Skip to main content

Clustered Foolishness

I had morning coffee with a well respected friend of mine recently. Aside from chatting about the usual wifery and family, we touched on the subject of clustered indices and SQL Server performance.

A common misconception in the software industry is that a clustered index will make your database queries faster. In fact, most cases will demonstrate the polar opposite of this assumption. The reason for this misconception is a misunderstanding of how the clustered index works in any database server.

A clustered index is a node clustering of records that share a common index value. When you decide on an index strategy for your data, you must consider the range of data to be indexed. Remember back to your data structures classes and what you were taught about hashtable optimizations.

A hashtable, which is another way of saying a database index, is just a table of N values that organizes a set of M records in quickly accessible lists that are of order L, where L is significantly less than M. If your index/hashtable is poorly performing, then you have a problem with your L and N, i.e. your N is approaching M and your L is approaching 1.

A clustered index is something special because it is the only index that dictates how data is PHYSICALLY stored on disk. While a simple index is an in-memory data structure, the clustered index is a physical clustering of the data records (order L from prior paragraph) written to storage. This is the killing joke of a clustered index because the worst case scenario of your index is to constantly change its range, which means you're constantly recreating your clusters. That, my friends, is why your database gets slower as it fills with records.

Your solution is to never use a clustered index unless you have a finite, pre-determined, range of index values. The clustered index is only best-performing when the key range is static, or rarely changing.

A common mistake is to set a record ID in your table to be your Primary Key, which by default is also clustered. Oops. That means your key space for that primary clustered key is always changing with every insert. Crap, right? I bet you've got a few of those in your database right now. You better run off and fix that right now.

You might wonder why this is such a big deal, right? At what point does the clustered index start to fail? Thousands of records, hundreds of thousands, millions? Those are good questions.

Every index in a database is ordered. This is a requirement so that searching the index space can be done in log(n) time. This is also the reason why the physical layout of a clustered index is so problematic. Each time the index space changes, the physical layout of the records must be recomputed and stored. A write operation to a hard disk is orders of magnitude slower than one in memory, and so the cost of rewriting the ENTIRE INDEX SPACE becomes prohibitive as the indexed table grows in size. Sound familiar? Even with fill factors set as high as 90%, you will feel the bite of rewriting the clustered index space if your index range changes rapidly.

I've found that the clustered index on a bad key range starts to fail around a hundred thousand records, but that depends on the size of your records and the speed of your hard drives. If you have high speed (AV-rated) SCSI drives, then you might be able to get away with more records. Once you hit a million records, though, you're sunk, no matter how fast the hard drive.

Your remedy is to always use non-clustered indices for your primary keys. The very nature of a primary key is that it must be unique, which is orthogonal to the idea of a clustered index. In SQL Server, the clustered nature of a key is a constraint, so you have to ALTER the table and DROP the constraint, and then re-create the primary key without clustering.

Then when you decide to add other indices to your tables, only do it on columns that are used in queries. Take advantage of multi-column indices because many times, your searches are multi-column filtered.

If you absolutely need to use a clustered index to make your row sorting faster, then do it on a static key space, or one that is almost never changing.

Popular posts from this blog

DNS Custom Logs and selinux

If you google "named custom logs selinux" you will find quite a bit of chatter about setting up custom logs outside of /var/log for DNS (named). These posts are interesting, but they tend to be run on posts about learning selinux and becoming an expert on named. What you need to know? If you have setup custom logging locations in your /etc/named.conf file, such as:     channel default_file {         file "/var/log/named/default.log" versions 3 size 5m;         severity dynamic;         print-time yes;     }; Then you will likely see errors like this in /var/log/messages: Oct 26 11:41:13 namedsvr setroubleshoot: SELinux is preventing /usr/sbin/named from write access on the directory /var/named/chroot/var/log/named. For complete SELinux messages. run sealert -l 6eab4aaf-e615-4ade-9e88-4efdc789eaf2 Then you run the sealert command as suggested by the very friendly selinux audit log and you are told: #============= named_t ============== #!

THE RISE OF FASCIST SOCIAL MEDIA

The Merriam-Webster dictionary defines fascism as: a tendency toward or actual exercise of strong autocratic or dictatorial control .  The phrase "dictatorial control" is important for the case that I am going to make about fascism in social media. The word "dictatorial" means "of or relating to a dictator," and a dictator is "one ruling in an absolute and often oppressive way." In 2020, social media has seen a rise in the number of autocratic events of censorship. The two social media outlets that I am going to focus on are Facebook and Twitter.  Background Facebook is a semi-private curated blogging platform where you, the user, share information at your leisure. The public part of Facebook is in Facebook Groups. With a group, outside people who are not privy to your "Facebook Wall" will join your group and establish a communal discourse. This can be private, by invitation only, or public. The Facebook is auth-walled so that you must

Outlook Configuration

To read all email in text and be able to extract the mail using mail headers: > regedit HCU/Software/Microsoft/Office/16.0/Outlook/Options/Mail   MinimalHeaderOn = 0 (dword)   ReadAsPlain = 1 (dword)   SaveAllMIMENotJustHeaders = 1 (dword) restart Outlook afterwards, maybe even reboot just for good measure. Now you get to see all of those phishy urls in the emails and you can get all of those embedded image attachments as raw encoded binary when you get the header details on the message. Put the Message Options button in the hot button task bar so you can quickly get this info. No more phishy phish from the numbskulls. I take payment in coffee. It's been a long time since I've had Jamaica Blue Mountain. Just saying. If you know how to disable the jpeg thumbnail render of attachments, please share on twitter. That's an obvious vector.