当前位置:网站首页>When should I use Apache Druid
When should I use Apache Druid
2022-06-24 06:13:00 【HoneyMoose】
Many companies have put Druid It can be applied to many different application scenarios . Please visit Use Apache Druid The company Page to find out which companies use Druid.
If your usage scenario conforms to some of the following features , that Druid It will be a very good choice :
- The insertion frequency of data is very high , But the update frequency is very low .
- Most queries are aggregate queries (aggregation) And report query (reporting queries), For example, we often use “group by” Inquire about . There are also some retrieval and scanning queries .
- The query latency is limited to 100ms To In a few seconds .
- Your data has a time component ( attribute ). For time-related attributes ,Druid Carry out special design and optimization .
- You may have multiple data tables , But queries are usually only for a large distributed data table , however , The query may also need to query multiple smaller
lookupsurface . - If your data has a high cardinality (high cardinality) Data field , for example URLs、 user IDs, But you need to quickly count and sort these fields .
- You need to get from Kafka,HDFS, text file , Or object storage ( for example ,AWS S3) Load data in .
If your usage scenario is some of the following ,Druid No A better choice :
- For an existing record , Use primary key (primary key) Perform low latency update operations .Druid Support streaming insertion (streaming inserts) data , But it doesn't support streaming updates very well (streaming updates) data . Druid The update operation of is completed through background batch processing .
- Your system is similar to an offline reporting system , Query latency is not an important consideration in system design .
- The table needs to be updated in the usage scenario (Fact Table) Make a connection query , And for this query, you can introduce a high delay to wait for the query to complete .
边栏推荐
- ZABBIX enterprise distributed monitoring
- At the trusted cloud conference, Tencent securely unlocked a number of new certifications!
- Risc-v instruction set explanation (4) R-type integer register register instruction
- Comparison of common layout solutions (media query, percentage, REM and vw/vh)
- MySQL series tutorial (I) getting to know MySQL
- How to resolve the domain name? How to choose a domain name?
- How to quickly master the orders message in sportisimo EDI project?
- Correct way to update Fedora image Yum source to Tencent cloud Yum source
- "Adobe international certification" confused me: what is Pantone?
- Analysis of official template of wechat personnel recruitment management system (III)
猜你喜欢
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database

Technology is a double-edged sword, which needs to be well kept

A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing

ServiceStack. Source code analysis of redis (connection and connection pool)

What is the difference between a white box test and a black box test

Solution to the 39th weekly game of acwing

One line of keyboard
随机推荐
Risc-v instruction set explanation (7) instruction address alignment and addition and subtraction overflow processing
Malicious software packages are found in pypi code base. Tencent security threat intelligence has been included. Experts remind coders to be careful of supply chain attacks
Experience sharing on unified management and construction of virtual machine
MySQL optimization
Text classification and fine tuning using transformer Bert pre training model
Tencent cloud won the "best customer value award for security hosting services in China" from Sullivan toubao Research Institute
Discussion on NFT Technology
System of test development - create test virtual machine on demand
The basic concept of network is the relationship among services, protocols, processes and ports.
Tencent (host security) was listed in the market guide for cloud workload protection platform released by Gartner
Summary of basic notes of C language (I)
Little transparent apprentice's way to go ashore
How to check whether the domain name is filed? Must the domain name be filed for use?
Realization of data transmission between a and B computers by using single chip microcomputer serial port
Koa middleware implementation
Analysis of official template of micro build low code (I)
Tencent security monthly report - Tencent security has been selected into several authoritative research reports, a data security special committee has been established, and zero trust specifications
How to recover data by splicing database fragments
Some common IPv6 problems!
What is the reason why the list of channels on the left side of easycvr video Plaza displays garbled codes?