Note: This article is a little long, so I suggest you download the source code to learn. (please collect if necessary! Please state the source of reprint, thank you!)
Code download: https://gitee.com/hong99/spring/issues/I1N1DF
Following the above< spring cache - distributed cache>;
About jmeter configuration
jmeter is an ...
Posted by jahwobbler on Wed, 18 May 2022 08:43:34 +0300
In addition to caching, Redis can also do many things: distributed locking, flow limiting, idempotency of request processing interface... Too much, too much ~Today, I want to talk with my friends about how to use Redis to deal with interface current limitation. This is also the knowledge point involved in the recent TienChin project. I'll bring ...
Posted by harley1387 on Tue, 17 May 2022 16:48:56 +0300
In java, we can lock with, lock with and unlock with. However, in the case of multiple processes or servers, this locking method can't work because it can't let other clients know whether they are locked or not. So we can use redis, zookeeper, etcd, etc. Redis also has an optimistic lock similar to lock redis - commodity trading The use of WATC ...
Posted by cac_azure03 on Mon, 16 May 2022 10:26:00 +0300
How to expand the capacity of Redis persistent data and cache?
If Redis is used as a cache, use consistent hash to achieve dynamic capacity expansion and reduction. If Redis is used as a persistent storage, a fixed key to nodes mapping relationship must be used. Once the number of nodes is determined, it cannot be changed. Otherwise (that is ...
Posted by Jaguar on Sun, 15 May 2022 21:29:43 +0300
Redis is a NoSQL Not Only SQL (key value)
Used to solve 3v+3 high
Massive Volume, real-time Velocity, diversity
High concurrency, high scalability and high performance
Download the zip package and unzip it to the environment folder
I use the automatic installation of pagoda panel
Directory for aut ...
Posted by ChrisBoden on Sun, 15 May 2022 10:01:55 +0300
The project team already has a distributed lock annotation (refer to the previous "note once distributed lock Annotation"), but when setting the lock expiration time, it needs to estimate the business time-consuming time. If the lock expiration time can be automatically adjusted according to the business running time, it wi ...
Posted by webhead on Tue, 10 May 2022 21:20:41 +0300
When Redis is used, it is easy to encounter problems such as massive data requiring duplicate checking and how to avoid cache penetration. In fact, these problems can be realized through BloomFilter bloom filter
Bloom Filter concept
Bloom filter is a long binary vector and a series of random mapping functions. Bloom filters can be used to r ...
Posted by fahrvergnuugen on Tue, 10 May 2022 21:15:55 +0300
The last article introduced the structure of sds and how to use sds. In this chapter, we will go back to the place of reading io data to see how redis reads data from io and finally converts it into the process of executing commands. This article needs to be familiar with the previous two articles first. Students who haven't read ...
Posted by dustbuster on Tue, 10 May 2022 08:16:03 +0300
Article reprint statement: please attach a link to the original text for reprint
0. Environmental preparation
The following is my local environment:
Set up a redis environment on the local machine or server, and start it successfully! Here I use redis5.x deployed on Aliyun student computer
IDEA2020.x, E ...
Posted by nikes90 on Sat, 07 May 2022 18:42:13 +0300
Detailed business code introduction of jt project
1) Business introduction:
1.1) anonymous access
Users access jt.com via Com enters the JT home page. At this time, it is an anonymous user. If the user visits the shopping cart module or order module, the interceptor will intercept this request and redirect it to the user login page.
Posted by deepermethod on Sat, 07 May 2022 05:08:26 +0300