Based on redis6 0 deployment of mini version message queue

Technical research background As the current R & D team is in the start-up stage of the company, there is no mature operation and maintenance system, and the ability to build and maintain the mature MQ commonly seen in the market is insufficient. However, we hope to have a lightweight message system for the members of the R & D team. T ...

Added by Hellusius on Sun, 13 Feb 2022 16:37:18 +0200

Python play with data simple distributed crawler

1, Explain Although there are many things that can be done by scratch, it is difficult to achieve large-scale distributed applications. Someone has changed the queue scheduling of the sweep and changed the starting URL from start_ It is separated from URLs and read from redis instead. Multiple clients can read the same redis at the same time, ...

Added by eranwein on Sat, 12 Feb 2022 08:24:48 +0200

07. Introduction, construction and simple use of Hadoop framework Zookeeper

Introduction, construction and simple use of Hadoop framework Zookeeper Introduction to Zookeeper    Zookeeper is an efficient distributed coordination service, which can provide configuration information management, naming, distributed synchronization, cluster management, database switching and other services. It is not suitabl ...

Added by sameerni on Sat, 12 Feb 2022 04:23:08 +0200

Implementation of Raft protocol for learning from sentinel Leader election

Learning from sentinel Leader election and implementation of Raft protocol (Part 2) In the last article, I introduced you to the basic process of Raft protocol and the basic process of sentinel instance work. The Sentinels perform periodic execution through the serverCron function, and then call the sentinelTimer function in serverCron to real ...

Added by Magwheel on Fri, 11 Feb 2022 07:04:52 +0200

Implementation principle of Redis cluster

1, Node At the beginning, each Redis instance is A cluster itself. The work of connecting each node is completed through the CLUSTER MEET command. After A and B shake hands, A will spread B's information to other nodes in A's cluster through the Gossip protocol, so that other nodes can also shake hands with B; // Cluster nodes struct cluster ...

Added by OttoBufonto on Fri, 11 Feb 2022 03:34:10 +0200

3. Deep dive Kafka producer - Core Architecture

Deep dive kafka producer - Core Architecture 3. Deep dive KafkaProducer infrastructure kafka has customized a set of network protocols, which can be implemented in any language to achieve the effect of pushing messages to and from kafka clusters. The clients module in the source code of kafka version 2.8.0 is the official default imple ...

Added by cparekh on Wed, 09 Feb 2022 13:36:14 +0200

Distributed -- snowflake algorithm -- use / principle / example

Original website: brief introduction This paper introduces the snowflake algorithm in distributed. Including: usage and principle. The snowflake algorithm is used to generate a globally unique ID. Principle of snowflake algorithm Snowflake, snowflake algorithm, is a distributed ID generation algorithm open source by Twitter. Project websit ...

Added by GreenCore on Wed, 09 Feb 2022 06:35:23 +0200

Link tracking Sleuth of spring cloud Alibaba

This article mainly explains the knowledge of distributed request link tracking Sleuth in spring cloud. Reference article: https://www.yuque.com/sunxiaping/yg511q/xc44uq Problems under microservice architecture In the microservicing construction of large-scale systems, a system will be divided into many modules. These modules are responsi ...

Added by rogair on Tue, 08 Feb 2022 07:40:51 +0200

Quick start Nginx

1. Introduction to Nginx 1.1 what is Nginx nginx Chinese documents: https://www.nginx.cn/doc/ Nginx is a high-performance Http and reverse proxy web server that provides IMAP/POP3/SMTP services Nginx features less memory, strong concurrency, simple installation and concise configuration files 1.2 reverse proxy Forward proxy: configu ...

Added by DavidT on Tue, 08 Feb 2022 02:00:59 +0200

ReentrantLock reentrant lock

Synchronized is called implicit Lock, also known as JVM Lock, because it holds and releases locks implicitly without developer intervention. Java 1.5 introduces a new locking mechanism, in which the implementation of the Lock is based on the Lock interface: public interface Lock { // Lock void lock(); // Unlock void unlock(); // The lock ...

Added by kjl-php on Mon, 07 Feb 2022 23:16:38 +0200