Database Indexing: Speeding Up Your Queries Like a Pro
Thilan Dissanayaka Database Systems January 20, 2020

Database Indexing: Speeding Up Your Queries Like a Pro

In the world of databases, speed matters. Whether you’re powering an e-commerce store, a social media app, or a business dashboard — users expect data to load instantly. That’s where database indexing becomes your secret weapon.

Without indexes, the database has to scan every single row to find what it needs. That’s fine for tiny tables—but for millions of rows? You’ll feel the slowdown. Let’s explore how indexing works, the different types available, and how to use them wisely.

🔍 What is Database Indexing?

Think of a database index like the index in a book. Instead of flipping through every page to find a topic, you jump straight to the page number listed. A database index works the same way: it helps the database engine find rows faster without scanning the entire table.

⚙️ How Does an Index Work?

When you create an index on a column (or multiple columns), the database creates an internal structure — usually a B-tree or a hash table — that maps values in that column to the location of their corresponding rows.

So instead of scanning rows line by line, the database can go straight to the rows that match your query — dramatically improving speed.

Types of Database Indexes

  1. Primary Index

Automatically created when a primary key is defined.

Ensures unique identification of each record.

Left columns Right columns
left foo right foo
left bar right bar
left baz right baz

Example:

CREATE TABLE users (
    id INT PRIMARY KEY,
    name VARCHAR(100)
);
  1. Unique Index

Ensures that the indexed column values are unique.

Prevents duplicate entries.

Example:

CREATE UNIQUE INDEX idx_email ON users(email);
  1. Composite Index

Created on multiple columns to optimize queries involving those columns.

Example:

CREATE INDEX idx_name_age ON users(name, age);
  1. Full-Text Index

Designed for text-search capabilities.

Optimized for matching keywords in large text fields.

Example:

CREATE FULLTEXT INDEX idx_description ON products(description);
  1. Clustered Index

Sorts and stores rows based on the index key.

Each table can have only one clustered index.

Example:

CREATE CLUSTERED INDEX idx_order_id ON orders(order_id);
  1. Non-Clustered Index

Stores pointers to actual table rows.

A table can have multiple non-clustered indexes.

Example:

CREATE NONCLUSTERED INDEX idx_last_name ON employees(last_name);

Benefits of Indexing

Faster Query Execution: Reduces the need for full table scans.

Improved Sorting: Optimizes ORDER BY and GROUP BY operations.

Efficient Filtering: Speeds up WHERE clause evaluations.

Enhanced Join Performance: Accelerates JOIN operations between tables.

When to Use Indexes

On columns frequently used in search conditions (e.g., WHERE clauses).

For columns involved in sorting (e.g., ORDER BY).

In JOIN operations on foreign keys.

When to Avoid Indexes

On small tables where indexing overhead outweighs benefits.

For columns with low cardinality (few unique values).

On columns frequently updated, as indexes require maintenance.

Best Practices for Indexing

  • Use Selective Indexes: Prioritize columns with high cardinality.

  • Limit Composite Indexes: Avoid creating indexes with too many columns.

  • Monitor and Optimize: Regularly analyze index performance.

  • Index Strategically: Balance read performance with write overhead.

ALSO READ
Blockchain 0x000 – Understanding the Fundamentals
May 21, 2020 Web3 Development

Imagine a world where strangers can exchange money, share data, or execute agreements without ever needing to trust a central authority. No banks, no intermediaries, no single point of failure yet...

Identity and Access Management (IAM)
May 11, 2020 Identity & Access Management

Who are you — and what are you allowed to do? That's the fundamental question every secure system must answer. And it's exactly what Identity and Access Management (IAM) is built to solve.

How I built a web based CPU Simulator
May 07, 2020 Pet Projects

As someone passionate about computer engineering, reverse engineering, and system internals, I've always been fascinated by what happens "under the hood" of a computer. This curiosity led me to...

Writing a Shell Code for Linux
Apr 21, 2020 Exploit Development

Shellcode is a small piece of machine code used as the payload in exploit development. In this post, we write Linux shellcode from scratch — starting with a simple exit, building up to spawning a shell, and explaining every decision along the way.

Exploiting a Stack Buffer Overflow on Windows
Apr 12, 2020 Exploit Development

In a previous tutorial we discusses how we can exploit a buffer overflow vulnerability on a Linux machine. I wen through all theories in depth and explained each step. Now today we are going to jump...

Access Control Models
Apr 08, 2020 Identity & Access Management

Access control is one of the most fundamental concepts in security. Every time you set file permissions, assign user roles, or restrict access to a resource, you're implementing some form of access control. But not all access control is created equal...

Exploiting a  Stack Buffer Overflow  on Linux
Apr 01, 2020 Exploit Development

Have you ever wondered how attackers gain control over remote servers? How do they just run some exploit and compromise a computer? If we dive into the actual context, there is no magic happening....

Basic concepts of Cryptography
Mar 01, 2020 Cryptography

Ever notice that little padlock icon in your browser's address bar? That's cryptography working silently in the background, protecting everything you do online. Whether you're sending an email,...

Common Web Application Attacks
Feb 05, 2020 Application Security

Web applications are one of the most targeted surfaces by attackers. This is primarily because they are accessible over the internet, making them exposed and potentially vulnerable. Since these...

Remote Code Execution (RCE)
Jan 02, 2020 Application Security

Remote Code Execution (RCE) is the holy grail of application security vulnerabilities. It allows an attacker to execute arbitrary code on a remote server — and the consequences are as bad as it sounds. In this post, we'll go deep into RCE across multiple languages, including PHP, Java, Python, and Node.js.