Based on redis6 0 deployment of mini version message queue
Technical research background
As the current R & D team is in the start-up stage of the company, there is no mature operation and maintenance system, and the ability to build and maintain the mature MQ commonly seen in the market is insufficient. However, we hope to have a lightweight message system for the members of the R & D team. T ...
Added by Hellusius on Sun, 13 Feb 2022 16:37:18 +0200
Python play with data simple distributed crawler
1, Explain
Although there are many things that can be done by scratch, it is difficult to achieve large-scale distributed applications. Someone has changed the queue scheduling of the sweep and changed the starting URL from start_ It is separated from URLs and read from redis instead. Multiple clients can read the same redis at the same time, ...
Added by eranwein on Sat, 12 Feb 2022 08:24:48 +0200
07. Introduction, construction and simple use of Hadoop framework Zookeeper
Introduction, construction and simple use of Hadoop framework Zookeeper
Introduction to Zookeeper
Zookeeper is an efficient distributed coordination service, which can provide configuration information management, naming, distributed synchronization, cluster management, database switching and other services. It is not suitabl ...
Added by sameerni on Sat, 12 Feb 2022 04:23:08 +0200
Implementation of Raft protocol for learning from sentinel Leader election
Learning from sentinel Leader election and implementation of Raft protocol (Part 2)
In the last article, I introduced you to the basic process of Raft protocol and the basic process of sentinel instance work. The Sentinels perform periodic execution through the serverCron function, and then call the sentinelTimer function in serverCron to real ...
Added by Magwheel on Fri, 11 Feb 2022 07:04:52 +0200
Implementation principle of Redis cluster
1, Node
At the beginning, each Redis instance is A cluster itself. The work of connecting each node is completed through the CLUSTER MEET command. After A and B shake hands, A will spread B's information to other nodes in A's cluster through the Gossip protocol, so that other nodes can also shake hands with B;
// Cluster nodes
struct cluster ...
Added by OttoBufonto on Fri, 11 Feb 2022 03:34:10 +0200
3. Deep dive Kafka producer - Core Architecture
Deep dive kafka producer - Core Architecture
3. Deep dive KafkaProducer infrastructure
kafka has customized a set of network protocols, which can be implemented in any language to achieve the effect of pushing messages to and from kafka clusters. The clients module in the source code of kafka version 2.8.0 is the official default imple ...
Added by cparekh on Wed, 09 Feb 2022 13:36:14 +0200
Distributed -- snowflake algorithm -- use / principle / example
Original website:
brief introduction
This paper introduces the snowflake algorithm in distributed. Including: usage and principle.
The snowflake algorithm is used to generate a globally unique ID.
Principle of snowflake algorithm
Snowflake, snowflake algorithm, is a distributed ID generation algorithm open source by Twitter. Project websit ...
Added by GreenCore on Wed, 09 Feb 2022 06:35:23 +0200
Link tracking Sleuth of spring cloud Alibaba
This article mainly explains the knowledge of distributed request link tracking Sleuth in spring cloud.
Reference article: https://www.yuque.com/sunxiaping/yg511q/xc44uq
Problems under microservice architecture
In the microservicing construction of large-scale systems, a system will be divided into many modules. These modules are responsi ...
Added by rogair on Tue, 08 Feb 2022 07:40:51 +0200
Quick start Nginx
1. Introduction to Nginx
1.1 what is Nginx
nginx Chinese documents: https://www.nginx.cn/doc/
Nginx is a high-performance Http and reverse proxy web server that provides IMAP/POP3/SMTP services
Nginx features less memory, strong concurrency, simple installation and concise configuration files
1.2 reverse proxy
Forward proxy: configu ...
Added by DavidT on Tue, 08 Feb 2022 02:00:59 +0200
ReentrantLock reentrant lock
Synchronized is called implicit Lock, also known as JVM Lock, because it holds and releases locks implicitly without developer intervention. Java 1.5 introduces a new locking mechanism, in which the implementation of the Lock is based on the Lock interface:
public interface Lock {
// Lock
void lock();
// Unlock
void unlock();
// The lock ...
Added by kjl-php on Mon, 07 Feb 2022 23:16:38 +0200