当前位置:网站首页>Redis cache breakdown, cache penetration, cache avalanche
Redis cache breakdown, cache penetration, cache avalanche
2022-07-06 03:07:00 【Attacking Xiao Wang 666】
Cache penetration
a large number of key Not in cache , The request goes directly to the database , and key It's not in the database ( Finally back to null, A meaningless query ), If hackers create such a large number of request attacks , Cache penetration may occur
Solution :
1. You can verify at the front end or back end , Filter illegal requests , For example, judge whether the request has been tampered by the summary Algorithm
2. Invalid cache key, Set a shorter effective time ( Not recommended )
3. The bloon filter , A very clever data structure , The concrete realization is :
Store all possible request values in the bloom filter , When requested by the user , First, judge whether the value exists through the bloom filter , If no error message is returned directly .
The process is as follows
When stored , Through multiple hash Function calculation , Then set the corresponding position of the bit array to 1
When comparing , The use of multiple hash The algorithm calculates the request parameters , Judge whether each element at the corresponding position in the digit group is 1, If there is any inconformity, it will be judged as fasle
Of course , Different strings may be hashed out in the same position ( You can appropriately increase the size of the digit group or adjust hash function )
Cache avalanche
It is caused by memory server downtime or simultaneous failure of a large number of hotspot caches at the same time , The request landed in the database
Solution :
1. For server downtime , It can be distributed ( Master-slave ) To improve usability , Or current limiting , Prevent a large number of requests for access at the same time
2. For hotspot cache invalidation , It can be set to never expire ( Not recommended ), Or set the expiration time randomly ( Peak staggering failure )
Cache breakdown
Cache avalanche is aimed at the situation that a large number of caches for different requests are invalidated , Cache breakdown refers to the situation that a large number of requests are the same and the cache fails
Solution :
Hotspot cache does not expire
Use mutexes , Only one request thread can reload the results into the cache after the cache expires , Other threads wait , Finally, query from the cache .
边栏推荐
- 【 kubernets series】 a Literature Study on the Safe exposure Applications of kubernets Service
- [kubernetes series] learn the exposed application of kubernetes service security
- Differences and usage scenarios between TCP and UDP
- 淘宝焦点图布局实战
- My C language learning record (blue bridge) -- on the pointer
- CSP numeric sort
- Maturity of master data management (MDM)
- codeforces每日5题(均1700)-第六天
- 电机控制反Park变换和反Clarke变换公式推导
- Handwriting database client
猜你喜欢

Performance test method of bank core business system
![Huawei, H3C, Cisco command comparison, mind map form from the basic, switching, routing three directions [transferred from wechat official account network technology alliance station]](/img/3b/385d19e51340ecd6281df47b39f40c.png)
Huawei, H3C, Cisco command comparison, mind map form from the basic, switching, routing three directions [transferred from wechat official account network technology alliance station]

Referenceerror: primordials is not defined error resolution

深入探究指针及指针类型

NR modulation 1

What is the investment value of iFLYTEK, which does not make money?

【 kubernets series】 a Literature Study on the Safe exposure Applications of kubernets Service

适合程序员学习的国外网站推荐

Codeworks 5 questions per day (1700 average) - day 6

CobaltStrike-4.4-K8修改版安装使用教程
随机推荐
如何精准识别主数据?
Handwriting database client
IPv6 jobs
Codeworks 5 questions per day (1700 average) - day 6
My C language learning record (blue bridge) -- under the pointer
Fault analysis | analysis of an example of MySQL running out of host memory
Microservice registration and discovery
Introduction to robotframework (I) brief introduction and use
Single instance mode of encapsulating PDO with PHP in spare time
[pointer training - eight questions]
有没有完全自主的国产化数据库技术
codeforces每日5題(均1700)-第六天
这些不太会
Installation and use tutorial of cobaltstrike-4.4-k8 modified version
07 单件(Singleton)模式
原型图设计
NR modulation 1
Analyze menu analysis
建模规范:命名规范
Function knowledge points