spring cache - (CACHE penetration, cache breakdown, cache avalanche, hot data)

Note: This article is a little long, so I suggest you download the source code to learn. (please collect if necessary! Please state the source of reprint, thank you!) Code download: https://gitee.com/hong99/spring/issues/I1N1DF background Following the above< spring cache - distributed cache>; About jmeter configuration jmeter is an ...

Posted by jahwobbler on Wed, 18 May 2022 08:43:34 +0300

Redis does interface current limiting, which is an annotation!

In addition to caching, Redis can also do many things: distributed locking, flow limiting, idempotency of request processing interface... Too much, too much ~Today, I want to talk with my friends about how to use Redis to deal with interface current limitation. This is also the knowledge point involved in the recent TienChin project. I'll bring ...

Posted by harley1387 on Tue, 17 May 2022 16:48:56 +0300

redis - distributed lock

In java, we can lock with, lock with and unlock with. However, in the case of multiple processes or servers, this locking method can't work because it can't let other clients know whether they are locked or not. So we can use redis, zookeeper, etcd, etc. Redis also has an optimistic lock similar to lock redis - commodity trading The use of WATC ...

Posted by cac_azure03 on Mon, 16 May 2022 10:26:00 +0300

Redis's capacity expansion, expiration deletion, update strategy and elimination mechanism

How to expand the capacity of Redis persistent data and cache? If Redis is used as a cache, use consistent hash to achieve dynamic capacity expansion and reduction. If Redis is used as a persistent storage, a fixed key to nodes mapping relationship must be used. Once the number of nodes is determined, it cannot be changed. Otherwise (that is ...

Posted by Jaguar on Sun, 15 May 2022 21:29:43 +0300

Redis learning notes

Redis is a NoSQL Not Only SQL (key value) NoSQL Used to solve 3v+3 high Massive Volume, real-time Velocity, diversity High concurrency, high scalability and high performance Redis Download Windows Download the zip package and unzip it to the environment folder Linux I use the automatic installation of pagoda panel Directory for aut ...

Posted by ChrisBoden on Sun, 15 May 2022 10:01:55 +0300

redis distributed locks automatically extend expiration time

background The project team already has a distributed lock annotation (refer to the previous "note once distributed lock Annotation"), but when setting the lock expiration time, it needs to estimate the business time-consuming time. If the lock expiration time can be automatically adjusted according to the business running time, it wi ...

Posted by webhead on Tue, 10 May 2022 21:20:41 +0300

Redis's BloomFilter is a powerful tool to avoid cache penetration

When Redis is used, it is easy to encounter problems such as massive data requiring duplicate checking and how to avoid cache penetration. In fact, these problems can be realized through BloomFilter bloom filter Bloom Filter concept Bloom filter is a long binary vector and a series of random mapping functions. Bloom filters can be used to r ...

Posted by fahrvergnuugen on Tue, 10 May 2022 21:15:55 +0300

Redis series, how redis executes commands

preface The last article introduced the structure of sds and how to use sds. In this chapter, we will go back to the place of reading io data to see how redis reads data from io and finally converts it into the process of executing commands. This article needs to be familiar with the previous two articles first. Students who haven't read ...

Posted by dustbuster on Tue, 10 May 2022 08:16:03 +0300

Springboot integrates Redis as the secondary cache of Mybatis

Article reprint statement: please attach a link to the original text for reprint 0. Environmental preparation The following is my local environment: SpringBoot2.3.x Mybatis3.x Redis5.x Set up a redis environment on the local machine or server, and start it successfully! Here I use redis5.x deployed on Aliyun student computer IDEA2020.x, E ...

Posted by nikes90 on Sat, 07 May 2022 18:42:13 +0300

jt project summary draft

Detailed business code introduction of jt project 1) Business introduction: 1.1) anonymous access ~~~~ Users access jt.com via Com enters the JT home page. At this time, it is an anonymous user. If the user visits the shopping cart module or order module, the interceptor will intercept this request and redirect it to the user login page. Speci ...

Posted by deepermethod on Sat, 07 May 2022 05:08:26 +0300