about this template

24
IBM Db2 The AI database 1

Upload: others

Post on 11-Nov-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

IBM Db2The AI database

1

AGENDA

• Db2 Overview• Db2 Powered by AI • Db2 Built for AI• ML Optimizer• Adaptive Workload Manager• Db2 Everywhere - Db2 + Cloud Pak for Data

to be enterprise ready..

for web and AI app development..

with AI..

• Performant

• Secure

• Available

• Automated administration &

monitoring

• Developer friendly

• Multi modal

• ML optimizer

• Adaptive workload

management

to be consumable..• Deploy across multiple form

factors

• Upgrade in minutes

Db2 is built…

Db2 Powered by AI

Data and AI Forum/ © 2020 IBM Corporation

10x1

2

3

Automatic

your

Db2

IBM Db2®

Db2 Built for AI

Data and AI Forum/ © 2020 IBM Corporation

– Access data you want directly from application

– Deploy your training pipelines directly on the server

– Your language, your choice

– RDBMS, Object Store , Data Lake , structured &

unstructured

Image Area

ML Query Optimizer1IBM Db2

ML OptimizerML based optimizer improves query performance using

predictive estimations to improve query access plans.

The Db2 Machine Learning Optimizer provides an additional level of

intelligent optimization to deliver query execution strategies that improve on

traditional cost-based query optimization

Basic workload cost optimizers can suggest query execution strategies, but

they aren’t sensitive to recent changes in the database, and they can’t

learn from experience

The Db2 Machine Learning Optimizer, by contrast, incorporates feedback

from actual query performance to recommend execution strategies that

may deliver improved results

Up to 10x fast query performance!

▪ Uses ML to learn from experience and

improve decisions using feedback from

actual query performance, in line with the

changes in the database

▪ Speed up query and database execution

with improved decision making and

accuracy

▪ Applies ML to better estimate predicate

filtering, which is key to better query

performance

▪ Confidence-based querying adds machine

learning extensions to SQL expressions using

neural networks, to find similarities, patterns

and matches

▪ Optimizes memory and compute capacity

resources and database resources based on

specific workload needs

ML based Query Optimization

Get intelligent query processing with ML-based

optimizer that uses Neural networks to learn from

experience

Get up to 10x better query

performance with Db2

ML OptimizerBenefits for the end user

By dynamically improving query performance, the Db2 ML

Optimizer helps to:

• Speed-up e-commerce transactions and improve customer

satisfactions, especially during major sales events and

holidays.

• Improve customer experience in support calls, prevent

churn, and create better loyalty in order to protect and grow

revenue.

• Do more with your existing infrastructure, meet and exceed

the SLA expected by the business.

• Quickly identify fraud patterns and improve fraud detection.

Get things done up to 10x faster!

Query Performance Examples

• Q1 – Q10 contain equality and range predicates which can exploit ML models

• Q11 – Q16 contain IN or OR predicates which can exploit ML models in 11.5.5

10

QueryElapsed Time (ms)

No ML 11.5.4 11.5.5Q1 0.9 1.8 0.7Q2 0.8 1.3 0.4Q3 23.4 6.4 5.7Q4 3.4 3.3 2.5Q5 7.1 7.5 7.2Q6 3.8 9.3 7.9Q7 3.4 3.3 5.6Q8 45.1 5.5 4.6Q9 12.5 7.2 6.4

Q10 23.9 6.3 5.5Q11 23.6 6.3 5.9Q12 23.6 30.6 5.8Q13 25.9 35.4 6.7Q14 23.9 25.8 6.9Q15 24.8 48.0 9.3Q16 27.6 36.7 13.1

TOTAL 273.7 234.9 94.4

0

20

40

60

Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10 Q11 Q12 Q13 Q14 Q15 Q16

Elap

sed

Tim

e (m

s)

Query Performance

No ML 11.5.4 11.5.5

Actual vs Estimated Cardinality Comparisons

• ~4200 queries on same table run on three different scenarios:

• ML Enabled

• Automatic Column Group Statistics (Auto-CGS)

• Independence Assumption

• Queries contain IN, equality, and range predicates

• Log computed between cardinality estimate and actual to show over/under estimation

• log(estimate / actual)

11

DEMO

Actual vs Estimated Cardinality Comparisons (additional tables)

13

Adaptive Workload Manager2IBM Db2

• Product Availability

• Initially available in Db2 Warehouse on Cloud, Db2 Warehouse, IIAS

• Available for on-prem ANALYTICS customers starting with 11.5.4

• More intelligent job scheduling makes more efficient use of system resources resulting in improved performance for concurrent workloads

• Resources managed

• Query working memory (aka sort)

• CPU load in the form of number of threads

• Runtime CPU consumption (via wlmdispatcher CPU limits)

• Adjusts admission implicitly based on workload without manual tuning

15

Db2’s New Adaptive Workload Management Technology

Admission management based on query resource footprint and fit rather than fixed user defined concurrency limits

Adaptive WLM

• Cost evaluation includes memory & cpu

load & time duration

• Includes historical feedback based on

past executions

• Scheduling based on dynamic view of

resource availability in each “lane”

• Expected benefits

▪ Improved robustness under high load

▪ Improved SLA achievement

▪ Improved overall resource efficiency &

throughput

Time Historical Actuals

Memory Historical Actuals

Time Estimate

Memory Estimate

CostCost

“Soft” resources can be assigned to each “lane”Scheduling based on actual memory and cpu availability in each “Lane”

Automatic Job Scheduling

Adaptive Workload Management Benefits

17

• Deliver true automatic workload management out of the box with zero tuning

• No need to configure + tune fixed concurrency limits

• Improved stability and performance

• Enables much simpler and more powerful admission models

Db2 Everywhere3IBM Db2

IBM Db2

Modern Resilient

19

Developer-Inclusive

Transactional Warehousing Event and Graph

IBM® Db2® Everywhere

Baremetal (VMs) Cp4D IBM SaaS Appliance3rd Party SaaS Desktop (dev)

AI for automation and

performance

Multi-model data management

Data virtualization

Integrated with multiple

programming languages

REST APIs

In-database machine learning

Performance and availability

Security

Cloud native

Integrated with Cloud Pak for Data

Cloud Pak for Data + Db2Simplifies, unifies and automates your journey to AI

Base ServicesCore to Cloud Pak for Data, these Base

services fastrack organizations on

their end-to-end data and AI journey

with comprehensive continuum of

capabilities.

Red Hat® OpenShift®A streamlined hybrid-cloud foundation to

take advantage of the underlying

resource and infrastructure optimization

and management. OpenShift license

dedicated to run Cloud Pak for Data.

Extended ServicesBeyond its Base Services, Cloud Pak for Data has a

growing ecosystem of OpenSource, Partner, and IBM

Extended Services – including Db2 to expand the

breadth of capabilities for teams.

Cloud Pak Control PlaneEssential to Cloud Pak for Data, Foundational Services

provide a command-line interface, an administration

interface, a services catalog, a central list of

connections, and the central user experience.

A truly Hybrid-Cloud worldDon’t let lock-in or major IT decisions

affect how your Data and AI temas

operate. Your work and data should be

accessible in any Hybrid-Cloud strategy.

Upcoming webinars

22

11th November - Db2 is Developer Inclusive + Preview of Db2 11.5.5

8th December - Db2 is Resilient and Consumable

Thank you

23

© Copyright IBM Corporation 2020

IBM Corporation

New Orchard Road, Armonk, NY 10504

Produced in the United States of America

September 2020

IBM, the IBM logo, ibm.com, IBM Cloud, IBM Cloud

Pak, Db2, InfoSphere, DataStage, Cognos and IBM

Watson are trademarks of International Business

Machines Corp., registered in many jurisdictions

worldwide. Other product and service names might be

trademarks of IBM or other companies. A current list

of IBM trademarks is available on the web at

“Copyright and trademark information” at

www.ibm.com/legal/copytrade.shtml.

Microsoft, Windows, Windows NT, and the Windows

logo are trademarks of Microsoft Corporation in the

United States, other countries, or both.

Java and all Java-based trademarks and logos are

trademarks or registered trademarks of Oracle and/or

its affiliates.

Red Hat®, and OpenShift® are trademarks or

registered trademarks of Red Hat, Inc. or its

subsidiaries in the United States and other countries.

This document is current as of the initial date of

publication and may be changed by IBM at any time.

Not all offerings are available in every country in

which IBM operates.

The performance data and client examples cited

are presented for illustrative purposes only. Actual

performance results may vary depending on specific

configurations and operating conditions. It is the

user’s responsibility to evaluate and verify the

operation of any other products or programs with IBM

products and programs. THE INFORMATION IN THIS

DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY

WARRANTY, EXPRESS OR IMPLIED, INCLUDING

WITHOUT ANY WARRANTIES OF

MERCHANTABILITY, FITNESS FOR A

PARTICULAR PURPOSE AND ANY WARRANTY

OR CONDITION OF NON-INFRINGEMENT. IBM

products are warranted according to the terms and

conditions of the agreements under which they are

provided.

The client is responsible for ensuring compliance with

laws and regulations applicable to it. IBM does not

provide legal advice or represent or warrant that its

services or products will ensure that the client is in

compliance with any law or regulation.

Statement of Good Security Practices: IT system

security involves protecting systems and information

through prevention, detection and response to

improper access from within and outside your

enterprise. Improper access can result in information

being altered, destroyed, misappropriated or misused

or can result in damage to or misuse of your systems,

including for use in attacks on others. No IT system or

product should be considered completely secure and

no single product, service or security measure can be

completely effective in preventing improper use or

access. IBM systems, products and services are

designed to be part of a lawful, comprehensive

security approach, which will necessarily involve

additional operational procedures, and may require

other systems, products or services to be most

effective. IBM DOES NOT WARRANT THAT ANY

SYSTEMS, PRODUCTS OR SERVICES ARE

IMMUNE FROM, OR WILL MAKE YOUR

ENTERPRISE IMMUNE FROM, THE MALICIOUS

OR ILLEGAL CONDUCT OF ANY PARTY

24