Performance & Monitoring

Performance antipatterns and monitoring strategies.

19 topics 2 sections

Performance Antipatterns

11 topics

Performance Antipatterns Overview

intermediate

Performance antipatterns are recurring design mistakes that systematically degrade system performance, often appearing benign in development but catastrophic at

12 min read

Busy Database

intermediate

The Busy Database antipattern occurs when your database becomes the bottleneck by handling excessive queries, performing application-layer logic, or suffering f

10 min read

Busy Frontend

intermediate

The Busy Frontend antipattern occurs when client-side code performs too much work synchronously, blocking the main thread and degrading user experience. Common

9 min read

Chatty I/O

intermediate

Chatty I/O is a performance antipattern where an application makes numerous small, sequential I/O requests instead of fewer, batched operations. Each network ca

10 min read

Extraneous Fetching

intermediate

Extraneous fetching occurs when systems retrieve more data than needed for a specific operation—like fetching entire user profiles when only names are required.

11 min read

Improper Instantiation

intermediate

Improper instantiation occurs when applications repeatedly create expensive objects instead of reusing them, causing memory pressure, garbage collection storms,

10 min read

Monolithic Persistence

intermediate

Monolithic persistence is the antipattern of using a single database to serve all application components, creating a bottleneck as systems scale. This approach

12 min read

No Caching

intermediate

The No Caching antipattern occurs when systems repeatedly fetch or compute the same data without storing results for reuse, forcing every request to hit slow ba

11 min read

Noisy Neighbor

intermediate

The Noisy Neighbor antipattern occurs when one tenant or component monopolizes shared resources (CPU, memory, I/O, network), degrading performance for others in

11 min read

Retry Storm

intermediate

A retry storm occurs when multiple clients simultaneously retry failed requests without backoff, creating an amplification effect that overwhelms downstream ser

9 min read

Synchronous I/O

intermediate

Synchronous I/O blocks the calling thread while waiting for network, disk, or database operations to complete, wasting CPU resources and limiting throughput. Th

8 min read

Monitoring

8 topics

Monitoring Overview

intermediate

Monitoring is the practice of collecting, aggregating, and analyzing data about system behavior to detect problems, understand performance, and inform operation

10 min read

Health Monitoring

intermediate

Health monitoring continuously verifies that system components are alive and functioning correctly by checking their ability to process requests. Unlike metrics

30 min read

Availability Monitoring

intermediate

Availability monitoring tracks whether your system is operational and accessible to users over time, measuring uptime percentages (99.9%, 99.99%) and generating

27 min read

Performance Monitoring

intermediate

Performance monitoring is the continuous observation and measurement of system behavior under load to detect degradation before it causes failures. It tracks me

30 min read

Security Monitoring

intermediate

Security monitoring is the continuous observation and analysis of system access patterns, authentication events, and resource usage to detect and respond to sec

26 min read

Usage Monitoring

intermediate

Usage monitoring tracks how users interact with system features and resources—which endpoints get hit, which features are used, and how much capacity each tenan

29 min read

Instrumentation

intermediate

Instrumentation is the practice of embedding code into your application to emit telemetry data—metrics, logs, traces, and events—that reveal system behavior in

28 min read

Visualization & Alerts

intermediate

Visualization transforms raw metrics into dashboards that reveal system health at a glance, while alerts proactively notify operators when thresholds are breach

33 min read