Search

Chapter 10. Locking

download PDF
Red Hat JBoss Data Grid provides locking mechanisms to prevent dirty reads (where a transaction reads an outdated value before another transaction has applied changes to it) and non-repeatable reads.

10.1. Configure Locking (Remote Client-Server Mode)

In Remote Client-Server mode, locking is configured using the locking element within the cache tags (for example, invalidation-cache, distributed-cache, replicated-cache or local-cache).
The following is a sample procedure of a basic locking configuration for a default cache in Red Hat JBoss Data Grid's Remote Client-Server mode.

Procedure 10.1. Configure Locking (Remote Client-Server Mode)

  1. Define the Isolation Level

    The isolation parameter defines the isolation level used for the local cache. Valid values for this parameter are REPEATABLE_READ and READ_COMMITTED.
    <distributed-cache>
    	<locking isolation="REPEATABLE_READ" />
    
  2. Set the acquire-timeout Parameter

    The acquire-timeout parameter specifies the number of milliseconds after which lock acquisition will time out.
    <distributed-cache>
    	<locking isolation="REPEATABLE_READ" 
    	         acquire-timeout="30000" />
    
  3. Set Number of Lock Stripes

    The concurrency-level parameter defines the number of lock stripes used by the LockManager.
    <distributed-cache>
    	<locking isolation="REPEATABLE_READ" 
    	         acquire-timeout="30000" 
    	         concurrency-level="1000" />
    
  4. Set Lock Striping

    The striping parameter specifies whether lock striping will be used for the local cache.
    <distributed-cache>
    	<locking isolation="REPEATABLE_READ" 
    	         acquire-timeout="30000" 
    	         concurrency-level="1000" 
    	         striping="false" />
    	         ...
    </distributed-cache>
    
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.