How to manage concurrency in Django models
How to manage concurrency in Django models
The days of desktop systems serving single users are long gone — web applications nowadays are serving millions of users at the same time. With many users comes a wide range of new problems — concurrency problems.
In this article I’m going to present two approaches for managing concurrency in Django models.
Photo byDenys Nevozhai
The Problem
To demonstrate common concurrency issues we are going to work on a bank account model:
class Account(models.Model):
id = models.AutoField(
primary_key=True,
)
user = models.ForeignKey(
User,
)
balance = models.IntegerField(
default=0,
)
To get started we are going to implement a naive deposit and withdrawmethods for an account instance:
def deposit(self, amount):
self.balance += amount
self.save()
def withdraw(self, amount):
if amount > self.balance:
raise errors.InsufficientFunds()
self.balance -= amount
self.save()
This seems innocent enough and it might even pass unit tests and integration tests on localhost. But, what happens when two users perform actions on the same account at the same time?
- User A fetches the account — balance is 100$.
- User B fetches the account — balance is 100$.
- User B withdraws 30$ — balance is updated to 100$ — 30$ = 70$.
- User A deposits 50$ — balance is updated to 100$ + 50$ = 150$.
What happened here?
User B asked to withdraw 30$ and user A deposited 50$ — we expect the balance to be 120$, but we ended up with 150$.
Why did it happen?
At step 4, when user A updated the balance, the amount he had stored in memory was stale (user B had already withdrawn 30$).
To prevent this situation from happening we need to make sure the resource we are working on is not altered while we are working on it.
Pessimistic approach
The pessimistic approach dictates that you should lock the resource exclusively until you are finished with it. If nobody else can acquire a lock on the object while you are working on it, you can be sure the object was not changed.
To acquire a lock on a resource we use a database lock for several reasons:
- (relational) databases are very good at managing locks and maintaining consistency.
- The database is the lowest level in which data is accessed — acquiring the lock at the lowest level will protect the data from other processesmodifying the data as well. For example, direct updates in the DB, cron jobs, cleanup tasks, etc.
- A Django app can run on multiple processes (e.g workers). Maintaining locks at the app level will require a lot of (unnecessary) work.
To lock an object in Django we use select_for_update.
Let’s use the pessimistic approach to implement a safe deposit and withdraw:
@classmethod
def deposit(cls, id, amount):
with transaction.atomic():
account = (
cls.objects
.select_for_update()
.get(id=id)
) account.balance += amount
account.save()
return account
@classmethod
def withdraw(cls, id, amount):
with transaction.atomic():
account = (
cls.objects
.select_for_update()
.get(id=id)
) if account.balance < amount:
raise errors.InsufficentFunds()
account.balance -= amount
account.save() return account
What do we have here:
- We use
select_for_updateon our queryset to tell the database to lock the object until the transaction is done. - Locking a row in the database requires a database transaction — we use Django’s decorator
transaction.atomic()to scope the transaction. - We use a classmethod instead of an instance method — to acquire the lock we need to tell the database to lock it. To achieve that we need to be the ones fetching the object from the database. When operating on self the object is already fetched and we don’t have any guaranty that it was locked.
- All the operations on the account are executed within the database transaction.
Let’s see how the scenario from earlier is prevented with our new implementation:
- User A asks to withdraw 30$:
- User A acquires a lock on the account.
- Balance is 100$. - User B asks to deposit 50$:
- Attempt to acquire lock on account fails (locked by user A).
- User B waits for the lock to release. - User A withdraw 30$ :
- Balance is 70$.
- Lock of user A on account is released. - User B acquires a lock on the account.
- Balance is 70$.
- New balance is 70$ + 50$ = 120$. - Lock of user B on account is released, balance is 120$.
Bug prevented!
What you need to know about select_for_update:
- In our scenario user B waited for user A to release the lock. Instead of waiting we can tell Django not to wait for the lock to release and raise a DatabaseError instead. To do that we can set the nowait argument of select_for_update to True,
…select_for_update(nowait=True). - Select related objects are also locked — When using select_for_update with select_related, the related objects are also locked.
For example, If we were toselect_relatedthe user along with the account, both the user and the account will be locked. If during deposit, for example, someone is trying to update the first name, that update will fail because the user object is locked.
If you are using PostgreSQL or Oracle this might not be a problem soon thanks to a new feature in the upcoming Django 2.0. In this version, select_for_update has an “of” option to explicitly state which of the tables in the query to lock.
I used the bank account example in the past to demonstrate common patterns we use in Django models. You are welcome to follow up in this article:
Optimistic Approach
Unlike the pessimistic approach, the optimistic approach does not require a lock on the object. The optimistic approach assumes collisions are not very common, and dictates that one should only make sure there were no changes made to the object at the time it is updated.
How can we implement such a thing with Django?
First, we add a column to keep track of changes made to the object:
version = models.IntegerField(
default=0,
)
Then, when we update an object we make sure the version did not change:
def deposit(self, id, amount):
updated = Account.objects.filter(
id=self.id,
version=self.version,
).update(
balance=balance + amount,
version=self.version + 1,
)
return updated > 0
def withdraw(self, id, amount):
if self.balance < amount:
raise errors.InsufficentFunds() updated = Account.objects.filter(
id=self.id,
version=self.version,
).update(
balance=balance - amount,
version=self.version + 1,
) return updated > 0
Let’s break it down:
- We operate directly on the instance (no classmethod).
- We rely on the fact that the version is incremented every time the object is updated.
- We update only if the version did not change:
- If the object was not modified since we fetched it than the object is updated.
- If it was modified than the query will return zero records and the object will not be updated. - Django returns the number of updated rows. If `updated` is zero it means someone else changed the object from the time we fetched it.
How is optimistic locking work in our scenario:
- User A fetch the account — balance is 100$, version is 0.
- User B fetch the account — balance is 100$, version is 0.
- User B asks to withdraw 30$:
- Balance is updated to 100$ — 30$ = 70$.
- Version is incremented to 1. - User A asks to deposit 50$:
- The calculated balance is 100$ + 50$ = 150$.
- The account does not exist with version 0 -> nothing is updated.
What you need to know about the optimistic approach:
- Unlike the pessimistic approach, this approach requires an additional field and a lot of discipline.
One way to overcome the discipline issue is to abstract this behavior. django-fsm implements optimistic locking using a version field as described above. django-optimistic-lock seem to do the same. We haven’t used any of these packages but we’ve taken some inspiration from them. - In an environment with a lot of concurrent updates this approach might be wasteful.
- This approach does not protect from modifications made to the object outside the app. If you have other tasks that modify the data directly (e.g no through the model) you need to make sure they use the version as well.
- Using the optimistic approach the function can fail and return false. In this case we will most likely want to retry the operation. Using the pessimistic approach with nowait=False the operation cannot fail — it will wait for the lock to release.
Which one should I use?
Like any great question, the answer is “it depends”:
- If your object has a lot of concurrent updates you are probably better off with the pessimistic approach.
- If you have updates happening outside the ORM (for example, directly in the database) the pessimistic approach is safer.
- If your method has side effects such as remote API calls or OS calls make sure they are safe. Some things to consider — can the remote call take a long time? Is the remote call idempotent (safe to retry)?
From a quick cheer to a standing ovation, clap to show how much you enjoyed this story.
How to manage concurrency in Django models的更多相关文章
- django models的点查询/跨表查询/双下划线查询
django models 在日常的编程中,我们需要建立数据库模型 而往往会用到表与表之间的关系,这就比单表取数据要复杂一些 在多表之间发生关系的情形下,我们如何利用models提供的API的特性获得 ...
- Django - models.py 应用
Django - models.py 应用 编写 models.py 文件 from django.db import models # Create your models here. class ...
- day20 Django Models 操作,多表,多对多
1 Django models 获取数据的三种方式: 实践: viwes def business(request): v1 = models.Business.objects.all() v2 = ...
- django models 数据库操作
django models 数据库操作 创建模型 实例代码如下 from django.db import models class School(models.Model): pass class ...
- Django models 操作高级补充
Django models 操作高级补充 字段参数补充: 外键 约束取消 ..... ORM中原生SQL写法: raw connection extra
- Django models Form model_form 关系及区别
Django models Form model_form
- Django models .all .values .values_list 几种数据查询结果的对比
Django models .all .values .values_list 几种数据查询结果的对比
- django models进行数据库增删查改
在cmd 上运行 python manage.py shell 引入models的定义 from app.models import myclass ##先打这一行 ------这些是 ...
- django models数据类型
Django Models的数据类型 AutoField IntegerField BooleanField true/false CharField maxlength,必填 TextField C ...
随机推荐
- 【iOS开发-80】Quartz2D绘图简介:直线/圆形/椭圆/方形以及上下文栈管理CGContextSaveGState/CGContextRestoreGState
本文转载至 http://blog.csdn.net/weisubao/article/details/41282457 - (void)drawRect:(CGRect)rect { //获得当前上 ...
- fiddler 清除证书+重新添加证书
1. 清除证书 ①任意浏览器,打开Internet属性弹窗,点击内容页签下<证书> ②删除个人页签下,颁发者为DO_NOT_TRUST_Fiddler**的数据 2. 重新认证证书 ①打开 ...
- python 快速排序详述
快速排序是对“冒泡排序”的优化算法,都属于交换排序类. 描述:它通过一趟排序将要排序的数据分割成独立的两部分,其中一部分的所有数据都比另外一部分的所有数据要小,然后再按此方法对这两部分数据分别进行快速 ...
- 实现asp.net mvc页面二级缓存,提高访问性能
实现的mvc二级缓存的类 //Asp.Net MVC视图页面二级缓存 public class TwoLevelViewCache : IViewLocationCache { private rea ...
- ubuntu14.04 desktop 32-bit kvm装windows xp
经过这几天来的折腾,总算是在ubuntu14.04用kvm装上了xp, 看不少的的贴,也绕了不少的圈,总的来说,非常感谢CSDN上的"上善若水75",看着他写的一个分类" ...
- Zookeeper数据与存储
一.前言 前面分析了Zookeeper对请求的处理,本篇博文接着分析Zookeeper中如何对底层数据进行存储,数据存储被分为内存数据存储于磁盘数据存储. 二.数据与存储 2.1 内存数据 Zooke ...
- 洛谷 P2486 [SDOI2011]染色
题目描述 输入输出格式 输入格式: 输出格式: 对于每个询问操作,输出一行答案. 输入输出样例 输入样例#1: 6 5 2 2 1 2 1 1 1 2 1 3 2 4 2 5 2 6 Q 3 5 C ...
- Intel IPP 图像空间转换
一. 背景 用QuickSync VPP模块做RGBA到NV12的颜色空间转换导致文字显示蒙上一层颜色的问题, 暂时怀疑是VPP自身的问题,因为参数设置都是按官方demo设置的.所以尝试使用IPP来做 ...
- C#读取excel 找不到可安装的ISAM
实在没有办法了 就仔细的查看了 一下数据链接字符串: string strConn = "Provider=Microsoft.Jet.Oledb.4.0;Data Source=" ...
- deviceToken的获取(一)
1.获得deviceToken的过程 1>客户端向苹果服务APNS,发送设备的UDID和英语的Bundle Identifier.2>经苹果服务器加密生成一个deviceToken ...