Introduction to Redis HyperLog usage
(1) Introduction to HyperLogLog
HyperLogLog was added at Redis version 2.8.9. The HyperLogLog algorithm is an algorithm for cardinality statistics. It only takes 12 KB of memory per HyperLogLog key to calculate the cardinality of nearly 2^64 different elements.HyperLogLog is suitable for large data volumes because it is relatively ...
Posted by jonathanellis on Wed, 17 Jul 2019 09:26:54 -0700
0713 Preview Task 2 redis Cluster
Introduction to 21.22 redis cluster
Multiple redis nodes network interconnected, data sharing
All nodes are master-slave (which can be multiple slaves), where services are never provided and only served as standby
Processing multiple keys at once (such as mset/mget) is not supported because redis need to distribute keys evenly across nodes ...
Posted by Barand on Mon, 15 Jul 2019 09:21:38 -0700
Preliminary Exploration of Redis 02-String Data Type and Operation of Redis
String type is the simplest type, a key corresponds to a value, and Stirng type is binary safe. Redis String can contain any data, such as jpg images or serialized objects.
Operation:
1,set
Set the value corresponding to key to the value of String type.
Example: Set a key-value pair of name=zhaojw, then get out the value of name, set name= ...
Posted by ssruprai on Sun, 14 Jul 2019 13:25:13 -0700
Link List of Redis underlying data structure
Link List of Redis underlying data structure
I. Realization of Link List in Redis
We all know how to insert and delete lists. If an element is inserted in the middle of an array, the memory address of all elements after that element moves backwards. Deleting is the same as inserting and deleting the last element of the data. Link list does n ...
Posted by timelf123 on Sat, 13 Jul 2019 14:53:59 -0700
Store Session of Nginx+Tomcat Load Balancing Cluster with Redis
Environment: Cent OS 7.0 (Virtual Machine Environment), Nginx 1.9.8, Redis 3.2.1
1. Background
When using Nginx+Tomcat for load balancing, because Nginx distributes different requests to a Tomcat, Tomcat runs in different containers, because session s are out of sync or lost.
2. Installation and Configuration of Nginx
1. Nginx I ...
Posted by TalonFinsky on Tue, 09 Jul 2019 10:52:53 -0700
Implementation of Distributed Lock Based on Constul
When we build distributed systems, we often need to control mutually exclusive access to shared resources. At this time, we are involved in the implementation of distributed locks (also known as global locks). Based on the current tools, we have a large number of ways of implementation, such as: Redis-based implementation, Zookeeper-based imple ...
Posted by amitshah on Mon, 08 Jul 2019 13:21:16 -0700
[Redis] 5. Redis transaction processing
MULTI, EXEC, DISCARD and WATCH are the basis of Redis transactions1. The MULTI command is used to open a transaction and always returns OK.After MULTI is executed, the client can continue to send any number of commands to the server, which will not be executed immediately, but will be placed in a queue.
2. When the EXEC command is invoked, all ...
Posted by thomasd1 on Sun, 07 Jul 2019 19:03:02 -0700
C# Operation Redis Storage Base (Continuation 1)
The last article introduced the most basic method of C# manipulation of Redis, because I am learning, but also looking for information to learn, and then I write, understand, and have been supplementing, today to see a more advanced point of usage, for beginners Ha.
Here I'm still using winform, or framwork 3.5. As you know from the previous b ...
Posted by Tsukasa on Mon, 01 Jul 2019 16:33:49 -0700
Building of redis 3.2.8 cluster environment
Environmental preparation
centos6.7
redis3.2.8
Installation steps
Step 1: Download the redis 3.2.8 installation package https://redis.io/download
Step 2: Decompress the compressed package to the middle/inner_dev_env/redis-3.2.8
[root@allere /inner_dev_env/redis-3.2.8]# pwd
/inner_dev_env/redis-3.2.8
Step 3: Create a new directory: redi ...
Posted by WesPear on Mon, 01 Jul 2019 11:56:25 -0700
Local access to Predix database using PH
Author: Li Hongxun, Front End Engineer, GE Digital Group
scene
Because of security considerations, data services do not have external IPS and ports on Predix, so we can only access app s deployed on Predix, which can cause some development inconvenience.For example, we may need to import local data into postgres, or we may want to look at ...
Posted by ming_andrada on Mon, 01 Jul 2019 10:05:43 -0700