EMIT: Micro-Invasive Database Configuration Tuning

التفاصيل البيبلوغرافية
العنوان: EMIT: Micro-Invasive Database Configuration Tuning
المؤلفون: Geng, Jian, Wang, Hongzhi, Yan, Yu
سنة النشر: 2024
المجموعة: Computer Science
مصطلحات موضوعية: Computer Science - Databases
الوصف: The process of database knob tuning has always been a challenging task. Recently, database knob tuning methods has emerged as a promising solution to mitigate these issues. However, these methods still face certain limitations.On one hand, when applying knob tuning algorithms to optimize databases in practice, it either requires frequent updates to the database or necessitates acquiring database workload and optimizing through workload replay. The former approach involves constant exploration and updating of database configurations, inevitably leading to a decline in database performance during optimization. The latter, on the other hand, requires the acquisition of workload data, which could lead to data leakage issues. Moreover, the hyperparameter configuration space for database knobs is vast, making it challenging for optimizers to converge. These factors significantly hinder the practical implementation of database tuning. To address these concerns, we proposes an efficient and micro-invasive knob tuning method. This method relies on workload synthesis on cloned databases to simulate the workload that needs tuning, thus minimizing the intrusion on the database. And we utilizing a configuration replacement strategy to filter configuration candidates that perform well under the synthesized workload to find best configuration. And during the tuning process, we employ a knowledge transfer method to extract a common high-performance space, to boost the convergence of the optimizer.
نوع الوثيقة: Working Paper
URL الوصول: http://arxiv.org/abs/2406.00616
رقم الانضمام: edsarx.2406.00616
قاعدة البيانات: arXiv
ResultId 1
Header edsarx
arXiv
edsarx.2406.00616
1112
3
Report
report
1112.21557617188
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2406.00616&custid=s6537998&authtype=sso
FullText Array ( [Availability] => 0 )
Array ( [0] => Array ( [Url] => http://arxiv.org/abs/2406.00616 [Name] => EDS - Arxiv [Category] => fullText [Text] => View record in Arxiv [MouseOverText] => View record in Arxiv ) )
Items Array ( [Name] => Title [Label] => Title [Group] => Ti [Data] => EMIT: Micro-Invasive Database Configuration Tuning )
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Geng%2C+Jian%22">Geng, Jian</searchLink><br /><searchLink fieldCode="AR" term="%22Wang%2C+Hongzhi%22">Wang, Hongzhi</searchLink><br /><searchLink fieldCode="AR" term="%22Yan%2C+Yu%22">Yan, Yu</searchLink> )
Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2024 )
Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Computer Science )
Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22Computer+Science+-+Databases%22">Computer Science - Databases</searchLink> )
Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => The process of database knob tuning has always been a challenging task. Recently, database knob tuning methods has emerged as a promising solution to mitigate these issues. However, these methods still face certain limitations.On one hand, when applying knob tuning algorithms to optimize databases in practice, it either requires frequent updates to the database or necessitates acquiring database workload and optimizing through workload replay. The former approach involves constant exploration and updating of database configurations, inevitably leading to a decline in database performance during optimization. The latter, on the other hand, requires the acquisition of workload data, which could lead to data leakage issues. Moreover, the hyperparameter configuration space for database knobs is vast, making it challenging for optimizers to converge. These factors significantly hinder the practical implementation of database tuning. To address these concerns, we proposes an efficient and micro-invasive knob tuning method. This method relies on workload synthesis on cloned databases to simulate the workload that needs tuning, thus minimizing the intrusion on the database. And we utilizing a configuration replacement strategy to filter configuration candidates that perform well under the synthesized workload to find best configuration. And during the tuning process, we employ a knowledge transfer method to extract a common high-performance space, to boost the convergence of the optimizer. )
Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => Working Paper )
Array ( [Name] => URL [Label] => Access URL [Group] => URL [Data] => <link linkTarget="URL" linkTerm="http://arxiv.org/abs/2406.00616" linkWindow="_blank">http://arxiv.org/abs/2406.00616</link> )
Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsarx.2406.00616 )
RecordInfo Array ( [BibEntity] => Array ( [Subjects] => Array ( [0] => Array ( [SubjectFull] => Computer Science - Databases [Type] => general ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => EMIT: Micro-Invasive Database Configuration Tuning [Type] => main ) ) ) [BibRelationships] => Array ( [HasContributorRelationships] => Array ( [0] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Geng, Jian ) ) ) [1] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Wang, Hongzhi ) ) ) [2] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Yan, Yu ) ) ) ) [IsPartOfRelationships] => Array ( [0] => Array ( [BibEntity] => Array ( [Dates] => Array ( [0] => Array ( [D] => 02 [M] => 06 [Type] => published [Y] => 2024 ) ) ) ) ) ) )
IllustrationInfo