当前位置:网站首页>When should I use Apache Druid
When should I use Apache Druid
2022-06-24 06:13:00 【HoneyMoose】
Many companies have put Druid It can be applied to many different application scenarios . Please visit Use Apache Druid The company Page to find out which companies use Druid.
If your usage scenario conforms to some of the following features , that Druid It will be a very good choice :
- The insertion frequency of data is very high , But the update frequency is very low .
- Most queries are aggregate queries (aggregation) And report query (reporting queries), For example, we often use “group by” Inquire about . There are also some retrieval and scanning queries .
- The query latency is limited to 100ms To In a few seconds .
- Your data has a time component ( attribute ). For time-related attributes ,Druid Carry out special design and optimization .
- You may have multiple data tables , But queries are usually only for a large distributed data table , however , The query may also need to query multiple smaller
lookupsurface . - If your data has a high cardinality (high cardinality) Data field , for example URLs、 user IDs, But you need to quickly count and sort these fields .
- You need to get from Kafka,HDFS, text file , Or object storage ( for example ,AWS S3) Load data in .
If your usage scenario is some of the following ,Druid No A better choice :
- For an existing record , Use primary key (primary key) Perform low latency update operations .Druid Support streaming insertion (streaming inserts) data , But it doesn't support streaming updates very well (streaming updates) data . Druid The update operation of is completed through background batch processing .
- Your system is similar to an offline reporting system , Query latency is not an important consideration in system design .
- The table needs to be updated in the usage scenario (Fact Table) Make a connection query , And for this query, you can introduce a high delay to wait for the query to complete .
边栏推荐
- Excel data extraction technique: a universal formula for extracting numbers from mixed text
- How do fixed assets intensive enterprises manage fixed assets effectively?
- Why migrate dig to wire
- Rhel8 series update image Yum source is Tencent cloud Yum source
- How to use ffmpeg one frame H264 to decode yuv420p in audio and video development?
- Flexible use of distributed locks to solve the problem of repeated data insertion
- Royal treasure: physical storage medium
- text classification with RNN
- Enterprise management background user manual
- You don't have to spend a penny to build a wechat official website in a minute
猜你喜欢
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database

ServiceStack. Source code analysis of redis (connection and connection pool)

A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing

Solution to the 39th weekly game of acwing

Technology is a double-edged sword, which needs to be well kept

What is the difference between a white box test and a black box test

One line of keyboard
随机推荐
Text classification and fine tuning using transformer Bert pre training model
Install and use juicefs storage on Tencent cloud
A letter from little potato
Architecture: rest and HATEOAS
Interpretation of Cocos creator source code: siblingindex and zindex
Web automated testing (2): choose selenium advantage? Comparison with phantomjs/qtp/monkey
Intranet environment request Tencent cloud 3.0 API details
Risc-v instruction set explanation (7) instruction address alignment and addition and subtraction overflow processing
One line of keyboard
Summary of basic notes of C language (I)
As a sigmastar agent, Qiming cloud shares dry goods for you: what are the characteristics of ssd201/202
A rail grinder for rail transit
[in depth sharing] Devops evolution path -- Realizing R & D digital transformation based on four vertical and four horizontal Devops system
Analysis of DDoS attack methods
Risc-v assembly language programming (2) assembly program ASM_ run_ led
The development and construction of live broadcast app, and the source code of live broadcast app involves all aspects
Domain name, resolution, SSL certificate product selection
Mysql database backup under Windows Environment
Tesseract-OCR helloworld
Material production tool manual