Tag

Avalanche

1 views collected around this technical thread.

Top Architect
Top Architect
Oct 27, 2022 · Backend Development

Redis Cache Expiration Avalanche and Mitigation Strategies

The article explains how Redis cache expiration can cause a request avalanche that overloads databases, and presents mitigation techniques such as semaphore rate limiting, per‑key locking, fault‑tolerant cache rebuilding, and example Java code using Spring and Redis.

AvalancheCacheJava
0 likes · 8 min read
Redis Cache Expiration Avalanche and Mitigation Strategies
Selected Java Interview Questions
Selected Java Interview Questions
Dec 7, 2019 · Backend Development

Understanding Redis Cache Avalanche, Penetration, and Breakdown: Causes and Mitigation Strategies

The article explains what Redis cache avalanche, penetration, and breakdown are, illustrates real‑world incidents, and provides pre‑, during‑, and post‑incident solutions such as high‑availability setups, local caches with rate limiting, fallback mechanisms, and placeholder writes to prevent database overload.

AvalancheBreakdownCache
0 likes · 8 min read
Understanding Redis Cache Avalanche, Penetration, and Breakdown: Causes and Mitigation Strategies
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Sep 11, 2018 · Operations

Understanding Application Service Avalanche and How to Prevent It

The article explains the causes of service avalanche in distributed systems—especially cache avalanche—and presents comprehensive mitigation strategies such as diversified cache expiration, circuit‑breaker, isolation, and rate‑limiting techniques to keep applications resilient under load.

AvalancheCacheRate Limiting
0 likes · 8 min read
Understanding Application Service Avalanche and How to Prevent It
Architecture Digest
Architecture Digest
Aug 13, 2018 · Backend Development

Cache Consistency, Concurrency, Penetration, Avalanche, and Bottomless Pit Issues and Mitigation Strategies

The article explains various cache problems—including consistency, concurrency, penetration, avalanche, and the bottomless‑pit phenomenon—and presents practical mitigation techniques such as active updates, locking, empty‑object caching, request filtering, consistent hashing, and multi‑level caching to ensure reliable high‑performance systems.

AvalancheCacheConcurrency
0 likes · 8 min read
Cache Consistency, Concurrency, Penetration, Avalanche, and Bottomless Pit Issues and Mitigation Strategies