Database Reliability Engineering: Designing and Operating Resilient Database Systems by Campbell Laine & Majors Charity
Author:Campbell, Laine & Majors, Charity [Campbell, Laine]
Language: eng
Format: azw3
Publisher: O'Reilly Media
Published: 2017-10-26T04:00:00+00:00
Pattern: high resource utilization operations
There are multiple patterns that you can utilize here, depending on the operations that are being executed.
For data modification, throttling by performing the updates in batches is a simple pattern to give engineers when performing bulk operations. For larger environments, it often makes more sense to utilize code to do lazy updating upon login of a user, or querying of a row for example.
For data removal, you can encourage SWEs to utilize soft deletes in their code. A soft delete flags a row as deleteable, which means it can be filtered out of queries in the application and removed at will. You can then throttle the deletes, removing them asynchronously. As with bulk updates, for large datasets this might prove to be impossible. If deletes are regularly performed on ranges, such as dates or ID groupings, you can utilize partitioning features to drop partitions. By dropping a table or partition, you do not create undo I/O which can reduce resource consumption.
Should you find that DDL operations such as table alters create enough I/O that latency is affected, you should consider this a red flag that capacity might be reaching its limits. Ideally, you would work with operations to add more capacity to the data stores. However, if this is not possible or is delayed, these DDL operations can be treated like blocking operations, with the appropriate pattern being applied.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7402)
Grails in Action by Glen Smith Peter Ledbrook(7295)
Kotlin in Action by Dmitry Jemerov(4637)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4130)
The Age of Surveillance Capitalism by Shoshana Zuboff(3422)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3242)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3027)
Mastering Python for Networking and Security by José Manuel Ortega(2950)
Blockchain Basics by Daniel Drescher(2890)
TCP IP by Todd Lammle(2638)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2602)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2483)
Hands-On Azure for Developers by Kamil Mrzyglod(2411)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2357)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2339)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2313)
The Social Psychology of Inequality by Unknown(2310)
The Art Of Deception by Kevin Mitnick(2297)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2244)