How to manage concurrency in Django models
How to manage concurrency in Django models
The days of desktop systems serving single users are long gone — web applications nowadays are serving millions of users at the same time. With many users comes a wide range of new problems — concurrency problems.
In this article I’m going to present two approaches for managing concurrency in Django models.
Photo byDenys Nevozhai
The Problem
To demonstrate common concurrency issues we are going to work on a bank account model:
class Account(models.Model):
id = models.AutoField(
primary_key=True,
)
user = models.ForeignKey(
User,
)
balance = models.IntegerField(
default=0,
)
To get started we are going to implement a naive deposit and withdrawmethods for an account instance:
def deposit(self, amount):
self.balance += amount
self.save()
def withdraw(self, amount):
if amount > self.balance:
raise errors.InsufficientFunds()
self.balance -= amount
self.save()
This seems innocent enough and it might even pass unit tests and integration tests on localhost. But, what happens when two users perform actions on the same account at the same time?
- User A fetches the account — balance is 100$.
- User B fetches the account — balance is 100$.
- User B withdraws 30$ — balance is updated to 100$ — 30$ = 70$.
- User A deposits 50$ — balance is updated to 100$ + 50$ = 150$.
What happened here?
User B asked to withdraw 30$ and user A deposited 50$ — we expect the balance to be 120$, but we ended up with 150$.
Why did it happen?
At step 4, when user A updated the balance, the amount he had stored in memory was stale (user B had already withdrawn 30$).
To prevent this situation from happening we need to make sure the resource we are working on is not altered while we are working on it.
Pessimistic approach
The pessimistic approach dictates that you should lock the resource exclusively until you are finished with it. If nobody else can acquire a lock on the object while you are working on it, you can be sure the object was not changed.
To acquire a lock on a resource we use a database lock for several reasons:
- (relational) databases are very good at managing locks and maintaining consistency.
- The database is the lowest level in which data is accessed — acquiring the lock at the lowest level will protect the data from other processesmodifying the data as well. For example, direct updates in the DB, cron jobs, cleanup tasks, etc.
- A Django app can run on multiple processes (e.g workers). Maintaining locks at the app level will require a lot of (unnecessary) work.
To lock an object in Django we use select_for_update.
Let’s use the pessimistic approach to implement a safe deposit and withdraw:
@classmethod
def deposit(cls, id, amount):
with transaction.atomic():
account = (
cls.objects
.select_for_update()
.get(id=id)
) account.balance += amount
account.save()
return account
@classmethod
def withdraw(cls, id, amount):
with transaction.atomic():
account = (
cls.objects
.select_for_update()
.get(id=id)
) if account.balance < amount:
raise errors.InsufficentFunds()
account.balance -= amount
account.save() return account
What do we have here:
- We use
select_for_updateon our queryset to tell the database to lock the object until the transaction is done. - Locking a row in the database requires a database transaction — we use Django’s decorator
transaction.atomic()to scope the transaction. - We use a classmethod instead of an instance method — to acquire the lock we need to tell the database to lock it. To achieve that we need to be the ones fetching the object from the database. When operating on self the object is already fetched and we don’t have any guaranty that it was locked.
- All the operations on the account are executed within the database transaction.
Let’s see how the scenario from earlier is prevented with our new implementation:
- User A asks to withdraw 30$:
- User A acquires a lock on the account.
- Balance is 100$. - User B asks to deposit 50$:
- Attempt to acquire lock on account fails (locked by user A).
- User B waits for the lock to release. - User A withdraw 30$ :
- Balance is 70$.
- Lock of user A on account is released. - User B acquires a lock on the account.
- Balance is 70$.
- New balance is 70$ + 50$ = 120$. - Lock of user B on account is released, balance is 120$.
Bug prevented!
What you need to know about select_for_update:
- In our scenario user B waited for user A to release the lock. Instead of waiting we can tell Django not to wait for the lock to release and raise a DatabaseError instead. To do that we can set the nowait argument of select_for_update to True,
…select_for_update(nowait=True). - Select related objects are also locked — When using select_for_update with select_related, the related objects are also locked.
For example, If we were toselect_relatedthe user along with the account, both the user and the account will be locked. If during deposit, for example, someone is trying to update the first name, that update will fail because the user object is locked.
If you are using PostgreSQL or Oracle this might not be a problem soon thanks to a new feature in the upcoming Django 2.0. In this version, select_for_update has an “of” option to explicitly state which of the tables in the query to lock.
I used the bank account example in the past to demonstrate common patterns we use in Django models. You are welcome to follow up in this article:
Optimistic Approach
Unlike the pessimistic approach, the optimistic approach does not require a lock on the object. The optimistic approach assumes collisions are not very common, and dictates that one should only make sure there were no changes made to the object at the time it is updated.
How can we implement such a thing with Django?
First, we add a column to keep track of changes made to the object:
version = models.IntegerField(
default=0,
)
Then, when we update an object we make sure the version did not change:
def deposit(self, id, amount):
updated = Account.objects.filter(
id=self.id,
version=self.version,
).update(
balance=balance + amount,
version=self.version + 1,
)
return updated > 0
def withdraw(self, id, amount):
if self.balance < amount:
raise errors.InsufficentFunds() updated = Account.objects.filter(
id=self.id,
version=self.version,
).update(
balance=balance - amount,
version=self.version + 1,
) return updated > 0
Let’s break it down:
- We operate directly on the instance (no classmethod).
- We rely on the fact that the version is incremented every time the object is updated.
- We update only if the version did not change:
- If the object was not modified since we fetched it than the object is updated.
- If it was modified than the query will return zero records and the object will not be updated. - Django returns the number of updated rows. If `updated` is zero it means someone else changed the object from the time we fetched it.
How is optimistic locking work in our scenario:
- User A fetch the account — balance is 100$, version is 0.
- User B fetch the account — balance is 100$, version is 0.
- User B asks to withdraw 30$:
- Balance is updated to 100$ — 30$ = 70$.
- Version is incremented to 1. - User A asks to deposit 50$:
- The calculated balance is 100$ + 50$ = 150$.
- The account does not exist with version 0 -> nothing is updated.
What you need to know about the optimistic approach:
- Unlike the pessimistic approach, this approach requires an additional field and a lot of discipline.
One way to overcome the discipline issue is to abstract this behavior. django-fsm implements optimistic locking using a version field as described above. django-optimistic-lock seem to do the same. We haven’t used any of these packages but we’ve taken some inspiration from them. - In an environment with a lot of concurrent updates this approach might be wasteful.
- This approach does not protect from modifications made to the object outside the app. If you have other tasks that modify the data directly (e.g no through the model) you need to make sure they use the version as well.
- Using the optimistic approach the function can fail and return false. In this case we will most likely want to retry the operation. Using the pessimistic approach with nowait=False the operation cannot fail — it will wait for the lock to release.
Which one should I use?
Like any great question, the answer is “it depends”:
- If your object has a lot of concurrent updates you are probably better off with the pessimistic approach.
- If you have updates happening outside the ORM (for example, directly in the database) the pessimistic approach is safer.
- If your method has side effects such as remote API calls or OS calls make sure they are safe. Some things to consider — can the remote call take a long time? Is the remote call idempotent (safe to retry)?
From a quick cheer to a standing ovation, clap to show how much you enjoyed this story.
How to manage concurrency in Django models的更多相关文章
- django models的点查询/跨表查询/双下划线查询
django models 在日常的编程中,我们需要建立数据库模型 而往往会用到表与表之间的关系,这就比单表取数据要复杂一些 在多表之间发生关系的情形下,我们如何利用models提供的API的特性获得 ...
- Django - models.py 应用
Django - models.py 应用 编写 models.py 文件 from django.db import models # Create your models here. class ...
- day20 Django Models 操作,多表,多对多
1 Django models 获取数据的三种方式: 实践: viwes def business(request): v1 = models.Business.objects.all() v2 = ...
- django models 数据库操作
django models 数据库操作 创建模型 实例代码如下 from django.db import models class School(models.Model): pass class ...
- Django models 操作高级补充
Django models 操作高级补充 字段参数补充: 外键 约束取消 ..... ORM中原生SQL写法: raw connection extra
- Django models Form model_form 关系及区别
Django models Form model_form
- Django models .all .values .values_list 几种数据查询结果的对比
Django models .all .values .values_list 几种数据查询结果的对比
- django models进行数据库增删查改
在cmd 上运行 python manage.py shell 引入models的定义 from app.models import myclass ##先打这一行 ------这些是 ...
- django models数据类型
Django Models的数据类型 AutoField IntegerField BooleanField true/false CharField maxlength,必填 TextField C ...
随机推荐
- NSNotificationCenter详解
本文转载至 http://blog.csdn.net/chengyingzhilian/article/details/7874408 作用:NSNotificationCenter是专门供程序中不同 ...
- JS 创建对象(常见的几种方法)
贴个代码先: function O(user,pwd){ //use constructor this.user=user; this.pwd=pwd; this.get=get; return th ...
- vptr
#include <stdio.h> class Point3d { public: virtual ~Point3d(){} public: static Point3d origin; ...
- SWD下载调试填坑,SWD连接丢失问题解决
野火SWD下载器,设置好以后,第一次下载成功,莫名其妙丢失连接,发现在复位状态可以连接(惊奇) 网络上搜索到把Boot0和Boot1置高,就可以把程序下载到RAM里, 能下载以后就好办了,把程序里SW ...
- 【BZOJ2119】股市的预测 后缀数组+分块
[BZOJ2119]股市的预测 Description 墨墨的妈妈热爱炒股,她要求墨墨为她编写一个软件,预测某只股票未来的走势.股票折线图是研究股票的必备工具,它通过一张时间与股票的价位的函数图像清晰 ...
- iOS 符号化崩溃日志
1.获取一下三个文件 1. crash报告(.crash文件) 2. 符号文件 (.dsymb文件) 3. 应用程序文件 (appName.app文件,把IPA文件后缀改为zip,然后解压,Pay ...
- 全栈JavaScript之路( 二十四 )DOM2、DOM3, 不涉及XML命名空间的扩展
版权声明:本文为博主原创文章.未经博主同意不得转载. https://blog.csdn.net/hatmore/article/details/37658167 (一)DocumentType 类型 ...
- [转载]Java web应用中的常见字符编码问题的解决方法
以下是 Java web应用的常见编码问题 1. html页面的编码 在web应用中,通常浏览器会根据http header: Content-type的值来决定用什么encoding, 比如遇到Co ...
- C语言程序设计50例(经典收藏)之1
题目:有1.2.3.4个数字,能组成多少个互不相同且无重复数字的三位数?都是多少? 程序分析:可填在百位.十位.个位的数字都是1.2.3.4.组成所有的排列后再去 掉不满足条件的排列. #includ ...
- 培训笔记——Linux基本命令
在介绍命令之前,更重要的要先介绍一下快速输入命令的方法. 如果你能记住一些常用命令,毫无疑问,通过命令的操作方式比通过鼠标的操作方式要快. 但是有一些命令或是命令用到的参数如文件名特别复杂特别长,这时 ...