Redis05: transaction processing practice

Redis transaction introduction summary Redis adopts the optimistic locking method for transaction control. It uses the watch command to see the given key. When exec(t commits the transaction), if the monitored key is valid for the whole connection, such as disconnecting the connection, the supervisor and transaction will be automatically clea ...

Added by Poomerio on Tue, 12 Oct 2021 03:52:38 +0300

Java seckill System IV: high concurrency optimization

This article is Optimization of Java high concurrency spike API Course notes. Editor: IDEA Java version: java8 Previously: I Second kill system environment construction and DAO layer design II Second kill system Service layer III Second kill system web layer High concurrency optimization analysis Where does concurrency occur? For ...

Added by mishasoni on Thu, 07 Oct 2021 23:16:51 +0300

Grain mall advanced chapter - distributed lock and cache

1, Local cache (single project)      If it is a single project, the cache only needs to consider its current application, but in the micro service, each micro service must have a cache service, and the data update must update its own cache, which may lead to data inconsistency Let's take a look at the process of sing ...

Added by designrandom on Mon, 04 Oct 2021 04:07:49 +0300

Redis cluster construction

brief introduction Redis cluster adopts P2P mode, which is completely decentralized, and there is no central node or proxy node;Redis clusters do not have a unified portal. When client s connect to the cluster, they can connect to any node in the cluster. Nodes in the cluster communicate with each other (PING-PONG mechanism), and each node is ...

Added by denhamd2 on Fri, 01 Oct 2021 02:43:32 +0300

Docker Builds redis Master+Sentry

1. Principle of redis master slave + sentry First, we need to know the consistency hash algorithm, which works by storing data clockwise to the nearest redis server, or possibly by calculating the value of the key from the hash algorithm The hash value is exactly the address value of the redis server. The reids master slave + sentry implement ...

Added by MikeL7 on Tue, 28 Sep 2021 21:22:57 +0300

Redis comprehensive learning

Docker installation Redis Create a Redis network docker network create redis Run redis container docker run --name master-redis \ --net redis \ -v C:\Users\Administrator\Desktop\redis\data:/data \ -v C:\Users\Administrator\Desktop\redis\conf:/usr/local/etc/redis \ -d redis redis-server /usr/local/etc/redis/redis.conf Use scaffold con ...

Added by dips_007 on Fri, 24 Sep 2021 18:25:03 +0300

Introduction and basic usage of Redis's five basic data types

Redis five data types Redis key basic command set key name -- Set a basic key value pair keys * -- View all keys exists key -- View the corresponding key Does it exist move key Number of corresponding database -- Put this key Move the corresponding data to another database expire key Expiration time(Unit second) -- Set how long this d ...

Added by colake on Tue, 21 Sep 2021 14:39:22 +0300

Deeply understand the features of redis and the performance testing tool redis benchmark

What is redis Redis is an open source (BSD licensed) in memory data structure storage system, which can be used as database, cache and message middleware. It supports many types of data structures, such as strings, hashes, lists, sets, sorted sets And range query, bitmaps, hyperloglogs and geospatial Index radius query. Redis has built ...

Added by Karlos2394 on Tue, 21 Sep 2021 00:49:26 +0300

Common Redis commands

1, Redis global command operation 1. View all keys keys * -- Fuzzy search queries can also be used, but generally they are not pushed keys s* 2. View the total number of keys dbsize 3. Check if the key exists exists key 4. Delete key to return the number of deleted entries del key 5. Key expiration Return the remaining expiration ...

Added by carlosx2 on Mon, 20 Sep 2021 18:37:25 +0300

Simple bloom filter with Redis Bitmap

Before An article In, we have deeply understood the basic principle of Bloom filter and learned that it has many applications in cache system. The Bitmap provided by Redis can just be used as the basis of the bit group required by the bloom filter. This paper first briefly introduces the Bitmap, and then gives the implementation of the bloom fi ...

Added by chancho on Fri, 17 Sep 2021 17:29:34 +0300