当前位置:网站首页>A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
2022-07-04 11:41:00 【Samsara】
A few words Redis Cache penetration 、 breakdown 、 An avalanche 、Redis sentry
This is an article that bloggers think is very easy to understand
Redis( Master slave copy , Sentinel mechanism , Cache penetration 、 Cache breakdown 、 Cache avalanche , Solve the problem of buffer penetration by using Bloom filter )
| type | Database state | Cache state |
|---|---|---|
| Cache penetration | There is no such data in the database | There is no such data in the cache |
| Cache breakdown | The database has this data | Cache single point expiration |
| Cache avalanche | The database has this data | A large number of caches have expired |
Solution
- Cache penetration :BloomFilter Intercept 、 The query results are stored in the cache and the life cycle is set ( Expiration time ) Shorter
- Cache breakdown : Due to the continuous operation of single point expired data , Therefore, you can set the hotspot data to never expire , Mutexes can also be added to restrict a large number of threads from accessing data at the same time
- Cache avalanche : Because a large number of data are expired , Therefore, it can be set randomly key The expiration time of , Cluster distribution can also query multiple key Put them in different libraries , You can also refresh the cache regularly
Redis sentry
yes Redis A process of , Monitor multiple by running independently Redis The situation of , Yes Master monitor , Also on the slave monitor , Keep it high redis The usability of . Sentinel cluster means that sentinels can also monitor each other's situation , More availability .
边栏推荐
- First knowledge of spark - 7000 words +15 diagrams, and learn the basic knowledge of spark
- Common tips
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 9
- C language compilation process
- Foreach (system.out:: println) usage
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 23
- Using terminal connection in different modes of virtual machine
- regular expression
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 14
- Reptile learning 3 (winter vacation learning)
猜你喜欢
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8](/img/16/33f5623625ba817e6e022b5cb7ff5d.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8

Oracle11g | getting started with database. It's enough to read this 10000 word analysis
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22](/img/e0/21367eeaeca10c0a2f2aab3a4fa1fb.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22

(2021-08-20) web crawler learning 2

Take advantage of the world's sleeping gap to improve and surpass yourself -- get up early

Foreach (system.out:: println) usage
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 10](/img/89/1c2f98973b79e8d181c10d7796fbb5.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 10

Summary of collection: (to be updated)
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16](/img/c3/f3746b161012acc3751b2bd0b8f663.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 5](/img/68/4f92ca7cbdb90a919711b86d401302.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 5
随机推荐
JD home programmers delete databases and run away. Talk about binlog, the killer of MySQL data backup
Xiaobing · beauty appraisal
How to judge the advantages and disadvantages of low code products in the market?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16
Shift EC20 mode and switch
Usage of case when then else end statement
CSDN documentation specification
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
QQ group administrators
Simple understanding of seesion, cookies, tokens
R built in data set
Heartbeat error attempted replay attack
re. Sub() usage
TCP fast retransmission sack mechanism
Test question bank management system - database design [easy to understand]
2020 Summary - Magic year, magic me
regular expression
Reptile learning 3 (winter vacation learning)
Entitas learning [3] multi context system
Application of slice