search
HomeDatabaseMysql TutorialDB2面向OLTP环境的物理数据库设计:规模调整和容量管理

数据库的规模和容量规划包括估算可以满足企业级的业务目标所需的系统资源。良好的容量规划不仅侧重于满足当前的需求,并针对未来需求对系统进行大小调整,使数据库基础架构可以根据业务需求的变化而进行无缝扩展。此外,一个良好的计划会考虑到工作负载变化

的规模和容量规划包括估算可以满足企业级的业务目标所需的系统资源。良好的容量规划不仅侧重于满足当前的需求,并针对未来需求对系统进行大小调整,使基础架构可以根据业务需求的变化而进行无缝扩展。此外,一个良好的计划会考虑到工作负载变化。

容量规划的主要目标是,确定系统资源的需求,并设计一个均衡的系统,优化资源,以达到满足业务需求的最佳性能和吞吐量。 当我们讨论数据库的规模调整和容量管理时,DB2 数据库的术语包括硬件基础架构、I/O 子系统,以及承载和支持一个或多个 DB2 实例以及一个或多个数据库所需的操作系统。 容量规划可以在以下几个方面帮助您:

 在周期的早期阶段为部署所需的一组系统资源或升级编制一份计划书。该计划书可以帮助您提前做好费用预算。
 在达到性能阈值和瓶颈之前,为未来的业务需求规划和设计数据库系统。

在发生危机时,提供额外的资源、人力和其他资源。这种情况导致更昂贵的解决方案,以及更低的运营效率。 主动管理您的系统需求,最大限度地减少重大事故和业务中断。对于一个 24x7 的关键任务型业务,任何停机都会直接影响收入、销售、客户满意度和商业信誉。

估算系统资源并设计一个均衡的系统

要估算工作负载的资源消耗和估算可以满足业务需求的容量,最佳方法是在质量保证或测试环境中对工作负载进行基准测试。运行一个全新的基准测试,是一个耗时的操作。该操作需要人力资源、系统设置、管理支持和各团队的承诺。或者,您也可以使用过去的数据作为基准测试的结果或工作负载的资源消耗,用这些来估算当前部署的资源需求。但结果不会像全新的基准测试那么准确。 一个全面的容量规划过程包括以下所有步骤:

1. 收集业务目标、服务水平要求和利益相关者的反馈。
2. 确定当前的系统资源容量,如 CPU 的数量、LPAR、每个 LPAR 或系统上的内存、I/O 性能的特点、存储设备、可用空间和网络带宽。
3. 调查工作负载的性质,如哪一部分的工作负载在何时使用最多资源。
4. 随着业务增长,估算在高峰期的工作负载增长率和资源消耗。
5. 利用从前面的步骤所收集的数据,估算系统要求,并对其进行规模调整。在非生产系统上运行工作负载,验证估计的规模并准确地规划所需要的容量。
6. 根据从测试中收集的指标,按需要调优系统和数据库。
7. 编制一份容量规划的计划书,并验证它。修订规模和建议书,并根据需要重复前面的步骤。
8. 所有利益相关者都对容量规划计划书达成共识,并批准它。
9. 实施所批准的容量规划。
10. 监视您的系统性能,随业务和工作负载的变化修订容量规划。

下图显示了前面的段落中描述的容量规划步骤的工作流程:

图 5. 估算系统资源并设计均衡系统的流程

当您为业务应用程序的吞吐量和响应时间设置目标时,必须估算和分析系统资源和工作负载的所有方面,使其能够满足服务水平要求。

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How do you alter a table in MySQL using the ALTER TABLE statement?How do you alter a table in MySQL using the ALTER TABLE statement?Mar 19, 2025 pm 03:51 PM

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

How do I configure SSL/TLS encryption for MySQL connections?How do I configure SSL/TLS encryption for MySQL connections?Mar 18, 2025 pm 12:01 PM

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

How do you handle large datasets in MySQL?How do you handle large datasets in MySQL?Mar 21, 2025 pm 12:15 PM

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?Mar 21, 2025 pm 06:28 PM

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

How do you drop a table in MySQL using the DROP TABLE statement?How do you drop a table in MySQL using the DROP TABLE statement?Mar 19, 2025 pm 03:52 PM

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

How do you create indexes on JSON columns?How do you create indexes on JSON columns?Mar 21, 2025 pm 12:13 PM

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

How do you represent relationships using foreign keys?How do you represent relationships using foreign keys?Mar 19, 2025 pm 03:48 PM

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?Mar 18, 2025 pm 12:00 PM

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!