Redis05: transaction processing practice
Redis transaction introduction
summary
Redis adopts the optimistic locking method for transaction control. It uses the watch command to see the given key. When exec(t commits the transaction), if the monitored key is valid for the whole connection, such as disconnecting the connection, the supervisor and transaction will be automatically clea ...
Added by Poomerio on Tue, 12 Oct 2021 03:52:38 +0300
Java seckill System IV: high concurrency optimization
This article is Optimization of Java high concurrency spike API Course notes.
Editor: IDEA
Java version: java8
Previously:
I Second kill system environment construction and DAO layer design
II Second kill system Service layer
III Second kill system web layer
High concurrency optimization analysis
Where does concurrency occur? For ...
Added by mishasoni on Thu, 07 Oct 2021 23:16:51 +0300
Grain mall advanced chapter - distributed lock and cache
1, Local cache (single project)
If it is a single project, the cache only needs to consider its current application, but in the micro service, each micro service must have a cache service, and the data update must update its own cache, which may lead to data inconsistency
Let's take a look at the process of sing ...
Added by designrandom on Mon, 04 Oct 2021 04:07:49 +0300
Redis cluster construction
brief introduction
Redis cluster adopts P2P mode, which is completely decentralized, and there is no central node or proxy node;Redis clusters do not have a unified portal. When client s connect to the cluster, they can connect to any node in the cluster. Nodes in the cluster communicate with each other (PING-PONG mechanism), and each node is ...
Added by denhamd2 on Fri, 01 Oct 2021 02:43:32 +0300
Docker Builds redis Master+Sentry
1. Principle of redis master slave + sentry
First, we need to know the consistency hash algorithm, which works by storing data clockwise to the nearest redis server, or possibly by calculating the value of the key from the hash algorithm The hash value is exactly the address value of the redis server. The reids master slave + sentry implement ...
Added by MikeL7 on Tue, 28 Sep 2021 21:22:57 +0300
Redis comprehensive learning
Docker installation Redis
Create a Redis network
docker network create redis
Run redis container
docker run --name master-redis \
--net redis \
-v C:\Users\Administrator\Desktop\redis\data:/data \
-v C:\Users\Administrator\Desktop\redis\conf:/usr/local/etc/redis \
-d redis redis-server /usr/local/etc/redis/redis.conf
Use scaffold con ...
Added by dips_007 on Fri, 24 Sep 2021 18:25:03 +0300
Introduction and basic usage of Redis's five basic data types
Redis five data types
Redis key basic command
set key name -- Set a basic key value pair
keys * -- View all keys
exists key -- View the corresponding key Does it exist
move key Number of corresponding database -- Put this key Move the corresponding data to another database
expire key Expiration time(Unit second) -- Set how long this d ...
Added by colake on Tue, 21 Sep 2021 14:39:22 +0300
Deeply understand the features of redis and the performance testing tool redis benchmark
What is redis
Redis is an open source (BSD licensed) in memory data structure storage system, which can be used as database, cache and message middleware. It supports many types of data structures, such as strings, hashes, lists, sets, sorted sets And range query, bitmaps, hyperloglogs and geospatial Index radius query. Redis has built ...
Added by Karlos2394 on Tue, 21 Sep 2021 00:49:26 +0300
Common Redis commands
1, Redis global command operation
1. View all keys
keys *
-- Fuzzy search queries can also be used, but generally they are not pushed
keys s*
2. View the total number of keys
dbsize
3. Check if the key exists
exists key
4. Delete key to return the number of deleted entries
del key
5. Key expiration
Return the remaining expiration ...
Added by carlosx2 on Mon, 20 Sep 2021 18:37:25 +0300
Simple bloom filter with Redis Bitmap
Before An article In, we have deeply understood the basic principle of Bloom filter and learned that it has many applications in cache system. The Bitmap provided by Redis can just be used as the basis of the bit group required by the bloom filter. This paper first briefly introduces the Bitmap, and then gives the implementation of the bloom fi ...
Added by chancho on Fri, 17 Sep 2021 17:29:34 +0300