当前位置:网站首页>A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
2022-07-04 11:41:00 【Samsara】
A few words Redis Cache penetration 、 breakdown 、 An avalanche 、Redis sentry
This is an article that bloggers think is very easy to understand
Redis( Master slave copy , Sentinel mechanism , Cache penetration 、 Cache breakdown 、 Cache avalanche , Solve the problem of buffer penetration by using Bloom filter )
| type | Database state | Cache state |
|---|---|---|
| Cache penetration | There is no such data in the database | There is no such data in the cache |
| Cache breakdown | The database has this data | Cache single point expiration |
| Cache avalanche | The database has this data | A large number of caches have expired |
Solution
- Cache penetration :BloomFilter Intercept 、 The query results are stored in the cache and the life cycle is set ( Expiration time ) Shorter
- Cache breakdown : Due to the continuous operation of single point expired data , Therefore, you can set the hotspot data to never expire , Mutexes can also be added to restrict a large number of threads from accessing data at the same time
- Cache avalanche : Because a large number of data are expired , Therefore, it can be set randomly key The expiration time of , Cluster distribution can also query multiple key Put them in different libraries , You can also refresh the cache regularly
Redis sentry
yes Redis A process of , Monitor multiple by running independently Redis The situation of , Yes Master monitor , Also on the slave monitor , Keep it high redis The usability of . Sentinel cluster means that sentinels can also monitor each other's situation , More availability .
边栏推荐
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 10
- 2021-08-09
- Object. Assign () & JS (= >) arrow function & foreach () function
- QQ get group settings
- Definition and method of string
- Simple understanding of string
- Some tips on learning database
- iptables导致Heartbeat脑裂
- Application of slice
- Reptile learning winter vacation series (2)
猜你喜欢

CSDN documentation specification
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 21](/img/73/4050a592fdd99bf06e8fd853b157b6.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 21

Using terminal connection in different modes of virtual machine

Introduction to Lichuang EDA

Failed to configure a DataSource: ‘url‘ attribute is not specified... Bug solution

Btrace tells you how to debug online without restarting the JVM

Introduction to canoe automatic test system
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 6](/img/38/51797fcdb57159b48d0e0a72eeb580.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 6

DDS-YYDS

Summary of Shanghai Jiaotong University postgraduate entrance examination module firewall technology
随机推荐
2020 Summary - Magic year, magic me
Canoe: what is vtsystem
array_ The contains() function uses
Shift EC20 mode and switch
Supercomputing simulation research has determined a safe and effective carbon capture and storage route
R built in data set
Process communication and thread explanation
Summary of collection: (to be updated)
Alibaba cloud server connection intranet operation
TCP fast retransmission sack mechanism
Reptile learning 4 winter vacation learning series (1)
Video analysis
VPS安装Virtualmin面板
Introduction to Lichuang EDA
Here, the DDS tutorial you want | first experience of fastdds - source code compilation & Installation & Testing
Detailed explanation of classic process synchronization problems
The latest idea activation cracking tutorial, idea permanent activation code, the strongest in history
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 9
QQ get group information
Elevator dispatching (pairing project) ③