Concurrency and How to Avoid It
Concurrency and How to Avoid It
The issue of multiple threads or processes trying to modify the same data at the same time is one as old as programming itself. Is it possible to avoid the situation altogether? Or are we left with the current, age-old implements?
Join the DZone community and get the full member experience.Join For Free
Compliant Database DevOps and the role of DevSecOps DevOps is becoming the new normal in application development, and DevSecOps is now entering the picture. By balancing the desire to release code faster with the need for the same code to be secure, it addresses increasing demands for data privacy. But what about the database? How can databases be included in both DevOps and DevSecOps? What additional measures should be considered to achieve truly compliant database DevOps? This whitepaper provides a valuable insight. Get the whitepaper
Inserts, updates, and deletes. Every framework tutorial starts with these and they are seen as the most basic functionalities that just work.
But, what if two concurrent requests try to modify the same data? Or try to insert the same data that should be unique? Or the inserts and updates have side-effects that have to be stored in other tables (e.g. audit log)?
“Transactions” you may say. Well, yes and no. A transaction allows a group of queries to be executed together—either pass together of fail together. What happens with concurrent transactions depends on a specific property of transactions—their isolation level. And, you can read here a very detailed explanation of how all of that works.
If you select the safest isolation level – serializable (and repeatable read), your system may become too slow. And depending on the database, transactions that happen at the same time may have to be retried by specific application code. And that’s messy. With other isolation levels you can have lost updates, phantom reads, etc.
Even if you get your isolation right, and you properly handle failed transactions, isolation doesn’t solve all concurrency problems. It doesn’t solve the problem of having an application-imposed data constraint (e.g. a uniqueness complex logic that can’t be expressed as a database unique constraint), it doesn’t solve the problem of inserting exact duplicates, it doesn’t solve other application-level concurrency issues, and it doesn’t perfectly solve the data modification issues. You may have to get into database locking, and locking is tedious. What is a write lock, a read-lock, what is an exclusive lock, and how not to end up in a deadlock (or a livelock)? I’m sure that even developers with a lot of experience are not fluent with database locks, because you either don’t need them, or you have a bigger problem that you should solve first.
The duplicate submission problem is a bit off topic, but it illustrates that not all concurrent request problems can be solved by the database alone. As many people suggest, is solved by a token that gets generated for each request and stored in the database using a unique constraint. That way two identical inserts (a result of a double-submission) cannot both go in the database. This gets a little more complicated with APIs, because you should rely on the user of the API to provide the proper token (and not generate it on the fly in their back-end). As for uniqueness – every article that I’ve read on the matter concludes that the only proper way to guarantee uniqueness is at the database level, using a unique constraint. But when there are complicated rules for that constraint, you are inclined to check in the application. And, in this case, concurrent requests will eventually allow for two records with the same values to be inserted.
Most of the problems are easy if the application runs on a single machine. You can utilize your language concurrency features (e.g. Java locks, concurrent collections) to make sure everything is properly serialized, that duplicates do not happen, etc. However, when you deploy to more than one machine (which you should), that becomes a lot harder problem.
So what are the approaches to address concurrency issues, apart from transactions? There are many, and here are a few of them (in no meaningful order).
- There is Hazelcast, which lets you use distributed locks—the whole cluster follows the Lock semantics as if it was a single machine. That is language specific and setting up a Hazelcast cluster of just a few use-cases (because not all of your requests will need that) may be too much
- You can use a message queue—push all requests to a message queue that is processed by a single (async) worker. That may be useful in some cases, and impractical in others (if you have to return some immediate response to the user, for example)
- You can use Akka and its clustering capabilities—it guarantees that an actor (think “service”) is processing only one message at a time. But using Akka for everything may not be a good idea because it completely changes the paradigm, it is harder to read and trace, harder to debug, and is platform-specific (only JVM languages can make use of it).
- You can use database-specific application level locks. That’s something quite useful, even though it is entirely RDBMS-dependent. Postgres has advisory locks, MySQL has get_lock, others probably have something similar. The idea here is that you use the database as your distributed lock mechanism. The locks are managed by the application, and don’t even need to have anything to do with your tables—you just ask for a lock for, say (entityType, entityId), and then no other application thread can enter a given piece of code unless it successfully obtains that database lock. It is kind of like the Hazelcast approach, but you get it “for free” with the database. Then you can have, for example, a @Before (spring) aspect that attaches to service methods and does the locking appropriate for the current application use-case, without using table locks.
- You can use a CRDT. It’s a data structure that is idempotent—no matter what the order of the operation applied is, it ends up in the same state. It’s explained in more details in this presentation. How does a CRDT map to a relational database is an interesting question I don’t have an answer to, but the point is that if your operations are idempotent, you will probably have fewer issues.
- Using the “insert-only” model. Databases like Datomic are using it internally, but you can use it with any database. You have no deletes, no updates—just inserts. Updating a record is inserting a new record with the “version” increased. That again relies on database features to make sure you don’t end up with two records with the same version, but you never lose data (concurrent updates will make it so that one is “lost”, because it’s not the latest version, but it’s stored and can be reverted to). And, you get an audit log for free.
The overall problem is how to serialize requests without losing performance. And, all the various lock mechanisms and queues, including non-blocking IO, address that. But, what makes the task easier is having a data model that does not care about concurrency. If the latter is applicable, always go for it.
Whole books have been written on concurrency, and I realize such a blog post is rather shallow by definition, but I hope I’ve at least given a few pointers.
Published at DZone with permission of Bozhidar Bozhanov , DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.