Introduction to Redis HyperLog usage

(1) Introduction to HyperLogLog HyperLogLog was added at Redis version 2.8.9. The HyperLogLog algorithm is an algorithm for cardinality statistics. It only takes 12 KB of memory per HyperLogLog key to calculate the cardinality of nearly 2^64 different elements.HyperLogLog is suitable for large data volumes because it is relatively ...

Posted by jonathanellis on Wed, 17 Jul 2019 09:26:54 -0700

0713 Preview Task 2 redis Cluster

Introduction to 21.22 redis cluster Multiple redis nodes network interconnected, data sharing All nodes are master-slave (which can be multiple slaves), where services are never provided and only served as standby Processing multiple keys at once (such as mset/mget) is not supported because redis need to distribute keys evenly across nodes ...

Posted by Barand on Mon, 15 Jul 2019 09:21:38 -0700

Preliminary Exploration of Redis 02-String Data Type and Operation of Redis

String type is the simplest type, a key corresponds to a value, and Stirng type is binary safe. Redis String can contain any data, such as jpg images or serialized objects. Operation: 1,set Set the value corresponding to key to the value of String type. Example: Set a key-value pair of name=zhaojw, then get out the value of name, set name= ...

Posted by ssruprai on Sun, 14 Jul 2019 13:25:13 -0700

Link List of Redis underlying data structure

Link List of Redis underlying data structure I. Realization of Link List in Redis We all know how to insert and delete lists. If an element is inserted in the middle of an array, the memory address of all elements after that element moves backwards. Deleting is the same as inserting and deleting the last element of the data. Link list does n ...

Posted by timelf123 on Sat, 13 Jul 2019 14:53:59 -0700

Store Session of Nginx+Tomcat Load Balancing Cluster with Redis

Environment: Cent OS 7.0 (Virtual Machine Environment), Nginx 1.9.8, Redis 3.2.1 1. Background When using Nginx+Tomcat for load balancing, because Nginx distributes different requests to a Tomcat, Tomcat runs in different containers, because session s are out of sync or lost. 2. Installation and Configuration of Nginx 1. Nginx I ...

Posted by TalonFinsky on Tue, 09 Jul 2019 10:52:53 -0700

Implementation of Distributed Lock Based on Constul

When we build distributed systems, we often need to control mutually exclusive access to shared resources. At this time, we are involved in the implementation of distributed locks (also known as global locks). Based on the current tools, we have a large number of ways of implementation, such as: Redis-based implementation, Zookeeper-based imple ...

Posted by amitshah on Mon, 08 Jul 2019 13:21:16 -0700

[Redis] 5. Redis transaction processing

MULTI, EXEC, DISCARD and WATCH are the basis of Redis transactions1. The MULTI command is used to open a transaction and always returns OK.After MULTI is executed, the client can continue to send any number of commands to the server, which will not be executed immediately, but will be placed in a queue. 2. When the EXEC command is invoked, all ...

Posted by thomasd1 on Sun, 07 Jul 2019 19:03:02 -0700

C# Operation Redis Storage Base (Continuation 1)

The last article introduced the most basic method of C# manipulation of Redis, because I am learning, but also looking for information to learn, and then I write, understand, and have been supplementing, today to see a more advanced point of usage, for beginners Ha. Here I'm still using winform, or framwork 3.5. As you know from the previous b ...

Posted by Tsukasa on Mon, 01 Jul 2019 16:33:49 -0700

Building of redis 3.2.8 cluster environment

Environmental preparation centos6.7 redis3.2.8 Installation steps Step 1: Download the redis 3.2.8 installation package https://redis.io/download Step 2: Decompress the compressed package to the middle/inner_dev_env/redis-3.2.8 [root@allere /inner_dev_env/redis-3.2.8]# pwd /inner_dev_env/redis-3.2.8 Step 3: Create a new directory: redi ...

Posted by WesPear on Mon, 01 Jul 2019 11:56:25 -0700

Local access to Predix database using PH

Author: Li Hongxun, Front End Engineer, GE Digital Group scene Because of security considerations, data services do not have external IPS and ports on Predix, so we can only access app s deployed on Predix, which can cause some development inconvenience.For example, we may need to import local data into postgres, or we may want to look at ...

Posted by ming_andrada on Mon, 01 Jul 2019 10:05:43 -0700