2

Why Move From CRUD to Event Sourcing Architecture? - DZone DevOps

 2 years ago
source link: https://dzone.com/articles/why-do-you-need-to-move-from-crud-to-event-sourcin
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Why Do You Need to Move From CRUD to Event Sourcing Architecture?

CRUD-based Architecture has always been a popular choice with DevOps, but can DevOps and Architects benefit from moving to Event Sourcing-based architecture?

Join the DZone community and get the full member experience.

Join For Free

Having a firm understanding of the various architectural formats allow designers to build innovative, reactive, and resilient applications to scale. As such, following these industry-vetted standards can save time, ensure reliability, and drive results. After all, why should businesses spend time and resources reinventing the wheel?

But mere acquaintance with the different architectures like CRUD-based architecture, Microservices-based architecture, and event sourcing-based architecture will just not be enough to make a well-rounded decision regarding it. One needs to dive into the details and understand the nature, applicability, and value offered by each of them. 

In this post, we are taking a look at CRUD and event sourcing architectures, with a view of why one should consider porting from the former to the latter. Let’s take a look.

What Is CRUD?

CRUD is an acronym for Create, Read, Update, and Delete. It constitutes these four database commands, which are rather self-explanatory on their own, that are deemed as necessary for persistent storage management. This pattern is widely used by businesses across sectors and industries for tracking customer data, employee information, payment records, accounts, etc.

Let us quickly illustrate the regular flow of events in the case of CRUD:

Gary is browsing through an eCommerce website. He adds a gaming console, one controller, and a game to his cart. At that point in time, the cart database will look somewhat like this:

Customer

Product

Quantity

Sony PlayStation 5

Sony DualSense Wireless Controller

Assassin's Creed Valhalla

Suppose he were to add another item (say, a headset) to the cart. The database updates to:

Customer

Product

Quantity

Sony PlayStation 5

Sony DualSense Wireless Controller

Assassin's Creed Valhalla

Sony PULSE 3D wireless headset

If Gary removes the headset, the table reverts to the one displayed previously. Additionally, if he were to add another controller, the database would be as follows:

Customer

Product

Quantity

Sony PlayStation 5

Sony DualSense Wireless Controller

Assassin's Creed Valhalla

Sony PULSE 3D wireless headset

In essence, the database follows the Create - Read - Update - Delete approach to maintaining the table. The “update” and “delete” functions are characteristics of CRUD.

Limitations of the CRUD Approach

While the CRUD approach is highly preferred due to the lightweight and simplistic nature of its operations, it is plagued by its own set of limitations. These include:

  • The first and most common criticism of CRUD is that it is primitive and obsolete. Rather than viewing it as architecture or design, it is seen as a cycle of steps that can be followed, whether one builds a database or an API.

  • CRUD relies on the permanence of states in a database. However, the storage of such information can be wasteful and resource-intensive, given the dynamic nature of events surrounding data manipulation in the current landscape.

  • Even though the CRUD architecture is simple, it requires heavy investment in terms of code and effort at the initial stages. Despite that, CRUD fails to perform competently when it comes to cloud load balancing.

  • While the CRUD code may be quite straightforward in the beginning, the moment it begins to share data with other services or microservices, problems will arise relating to the synchronization of states and handling failures.

  • The complexities involved in the CRUD architecture will call for equally intricate solutions, which could extend to failure tracking, manual state logs, asynchronous batch processing, and more. Such considerations would be tougher to code and integrate.

  • In CRUD models, entity instances are typically represented dually and as a mutable object in memory occupying a mutable row in a relational database table. Such a structure results in the infamous object-relational impedance mismatch. Even the attempt to bridge such divides will further inject complications into the architecture.

What Is Event Sourcing Architecture?

Event Sourcing is a data storage technique that is seen as an upgrade of CRUD. It merely focuses on the Create and Read functions and completely omits the Update and Delete actions for values, as would be the case in CRUD. In simpler words, you cannot perform destructive operations through event sourcing.

So then, how does it overcome the challenges faced by CRUD?

Here’s where it gets interesting: unlike the traditional approach followed by CRUD, event sourcing stores the individual changes to the record as a series of deltas leading to the current state as a factor of time rather than persisting on the current state itself. In this manner, event sourcing imparts traceability to state changes. In most cases, this functionality is often combined with Domain-Driven Design (DDD) and Command Query Responsibility Segregation (CQRS) design patterns.

To better understand event sourcing architecture, let us take the example of Gary’s bank account. Suppose Gary had $2,400 in his account. He purchases the PS5 console for $499. The eCommerce website grants him a cashback of $49 for this purchase. 

In such a case, the event sourcing table would look like this: 

Event

Value

Remark

(balance)

(debit)

(credit)

By tracing the withdrawals and deposits over time, one can calculate his current balance to be $1,950. This restoration of states and playing back of events is called replay.

One can think of event sourcing as a log of customer activities. 

In case we were to view Gary’s activities from the eCommerce platform’s point of view, the addition of the console would be the first event, the addition of the controller would be the second event, and so on. In fact, even the checkout process would be a standalone event. If Gary were to inadvertently add three controllers to the cart (say, events 1, 2, and 3) and then he removes one, the removal would also be a separate event: event 4!

Benefits of Adopting the Event Sourcing Architecture

From a basic understanding of event sourcing, it appears to be a better and more improved alternative that overcomes the drawbacks of CRUD. To emphasize this fact, let us take a look at the proven advantages of event sourcing.

  • Event sourcing follows an event-driven architecture and facilitates the reliable publication of events upon a state change.

  • It overcomes the object-relational impedance mismatch problems, as seen with CRUD, by persisting events rather than domain objects.

  • It maintains a record of the series of events, which can be manipulated in the append-only state. By eliminating the need for tracking the states and the relationship between entities, the event sourcing code is easier to write and read from the database.

  • Since it keeps a log of how an entity reached its current events, event sourcing maintains consistency between audit data and transactional data as they are both the same. Further, it is also an excellent fail-safety as data can be reconstituted from the event log.

  • As all events are merely appended to the existing database and the update and delete functionalities are revoked, event sourcing architecture focuses purely on the writing aspect, which improves its performance.

  • Event sourcing allows for the analysis of the event stream, which helps businesses in deriving crucial information from it. As such, they can gain a top-level view of all the system activities, without complicating the write function.

  • Architectures following the event source model are easier to test and debug as the commands and events can be simulated for testing before introducing them. Further, the event log also acts as an excellent record of the debugging activities and if an issue is detected, one can replay the event log in a controlled environment to understand the source of such anomalies.

  • It can store any type of message and any consumer can access this information as long as they possess the authorized access. It is possible to raise temporal queries to determine the state of an entity at any given time. As such, they are highly flexible.

  • Event-sourced applications are easier to migrate as opposed to their monolithic counterparts, as they follow a microservice-based architecture. It is possible due to the loose coupling of business entities for events exchange.

Closing Thoughts

As more applications need real-time data to be delivered in an ordered and asynchronous manner, there exists a growing demand for event sourcing. Further, it serves as an excellent medium to consume and manage the log data of an application on a web scale. In such conditions, event sourcing establishes a single point of truth which advances the reliability of the application. 

So, when does your business plan to migrate from CRUD to event sourcing?


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK