Tagged articles
6 articles
Page 1 of 1
Top Architect
Top Architect
Oct 27, 2022 · Backend Development

Redis Cache Expiration Avalanche and Mitigation Strategies

The article explains how Redis cache expiration can cause a request avalanche that overloads databases, and presents mitigation techniques such as semaphore rate limiting, per‑key locking, fault‑tolerant cache rebuilding, and example Java code using Spring and Redis.

CacheJavaavalanche
0 likes · 8 min read
Redis Cache Expiration Avalanche and Mitigation Strategies
JavaEdge
JavaEdge
Sep 11, 2020 · Backend Development

How to Prevent Cache Avalanche, Penetration, and Stampede in Redis

The article explains three common Redis cache problems—avalanche, penetration, and stampede—detailing their causes, impacts on system stability, and practical mitigation techniques such as random expiration, Bloom filters, mutex locks, and rate limiting, accompanied by code examples.

BackendCacheavalanche
0 likes · 7 min read
How to Prevent Cache Avalanche, Penetration, and Stampede in Redis
Selected Java Interview Questions
Selected Java Interview Questions
Dec 7, 2019 · Backend Development

Understanding Redis Cache Avalanche, Penetration, and Breakdown: Causes and Mitigation Strategies

The article explains what Redis cache avalanche, penetration, and breakdown are, illustrates real‑world incidents, and provides pre‑, during‑, and post‑incident solutions such as high‑availability setups, local caches with rate limiting, fallback mechanisms, and placeholder writes to prevent database overload.

BackendBreakdownCache
0 likes · 8 min read
Understanding Redis Cache Avalanche, Penetration, and Breakdown: Causes and Mitigation Strategies
Java Backend Technology
Java Backend Technology
Sep 11, 2018 · Backend Development

How to Prevent Cache Consistency, Concurrency, and Avalanche Issues in High‑Traffic Systems

This article explains common cache problems such as consistency, concurrency, penetration, jitter, avalanche, and the bottomless‑hole phenomenon, and provides practical strategies like expiration policies, locking, empty‑object caching, sharding, rate limiting, and IO optimizations to keep high‑traffic systems stable.

BackendConsistencyavalanche
0 likes · 7 min read
How to Prevent Cache Consistency, Concurrency, and Avalanche Issues in High‑Traffic Systems
Architecture Digest
Architecture Digest
Aug 13, 2018 · Backend Development

Cache Consistency, Concurrency, Penetration, Avalanche, and Bottomless Pit Issues and Mitigation Strategies

The article explains various cache problems—including consistency, concurrency, penetration, avalanche, and the bottomless‑pit phenomenon—and presents practical mitigation techniques such as active updates, locking, empty‑object caching, request filtering, consistent hashing, and multi‑level caching to ensure reliable high‑performance systems.

CacheConsistencyavalanche
0 likes · 8 min read
Cache Consistency, Concurrency, Penetration, Avalanche, and Bottomless Pit Issues and Mitigation Strategies