworks for communication with one or more other digital devices, andspecifically to network 120 for communication with devices representedin FIG. 1. Network adapter(s) 213 could support redundant connections toa single network, or could be coupled to separate networks, which may ormay not be in communication with each other. Such external networkspreferably include the Internet, and may include one or moreintermediate networks, such as local area networks, through whichcommunication with the Internet is effected.

It should be understood that FIG. 2 is intended to depict therepresentative major components of general purpose computer system 200at a high level, that individual components may have greater complexitythan represented in FIG. 2, that components other than or in addition tothose shown in FIG. 2 may be present, that the number, type andconfiguration of such components may vary, and that a complex computersystem will typically have more components than represented in FIG. 2.Several particular examples of such additional complexity or additionalvariations are disclosed herein, it being understood that these are byway of example only and are not necessarily the only such variations.

Although only a single CPU 201 is shown for illustrative purposes inFIG. 2, computer system 200 may contain multiple CPUs, as is known inthe art. Although main memory 202 is shown in FIG. 2 as a singlemonolithic entity, memory 202 may in fact be distributed and/orhierarchical, as is known in the art. For example, memory may exist inmultiple levels of caches, and these caches may be further divided byfunction, so that one cache holds instructions while another holdsnon-instruction data which is used by the processor or processors.Memory may further be distributed and associated with different CPUs orsets of CPUs, as is known in any of various so-called non-uniform memoryaccess (NUMA) computer architectures Although communications buses 205are shown in FIG. 2 as a single entity, in fact communications amongvarious system components is typically accomplished through a complexhierarchy of buses, interfaces, and so forth, in which higher-speedpaths are used for communications between CPU(s) 201 and memory 202, andlower speed paths are used for communications with I/O interface units211-213. Buses 205 may be arranged in any of various forms, such aspoint-to-point links in hierarchical, star or web configurations,multiple hierarchical buses, parallel and redundant paths, etc. Forexample, as is known in a NUMA architecture, communications paths arearranged on a nodal basis. Buses may use, e.g., an industry standard PCIbus, or any other appropriate bus technology. While multiple I/Ointerface units are shown which separate buses 205 from variouscommunications paths running to the various I/O devices, it wouldalternatively be possible to connect some or all of the I/O devicesdirectly to one or more system buses. Although FIG. 1 represents network120 as a single entity, in one or more embodiments a separate network orstorage bus may be present for communicating with one or more sharedstorage servers, and such communication may be driven by a dedicated oneor more storage interface units 211 separate from general purposenetwork adapters 213.

Computer system 200 depicted in FIG. 2 may include multiple attachedterminals, such as might be typical of a multi-user “mainframe” computersystem. Where computer system 200 is used exclusively as a compute node110 or other server for performing work on behalf of remote clients, itmay contain only a limited number of terminals, or even a singleterminal, e.g., for use as a maintenance interface by a systemadministrator or the like, or in some cases no terminal at all,administrative functions being performed remotely. Furthermore, whilecertain functions are described herein for illustrative purposes asembodied in a single computer system, some or all of these functionscould alternatively be implemented using a distributed network ofcomputer systems in communication with one another, in which differentfunctions or steps described herein are performed on different computersystems.

Although compute nodes 110, management system 105, compiler system 102,and database system 115 are represented in FIGS. 1-2 as independentsystems, any or all of these entities may be implemented ascorresponding logical partitions of one or more logically partitionedcomputer systems. For example, any of CPUs 201 may in fact be acorresponding portion of a processing resource capacity of a largerlogically partitioned computer system which is allocated to thecorresponding logical partition; and any memory 202 may in fact be acorresponding portion of a memory capacity of a larger logicallypartitioned computer system which is allocated to the correspondinglogical partition.

While various system components have been described and shown at a highlevel, it should be understood that a typical computer system containsmany other components not shown, which are not essential to anunderstanding of the present invention.

Stream Computing Components

FIG. 3 is a conceptual illustration showing in greater detail certainsoftware components in memory 300 of a compute node 110, which may bethe same as one of the compute nodes 110A-110D of FIG. 1, according tovarious embodiments. As shown in FIG. 3, a representative compute nodememory includes an operating system kernel 301, one or more processingelements 311, a buffer 313, and a compute node database agent 321.

Operating system kernel 301 is executable code and state data providingvarious low-level software functions, such as device interfaces,management of memory pages, management and dispatching of multipletasks, common services for application programs, etc. as is well knownin the art. In particular, OS kernel 301 preferably includes one or morenetwork adapter drivers 302 for handling communications with one or morenetworks, including network 120, via network interface(s) 213.

The one or more processing elements 311 each comprise code and statedata for performing respective functions as part of a data streamcomputing application. A stream computing application may include one ormore stream operators 312 that may be compiled into a “processingelement” container 311. The memory 300 may include two or moreprocessing elements 311, each processing element having one or morestream operators 312. Each stream operator 312 may include a portion ofcode that processes tuples flowing into a processing element and outputstuples to other stream operators 312 in the same processing element, inother processing elements, or in both the same and other processingelements in a stream computing application. Processing elements 311 maypass tuples to other processing elements that are on the same computenode 110 or on other compute nodes that are accessible viacommunications network 120. For example, a processing element 311 oncompute node 110A may output tuples to a processing element 311 oncompute node 110B. In one embodiment, a processing element 311 isassigned to be executed by only one CPU, although in other embodimentsthe stream operators 312 of a processing element 311 may includemultiple threads which may be executed on different respective CPUs.

Buffer 313 is a portion of memory 300 for holding data being streamed aspart of the stream computing application, and in particular, for holdingdata tuples. Buffer 313 may be a single entity, but in one or moreembodiments, multiple buffers exist including a local buffer 314 alsoknown as a window, one or more TCPIP buffers 315 for passing messagesamong various entities of the data streaming applications, and one ormore thread ports 316 for queuing data to be processed be respective oneor more threads.

FIG. 4 is a conceptual representation of a set of tuples in a streamingdata application buffer 313, according to various embodiments. Any ofbuffers 314-316 may hold one or more tuples. As illustrated in FIG. 4, aset of tuples contains one or more tuples 401, each tuple logicallyorganized as multiple fields or attributes 402-404. A set of tuples maybe conceptually represented as a table, in which each tuple 401corresponds to a respective row of the table, and each attribute orfield of a tuple corresponds to a respective column of the table.Although conceptually represented as a table, the actual structure of aset of tuples in memory may vary, and may be different in each of thedifferent buffers 314-316; the set may occupy non-contiguous memoryaddress regions, tuples may vary in size; some attributes might bepresent in only a subset of the tuples, and so forth. Although the datastreaming application produces tuples which are added to a table of adatabase, the structure and attributes of tuples 401 within the datastreaming application are not necessarily identical to those of tuplesin a table of a relational database. The tuples 401 stored in buffer 313may be all of a single type (i.e., all have the same attributes andstructure), or may be tuples of different types. In one or moreembodiments, tuples may be grouped separately in separate sets or indifferent buffers depending on current status of a tuple within theoperator graph. For example, one set of tuples may comprise tuples401awaiting processing by a particular processing element 311 within thecompute node while another set comprises tuples 401 which have alreadybeen processed by the particular processing element

Compute node database agent 321 is executable code and state data whichperforms certain functions on behalf of a requesting entity with respectto data in the data streaming application, and in particular, withrespect to tuples 315 temporarily stored in buffer 313, as explained ingreater detail herein. In general, compute node database agent performsfunctions which enable a relational database to access streaming data.In one or more embodiments, the requesting entity is a management systemdatabase agent 521 executing in management system 105, although therequesting entity could alternatively be a relational database itself.In one or more embodiments, compute node database agent 321 includes aquery function 322 for executing queries on behalf of a requestingentity against data in buffer 313 and returning query results to therequesting entity. In one or more embodiments, compute node databaseagent 321 includes an edit/delete function which performs edit and/ordelete operations on data in buffer 313 on behalf of a requestingentity. Database agent 321 may include other or additional functions.

In one or more embodiments, compute node memory 300 may further includetrace data 318 tracing operation of the data streaming application, andparticularly tracing the progression of tuples through the operatorgraph. This trace data may be used to build operator graph profile datafor use in projecting tuples exiting the data streaming application andentering database 140.

FIG. 5 is a conceptual illustration showing in greater detail certainsoftware components in memory 500 of the management system 105 of FIG. 1according to various embodiments. As shown in FIG. 5, a representativemanagement system memory includes an operating system kernel 501, astream manager 134, an operator graph 136, a management system databaseagent 521, a profile data analyzer 523, operator graph profile data 525,and a query results cache 528.

Operating system kernel 501 is executable code and state data providingvarious low-level software functions, such as device interfaces,management of memory pages, management and dispatching of multipletasks, common services for application programs, etc. as is well knownin the art. In particular, OS kernel 501 preferably includes one or morenetwork adapter drivers 502 for handling communications with one or morenetworks, including network 120, via network interface(s) 213.

Stream manager 134 manages the operation of the data streamingapplication, and in particular, maintains operator graph 132. Operatorgraph 132 is a data structure defining how tuples are routed toprocessing elements 311 for processing.

Management system database agent 521 is executable code and state datawhich performs certain database related functions with respect to datain the data streaming application at the request of a relationaldatabase. These database related functions may involve access to data inthe buffers 313 of one or more compute nodes 110, for which managementsystem database agent 521 communicates with corresponding compute nodedatabase agents 321 in the respective one or more compute nodes 110.Management system database agent 521 may receive result data from thevarious compute node database agents 321, may collect and process resultdata in query results cache 528, and provide collected and processedresults back to the requesting database. In one or more embodiments,management system database agent 521 performs certain operations, and inparticular projects streamed data to enter the relational database,using operator graph profile data 525.

Profile data analyzer 523 is executable code and state data whichcollects trace data from the various compute nodes and analyzes thatdata to construct and maintain operator graph profile data 525. Operatorgraph profile data 525 includes profile summary records 526 and tracedata 527. Trace data 527 is a collection of all or selective portions oftrace data 318 from the various compute nodes, and is used to by profiledata analyzer to generate profile summary records 526. Profile summaryrecords are a representation of historical data streaming flow patterns.For example, profile summary records may represent a number, proportionor other measure of tuples entering and leaving each processing element,attributes within tuples which are changed, deleted or added by eachprocessing element, and so forth. Tuple data flow may further berepresented separately for different attribute key values within atuple. Exemplary profile summary data 526 is illustrated in FIG. 12 anddescribed in greater detail herein.

FIG. 6 is a conceptual illustration showing in greater detail certainsoftware components in memory 600 of the compiler system 102 of FIG. 1according to various embodiments. As shown in FIG. 6, a representativecompiler system memory includes an operating system kernel 601, acompiler 136, and compiler input and output in the form of sourcemodules 611, intermediate code modules 612, and object code modules 613.

Operating system kernel 601 is executable code and state data providingvarious low-level software functions, such as device interfaces,management of memory pages, management and dispatching of multipletasks, common services for application programs, etc. as is well knownin the art. In particular, OS kernel 601 preferably includes one or morenetwork adapter drivers 602 for handling communications with one or morenetworks, including network 120, via network interface(s) 213.

Compiler 136 is executable code and data structures which compilesmodules, which include source code or statements 611, into the objectcode 613, which includes machine instructions that execute on aprocessor. In one embodiment, the compiler 136 may translate the modulesinto an intermediate form 612 before translating the intermediate forminto object code. The compiler 136 may output a set of deployableartifacts that may include a set of processing elements and anapplication description language file (ADL file), which is aconfiguration file that describes the stream computing application. Insome embodiments, the compiler 136 may be a just-in-time compiler thatexecutes as part of an interpreter. In other embodiments, the compiler136 may be an optimizing compiler. In various embodiments, the compiler136 may perform peephole optimizations, local optimizations, loopoptimizations, inter-procedural or whole-program optimizations, machinecode optimizations, or any other optimizations that reduce the amount oftime required to execute the object code, to reduce the amount of memoryrequired to execute the object code, or both. The output of the compiler136 may be represented by an operator graph, e.g., the operator graph132.

The compiler 136 may also provide the application administrator with theability to optimize performance through profile-driven fusionoptimization. Fusing operators may improve performance by reducing thenumber of calls to a transport. While fusing stream operators mayprovide faster communication between operators than is available usinginter-process communication techniques, any decision to fuse operatorsrequires balancing the benefits of distributing processing acrossmultiple compute nodes with the benefit of faster inter-operatorcommunications. The compiler 136 may automate the fusion process todetermine how to best fuse the operators to be hosted by one or moreprocessing elements, while respecting user-specified constraints. Thismay be a two-step process, including compiling the application in aprofiling mode and running the application, then re-compiling and usingthe optimizer during this subsequent compilation. The end result may,however, be a compiler-supplied deployable application with an optimizedapplication configuration.

Compiler system memory 600 further includes common run-time code 614.Common run-time code can be any of source code, intermediate code, orobject code. Common run-time code 614 is common code which is includedin the code of each processing element 311 to perform functions commonto all or many processing elements. Common run-time code may include,for example, functions for passing messages among the various processingelements, accessing buffer 313, reporting errors or other status, and soforth. In one or more embodiments, common run-time code includes traceinstructions 615 for collecting trace data 318 tracing operation of thedata streaming application. Trace data 318 collected by executing traceinstructions 615 may be used for building operator graph profile data525. Trace instructions 615 may be optionally included instructions,i.e., instructions which the compiler 136 optionally includes in thecode of a processing element depending on the settings or directionsgiven to the compiler at time of compilation.

FIG. 7 illustrates an exemplary operator graph 700 for a streamcomputing application beginning from one or more sources 702 through toone or more sinks 704, 706, according to some embodiments. This flowfrom source to sink may also be generally referred to herein as anexecution path. In addition, a flow from one processing element toanother may be referred to as an execution path in various contexts.Although FIG. 7 is abstracted to show connected processing elementsPE1-PE10, the operator graph 700 may include data flows between streamoperators 312 (FIG. 3) within the same or different processing elements.Typically, processing elements, such as processing element 311 (FIG. 3),receive tuples from the stream as well as output tuples into the stream(except for a sink—where the stream terminates, or a source—where thestream begins). While the operator graph 700 includes a relatively smallnumber of components, an operator graph may be much more complex and mayinclude many individual operator graphs that may be statically ordynamically linked together.

The example operator graph shown in FIG. 7 includes ten processingelements (labeled as PE1-PE10) running on the compute nodes 110A-110D. Aprocessing element may include one or more stream operators fusedtogether to form an independently running process with its own processID (PID) and memory space. In cases where two (or more) processingelements are running independently, inter-process communication mayoccur using a “transport,” e.g., a network socket, a TCP/IP socket, orshared memory. Inter-process communication paths used for inter-processcommunications can be a critical resource in a stream computingapplication. However, when stream operators are fused together, thefused stream operators can use more rapid communication techniques forpassing tuples among stream operators in each processing element.

The operator graph 700 begins at a source 702 and ends at a sink 704,706. Compute node 110A includes the processing elements PE1, PE2, andPE3. Source 702 flows into the processing element PE1, which in turnoutputs tuples that are received by PE2 and PE3. For example, PE1 maysplit data attributes received in a tuple and pass some data attributesin a new tuple to PE2, while passing other data attributes in anothernew tuple to PE3. As a second example, PE1 may pass some received tuplesto PE2 while passing other tuples to PE3. Tuples that flow to PE2 areprocessed by the stream operators contained in PE2, and the resultingtuples are then output to PE4 on compute node 110B. Likewise, the tuplesoutput by PE4 flow to operator sink PE6 704. Similarly, tuples flowingfrom PE3 to PE5 also reach the operators in sink PE6 704. Thus, inaddition to being a sink for this example operator graph, PE6 could beconfigured to perform a join operation, combining tuples received fromPE4 and PE5. This example operator graph also shows tuples flowing fromPE3 to PE7 on compute node 110C, which itself shows tuples flowing toPE8 and looping back to PE7. Tuples output from PE8 flow to PE9 oncompute node 110D, which in turn outputs tuples to be processed byoperators in a sink processing element, for example PE10 706. Typically,the sinks 704,706 output data (e.g. tuples) externally of the datastreaming application (e.g., to a database, storage file, or otherdestination); however, it is possible for any of the processing elementsto output data externally as well.

Processing elements 311 (FIG. 3) may be configured to receive or outputtuples in various formats, e.g., the processing elements or streamoperators could exchange data marked up as XML documents. Furthermore,each stream operator 312 within a processing element 311 may beconfigured to carry out any form of data processing functions onreceived tuples, including, for example, writing to database tables orperforming other database operations such as data joins, splits, reads,etc., as well as performing other data analytic functions or operations.

The stream manager 134 may be configured to monitor a stream computingapplication running on compute nodes, e.g., compute nodes 110A-110D, aswell as to change the deployment of an operator graph, e.g., operatorgraph 132. The stream manager 134 may move processing elements from onecompute node 110 to another, for example, to manage the processing loadsof the compute nodes 110A- 110D in the computing infrastructure 100.Further, stream manager 134 may control the stream computing applicationby inserting, removing, fusing, un-fusing, or otherwise modifying theprocessing elements and stream operators (or what tuples flow to theprocessing elements) running on the compute nodes 110A-110D.

Because a processing element may be a collection of fused streamoperators, it is equally correct to describe the operator graph as oneor more execution paths between specific stream operators, which mayinclude execution paths to different stream operators within the sameprocessing element. FIG. 7 illustrates execution paths betweenprocessing elements for the sake of clarity.

Database Components

In accordance with one or more embodiments, tuples output by operatorgraph 700, whether from one of sinks 704, 706, or from some otherprocessing element, are entered into one or more tables of a structuredrelational database 140. FIG.8 is a conceptual illustration of the majorsoftware components in memory 800 of a database server computer system115 of FIG. 1 for accessing a structured relational database 140,according to various embodiments. As shown in FIG. 8, a database servercomputer system memory contains an operating system kernel 801 andstructured database 140 including a database manager 811, one or moredatabase tables 821-823, and one or more metadata structures 824-832.

Operating system kernel 801 is executable code and state data providingvarious low-level software functions, such as device interfaces,management of memory pages, management and dispatching of multipletasks, common services for application programs, etc. as is well knownin the art. In particular, OS kernel 801 preferably includes one or morenetwork adapter drivers 802 for handling communications with one or morenetworks, including network 120, via network interface(s) 213.

Database tables and metadata 820 include one or more tables 821-823 (ofwhich three are shown for illustrative purposes in FIG. 8, it beingunderstood that the number may vary). As is known in the database art, adatabase table is a data structure logically in the form of a tablehaving multiple records (also called entries or tuples), each recordhaving at least one, and usually multiple, fields (also calledattributes). The “rows” of the table correspond to the records, and the“columns” correspond to the fields. Although tables 821-823 are datastructures which are logically equivalent to tables, they may bearranged in any suitable structure known in the database art. Databasetables 821-823 might contain almost any type of data which is useful tousers of a computer system.

FIG. 9 is a conceptual representation of the structure of a databasetable 821, according to one or more preferred and/or optionalembodiments, it being understood that tables 822, 823 could have similarstructure. Referring to FIG. 9, table 821 includes a header portion 901and one or more table partitions 902A,902B,902C (herein genericallyreferred to as feature 902). Each table partition 902 contains multiplerecords 903 (also called rows, entries, or tuples), each record 903containing multiple data values logically organized as multiple fields904-906. A large database table will typically have multiple partitions902, each partition containing a respective disjoint subset of therecords of the database table as a whole, although smaller tables mayhave only a single partition. Each database table partition 902 isconceptually represented in FIG. 9 as a table or array, in which therows represent database records, and the columns represent databasefields. However, as is known in the art, the actual structure of thedatabase table in storage may vary due to the needs of data organizationaccommodating database updates, and so forth. A database table mayoccupy non-contiguous blocks of storage; database records may vary inlength; some fields might be present in only a subset of the databaserecords; and individual entries may be non-contiguous.

Associated with database table 821 is header portion 901. Header 901 isin fact data separate from the collection of records 903, and may beconsidered part of the database table 821 or may be considered aseparate data structure. The header may or may not be stored inlocations contiguous to the records 903. Header contains data foridentifying the contents of the table, where it is located (e.g.,pointers, arrays and other structures which identify the locations ofthe various partitions 902), certain essential parameters of the table,and so forth. In particular, in accordance with one or more embodiments,header 901 contains a table identifier 907 and a current table size 908(i.e., the number of record currently in table 821). In accordance withone or more embodiments, the header further contains various other datauseful for managing the table.

Associated with the database tables are one or more auxiliary datastructures 824-832, also sometimes referred to as metadata (of whichnine are represented in FIG. 8, it being understood that the number andtype of such structures may vary). Auxiliary data structurescharacterize the structure of the database and data therein, and areuseful in various tasks involved in database management, particularly inexecuting queries against the database. Examples of auxiliary datastructures include database indexes 824-827, histograms 828-829, andmaterialized query tables (MQT) 830-831). Auxiliary data structures mayfurther include a query cache 832 in which data regarding previouslyexecuted queries (the query itself, query execution plan or executionstrategy, run-time statistics from execution, etc.) is stored. Althougha particular number and type of auxiliary database structures isillustrated in FIG. 8, it will be understood that the number and type ofsuch structures may vary, that not all illustrated structures may bepresent, and/or that additional structures not shown may be present.

Database manager 811 comprises executable computer programming codewhich executes on CPU(s) 201 of database server system 115 to providebasic functions for the management of database 140. Database manager 811may theoretically support an arbitrary number of database tables, whichmay or may not have related information, although only three tables areshown in FIG. 8. Database manager 811 preferably contains administrativemaintenance functions 812 which automatically perform certain functionsto manage the database and/or allow authorized users to perform basicadministrative operations with respect to the database, such as definingand editing database table definitions, creating, editing and removingrecords in the database, viewing records in the database, definingdatabase auxiliary data structures such as indexes and materializedquery tables, views, and so forth. Administrative functions may furtherinclude logging of database transactions, recovery of data, and soforth. Certain of these functions may be available only to systemadministrators and the like, while others are available to clients.

Database manager 811 preferably further includes a query engine 813 forexecuting queries against data in database tables 821-823 and a queryoptimizer 814 for generating optimized query execution plans for use byquery engine 813 in executing queries. Database manager 811 furtherpreferably includes an external interface 815 having one or moreapplication programming interfaces (APIs) by which external applicationscan access data in database 140 either by invoking query engine 813 orthrough other means. Database manager 811 may further contain any ofvarious more advanced database functions, as are known in the art.Database manager could be a generic database management system, such asone implementing a structured query language (SQL) query protocol, butit might alternatively query and structure data according to some otherprotocol and/or might be a custom designed database management system.Although database manager 811 is shown and described herein as an entityseparate from operating system kernel 801, it will be understood that insome computer architectures various database management functions areintegrated with the operating system.

Although one database 140 having three database tables 821-823 and nineauxiliary structures 824-832 are shown in FIG. 8, the number of suchentities may vary, and could be much larger. A computer system or agroup of computer systems may contain multiple databases, each databasemay contain multiple tables, and each database may have associated withit multiple indexes, MQTs, histograms, views, volatility records, and/orother auxiliary data structures not illustrated. Alternatively, someentities represented in FIG. 8 might not be present in all databases.Additionally, database 140 may be logically part of a larger distributeddatabase which is stored on multiple computer systems. Although databasemanager 811 is represented in FIG. 8 as part of database 140, thedatabase manager, being executable code, is sometimes considered anentity separate from the “database”, i.e., the data 820.

In addition to operating system 801 and database 140, memory of databasesystem 800 may include all or selective portions of one or more userapplications 804-805. User applications 804-805 are applications whichexecute on CPU(s) 201, and may access data in database 140 to performtasks on behalf of one or more users. Such user applications mayinclude, e.g., sales transactions, inventory management, personnelrecords, accounting, code development and compilation, mail,calendaring, or any of thousands of user applications, and may beweb-based (i.e., present web pages to a remote client for rendering inthe client's browser) or provide some other form of user interface. Someof these applications may access database data in a read-only manner,while others have the ability to update data. There may be manydifferent types of read or write database access tasks, each accessingdifferent data or requesting different operations on the data. Forexample, one task may access data from a specific, known record, andoptionally update it, while another task may invoke a query, in whichall records in the database are matched to some specified searchcriteria, data from the matched records being returned, and optionallyupdated. Furthermore, data may be read from or written to databasetables 811-813 directly, or may require manipulation or combination withother data supplied by a user, obtained from another database, or someother source. Applications 804-805 typically utilize function calls todatabase manager 811 through external APIs 815 to access data in thedatabase, and in particular, to execute queries against data in thedatabase, although in some systems it may be possible to independentlyaccess data in the database directly from the application. Although twoapplications 804-805 are shown for illustrative purposes in FIG. 8, thenumber of such applications may vary.

Various software entities are represented conceptually in FIGS. 3-9 asbeing contained in respective memories of any of the various systems ordevices described herein. However, as is well known, the memory of acomputer or other digital device is typically insufficient to hold allsoftware entities and other data simultaneously, and selective portionsof software entities or other data are typically loaded into memory fromstorage as required. Furthermore, various software entities arerepresented in FIGS. 3-9 as being separate entities or contained withinother entities. However, it will be understood that this representationis for illustrative purposes only, and that particular modules or dataentities could be separate entities, or part of a common module orpackage of modules. Furthermore, although a certain number and type ofsoftware entities are shown in the conceptual representations of FIGS.3-9, it will be understood that the actual number of such entities mayvary, and in particular, that in a complex data streaming and/ordatabase environment, the number and complexity of such entities istypically much larger. Additionally, although certain softwarecomponents are depicted in within respective single systems forcompleteness of the representation, it is not necessarily true that allprograms, functions and data will be present in a single system, and maybe present in another partition on the same computer system or in adifferent computer system. For example, user applications 804-805 whichcall APIs to access the database may be on a separate system fromcertain maintenance functions such as defining the database, adding ordeleting metadata structures, and so forth. Finally, it will beunderstood that the conceptual representations of FIGS. 3-9 are notmeant to imply any particular memory organizational model, and that acomputer system hosting a data streaming application or a database mightemploy a single address space virtual memory, or might employ multiplevirtual address spaces which overlap.

Collection of Data Streaming Profile Data

In accordance with one or more embodiments, profile data is collectedwhich characterizes the operation of the data streaming application.This profile data is then used to correlate instances of tuples exitingthe data streaming application (e.g., via a sink 604,606, or otherwise)to be appended to a database table 821-823 of database 140 withpreviously occurring tuples in the operator graph. These previouslyoccurring tuples may have specified attribute values and/or exist atspecified locations in the operator graph. The analyzed profile data maybe used to project data which will be added to the database and/or toexecute queries against in-flight data in the data streamingapplication, as described in commonly assigned U.S. patent applicationSer. No. 15/339,772, entitled “Projecting Effect of In-Flight StreamedData on a Relational Database”, filed Oct. 31, 2016, and commonlyassigned U.S. patent application Ser. No. 15/339,800, entitled “QueryingIn-Flight Streamed Data from a Relational Database”, filed Oct. 31,2016, both of which are herein incorporated by reference. However, atleast some of this profile data may also be used for executingdelete/edit commands against in-flight data, as described herein.

In one or more embodiments, profile data is obtained by tracing theexecution of one or more execution instances of the data streamingapplication, although other or additional forms of profile data might beused, such as input and output data or data obtained from analysis ofthe source code. Tracing is a well-known technique whereby theoccurrence of pre-defined traceable events during execution of acomputer program causes the computer to save certain state data showingthe state of the computer at the time the traceable event occurred. Itis typically used during computer program code development, to debugerrors, determine frequently used code paths, identify performancebottlenecks, and so forth.

Tracing may be accomplished by “instrumenting” the code to be traced,i.e., placing trace instructions (“instrumentation”) at various codelocation which, when encountered during execution of the computerprogram, cause the desired state data to be saved. A trace instructioncould cause data to be saves unconditionally (every time the instructionis encountered), or conditionally based on some state value(s). Theexact mechanism whereby the state data is saved may vary. The tracinginstrumentation could be in-line instructions in the code, or a call toa separate routine, or an instruction which triggers an interrupt.

In one or more embodiments, the trace instructions 615 (instrumentation)are contained in at least one version of the common run-time code 614used by computer 136 to generate the data streaming program. Therecould, in fact, be multiple versions of the common run-time code,including one without any instrumentation. There could also be multipledifferent instrumented versions for collecting different types ofprofile data. Instrumentation in the common run-time code simplifies theprocess of developing a data streaming application by avoiding the needfor developers of each different data streaming application to createtheir own instrumentation, and standardizes the collection and analysisof profile data.

The common run-time code 614 typically contains routines in whichtraceable events occur. Specifically, in one or more embodiments, commonrun-time code 614 will include routines for allocating a new tuple inthe data streaming application, for sending a tuple from one processingelement to a next processing element, and for outputting a tuple to thedatabase. Additional routines which may be of interest in tracing tuplesin accordance with one or more embodiments may include routines forcopying or duplicating a tuple, for deleting a tuple, for changing thedefinition of a tuple (its fields, field lengths, etc.) and so forth. Inone or more embodiments, any or all of these events might be traceableevents which cause the collection of trace data, and appropriateinstrumentation is placed in the corresponding routines which performthe operation.

In one or more embodiments, the instrumented version(s) of commonrun-time code 614 alter the structure of the tuples used in the datastreaming application by adding additional data useful in traceanalysis. FIG. 10 is a conceptual representation of an altered tuple1001 of a data streaming application, altered for supporting profileanalysis of trace data, according to various embodiments. Referring toFIG. 10, tuple 1001 includes a header 1002 containing a tuple type 1003,a unique tuple identifier 1004, and a variable number of parent pairs1005, each parent pair comprising a respective parent tuple type 1006and parent tuple identifier 1007. The header may contain other data. Thetuple further contains a body portion 1008 having a variable number ofuser data fields 1009-1011 as defined by the data streaming application,of which three are illustrated in FIG. 10, it being understood that thenumber of such user data fields may vary. The tuple type 1003 is thename of a set of tuples having a common defined structure, correspondingroughly to a table name of a database table containing multiple tuples(also called records or rows). The tuple identifier 1004 and parentpairs 1005 are additional fields which are added by the instrumentedversion of the common run-time code 614. These fields are usedinternally by the data streaming application for trace analysis and/orother purposes, and need not be visible to the user of the application.

In the instrumented version of the common run-time code, any routinewhich creates a new tuple automatically allocates the above describedfields and assigns a unique tuple identifier 1004, similar to a uniqueserial number, to the newly created tuple. If the newly created tuple iscreated from or copied from an existing tuple (parent tuple), the tupletype and unique tuple identifier of the parent tuple are copied into aparent pair 1005 of the new tuple as the parent tuple type 1006 andparent tuple identifier 1007, respectively. Since there could be a chainof multiple parents, all parent pairs 1005 in the immediate parent arealso copied into respective parent pairs 1005 of the newly createdtuple.

FIG. 11 is a flow diagram illustrating at a high level a process ofcollecting profile data for a data streaming application, according tovarious embodiments. Referring to FIG. 11, the instrumented code iscompiled by compiler 136 (block 1101). Compilation represented at block1101 could be either static or dynamic compilation. If staticallycompiled, the user would direct compilation with instrumentation atcompile time, by specifying use of an appropriate instrumented versionof the common run-time code, or if supported, by a special compilerdirective or option to use the instrumented version. If dynamicallycompiled at run time, the user invoking execution of the data streamingapplication specifies the code files (e.g., source or intermediate code)including any instrumented version of the common run-time code.Responsive to the appropriate directive, compiler 136 compiles the datastreaming application (either statically or dynamically, as the case maybe) to incorporate the tracing instructions.

The data streaming application is invoked for execution with tracingenabled, and any optional tracing parameters are specified (block 1102).Although block 1102 is represented in FIG. 11 as following block 1101,is will be understood that in certain dynamic compilation environments,compilation may occur after the data streaming application is invokedfor execution.

In one or more embodiments, the instrumentation instructions, being inthe common run-time code, are not specific to any particular datastreaming application and therefore not specific to any particular typeof tuple or set of tuple types. For example, a common run-time routinewhich sends a tuple from one processing element to a next processingelement could include a tracing instructions which trigger whenever atuple (of any type) is sent. If the user wishes to trace a particulartype of tuple or set of tuple types, the user specifies the tuple(s) tobe traced as an optional tracing parameter when the data streamingapplication is invoked. When the trace instructions are triggered, thecode determines whether the tuple being operated on by the correspondingcommon run-time routine is of the type which should be traced, and savestrace data accordingly. Additional run-time tracing options arepossible. For example, it may be desirable to trace only some if thepossible traceable events or paths through the operator graph. Whilegeneric trace instructions may exist in the common run-time code makingit possible to trace all paths through the operator graph, the user mayspecify particular paths to be traced or otherwise limit the events tobe traced.

Accordingly, when the data streaming application is invoked forexecution at block 1102, the user may specify any tracing parameters.The user may have the option to disable tracing entirely for performancereasons. To collect trace data for use in analyzing the executionprofile of the data streaming application and generating operator graphprofile data 525 including profile summary data 526, tracing ispreferably enabled and trace data for one or more tuple types ofinterest is saved whenever a tuple of the corresponding type is created,is sent from one processing element to another, or is output to thedatabase. Additional events may optionally be traced.

Stream manager 134 responds by initiating execution in the variouscompute nodes 110 and initializing any environmental parameters,including environmental parameters governing tracing (block 1103). Forexample, a trace enable flag may be set, and bit masks or other datastructures may be initialized to control tracing for the desired eventsto be traced, trace data to be collected, and so forth.

The data streaming application executes concurrently in each of thecompute nodes 110 and in the management system 105, represented in FIG.11 as blocks 1104A-D. Actions within each node or management system areillustrated only in block 1104A for clarity of representation, it beingunderstood that these are similar in blocks 1104B-D. Within each node(or management system), the data streaming application code executes,possibly in multiple concurrent threads (represented in simplified formas block 1105), until a trace instruction is encountered. The traceinstruction causes a check whether tracing is enabled (block 1106). Ifnot, the ‘N’ branch is taken from block 1106, and execution resumes. Iftracing is enabled, trace code determines whether the event and thecurrent state data match the tracing parameters which were specifiedwhen execution was invoked (block 1107). For example, if particularevents such as tuple creation, tuple transmission from one processingelement to another, and/or tuple output are to be traced, the trace codeverifies that the trace instruction causing temporary halt in executioncame from one of these events; if tracing of a particular tuple type wasspecified, the trace code verifies that the tuple associated with thetrace event is of the specified type; and so forth. If the event/statedata do not match the specified tracing parameters, the ‘N’ branch istaken from block 1107, and execution resumes; otherwise, the ‘Y’ branchis taken, and the trace code determines the extent of trace data to besaved (block 1108). Almost any data could be saved in a trace, but inone or more embodiments, the saved trace data includes a copy of thetuple associated with the traceable event and the location in theoperator graph at which the tuple was at the time of the traceableevent. This data is then saved in the local trace data 318, or, if thetrace instructions are executing in the management node, in managementnode trace data 527 (block 1109).

At some point, an exit condition is encountered during execution,causing execution of the program to end, as indicated by the flow lineto the END block. Such an exit condition could be, e.g., completion ofprocession all data, an interrupt, an error condition, or other exitcondition.

Profile trace data could be collected by tracing during one or multipleexecution instances of the data streaming application, and might berefined or periodically updated over time as more is learned about thebehavior of the data streaming application or as changes to theapplication code or the data upon which it typically operates causechanges to the application's behavior.

Generation of Profile Summary Data

In accordance with one or more embodiments, the collected profile datais analyzed using profile data analyzer 523 in management system 105 toproduce a set of profile summary records 526. The profile summaryrecords correlate specific tuple types occurring at specific locationswithin the operator graph with tuple types which are output to thedatabase, and specify some measure of the number of output tuples ofparticular type which can be projected to be produced.

FIG. 12 is a conceptual illustration of the structure of an exemplaryset of profile summary records 526, according to various embodiments.These records characterize previously observed flows of tuples withinthe data streaming application, and may be used, among other things, forprojecting data to be added to database 140 from data which is currently“in-flight”, i.e., being streamed within the data streaming application.

Referring to FIG. 12, the profile summary data 526 contains multiplerecords 1201, each record corresponding to a single type of tuple, itslocation within the operator graph 132, and type of tuple which may beoutput to the database as a result, and expressing one or moreexpectation values with respect thereto. Each record 1201 in the profilesummary data contains an output tuple type field 1202 specifying thetype of tuple which is output to the database, a graph location field1203 specifying the location within the operator graph to which thecorresponding record pertains, and an internal tuple type field 1204specifying the type of tuple which is temporarily held at thecorresponding location within the operator graph. It is possible thatthe output tuple type specified in field 1202 will be the same as theinternal tuple type specified in field 1204. In one or more embodiments,the record further contains a key field identifier 1205 specifying a keyfield within the internal tuple type specified in field 1204, and avariable number of key field specifics 1206, each specific specifying acorresponding minimum value 1207, a corresponding maximum value 1208,and a corresponding expectation value 1209.

Taken together, the profile summary record 1201 specifies an expectationvalue for a particular tuple at a particular graph location having aparticular key value of the key field. I.e., a record specifying outputtuple type OT in field 1202, graph location L in field 1203, internaltuple type IT in field 1204, key field K in field 1205, minimum keyvalue MIN in a field 1207, maximum key value MAX in field 1208, andexpectation value E in field 1209, is interpreted to mean that a singletuple of type IT at graph location L having a value in key field Kbetween MIN and MAX can be projected to produce E tuples of type OT forinput to the database. The expectation value E may be expressed as afloating point value which in many cases will be between 0 and 1, but itis possible for E to exceed 1, i.e., for a single tuple of type IT toresult in the output of multiple tuples of type OT. Alternatively, theexpectation value may be stored as a pair of values, the expectationvalue being derived as the quotient of the pair of values. For example,the pair of values may be two integers which represent a count of anumber of tuples of type OT (and optionally having particularparameters) output and a count of a number of tuples of type IT (andoptionally having particular parameters) found at the subject graphlocation.

In one or more alternate embodiments, the key field 1205 and key fieldspecifics 1206 may be optional or not used, and a single expectationvalue is specified for the internal tuple type and graph location, i.e.,a single expectation value regardless of the values of any data withinthe corresponding tuple.

In one or more further alternate embodiments, the profile summary record1201 includes a variable number of stable field identifier pairs 1210,each specifying a respective output stable field 1211 and correspondinginternal stable field 1212 of a stable field pair. As used herein, a“stable field pair” is an ordered pair of fields, one field of the pairin the internal tuple, and another in the output tuple, in which thevalue of the field in the output tuple is derived directly from thevalue of the field in the internal tuple without modification. Knowledgeof stable field pairs can be used to further refine projected changes todata in a database, for example, in response to a query in which a useris interested only in a particular subset of values in the stable field.

The data collected by tracing may be analyzed in any of various ways toproduce profile summary records 526. Conceptually, the analysis amountsto determining, for each tuple output to the database, for each locationthe tuple or a parent tuple passed through in the operator graph, andfor each internal tuple (or parent tuple) at that location, the numberof internal tuples at the location and the number of resultant tuplesoutput to the database. Additionally, if one or more key fields areidentified, these numbers are broken down by range of values in the keyfield. Further, stable fields can be identified by comparing fieldvalues in the internal tuples with those of the resultant output tuples.

FIG. 13 is a flow diagram illustrating at a high level a process ofanalyzing profile data to produce a set of profile summary records 526,according to various embodiments. This analysis is performed by or underthe control of profile data analyzer 523 in management system 105.

Referring to FIG. 13, trace data collected in the various nodes andstored in respective local node trace data caches 318 of compute nodes110 is transmitted to the management system 105 for analysis (block1301). Collection of trace data in the management system is shown as asingle block for simplicity of representation. It would in fact bepossible to transmit all trace data to the management system at thebeginning of analysis, as represented in FIG. 13. Alternatively, profiledata analyzer 523 in management system 105 may request trace data inincrements from the various compute nodes 110 as the analysis isperformed. This latter approach would off-load some of the screeningwork to the compute nodes. For example, the management system maydetermine that only specific tuple types at specific locations generateoutput to the database, and accordingly request only those tuple types,thereby reducing consumption of network bandwidth during analysis, andreducing the burden on the management system of scanning a great deal oftrace data which is ultimately not used.

The tuple type or types which are output to the database are identified,the parent tuple type(s), if any, of each tuple type which is output tothe database are identified, and one or more tables are generated of alltuples output to the database during the trace (block 1302). The orderof these actions may vary, depending on how the determinations are made.In some embodiments, it is possible that the output tuple types areknown or determined from external commands received from the database,or by analysis of source code. However, for a generic application, itwould always be possible to scan all the trace data, identify all tupleswhich are in fact output to the database during the trace datacollection, and construct a list of tuple types which are output to thedatabase from this data. Similarly, the parent types, if any, might bedetermined by analysis of source code or from external command, but fora generic application, it would always be possible to extract a list ofparent tuple types by examining parent type fields 1006 of the outputtuples. The table(s) of tuples, although referred to as tables, may beany convenient data structure for performing the analysis herein. Alltuples of the same type which are output to the database constitute anoutput tuple set. Preferably, each output tuple set is placed in aseparate respective table or other data structure. The table(s) oftuples output to the database may be indexed to assist further analysis,e.g., according to tuple identifier 1004.

For each location in the operator graph, the trace data is analyzed toproduce a corresponding one or more profile summary records 1201. Thisis represented in FIG. 13 as blocks 1303-1308, by selecting a locationin the operator graph (block 1303) and analyzing each location in turn.However, it will be appreciated that multiple actions may be performedconcurrently by multiple threads of execution or otherwise. A “location”can be any subset of the operator graph in the data streamingapplication in which tuples might be temporarily held and at which theyare traced. In one or more embodiments, the “locations” are processingelements in the operator graph, although the granularity of locationscould be compute nodes, operators, or some other entity.

For the selected location, the tuples traced from that location arescanned to identify one or more sets of tuples (referred to herein asinternal sets), each internal set corresponding to a tuple type of oneof the output tuple sets, or a parent tuple type of the tuples in anoutput tuple set (block 1304). A corresponding profile summary record1201 is generated for each such set (block 1305), the output tuple type1202 being set to the corresponding type of the output tuple set, thegraph location 1203 being set to the selected location, and the internaltuple type 1204 being set to the tuple type of the tuples in theinternal tuple set.

For each internal tuple set from the selected location, one or moreexpectation values are determined and recorded in the profile summaryrecord (block 1306). In one or more embodiments, a single expectationvalue for the profile summary record is derived as the quotient of thenumber of tuples in the corresponding output tuple set divided by thenumber of tuples in the internal tuple set. It would alternatively bepossible to record the expectation value as a pair of integerscorresponding to the count of tuples in the output tuple set and countof tuples in the internal tuple set. In one or more additionalembodiments, multiple expectation values are determined, eachcorresponding to some range of values of one or more key fields. The keyfield(s) could be specified by some external command to the streammanager, or could be determined by the profile data analyzer 523 byanalyzing the trace data. Specifically, any of various analyticaltechniques or tools could be used for finding correlations in data. Inthis case, the correlation sought is any correlation between a key fieldvalue and the expectation of producing an output tuple.

Therefore, in accordance with one or more embodiments, profile dataanalyzer 523 scans the internal tuple set and output tuple set to findkey values or ranges of key values, if any, which correlate to asignificantly higher or lower expectation value than the expectationvalue for the internal tuple set and output tuple set as a whole. Inthis case, the expectation value corresponding to a key value or keyvalue range is expressed as the quotient having a divisor equal to thenumber of internal tuples in the internal tuple set having a specifiedkey value or key value within the specified range, and a dividend equalto the number of tuples in output tuple set which are produced by any ofthe tuples counted in the divisor, i.e. which have a tuple ID 1004 or aparent tuple ID 1007 equal to the tuple ID of a tuple in the internaltuple set which has a specified key value or key value within thespecified range. If such a key field or key fields and value ranges areidentified, the key field is saved as key field 1205 in the profilesummary record, and each value or range of values of interest, and theircorresponding expectation values, are saved as a respective key fieldspecific 1206 having a respective minimum value 1207 of thecorresponding key field, a respective maximum value 1208 of thecorresponding key field, and a respective expectation value 1209corresponding to the expectation value for the internal tuple type atthe selected operator graph location when the key field value lies inthe range specified by the minimum 1207 and maximum 1208 values.

In one or more embodiments, for each internal tuple set, any stablefields are identified, and for each stable field, a corresponding stablefield pair 1210 is added to the profile summary record 1201 (block1307). It may be possible to identify stable fields from analysis of thesource code, but for a generic application, stable fields may beidentified by comparing the tuples in the internal set with the tuplesin the corresponding output tuple set, even where the field names and/orinternal and output tuple types are different. This may be done byscanning the entire set of internal tuples; for each internal tuple,determining whether a corresponding output tuple exists in the outputtuple set (i.e., having the same tuple ID 1004 if the tuple types arethe same, or having a parent tuple ID 1007 and parent type 1006 whichare the same as the tuple ID 1004 and tuple type 1003 of the internaltuple); and if so, for the first such tuple pair found, creating a listof all field pairs for which the value of the field in the output tupleis the same as the value of the field in the input tuple; and for allsubsequent pairs of an internal and an output tuple found, removing anyfield pair from the list if the values of the respective fields in thetwo tuples of the pair are not identical. Any field pairs remaining atthe end of the scan are considered stable fields, and the correspondingfield names in the output tuple and internal tuple of each such pair arerecorded in a new stable field pair 1210 as stable field output 1211 andstable field internal 1212, respectively.

If any more operator graph locations remain to be analyzed, the ‘Y’branch is taken from block 1308 and a next graph location is selectedfor analysis. When all graph locations have been analyzed, the profilesummary records have been generated and populated with data, and theanalysis of profile data is complete.

It will be appreciated that in the above description and theillustration of FIG. 13, various actions are shown and described asbeing performed sequentially for ease of understanding. However, forgreater system efficiency, it may be possible to perform many of theseactions concurrently by combining multiple scans of trace data into asingle scan. It will further be understood that the order of certainactions could be changed without affecting the result of generatingprofile summary records. Finally, it will be appreciated that manyvariations in the form of profile data used to analyze in-flight data ofinterest are possible, and that the profile summary records describedherein represent only some of the possible forms of profile data whichmay be used. Profile records may have other or additional fields; may bebased on data other than or in addition to trace data; may characterizedata streaming application behavior in a different way; and so forth.

Querying In-Flight Data

In accordance with one or more embodiments, in-flight data of the datastreaming application is accessible from a database query initiated by auser of database 140. Including in-flight streaming data within thescope of a database query is preferably a user option which could bespecified as one of the query parameters or otherwise; if in-flightstreaming data is not included, the query is executed in a conventionalmanner against only data in the database itself. In one or more optionalembodiments, a user may limit the scope of the queried data toparticular portions of the data streaming application (e.g., buffers ofparticular processing elements). If in-flight streaming data isincluded, the query is executed against the streamed data bytransmitting the query request to management system database agent 521within the stream manager, which in turn transmits respective requeststo respective compute node database agents 321 in each applicablecompute node 110. Management system database agent 521 does notnecessarily transmit every request to every compute note database agent321, and may limit a request to specific compute nodes based onknowledge of the path or paths taken by tuples of interest to the querycontained in operator graph 132 and/or operator graph profile data 525,and/or query scope restrictions specified by the user. Each compute nodedatabase agent(s) 321 receiving the query searches data in its buffer313 to find any tuples matching the query parameters, and returnsresults to the management system database agent 521. Management systemdatabase agent 521 collects results and projects a likelihood thattuples of one or more types or attributes will be produced by the datastreaming application for appending to one or more database tables,returning results to the database. Results may be returned forindividual tuples in which an independent likelihood is represented foreach tuple, or may be aggregated for groups of tuples, e.g., tupleshaving an identical key value or a key value within a specific range.

FIG. 14 is a flow diagram illustrating at a high level the operation ofvarious system components in executing a database query using database140, according to various embodiments. Referring to FIG. 14, databasemanager 811 receives a database query initiated by a user (block 1401).The query might be received from an application 804, 805, executing ondatabase system 115 or on a different system in communication withdatabase system 115 over a network, using one or more external APIs 815.Alternatively, a query might be input to database manager 811 directlyby a user through an internal user interface provided by the databasemanager.

The query either explicitly or implicitly specifies a queried datascope, i.e., specifies the scope of data to be searched for data meetingthe query parameters, and to be used in generating query results.Conventionally, this query scope is limited to one or more databasetables 821-823 of database 140. However, in accordance with variousembodiments disclosed herein, a query may optionally specify thatin-flight data of a data streaming application is to be included in thescope of the query. The manner in which query scope is specified mayvary. In one or more embodiments, only the database is searched bydefault, and streamed data within the data streaming application is onlysearched if an optional extended search parameter is specified. Inaddition to specifying that streamed data is to be searched, a query mayexplicitly or implicitly limit the query scope to particular portions ofthe data streaming application. For example, a query may specify thatonly data associated with particular processing elements of the operatorgraph or in particular nodes will be searched for query results.Limiting the query scope to particular portions of the data streamingapplication generally requires special knowledge of the data streamingapplication on the part of the user, but there are instances where thiscapability may prove useful. For example, a user may know that tuples ina data stream before some location in the operator graph are subject toa high rate of change or deletion, and therefore considered unreliableas data, while tuples after that location are more stable; in this case,the user may wish to limit the query scope to nodes or processingelements downstream of that location.

If the queried data scope does not include data in the data streamingapplication, the ‘N’ branch is taken from block 1402, and blocks 1403and 1404 are by-passed. If the queried data scope explicitly orimplicitly includes data in the data streaming application, the ‘Y’branch is taken from block 1402, and the database manager 811 transmitsthe query, including any optional parameters specifying queried datascope, to the database agent 521 within stream management system 105(block 1403). In response, the management system database agent causesthe query to be executed against streamed data, and ultimately returnsquery results to the database manager. This process is represented inFIG. 14 as block 1405, and shown in greater detail in FIG. 15.

Concurrently with transmitting the query to the management system (ifthe queried data scope includes streamed data), or without transmittingthe query to the management system (if the queried data scope does notinclude streamed data), the database manager determines at block 1404whether the queried data scope includes database data, i.e., data in oneor more tables 821-823. If so (the ‘Y’ branch from block 1404), then thequery engine 813 is invoked to execute the query against database dataand return appropriate query results (block 1406). As is well known inthe art, numerous techniques exist for executing queries againstdatabase table data, and the query against database data is performedusing any conventional database query execution technique and/ortechniques hereafter developed, and can involve the use of any ofvarious metadata structures 824-831. If the queried data scope does notinclude database data, the ‘N’ branch is taken from block 1404, andblock 1406 is skipped. Block 1404 thus enables the database manager todirect a query only to streamed data, and by-pass database dataentirely. The directive to exclude database data from the queried datascope would initiate with the user submitting the query. It will beobserved that the user may therefore direct the query to be executedagainst database data only, against streamed data only, or against bothdatabase data and streamed data. In one or more alternative embodiments,the user does not have the capability to exclude database data from thescope of the query, and all queries are executed against database data(i.e., block 1404 is not present).

When query results have been returned from all applicable sources, i.e.,from the query engine 813 if the queried data scope includes databasedata, and from the management system database agent 521 if the querieddata scope includes streamed data, the results are combined as needed(block 1407). The combined results are then returned to the requestor(block 1408).

The query results may be presented to the requesting user in any ofvarious ways, and this may be performed by the database manager 811 orby an application program formatting query results for presentation tothe user. Preferably query results representing data currently in one ormore database tables are distinguished from query results representingin-flight data in the data streaming application. In one or moreembodiments, query results are aggregated into counts of tuplessatisfying the parameters of a query, which may be a single count foreach tuple type or may be broken down according to range of some keyvalue. In such a case, tuple counts representing tuples in the datastreaming application may be modified by multiplying an actual count oftuples by an appropriate expectation value to produce a projected countof such tuples. This operation could be performed in the data streamingmanager database agent, before returning results to the database, orperformed in the database itself. In one or more further embodiments, anadditional column is provided in the query results set for any in-flightdata, the additional column indicating the likelihood that the in-flightdata will make it into the database. I.e., this column is based on theexpectation value from a profile summary record, which may be returnedfrom the manager database agent to the database. Alternatively, anadditional column provided with in-flight data may be used to indicatethe location in the operator graph from which the data was in-flightdata was derived.

FIG. 15 is a flow diagram illustrating in greater detail a process ofquerying streamed data in a data streaming application, according tovarious embodiments. Streamed data could be queried, as shown in FIG. 15and represented as block 1405 in FIG. 14, in response to a databasequery submitted by a user to database manager 811. Alternatively,streamed data could be queried independently of any user-submitteddatabase query. From the standpoint of the stream manager and localdatabase agents in the various nodes, an incoming query of streamed datais simply responded to in the manner shown in FIG. 15 and describedherein, regardless of the source of the query. For example, the databasemanager itself may initiate a query of streamed data for purposes ofmanaging the organization of the database, such as creating metadatastructures in advance, creating temporary buffer space, or otherreasons.

Referring to FIG. 15, the management system database agent 521 inmanagement system 105 functions as the point of contact for the databasemanager 811, and receives a query request from the database managerdirecting it to query data in the data streaming application (block1501). In addition to the logical terms of the query itself, the queryrequest from the database manager may contain queried scope data whichrestricts the query scope to selective portions of the data streamingapplication.

In response to receiving the query request, the management systemdatabase agent 521 determines the locations within the operator graph tobe interrogated, and translates tuples and fields if required (block1502). The manager database agent may access the applicable profilesummary records 526 to determine locations within the operator graph atwhich the tuple or tuples which are the subject of the query can befound, and additionally, the type identifier for such tuples within thedata streaming application if the type identifier is not the same asthat used in the query request, e.g., not the same as that used by thedatabase. As explained previously, each profile summary record 1201corresponds to a respective output tuple type 1202 and respective graphlocation 1203. For each tuple type specified in the logical query, theprofile summary records 1201 having output tuple type field 1202corresponding to the tuple type of the query are identified, and a setof corresponding graph locations determined, this set of correspondinggraph locations being a subset of all locations in the operator graph.If the query request further limits the queried data scope to someportion of the data streaming application, then any graph locationsoutside the specified queried data scope would be deleted from the setof graph locations.

Since tuples within the data streaming application may be generated fromother tuples, and the names of tuples and fields used within the datastreaming application are not necessarily the same as used in dataoutput to the database, the manager database agent may translatetuples/fields specified in the logical query to tuples/fields usedinternally in the data streaming application for purposes of queryinginternal data. This again may be performed using the profile summaryrecords 526. Each summary record 1201 specifying an output tuple type1202 and graph location 1203 may also specify an internal tuple type1204 corresponding to a tuple type used internally within the datastreaming application at the corresponding graph location specified ingraph location field 1203. If a tuple is specified in the logical query,this is an output tuple from the perspective of the profile summaryrecord 1201, and is translated to the corresponding internal tuplespecified in internal tuple type field 1204. Similarly, the profilesummary record may contain one or more stable field output 1211 andcorresponding stable field internal 1212 pairs. For each stable fieldspecified in the logical query, the stable field output identifier 1211is matched with the stable field, and is replaced in the logical querywith the corresponding stable field internal identifier 1212 from theprofile summary record.

If the query contains a logical condition referencing the value of anunstable field, then the ‘Y’ branch is taken from block 1503, and thequery may be modified, the operator graph locations to be interrogatedmay be further restricted, or some other action may be taken, inaccordance with an applicable policy for dealing with unstable fields(block 1504). If there are no unstable fields, the ‘N’ branch is takenfrom block 1503, and block 1504 is by-passed. A field specified in thelogical query is deemed unstable if it is not in the listing of stablefields in the applicable profile summary record, i.e., if there is nopair of stable output field identifier 1211 and stable internal fieldidentifier 1212 corresponding to the field specified in the logicalquery. It will be noted that a field may be stable in one or moreprofile summary records, while the same field is unstable in one or moreother profile summary records. This is a result of the fact that a fieldmay change at some location in the operator graph, so that operatorgraph locations upstream of the field change may show an unstable field,while downstream locations may show a stable field.

At block 1504, the manager database agent implements a policy fordealing with logical queries referencing unstable fields. Such a policymay vary. One example of such a policy would be to abort execution ofthe query in the data streaming application and return an error message(indicated by the dashed line from block 1504 to end), although it isgenerally preferable to provide some information where possible. Anotherexample of such a policy would be to restrict the queried data scope tolocations in which the field is stable, i.e., to interrogate only theoperator graph locations for which the fields are stable when findingtuples responsive to the logical query. Such a policy would generallyresult in fewer tuples matching the parameters of the query. It couldeven result in a null set of locations to be interrogated, andcorrespondingly, no tuples matching the parameters of the query. If thisis done, it is also preferable to provide a message to the requestingdatabase indicating the action taken.

Another example of such a policy would be to replace any conditionreferencing the unstable field with a wildcard value, which wouldgenerally have the effect of increasing the number of tuples matchingthe parameters of the query. If such a policy were used, it would bepossible to adjust the results for this inaccuracy by, e.g., using ahistogram or other data estimate the proportion of output tuples havinga value within the range specified in the applicable query condition.For example, suppose that field X.f is deemed unstable and the querycontains the AND condition: val1≤X.f≤val2. If it can be determined byreference to a histogram or other data that val1≤X.f≤val2 in 20% of thetuples output by the data streaming application, then the number oftuples found using a wildcard value in the query can be multiplied by0.20 to provide an estimate of the number of tuples matching the termsof the query. Similarly, if individual records are returned from a querywith corresponding expectation values derived from the profile summaryrecords, each of the expectation values can be adjusted by multiplyingby the same percentage.

After any translation or other modification of the query in blocks 1502and 1504, the management system database agent 521 transmits the query,modified as explained above, to the local database agent 321 in eachcompute node previously determined to receive the query (block 1505).These queries are referred to herein as the local queries, todistinguish them from the query received by the management system fromthe database, although they may in fact be identical to the queryreceived by the management system from the database. Due to the possibleexistence of unstable fields at some graph locations and not others orchanges to type names of tuples and/or field names within tuples, thelocal query transmitted to each compute node may vary. Furthermore, themanagers' database agent may transmit multiple differently expressedlocal queries to the same compute node for interrogating differentlocations (e.g., different operator graph processing elements) withinthe same compute node.

Responsive to receiving the local queries, each local database agent 321queries local data in accordance with the received local query(ies) andreturns results to the management system database agent 521 (block1506). Data may be queried, e.g., by scanning all tuples within a localbuffer 314 or other applicable tuple storage to find tuples matching theterms of a query (similar to a table scan of a database table). Data mayalternatively be queried using any of various more sophisticatedtechniques for querying data as are known in the database art. Forexample, if tuples within a buffer are organized into partitions orsimilar structures based on a key value, this partitioning may be usedto reduce the scope of tuples which must be examined to respond to thelocal query. It would also be possible to use metadata structures (notshown) such as indexes to improve the efficiency of local queryexecution, although maintenance of metadata structures entails someoverhead which must be justified by the frequency of use. Local queryresults may be returned to the stream manager as raw data, i.e. as theactual tuples found to match the terms of the local query, or asaggregated data, i.e., as a total number of tuples or total number oftuples in each of multiple categories.

The management system database agent 521 receives the response(s) to thelocal query(ies) and temporarily stores them in query results cache 528(block 1507). If required, the agent translates the received resultsback to output form, i.e., to the form used by the database (block1508). This is essentially the reverse of the translation performed atblock 1502. I.e., if the name of a tuple type or field within a tuple isdifferent in the local returned data from that used in the tuple outputto the database, the profile summary records 526 are used to translatethe internally used names back to those used in the tuples which areoutput to the database.

The management system database agent uses the profile summary records toassign expectation values to the results, and aggregates results asrequired (block 1509). Expectation values can be assigned either toindividual tuples or to aggregated totals of tuples from a particularlocation. The expectation value assigned to a particular tuple oraggregated group of tuples is the expectation value from expectationvalue field 1209 of the profile summary record 1201 corresponding to theoutput tuple type 1202 and location 1203 of the correspondingtuple/tuple group and location in the graph from which it was derived,and having a key field value between the applicable minimum and maximumfrom fields 1207 and 1208 of the profile summary record. If the queryresults will be reported only as aggregated results, the number oftuples in each aggregated group is multiplied by the correspondingexpectation value to yield a projected number of records of thecorresponding aggregated group.

The management system database agent 521 may further combine oraggregate tuples or groups of tuples to report results as a singleaggregated group or multiple groups, either according to somepre-existing policy or aggregation or the terms of the query request. Inaggregating tuples/groups, a projected total number for an aggregatedgroup of tuples is obtained by combining the projected numbers of theconstituent groups or adding the expectation values of multipleindividual tuples. Alternatively, if the policy or terms of the queryrequest so provide, the management system may associate a respectiveexpectation value with each individual tuple and report each individualtuple and its associated expectation value back to the database as queryresults. The management system may further report additional potentiallyuseful data with respect to each tuple, for example, a location withinthe operator graph from which the tuple was obtained.

When results have been processed in the management system database agentas described, they are returned to the database (block 1510), and theprocess of querying streamed data in the data streaming applicationends.

In the embodiments described above, the database agent in the managementsystem manages the profile data and performs any modifications of thequery. However, some or all of these actions might alternatively beperformed by the database itself, or by some other component within thedata streaming application. For example, operator graph profile data oralternative data might be provided to the database, which performs anyrequired translation of the logical query before the same is transmittedto the data streaming application, and performs any required translationof results after the same are received. As a further example, certainprofile data might be provided to the local compute nodes, which performtranslations and/or assign expectation values.

Because data in the data streaming application is dynamic, there existsthe possibility that one or more tuples will be counted twice and/orwill be skipped when multiple local queries are executed concurrently atrespective compute nodes. Since projections of data entering thedatabase at some future time is, by their nature, inexact, this does notnecessarily prevent any useful application of the projected data. Theprojection is only intended to provide an approximation of futurechanges to the database, and as long as the number of miscounted tuplesis small in relation to the total number being counted, the projectionremains more or less correct.

Modifying In-Flight Data

In accordance with one or more embodiments, the database agent 321 inthe management system and the local compute node database agents 521 ineach compute node 110 can be used to modify in-flight data of the datastreaming application responsive to a modify data command initiated by auser of database 140. This may be performed in a manner similar to thequerying of data initiated by a user of the database.

A modify data command is a database supported command to apply a datamodify operation (i.e., a delete of a tuple or an editing of thecontents of at tuple) to one or more selective tuples of the database,the tuples being selected according to logical parameters of the modifydata command. These logical parameters may be similar to the logicalparameters of a database query.

In accordance with one or more embodiments, in-flight streaming data maybe included within the scope of a modify data command. In-flightstreaming data might be included for any of various reasons. Forexample, if a particular subset of tuples is no longer to be maintainedin the database, then deleting tuples of that subset from the datastreaming application amounts to deleting extraneous data, which mayimprove the efficiency of the data streaming application and/or removethe need to later delete the product of in-flight data from thedatabase. In another example, a global correction might be applied tosome subset of data, where correcting the in-flight data as well avoidsthe need for later downstream corrections. Although it is theoreticallypossible to modify a single tuple, it is typically expected that themodify data command is applied to multiple tuples defined by the logicalparameters of the command.

Including in-flight streaming data within the scope of a modify datacommand is preferably a user option which could be specified as one ofthe command parameters or otherwise; if in-flight streaming data is notincluded, the modify data command is executed in a conventional manneragainst only data in the database itself. In one or more optionalembodiments, a user may limit the scope of the data subject to themodify data command to particular portions of the data streamingapplication (e.g., buffers of particular processing elements). Ifin-flight streaming data is included, the modify data command is appliedto the streamed data by transmitting the command to management systemdatabase agent 521 within the stream manager, which in turn transmitsrespective commands to respective compute node database agents 321 ineach applicable compute node 110. Management system database agent 521does not necessarily transmit every modify data command to every computenote database agent 321, and may limit a command to specific computenodes based on knowledge of the path or paths taken by tuples which arethe subject of the data modify command contained in operator graph 132and/or operator graph profile data 525, and/or command scoperestrictions specified by the user. Each compute node database agent(s)321 receiving the modify data command searches data in its buffer 313 tofind any tuples matching the command's logical parameters, and appliesthe data modify operation specified by the command to any matchingtuples it finds. The compute nodes may return an acknowledgment to themanagement system database agent 521, which may contain detailed dataconcerning the extent of modified data. The management system databaseagent 521 may in turn provide acknowledgment information to the databasemanager.

FIG. 16 is a flow diagram illustrating at a high level the operation ofvarious system components in executing a modify data command usingdatabase 140, according to various embodiments. Referring to FIG. 16,database manager 811 receives a modify data command initiated by a user(block 1601). The command might be received from an application 804,805, executing on database system 115 or on a different system incommunication with database system 115 over a network, using one or moreexternal APIs 815. Alternatively, a modify data command might be inputto database manager 811 directly by a user through an internal userinterface provided by the database manager.

The modify data command either explicitly or implicitly specifies acommand scope, i.e., the scope of data to be searched for data meetingthe logical parameters of the command, to which the data modifyoperation will be applied. Conventionally, this command scope is limitedto one or more database tables 821-823 of database 140. However, inaccordance with various embodiments disclosed herein, a modify datacommand may optionally specify that in-flight data of a data streamingapplication is to be included in the scope of the command. The manner inwhich command scope is specified may vary. In one or more embodiments,only the database is searched by default, and streamed data within thedata streaming application is only searched if an optional extendedmodify data parameter is specified. In addition to specifying thatstreamed data is to be included in the command scope, a modify datacommand may explicitly or implicitly limit the command scope toparticular portions of the data streaming application. For example, acommand may specify that only data associated with particular processingelements of the operator graph or in particular nodes will be subject tomodification. Limiting the command scope to particular portions of thedata streaming application generally requires special knowledge of thedata streaming application on the part of the user, but there areinstances where this capability may prove useful.

If the scope of the modify data command does not include data in thedata streaming application, the ‘N’ branch is taken from block 1602, andblocks 1603 and 1604 are by-passed. If the command scope explicitly orimplicitly includes data in the data streaming application, the ‘Y’branch is taken from block 1602, and the database manager 811 transmitsthe command, including any optional parameters specifying command scope,to the database agent 521 within stream management system 105 (block1603). In response, the management system database agent causes themodify data command to be applied to streamed data, and may optionallyreturn an acknowledgment and/or indication of actions that wereperformed to the database manager. This process is represented in FIG.16 as block 1605, and shown in greater detail in FIG. 17.

Concurrently with transmitting the modify data command to the managementsystem (if the command scope includes streamed data), or withouttransmitting the command to the management system (if the command scopedoes not include streamed data), the database manager determines atblock 1604 whether the modify data command scope includes database data,i.e., data in one or more tables 821-823. If so (the ‘Y’ branch fromblock 1604), then the query engine 813 is invoked to execute the modifydata command against database data (block 1606). Any conventionaltechnique known in the database art may be used for executing the modifydata command against data in one or more database tables 821-823. If themodify data command scope does not include database data, the ‘N’ branchis taken from block 1604, and block 1606 is skipped. Block 1604 thusenables the database manager to apply data modify operations only tostreamed data, and by-pass database data entirely. The directive toexclude database data from the scope of the modify data command wouldinitiate with the user submitting the query. It will be observed thatthe user may therefore direct the modify data command to be applied todatabase data only, to streamed data only, or to both database data andstreamed data. In one or more alternative embodiments, the user does nothave the capability to exclude database data from the scope of themodify data command, and all such commands are applied to database data(i.e., block 1604 is not present).

After the modify data command has been executed against all applicabledata in the database and/or data streaming application, as the case maybe, a completion message is returned to the user (block 1607). Thismessage may optionally include statistics such as the number of tuplesdeleted/modified and so forth. Such statistics may optionally includelocation(s) in a data streaming operator graph and/or database table atwhich data was modified.

FIG. 17 is a flow diagram illustrating in greater detail a process ofmodifying streamed data in a data streaming application responsive to amodify data command from the database, according to various embodiments.Streamed data could be modified, as shown in FIG. 17 and represented asblock 1605 in FIG. 16, in response to a modify data command submitted bya user to database manager 811.

Referring to FIG. 17, the management system database agent 521 inmanagement system 105 functions as the point of contact for the databasemanager 811, and receives a modify data command from the databasemanager directing it to perform a data modify operation on selectivedata in the data streaming application (block 1701). In addition to thelogical parameters defining the data (tuples) which are to be modifiedand the data modify operation to performed, the command from thedatabase manager may contain scope data which restricts the scope of thecommand to selective portions of the data streaming application.

In response to receiving the modify data command, the management systemdatabase agent 521 determines the locations within the operator graph tobe interrogated, and translates tuples and fields if required (block1702). This operation is analogous to that performed with queries, asdescribed above with respect to block 1502. The manager database agentmay access the applicable profile summary records 526 to determinelocations within the operator graph at which the tuple or tuples whichare the subject of the modify data command can be found, andadditionally, the type identifier for such tuples within the datastreaming application if the type identifier is not the same as thatspecified by the command. For each tuple type specified in the command,the profile summary records 1201 having output tuple type field 1202corresponding to the tuple type of the command are identified, and a setof corresponding graph locations determined, this set of correspondinggraph locations being a subset of all locations in the operator graph.If the modify data command further limits the scope of data to bemodified to some portion of the data streaming application, then anygraph locations outside the command's scope would be deleted from theset of graph locations.

The manager database agent may use the profile summary records 526 totranslate the names of any tuples and fields specified in the modifydata command to tuples/fields used internally in the data streamingapplication for purposes of modifying internal data. I.e., each summaryrecord 1201 specifying an output tuple type 1202 and graph location 1203may also specify an internal tuple type 1204 corresponding to a tupletype used internally within the data streaming application at thecorresponding graph location specified in graph location field 1203. Atuple specified in the modify data command is an output tuple from theperspective of the profile summary record 1201, and is translated to thecorresponding internal tuple specified in internal tuple type field1204. Similarly, the profile summary record may contain one or morestable field output 1211 and corresponding stable field internal 1212pairs. For each stable field specified in the command, the stable fieldoutput identifier 1211 is matched with the stable field, and is replacedin the command with the corresponding stable field internal identifier1212 from the profile summary record.

If the modify data command contains a logical condition referencing thevalue of an unstable field, then the ‘Y’ branch is taken from block1703, and appropriate action is taken in accordance with an applicablepolicy for dealing with unstable fields (block 1704). If there are nounstable fields, the ‘N’ branch is taken from block 1703, and block 1704is by-passed. A field specified in the command is deemed unstable if itis not in the listing of stable fields in the applicable profile summaryrecord, i.e., if there is no pair of stable output field identifier 1211and stable internal field identifier 1212 corresponding to the fieldspecified in the command. As explained above, a field may be consideredstable at some operator graph locations and unstable at others.

At block 1704, the manager database agent implements a policy fordealing with modify data commands which reference unstable fields. Thispolicy could be, but is not necessarily the same as, the policy fordealing with unstable fields in a query. In general, data should not bemodified where uncertainty exists, and accordingly a typical policywould be to abort execution of the data modify command (shown as thedashed line to block 1709) or to restrict the scope of any data modifyoperation only to tuples which are selected according to a value of astable field, although other policies are possible.

After any translation or other modification of the modify data commandin blocks 1702 and 1704, the management system database agent 521transmits the command, modified as explained above, to the localdatabase agent 321 in each compute node previously determined to receivethe command (block 1705). These commands are referred to herein as thelocal data modify commands, to distinguish them from the commandreceived by the management system from the database, although they mayin fact be identical to the command received by the management systemfrom the database. Due to the possible existence of unstable fields atsome graph locations and not others or changes to type names of tuplesand/or field names within tuples, the local command transmitted to eachcompute node may vary. Furthermore, the managers' database agent maytransmit multiple differently expressed local commands to the samecompute node for interrogating different locations (e.g., differentoperator graph processing elements) within the same compute node.

Responsive to receiving the local commands, each local database agent321 examines the applicable local data within the command's scope toidentify all tuples meeting the logical parameters of the command,applies the data modify operation specified by the command to each suchtuple, and returns an acknowledgment or completion message. (block1706). Identifying applicable tuples may be performed in a mannersimilar to execution of a query as described above, using any localmetadata or organizational structure. The data modify operation mayinclude any of deletion of a tuple, setting one or more tuple fields tosome specified value(s), computing a value for a tuple field, oraddition or deletion of one or more tuple fields. Each local databaseagent may return an acknowledgment/completion message indicating thatthe command has been or will be performed on local data. Theacknowledgment/completion message may include statistical data such asthe number of tuples modified, number of tuples in each of multiplesubsets divided according to some key value or values, computed valuesof modified tuple fields, if any, and so forth.

The management system database agent 521 receives the response(s) to thelocal modify data command(s) and temporarily stores them locally (block1707). If required, the agent aggregates any statistical data receivedfrom multiple local agents and translates the received statistical databack to output form, i.e., to the form used by the database (block1708). This is essentially the reverse of the translation performed atblock 1702. I.e., if the name of a tuple type or field within a tuple isdifferent in the local returned data from that used in the tuple outputto the database, the profile summary records 526 are used to translatethe internally used names back to those used in the tuples which areoutput to the database. Statistical data reported back to the databasemay include a location or location(s) at which subsets of tuples weremodified.

When results have been processed in the management system database agentas described, they are returned to the database (block 1709), and theprocess of modifying streamed data in the data streaming applicationends.

In the embodiments described above, the database agent in the managementsystem manages the profile data and performs any translation or othermodification of the data modify command. However, some or all of theseactions might alternatively be performed by the database itself, or bysome other component within the data streaming application. For example,operator graph profile data or alternative data might be provided to thedatabase, which performs any required translation of the command beforethe same is transmitted to the data streaming application, and performsany required translation of results after the same are received. As afurther example, certain profile data might be provided to the localcompute nodes, which perform translations as required.

Thus, in one or more embodiments, when a modify data command is sentfrom the database to the data streaming application, the modificationsit makes can simply all be specified from the perspective of thestreaming application. The received modified data command would containall the parameters, from the perspective of the data streamingapplication, needed to identify operators and change tuple values. Inother embodiments, the database user or the database need not know anysuch information specific to the data streaming application, and thedata streaming application modifies the received modify data command asrequired using its own profile data or other metadata, as describedherein.

In one or more additional alternative embodiments, the data streamingapplication may project, based on profiling data or otherwise, whetherexecution of a received data modify command or a received query againstdata in the data streaming application is likely to cause an unduebackup of data in the streaming application, and take appropriate actionif an undue backup is projected. Such action could include not executingthe modify data command or query, or executing it only against some partof the operator graph.

Additional Embodiments Modifying In-Flight Data

In various embodiments described above, a complete system for bothquerying and modifying in-flight data in a data streaming applicationfrom a database has been described, in which certain data structuresand/or functional elements are used for both querying and modifying thein-flight data. However, the capability to query in-flight data and tomodify in-flight data may alternatively exist independently, so thatonly one of these capabilities is provided. Additionally, even if bothfunctional capabilities are provided by a single database and associateddata streaming application, they may use separate functional elementsand/or data structures.

In particular, in one or more alternative embodiments, the databasemodifies in-flight data of the data streaming application but does notquery in-flight streamed data.

In one or more additional alternative embodiments, operator graphprofiling data is not used for modifying in-flight data. Such profilingdata may be unnecessary because, e.g., no translation of tuples isrequired, or the capability to translate tuples is not supported anddata modify and/or query operations can only be executed against tuplesof the output type. Alternatively, other means may be provided formodifying tuples where different internal type names are used or thereare unstable fields, e.g., different types of metadata may be used, auser may input the tuple type to be modified or specify stable fields,source code analysis may provide type names, etc.

Other Variations

Although a series of steps has been described above as one or morepreferred and/or alternate embodiments, it will be appreciated that manyvariations of processes for characterizing a data streaming application,accessing in-flight data within a data streaming application, andanalyzing accessed data to project data entering a database arepossible. In particular, some steps may be performed in a differentorder, different data structures may be used, and/or different hardwareor software resources may be employed to perform functions describedherein. Furthermore, although certain formulae, thresholds, logicalconditions, and so forth may have been disclosed as one or moreembodiments, it will be appreciated that these formulae, thresholds,logical conditions, etc., and variations thereof are only some of thepossible embodiments, and that other techniques could alternatively beused.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing.Examples of a computer readable storage medium are illustrated in FIG. 2as system memory 202 and data storage devices 225-227. A computerreadable storage medium, as used herein, is not to be construed as beingtransitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Unless inconsistent with the invention or otherwise qualified herein,computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

Although a specific embodiment of the invention has been disclosed alongwith certain alternatives, it will be recognized by those skilled in theart that additional variations in form and detail may be made within thescope of the following claims:

What is claimed is:
 1. A computer-executed method, comprising: receivingin a structured database a modify data command, the modify data commandspecifying a modify data operation to be applied to each of one or moretuples and logical parameters of tuples to which the modify data commandis to be applied; responsive to receiving in said structured databasethe modify data command, forwarding the modify data command from saidstructured database to a data streaming application, said data streamingapplication producing output for inclusion in said structured database;identifying, in said data streaming application, in-flight data tuplesof said data streaming application matching parameters of the forwardedmodify data command; and applying, in said data streaming application,the modify data operation specified by the modify data command to eachtuple identified by said identifying, in said data streamingapplication, in-flight data tuples of said data streaming applicationmatching parameters of the forwarded modify data command.
 2. Thecomputer-executed method of claim 1, further comprising: responsive toreceiving in said structured database the modify data command,determining in said structured database whether a scope of the modifydata command includes in-flight data of said data streaming application,wherein the modify data command is forwarded from said structureddatabase to said data streaming application only if the structureddatabase determines that the scope of the modify data command includesin-flight data of said data streaming application.
 3. Thecomputer-executed method of claim 2, wherein said modify data commandincludes scope data identifying a portion of said data streamingapplication containing the in-flight data of said data streamingapplication, said portion being less than all of said data streamingapplication, wherein said identifying, in said data streamingapplication, in-flight data of said data streaming application matchingparameters of the forwarded modify data command, comprises searchingonly said portion for the in-flight data matching parameters of theforwarded modify data command.
 4. The computer-executed method of claim1, wherein the output data produced by said data streaming applicationfor inclusion in said structured database comprises a plurality oftuples of an output type, the output type being a type defined by saidstructured database, and wherein the in-flight data in said datastreaming application comprises a plurality of tuples of an internaltype which is different from a type defined by said structured database;and wherein identifying, in said data streaming application, in-flightdata tuples of said data streaming application matching parameters ofthe forwarded modify data command comprises translating the forwardedmodify data command to apply to tuples of the internal type, andidentifying tuples of the internal type matching the parameters of thetranslated forwarded modify data command.
 5. The computer-executedmethod of claim 1, wherein said identifying, in said data streamingapplication, in-flight data tuples of said data streaming applicationmatching parameters of the forwarded modify data command comprises:sending, from a management system of said data streaming application toa respective agent in each of at least one compute node of said datastreaming application, a respective modify data command to apply torespective data in the respective compute node of the plurality ofcompute nodes; and identifying, in each of the at least one computenode, respective data matching the parameters of the respective modifydata command sent from the management system to the respective agent inthe respective compute node.
 6. The computer-executed method of claim 1,further comprising: returning, from the data streaming application tosaid structured database, a completion message, said completion messagecontaining at least some statistical data with respect to tuples towhich the modify data operation was applied.
 7. The computer-executedmethod of claim 1, further comprising: translating the modify datacommand query received from the requestor to a translated modify datacommand query for use in applying the modify data operation to thein-flight data of said data streaming application, the translated modifydata command being produced by performing at least one of: (a)translating at least one output tuple type used by said database to acorresponding internal tuple type used by said data streamingapplication, or (b) translating at least one field name used by saiddatabase to at least one corresponding field name used by said datastreaming application.
 8. The computer-executed method of claim 1,further comprising: verifying whether each tuple field referenced as alogical parameter of the modify data command corresponds to a stablefield in said data streaming application; and with respect to any tuplefield referenced as a logical parameter of the modify data command whichdoes not correspond to a stable field in said data streamingapplication, taking at least one action to modify the modify datacommand in accordance with a pre-existing policy.
 9. Thecomputer-executed method of claim 1, wherein said modify data operationcomprises deletion of a tuple.
 10. The computer-executed method of claim1, wherein said modify data operation comprises altering a value of atleast one field of a tuple.
 11. The computer-executed method of claim 1,wherein identifying, in said data streaming application, in-flight datatuples of said data streaming application matching parameters of theforwarded modify data command comprises using operator graph profiledata characterizing the data streaming application, said operator graphprofile data being obtained by collecting trace data from at least oneprevious execution instance of said data streaming application, andanalyzing the collected trace data to produce said operator graphprofile data characterizing the data streaming application.
 12. Anon-transitory computer-readable media having recorded thereon acomputer program having a plurality of computer-executable instructions,wherein the computer program, when executed by at least one computersystem, causes the at least one computer system to perform actionscomprising: receiving in a structured database a modify data command,the modify data command specifying a modify data operation to be appliedto each of one or more tuples and logical parameters of tuples to whichthe modify data command is to be applied; responsive to receiving insaid structured database the modify data command, forwarding the modifydata command from said structured database to a data streamingapplication, said data streaming application producing output forinclusion in said structured database; identifying, in said datastreaming application, in-flight data tuples of said data streamingapplication matching parameters of the forwarded modify data command;and applying, in said data streaming application, the modify dataoperation specified by the modify data command to each tuple identifiedby said identifying, in said data streaming application, in-flight datatuples of said data streaming application matching parameters of theforwarded modify data command.
 13. The non-transitory computer-readablemedia of claim 12, wherein the computer program further causes the atleast one computer system to perform actions comprising: responsive toreceiving in said structured database the modify data command,determining in said structured database whether a scope of the modifydata command includes in-flight data of said data streaming application,wherein the modify data command is forwarded from said structureddatabase to said data streaming application only if the structureddatabase determines that the scope of the modify data command includesin-flight data of said data streaming application.
 14. Thenon-transitory computer-readable media of claim 13, wherein said modifydata command includes scope data identifying a portion of said datastreaming application containing the in-flight data of said datastreaming application, said portion being less than all of said datastreaming application, wherein said identifying, in said data streamingapplication, in-flight data of said data streaming application matchingparameters of the forwarded modify data command, comprises searchingonly said portion for the in-flight data matching parameters of theforwarded modify data command.
 15. The non-transitory computer-readablemedia of claim 12, wherein the output data produced by said datastreaming application for inclusion in said structured databasecomprises a plurality of tuples of an output type, the output type beinga type defined by said structured database, and wherein the in-flightdata in said data streaming application comprises a plurality of tuplesof an internal type which is different from a type defined by saidstructured database; and wherein identifying, in said data streamingapplication, in-flight data tuples of said data streaming applicationmatching parameters of the forwarded modify data command comprisestranslating the forwarded modify data command to apply to tuples of theinternal type, and identifying tuples of the internal type matching theparameters of the translated forwarded modify data command.
 16. Thenon-transitory computer-readable media of claim 12, wherein saididentifying, in said data streaming application, in-flight data tuplesof said data streaming application matching parameters of the forwardedmodify data command comprises: sending, from a management system of saiddata streaming application to a respective agent in each of at least onecompute node of said data streaming application, a respective modifydata command to apply to respective data in the respective compute nodeof the plurality of compute nodes; and identifying, in each of the atleast one compute node, respective data matching the parameters of therespective modify data command sent from the management system to therespective agent in the respective compute node.
 17. The non-transitorycomputer-readable media of claim 12, wherein the computer programfurther causes the at least one computer system to perform actionscomprising: verifying whether each tuple field referenced as a logicalparameter of the modify data command corresponds to a stable field insaid data streaming application; and with respect to any tuple fieldreferenced as a logical parameter of the modify data command which doesnot correspond to a stable field in said data streaming application,taking at least one action to modify the modify data command inaccordance with a pre-existing policy.
 18. A data processing apparatussupporting execution of a data streaming application, comprising: atleast one physical processor; at least one physical memory; a datastreaming application embodied as instructions executable on the atleast one processor and storable in the at least one memory, the datastreaming application implementing an operator graph having a pluralityof processing elements which operate on data tuples being transferredamong processing elements of the plurality fo processing elements, thedata streaming application producing output tuples for inclusion in astructured database; at least one database agent associated with thedata streaming application, the at least one database agent embodied asinstructions executable on the at least one processor and storable inthe at least one memory, wherein the at least one database agent:receives a forwarded modify data command from said structured database,the modify data command specifying a modify data operation to be appliedto each of one or more tuples and logical parameters of tuples to whichthe modify data command is to be applied; responsive to receiving theforwarded modify data command from said structured database, identifiesin-flight data tuples of said data streaming application matchingparameters of the forwarded modify data command; and applies, in saiddata streaming application, the modify data operation specified by themodify data command to each data tuple identified by identifyingin-flight data tuples of said data streaming application matchingparameters of the forwarded modify data command.
 19. The data processingapparatus supporting execution of a data streaming application of claim18, wherein said at least one database agent comprises: a managementdatabase agent in a management system of said data streamingapplication; and at least one compute node database agent, each computenode database agent in a respective compute node of said data streamingapplication; wherein the management database agent receives theforwarded modify data command from said structured database, andresponsive thereto, sends, from the management system of said datastreaming application to a respective compute node database agent ofsaid at least one compute node database agent, a respective modify datacommand to be applied to respective data in the respective compute node;wherein each compute node database agent identifies, responsive toreceiving the respective modify data command to be applied to respectivedata in the respective compute node, respective data in the respectivecompute node matching the parameters of the respective modify datacommand sent from the management system to the respective agent in therespective compute node, and applies the data modify operation specifiedby the respective modify data command to the respective data in therespective compute node matching the parameters of the respective modifydata command.
 20. The data processing apparatus supporting execution ofa data streaming application of claim 18, wherein said forwarded modifydata command includes scope data identifying a portion of said datastreaming application containing the in-flight data of said datastreaming application, said portion being less than all of said datastreaming application, wherein identifying in-flight data tuples of saiddata streaming application matching parameters of the forwarded modifydata command comprises searching only said portion for the in-flightdata tuples of said data streaming application matching parameters ofthe forwarded modify data command.