• 缓存常见问题


    [转]What is cache penetration, cache breakdown and cache avalanche?

    When designing and developing highly available system, cache is an very important consideration. It is useful to cache some frequently accessed data so that they can be accessed quickly and also cache can protect the downstream system like DB from being hit too often. 

    To provide better cache design in large systems, some problems may need to be considered first. In this post, we will talk about some frequently discussed cache problems and mitigation plans.

    Cache penetration

    Cache penetration is a scenario where the data to be searched doesn't exist at DB and the returned empty result set is not cached as well and hence every search for the key will hit the DB eventually. If a hacker tries to initiate some attack by launching lots of searches with such key, the underlying DB layer will be hit too often and may eventually be brought down.

    In such cases, there are a few mitigation plans.

    1. If there is no data for the key in DB, just return an empty result and cache it for a short period of time(Don't set a long expiration time)
    2. Using Bloom filter. Bloom filter is similar to hbase set which can be used to check whether a key exists in the data set. If the key exists, go to the cache layer or DB layer, if it doesn't exists in the data set, then just return.

    If the searched key has high repeat rate, then can adopt the first solution. Otherwise if the searched key has low repeat rate and the searched keys are too many, can adopt the second solution to filter most of them first.

    Cache breakdown

    Cache breakdown is a scenario where the cached data expires and at the same time there are lots of search on the expired data which suddenly cause the searches to hit DB directly and increase the load to the DB layer dramatically.

    This would happen in high concurrency environment. Normally in this case, there needs to be a lock on the searched key so that other threads need to wait when some thread is trying to search the key and update the cache. After the cache is updated and lock is released, other threads will be able to read the newly cached data.

     

    Another feasible method is to asynchronously update the cached data through a worker thread so that the hot data will never expire.

    Cache avalanche

    Cache avalanche is a scenario where lots of cached data expire at the same time or the cache service is down and all of a sudden all searches of these data will hit DB and cause high load to the DB layer and impact the performance.

    To mitigate the problem, some methods can be adopted.

    1. Using clusters to ensure that some cache server instance is in service at any point of time. If Redis is used, can have redis clusters.
    2. Some other approaches like hystrix circuit breaker and rate limit can be configured so that the underlying system can still serve traffic and avoid high load
    3. Can adjust the expiration time for different keys so that they will not expire at the same time.

    All the mitigation methods need to be implemented based on real use cases and system design requirements.

    缓存穿透(cache penetration)

       缓存里面没有,数据主库里也没有

       解决方案1,把没有的加入redis,优点是简单,缺点是防止不了黑客攻击

       解决方案2,布隆过滤器,优点是可以杜绝绝大部分无效请求访问数据库,缺点是复杂

    缓存击穿(cache breakdown)

      缓存里没有,数据库有

      解决方案:redis分布式锁

    缓存雪崩(cache avalanche)

      redis数据库宕机,大部分数据失败

      解决方案包括redis cluster、限流、错开失效时间

    数据一到性问题

      解决方案有延时双删,串行化

  • 相关阅读:
    java.sql.SQLSyntaxErrorException: ORA-01722: 无效数字
    Lambda表达式详解
    MAC JDK 卸载方法(彻底卸载)
    JAVA final关键字
    JAVA访问权限
    JAVA重写
    JAVA继承
    单例设计模式---懒汉式和饿汉式
    JAVA构造块和静态代码块
    Java static关键字
  • 原文地址:https://www.cnblogs.com/season2009/p/13023453.html
Copyright © 2020-2023  润新知