There must be no cache and data that cannot be queried. Because the cache is written passively when it misses, and for the sake of fault tolerance, if the data cannot be found from the storage layer, it will not be written to the cache, which will cause the nonexistent data to be queried in the storage ...
Posted by scuzzo on Thu, 19 May 2022 21:57:24 +0300
In some scenarios, multiple processes must monopolize and share resources in a mutually exclusive manner. At this time, distributed locking is the most direct and effective.
With the rapid development of technology, the increase of data scale and the increasing popularity of distributed systems, an application is often deployed on mul ...
Posted by laide234 on Thu, 19 May 2022 05:32:16 +0300
1, Preparatory work
The redis compressed package of 5.0.4 can be downloaded from the official website. linux environment
2, Unzip and install
1. Create 6 new folders to install redis directory The directory path is / root/tools/7001
[root@my 7001]# pwd
[root@my 7001]# ls
2. Unzip and install redis
Posted by sarijit on Thu, 19 May 2022 00:34:17 +0300
Note: This article is a little long, so I suggest you download the source code to learn. (please collect if necessary! Please state the source of reprint, thank you!)
Code download: https://gitee.com/hong99/spring/issues/I1N1DF
Following the above< spring cache - distributed cache>;
About jmeter configuration
jmeter is an ...
Posted by jahwobbler on Wed, 18 May 2022 08:43:34 +0300
In addition to caching, Redis can also do many things: distributed locking, flow limiting, idempotency of request processing interface... Too much, too much ~Today, I want to talk with my friends about how to use Redis to deal with interface current limitation. This is also the knowledge point involved in the recent TienChin project. I'll bring ...
Posted by harley1387 on Tue, 17 May 2022 16:48:56 +0300
In java, we can lock with, lock with and unlock with. However, in the case of multiple processes or servers, this locking method can't work because it can't let other clients know whether they are locked or not. So we can use redis, zookeeper, etcd, etc. Redis also has an optimistic lock similar to lock redis - commodity trading The use of WATC ...
Posted by cac_azure03 on Mon, 16 May 2022 10:26:00 +0300
How to expand the capacity of Redis persistent data and cache?
If Redis is used as a cache, use consistent hash to achieve dynamic capacity expansion and reduction. If Redis is used as a persistent storage, a fixed key to nodes mapping relationship must be used. Once the number of nodes is determined, it cannot be changed. Otherwise (that is ...
Posted by Jaguar on Sun, 15 May 2022 21:29:43 +0300
Redis is a NoSQL Not Only SQL (key value)
Used to solve 3v+3 high
Massive Volume, real-time Velocity, diversity
High concurrency, high scalability and high performance
Download the zip package and unzip it to the environment folder
I use the automatic installation of pagoda panel
Directory for aut ...
Posted by ChrisBoden on Sun, 15 May 2022 10:01:55 +0300
The project team already has a distributed lock annotation (refer to the previous "note once distributed lock Annotation"), but when setting the lock expiration time, it needs to estimate the business time-consuming time. If the lock expiration time can be automatically adjusted according to the business running time, it wi ...
Posted by webhead on Tue, 10 May 2022 21:20:41 +0300
When Redis is used, it is easy to encounter problems such as massive data requiring duplicate checking and how to avoid cache penetration. In fact, these problems can be realized through BloomFilter bloom filter
Bloom Filter concept
Bloom filter is a long binary vector and a series of random mapping functions. Bloom filters can be used to r ...
Posted by fahrvergnuugen on Tue, 10 May 2022 21:15:55 +0300