Volt Active Data
12.3.9 LTS
VoltDB Operator 2.1.7 |
VoltDB Helm Chart 2.1.7 |
October 10, 2024
This document provides information about known issues and limitations to the current release of VoltDB. If you encounter any problems not listed below, please be sure to report them to support@voltactivedata.com. Thank you.
The process for upgrading from the recent versions of VoltDB is as follows:
Shutdown the database, creating a final snapshot (using voltadmin shutdown --save).
Upgrade the VoltDB software.
Restart the database (using voltdb start).
For Kubernetes, see the section on "Upgrading the VoltDB Software and Helm Charts" in the VoltDB Kubernetes Administrator's Guide. For DR clusters, see the section on "Upgrading VoltDB Software" in the VoltDB Administrator's Guide for special considerations related to DR upgrades. If you are upgrading from versions before V6.8, see the section on "Upgrading Older Versions of VoltDB Manually" in the same manual.
Finally, for all customers upgrading from earlier versions of VoltDB, please be sure to read the upgrade notes for your current and subsequent releases, including V6, V7, V8, V10, and V11.
In addition to the major enhancements listed above, users of previous versions of VoltDB should take note of the following changes that might impact their existing applications. See the VoltDB Operator Release Notes for changes specific to the use of VoltDB on the Kubernetes platform.
1. Release V12.3.9 (October 10, 2024) | ||||||||||
1.1. | Security updates | |||||||||
The following CVEs were resolved:
The following outstanding CVE in the Universal Base Image (UBI) will be addressed as soon as a fix becomes available from Red Hat:
| ||||||||||
1.2. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
2. Release V12.3.8 (June 12, 2024, updated July 15, 2024) | ||||||||||
2.1. | Improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
3. Release V12.3.7 (March 31, 2024) | ||||||||||
3.1. | Security updates | |||||||||
The following high and critical CVEs were resolved:
This release removes all known high and critical security vulnerabilities found in the RedHat Universal Base Image (UBI). | ||||||||||
3.2. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
4. Release V12.3.6 (March 8, 2024) | ||||||||||
4.1. | Kubernetes updated to use the Red Hat Universal Base Image (UBI). | |||||||||
With this release, the base image for running Volt under Kubernetes has been upgraded from Alpine to the Red Hat Universal Base Image (UBI). UBI provides Volt Active Data with an established and supported base image on which to build. This change also corrects issues encountered when running Volt under recent releases of OpenShift. | ||||||||||
4.2. | Security updates | |||||||||
The following high and critical CVEs were resolved:
Note that, with the switch to RedHat Universal Base Image (UBI), there are a few known security vulnerabilities in the UBI implementation of Bind. These will be corrected as soon as Red Hat provides an upgraded UBI release with the appropriate patches. | ||||||||||
4.3. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
5. Release V12.3.5 (January 24, 2024) | ||||||||||
5.1. | Security updates | |||||||||
All known high and critical CVEs were resolved as of the date of this release, including:
| ||||||||||
5.2. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
6. Release V12.3.4 (January 18, 2024) | ||||||||||
6.1. | New license file format | |||||||||
VoltDB has introduced a new license file format with a more flexible structure to allow for new features in the future. This LTS release adds support for the new file format to ensure it can run using both existing and new licenses. In addition to supporting the new format, several minor changes related to license management have been made:
| ||||||||||
6.2. | Security updates | |||||||||
All known high and critical CVEs were resolved as of the date of this release, including:
| ||||||||||
6.3. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
7. Release V12.3.3 (November 2, 2023) | ||||||||||
7.1. | Security updates | |||||||||
All known high and critical CVEs were resolved as of the date of this release, including:
| ||||||||||
7.2. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
8. Release V12.3.2 (September 1, 2023, updated September 7, 2023) | ||||||||||
8.1. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
9. Release V12.3.1 (July 26, 2023) | ||||||||||
9.1. | Security updates | |||||||||
All known high and critical CVEs were resolved as of the date of this release, including:
| ||||||||||
9.2. | Additional improvements | |||||||||
In addition, the following limitations in previous versions have been resolved:
| ||||||||||
10. Release V12.3.0 (July 5, 2023) | ||||||||||
10.1. | Long-Term Support release | |||||||||
The current release, Volt Active Data V12.3, is the Long-Term Support (LTS) release for version 12. We encourage all customers using V12 to upgrade to the V12.3 release to ensure ongoing support through minor version updates. See the chapter on Long-Term Support in the Volt Upgrade Guide for more information on the advantages of LTS releases and subsequent chapters on how to upgrade from previous major releases. | ||||||||||
10.2. | LDAP Integration | |||||||||
It is now possible to use existing LDAP users and groups to authenticate and authorize access to VoltDB databases in place of builtin VoltDB accounts. LDAP integration allows users and programs to pass LDAP credentials to the database server, which in turn passes those credentials to LDAP for authentication. VoltDB then looks up what groups the LDAP user is a member of to identify what roles they have and ultimately what permissions they are granted by the database. VoltDB LDAP integration supports both plain and secure LDAP. See the chapter on Security in the Using VoltDB manual for details. | ||||||||||
10.3. | Dynamic schema change in XDCR clusters without pausing | |||||||||
When done carefully, it is possible to add and remove DR tables from a XDCR VoltDB schema without having to pause the databases. However, previously, there was no safe way to modify the tables themselves. VoltDB V12.3 introduces dynamic schema change which, as the name implies, allows you to apply selected modifications to DR tables without pausing the database and while continuing to process transactions for those tables. Dynamic schema change allows you to add or remove columns from the end of a table. You can also modify the length of VARCHAR columns. During the transition, when the schema of the clusters do not match, VoltDB follows set rules for applying the binary logs to mismatched tables. In many cases — such as if applications use the default values for new columns — the clusters can process transactions normally during the transition and the clusters' contents will match once the schema change is complete. Of course, there is always certain amount of risk to dynamic changes if you do not manage your client applications correctly, so VoltDB keeps a count of how many binary logs are applied to mismatched tables so you can determine how much risk there is. New data columns to existing selectors and new selectors (such as DRSCHEMA and XDCR) for the @Statistics system procedure help you monitor the status of schema changes in your databases. Since dynamic schema change does introduce some additional risk of divergence to the clusters, it is not enabled by default. Before applying schema changes without pausing, you must enable dynamic schema change in the configuration file. See the documentation on updating the schema in the chapter on Database Replication of the Using VoltDB manual for details. Also, if you want to use this feature in existing XDCR databases, see the section later in this document for upgrading XDCR clusters to use dynamic schema change. | ||||||||||
10.4. | Beta release of a new metrics system | |||||||||
VoltDB V12.3 includes the beta release of a new reporting system aimed at providing a simpler, more consistent interface to statistics about the database status and performance. The new system is built into the server (unlike the previous external Prometheus agent), meaning it starts and stops automatically as part of the overall database system. Each server reports its own status. And the system as a whole integrates seamlessly with Prometheus and Grafana To learn more about the new metrics system, see the beta release documentation which is available online. | ||||||||||
10.5. | Support for the latest base platforms (RHEL 9 and Kubernetes 1.26) | |||||||||
Both Red Hat Enterprise Linux (RHEL) version 9 and Kubernetes 1.26 are now supported as platforms for production use. | ||||||||||
10.6. | Kubernetes upgrade | |||||||||
The VoltDB base image on Kubernetes has been upgraded to use Alpine 3.18 and Java 17. | ||||||||||
10.7. | Improved management of memory used for "undoing" transactions | |||||||||
VoltDB uses temporary memory to store changes in case a transaction needs to rollback. Rather than allocate and deallocate memory for each transaction, VoltDB maintains an undo pool that is reused for this purpose. The pool is extended if a transaction requires more undo memory. The pool then stays at the larger size assuming a future transaction is likely to need the same amount of undo memory. Previously, the current allocation of the undo pool was not visible. A new field has been added to the @Statistics MEMORY output reporting the current allocation. In addition, the voltadmin defrag command now resets the undo pool as part of its memory optimization function. | ||||||||||
10.8. | New information available from @Statistics system procedure | |||||||||
The @Statistics system procedure returns new and enhanced data on a number of different topics:
See the @Statistics reference page in the Using VoltDB manual for more information. | ||||||||||
10.9. | Security updates | |||||||||
All known high and critical CVEs were resolved as of the date of this release, including:
| ||||||||||
10.10. | Additional improvements | |||||||||
In addition, the following limitations in previous versions have been resolved:
| ||||||||||
11. Release V12.2.2 (April 24, 2023) | ||||||||||
11.1. | Security updates | |||||||||
All known high and critical CVEs were resolved as of the date of this release, including:
| ||||||||||
11.2. | Additional improvements | |||||||||
In addition, the following limitations in previous versions have been resolved:
| ||||||||||
12. Release V12.2.1 (April 13, 2023) | ||||||||||
12.1. | Security update | |||||||||
Packages within Volt Active Data have been updated to eliminate the following known security vulnerability: CVE-2023-0464. | ||||||||||
13. Release V12.2 (March 29, 2023) | ||||||||||
13.1. | Important! New Volt Operator for Kubernetes | |||||||||
The Volt Operator for Kubernetes has been updated to improve stability, extensibility, and to support Kubernetes V1.23 through V1.25. The new version of the Operator, V2.0, is required for both Volt V12.2 and Kubernetes V1.25. The transition from V1.x to V2.0 of the Operator is the same as any other update, with one exception: when upgrading to V2.0 you must use the kubectl replace command to update the CRD instead of the kubectl apply command, as was documented in previous releases. On the other hand, use of replace instead of apply works when updating any version of the Volt software. So the documentation has been revised to recommend the use of replace for all software upgrades. Because Volt Operator and Helm chart V2.0 are required for Kubernetes 1.25, customers upgrading to 1.25 must upgrade the components in the following order:
| ||||||||||
13.2. | Changes to Kubernetes pod security | |||||||||
In previous releases, the Volt Operator established permissions for the Kubernetes pods to provide Volt with the rights needed to function properly. This was done using Kubernetes pod security policies (PSP). Starting with the Volt Operator and charts V2.0, pod security policies are no longer enabled by default. This means the Volt pods have no specific limitations set for them. For Kubernetes V1.23 and V1.24, you can enable PSP constraints by setting the Helm property
$ kubectl label --override namespace mydatacenter pod-security.kuberneted.io/enforce=baseline | ||||||||||
13.3. | Cloud native placement groups maximize high availability by distributing partitions across availability zones in Kubernetes | |||||||||
Volt Active Data now supports cloud native placement groups. K-Safety guarantees the database cluster can survive a certain number of node failures. Placement groups allow you to define groups of nodes that are logically connected so that Volt can avoid losing the database if an entire group goes offline. In Kubernetes, if you enable the new cloud native placement capability, Volt maximizes its availability, using knowledge of the Kubernetes regions and zones to intelligently distribute copies of the database partitions so that even if an availability zone is lost, the database can remain operational. See the section on "Configuring High Availability" in the Volt Kubernetes Administrator's Guide for more information. | ||||||||||
13.4. | TLS/SSL support for subject alternative names (SAN) | |||||||||
One feature of TLS/SSL is that the client can verify that the certificate is assigned to the same host name or address they connect to. In fact, it can allow for multiple names and even wildcards using Subject Alternative Names (SAN). By default, Volt does not utilize this feature. However, starting with Volt V12.2 the Volt Java client can enable alternative name support and verify that the certificate matches the requested address. See the note on using TLS alternative name support later in this document for details. | ||||||||||
13.5. | Required version of Python updated to V3.9 or later | |||||||||
Because version 3.6 is no longer supported, the minimal version of Python required by Volt Active Data has been updated to V3.9. | ||||||||||
13.6. | Kakfa security update requires new property for Volt topic producers | |||||||||
To resolve certain security vulnerabilities the Kafka client library has been upgraded. However, the newer
library requires Kafka producers to explicitly disable idempotency when sending messages to Volt topics, which was
not required before. Important: if you are using a Kafka producer to send data to
Volt topics and do not explicitly disable idempotency, you will need to update the client to add the property
| ||||||||||
13.7. | Masking passwords when configuring security on Kubernetes | |||||||||
When configuring security in VoltDB, you must specify usernames and passwords, which previously appeared in plain text in the YAML configuration file. You can now use the Helm voltadmin plugin to mask those passwords, so they are not readily viewable in the YAML. See the description of the Helm plugin mask command in the Volt Kubernetes Administrator's Guide for details. | ||||||||||
13.8. | Support for JDBC getMaxConnection method | |||||||||
The Volt JDBC API now supports the getMaxConnection method, which returns the integer value of zero (0) indicating the maximum is unspecified. | ||||||||||
13.9. | Ability to use separate TLS/SSL credentials for each XDCR cluster | |||||||||
Previously, when enabling TLS/SSL encryption for XDCR clusters in Kubernetes, all of the clusters needed to
use the same certificate. Although the property It is now possible to specify separate TSL/SSL credentials for each XDCR cluster. When specifying the
credentials of the remote XDCR cluster, use the new properties
When upgrading an existing cluster to operator 2.0 and using the new XDCR TLS/SSL properties, be sure to
remove any existing definition of the $ helm upgrade mydb voltdb/voltdb --reuse-values \
--set cluster.config.deployment.dr.connection.ssl={} | ||||||||||
13.10. | Additional improvements | |||||||||
In addition to the new features and capabilities described above, the following limitations in previous versions have been resolved:
| ||||||||||
14. Release V12.1.1 (March 17, 2023) | ||||||||||
14.1. | Security updates | |||||||||
All known high and critical CVEs were resolved as of the date of this release, including:
| ||||||||||
15. Release V12.1 (December 21, 2022, updated December 29, 2022) | ||||||||||
15.1. | Simplified updating of TLS/SSL certificates in Kubernetes eliminates need for cluster restart | |||||||||
The latest Operator release simplifies the process for updating TLS/SSL certificates and eliminates the need to stop and restart the cluster to apply the new certificate. In Kubernetes,if you store the TLS/SSL credentials using Kubernetes secrets, either created manually or through the cert-manager, the Operator now automatically updates the configuration on the running cluster once the secret changes. So, if you created the secret manually, you simply need to delete and recreate the secret with the new credentials. If you use cert-manager, cert-manager itself updates the credentials when the expiration date approaches. In either case, the Operator recognizes the change and updates the running cluster without any further operator intervention. | ||||||||||
15.2. | New @Statistics selector for information about the cluster nodes and the partitions they host | |||||||||
The @Statistics system procedure has a new selector, HOST, that returns information about the nodes of the cluster, including what partitions it hosts and whether it is safe to stop the node in a K-safe cluster. See the description of the @Statistics system procedure in the Using VoltDB manual for details. | ||||||||||
15.3. | New @SystemInformation selector for listing environment variables | |||||||||
Support for a new selector, ENV, has been added to the @SystemInformation system procedure. The ENV selector returns information about the environment variables defined for the database server process, one row for each variable on each host. See the description of the @SystemInformation system procedure in the Using VoltDB manual for details. | ||||||||||
15.4. | TLS/SSL protocols 1.0 and 1.1 are no longer supported | |||||||||
The TLS/SSL protocol versions 1.0 and 1.1 were deprecated and removed from most industry applications and browsers in 2020. Going forward, these obsolete protocol versions are no longer available in VoltDB either. | ||||||||||
15.5. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
| ||||||||||
16. Release V12.0 (October 18, 2022) | ||||||||||
16.1. | Memory management improvements | |||||||||
Memory management for the database table data has been rewritten and optimized to reduce certain impediments in the previous implementation. Although this change is primarily internal and transparent to you as a customer, it does have two direct benefits in terms of eliminating development and operational roadblocks:
| ||||||||||
16.2. | Support for Ubuntu 22.04 and the Rocky OS | |||||||||
Volt Active Data has added Ubuntu 22.04 and Rocky OS as supported platforms for VoltDB. | ||||||||||
16.3. | Support for storing TLS/SSL credentials in Kubernetes secrets | |||||||||
When enabling TLS/SSL in Kubernetes, you can now store your TLS/SSL credentials (including the keystore, truststore, and passwords) in a Kubernetes secret. This avoids having to specify passwords on the Helm command line and simplifies the commands needed to start and update database instances. See the section on configuring TLS/SSL in the Volt Kubernetes Administrator's Guide for details. | ||||||||||
16.4. | Expiration dates for user accounts | |||||||||
You can now specify an expiration date for user accounts in the database configuration file. Once the specified date is past, the associated account can no longer access the database, until the configuration for the user account is updated. The expiration date is optional. See the section on defining users and roles in the Using VoltDB manual for details. | ||||||||||
16.5. | New LAG() windowing function | |||||||||
The LAG() function accesses previous rows from the window results using an offset. See the section on windowing functions in the SELECT reference page for more information. | ||||||||||
16.6. | Dedicated pod for VMC and HTTP API in Kubernetes | |||||||||
By default, Volt in Kubernetes now creates a separate pod for the Volt Management Center (VMC) and HTTP API.
This provides a single service name for accessing these resources, as well as a single instance for the entire
cluster (rather than separate instances for each host). The new pod is available from the service name
| ||||||||||
16.7. | License is required on the voltdb init command | |||||||||
Starting with V12, the voltdb init command must find and load a license file or the
initialization of the database root directory will fail. The license file can either be specified explicitly using
the | ||||||||||
16.8. | Kafkaloader10 is now deprecated | |||||||||
To support different versions of the Kafka API, two versions of the kafkaloader utility were provided in the past: kafkaloader and kafkaloader10. Now that support for older versions of Kafka has been dropped, the legacy loader, kafkaloader10, has been deprecated and will be removed in a future release. | ||||||||||
16.9. | Old deprecated methods removed from the Java client API | |||||||||
Several obsolete methods in the Java client API that were previously deprecated have now been removed. Those
methods were | ||||||||||
16.10. | The voltadmin plan_upgrade command has been removed | |||||||||
The procedure for upgrading the VoltDB software using limited hardware is no longer supported. The associated command, plan_upgrade, has been removed from the voltadmin utility. | ||||||||||
16.11. | @Statistics DRCONSUMER column renamed | |||||||||
The results of the @Statistics system procedure DRCONSUMER selector have been altered slightly. Specifically, the last column of the third results table has been renamed to be more descriptive from LAST_FAILURE to LAST_FAILURE_CODE. | ||||||||||
16.12. | Additional information in @SystemInformation output | |||||||||
The @SystemInformation system procedure now includes additional information regarding the number of processors, both existing and available for use. This is important because in certain situations (most notably, Kubernetes) not all processors are available to the application. The new results field is called JAVAAVAILABLEPROCESSORS. | ||||||||||
16.13. | Additional improvements | |||||||||
The following limitations in previous versions have been resolved:
|
The following are known limitations to the current release of VoltDB. Workarounds are suggested where applicable. However, it is important to note that these limitations are considered temporary and are likely to be corrected in future releases of the product.
The following notes provide details concerning how certain VoltDB features operate. The behavior is not considered incorrect. However, this information can be important when using specific components of the VoltDB product.
1. IPv6 | |
1.1. | Support for IPv6 addresses |
VoltDB works in IPv4, IPv6, and mixed network environments. Although the examples in the documentation use IPv4 addresses, you can use IPv6 when configuring your database, making connections through applications, or using the VoltDB command line utilities, such as voltdb and voltadmin. When specifying IPv6 addresses on the command line or in the configuration file, be sure to enclose the address in square brackets. If you are specifying both an IPv6 address and port number, put the colon and port number after the square brackets. For example: voltadmin status --host=[2001:db8:85a3::8a2e:370:7334]:21211 | |
2. XDCR | |
2.1. | Upgrading existing XDCR clusters for Dynamic Schema Change |
Volt Active Data V12.3 introduces a new feature, dynamic schema change for XDCR clusters. To use this feature, clusters must be configured to enable the feature and must be using the latest DR protocol. However, existing clusters that upgrade from earlier versions will not automatically use the new protocol. Instead, you must explicitly upgrade the DR protocol using the voltadmin dr protocol --update command. First, to use dynamic schema change you must enable the feature in the configuration file. This must be done
when you initialize the cluster which, for existing XDCR clusters, is easiest to when performing the version
upgrade. To upgrade XDCR clusters, you must drop the cluster from the XDCR environment, upgrade the software, then
reinitialize and restart the cluster. While reinitializing the cluster, add the <deployment>
<dr id="1" role="xcdr">
<schemachange enabled="true"/>
<connection source="paris.mycompany.com,rome.mycompany.com"/>
</dr>
</deployment> Similarly, for Kubernetes, the YAML would be: cluster:
config:
deployment:
dr:
id: 1
role: xdcr
schemachange:
enabled: true
connection:
source: paris.mycompany.com,rome.mycompany.com Once all of the clusters are upgraded to the appropriate software version, you can upgrade the DR protocol. When used by itself, the voltadmin dr protocol command displays information about what versions of the DR protocol the XDCR clusters support and which version they are using. When the XDCR relationship starts, the clusters use the highest supported protocol. However, when an existing XDCR group is upgraded, they do not automatically upgrade the originally agreed-upon protocol. In this case, you must go to each cluster and issue the voltadmin dr protocol --update command to use the highest protocol that all the clusters can support. Once you issue the voltadmin dr protocol --update command on all of the clusters, you are then ready to perform dynamic schema changes on your XDCR environment. | |
3. Volt Management Center | |
3.1. | Schema updates clear the stored procedure data table in the Management Center Monitor section |
Any time the database schema or stored procedures are changed, the data table showing stored procedure statistics at the bottom of the Monitor section of the VoltDB Management Center get reset. As soon as new invocations of the stored procedures occur, the statistics table will show new values based on performance after the schema update. Until invocations occur, the procedure table is blank. | |
3.2. | TLS/SSL for the HTTPD port on Kubernetes |
Prior to VoltDB V12.0, encryption for the httpd port which VMC uses was automatically enabled on Kubernetes
when you enabled TLS/SSL for the server using the Starting with V12.0, VMC on Kubernetes is run as a separate service by default and you can enable or disable
TLS/SSL encryption for VMC independently using the | |
4. SQL | |
4.1. | You cannot partition a table on a column defined as ASSUMEUNIQUE. |
The ASSUMEUNIQUE attribute is designed for identifying columns in partitioned tables where the column values are known to be unique but the table is not partitioned on that column, so VoltDB cannot verify complete uniqueness across the database. Using interactive DDL, you can create a table with a column marked as ASSUMEUNIQUE, but if you try to partition the table on the ASSUMEUNIQUE column, you receive an error. The solution is to drop and add the column using the UNIQUE attribute instead of ASSUMEUNIQUE. | |
4.2. | Adding or dropping column constraints (UNIQUE or ASSUMEUNIQUE) is not supported by the ALTER TABLE ALTER COLUMN statement. |
You cannot add or remove a column constraint such as UNIQUE or ASSUMEUNIQUE using the ALTER TABLE ALTER COLUMN statement. Instead to add or remove such constraints, you must first drop then add the modified column. For example: ALTER TABLE employee DROP COLUMN empID; ALTER TABLE employee ADD COLUMN empID INTEGER UNIQUE; | |
4.3. | Do not use UPDATE to change the value of a partitioning column |
For partitioned tables, the value of the column used to partition the table determines what partition the row belongs to. If you use UPDATE to change this value and the new value belongs in a different partition, the UPDATE request will fail and the stored procedure will be rolled back. Updating the partition column value may or may not cause the record to be repartitioned (depending on the old and new values). However, since you cannot determine if the update will succeed or fail, you should not use UPDATE to change the value of partitioning columns. The workaround, if you must change the value of the partitioning column, is to use both a DELETE and an INSERT statement to explicitly remove and then re-insert the desired rows. | |
4.4. | Ambiguous column references no longer allowed. |
Starting with VoltDB 6.0, ambiguous column references are no longer allowed. For example, if both the Customer and Placedorder tables have a column named Address, the reference to Address in the following SELECT statement is ambiguous: SELECT OrderNumber, Address FROM Customer, Placedorder . . . Previously, VoltDB would select the column from the leftmost table (Customer, in this case). Ambiguous column references are no longer allowed and you must use table prefixes to disambiguate identical column names. For example, specifying the column in the preceding statement as Customer.Address. A corollary to this change is that a column declared in a USING clause can now be referenced using a prefix. For example, the following statement uses the prefix Customer.Address to disambiguate the column selection from a possibly similarly named column belonging to the Supplier table: SELECT OrderNumber, Vendor, Customer.Address FROM Customer, Placedorder Using (Address), Supplier . . . | |
5. Runtime | |
5.1. | File Descriptor Limits |
VoltDB opens a file descriptor for every client connection to the database. In normal operation, this use of file descriptors is transparent to the user. However, if there are an inordinate number of concurrent client connections, or clients open and close many connections in rapid succession, it is possible for VoltDB to exceed the process limit on file descriptors. When this happens, new connections may be rejected or other disk-based activities (such as snapshotting) may be disrupted. In environments where there are likely to be an extremely large number of connections, you should consider increasing the operating system's per-process limit on file descriptors. | |
5.2. | Use of Resources in JAR Files |
There are two ways to access additional resources in a VoltDB database. You can place the resources in the
LOAD CLASSES is used primarily to load classes associated with stored procedures and user-defined functions. However, it will also load any additional resource files included in subfolders of the JAR file. You can remove classes that are no longer needed using the REMOVE CLASSES directive. However, there is no explicit command for removing other resources. Consequently, if you rename resources or move them to a different location and reload the JAR file, the database will end up having multiple copies. Over time, this could result in more and more unnecessary memory being used by the database. To remove obsolete resources, you must first reinitialize the database root directory, start a fresh database, reload the schema (including the new JAR files with only the needed resources) and then restore the data from a snapshot. | |
5.3. | Servers with Multiple Network Interfaces |
If a server has multiple network interfaces (and therefore multiple IP addresses) VoltDB will, by default, open ports on all available interfaces. You can limit the ports to an single interface in two ways:
Also, when using an IP address to reference a server with multiple interfaces in command line utilities (such as voltadmin stop node), use the @SystemInformation system procedure to determine which IP address VoltDB has selected to identify the server. Otherwise, if you choose the wrong IP address, the command might fail. | |
5.4. | Using VoltDB where the /tmp directory is noexec |
On startup, VoltDB extracts certain native libraries into the /tmp directory before loading them. This works in all standard operating environments. However, in custom installations where the /tmp storage is mounted with the "noexec" option, VoltDB cannot extract the libraries and, in the past, refused to start. For those cases where the /tmp directory is assigned on storage mounted with the ‘noexec’ option, you can assign an alternative storage for VoltDB to use for extracting and executing temporary files. This is now done automatically on Kubernetes and does not require any user intervention. On non-Kubernetes environments, you can identify an alternative location by assigning it to
export VOLTDB_OPTS="-Dvolt.tmpdir=/volttemp \ -Dorg.xerial.snappy.tempdir=/volttemp \ -Djna.tmpdir=/volttemp" When using an alternate temporary directory, files can accumulate over time since the directory is not automatically purged on startup. So you should make sure you periodically delete old files from the directory. | |
6. Platforms | |
6.1. | OpenShift and Transparent Huge Pages (THP) |
For production, VoltDB requires that Transparent Huge Pages (THP) are disabled because they interfere with memory-intensive applications. However, THP may be enabled on OpenShift containers and the containers themselves not have permission to disable them. To overcome this situation, you must run the Helm chart for disabling THP from a privileged container: $ helm -n kube-system install thp voltdb/transparent-hugepages \ --set thp.securityContext.privileged=true | |
6.2. | Kubernetes Compatibility |
See the Volt Kubernetes Compatibility Chart for information on which versions of the Volt Operator and Helm charts support which version of VoltDB. See the VoltDB Operator Release Notes for additional information about individual releases of the VoltDB Operator. |