redis cluster configuration of docker in M1 mac

redis cluster configuration of docker in M1 macprefaceIn order to prevent readers from misunderstanding, this article is a personal practical note on setting up a redis cluster on a mac. The author is a mac system. Although many operations are similar to Linux, there are differences and many holes. This tutorial can also be used as a reference ...

Posted by amandas on Thu, 04 Nov 2021 10:07:26 -0700

python -- MySQL, mongodb, redis databases

1, MySQL database MySQL database notes 2, mongodb database 1, Introduction to mongodb Non relational database is a document structure, json (Dictionary Plus list), which stores large dataImmune to sql injection statement attacks. The simplest database.There are multiple libraries in mongodb. There are multiple collections in the library, an ...

Posted by chwebdesigns on Tue, 02 Nov 2021 06:24:28 -0700

Deeply analyze the characteristics and principles of Redis client Jedis

1, OpeningRedis, as a general cache model, is very popular because of its high performance. Redis version 2.x only supports stand-alone mode, and the cluster mode has been introduced since version 3.0.Redis's Java ecological clients include Jedis, Redisson and lattice. Different clients have different capabilities and use methods. This paper ma ...

Posted by newbie8899 on Mon, 01 Nov 2021 18:52:47 -0700

redisson solves oversold cases

  1. Import dependent packages of Redisson and StringRedisTemplate <!--redisson rely on--> <dependency> <groupId>org.redisson</groupId> <artifactId>redisson</artifactId> <version>2.2.13</version> </dependency> <!--StringRedisTemplate rely on--> <dependency> ...

Posted by frobak on Sun, 31 Oct 2021 04:35:48 -0700

Why does Ali have to ask Redis for an interview? Alibaba architect's Redis distributed lock actual combat sharing

1, What is a distributed lock? We all know the concept of lock when learning Java, such as synchronized lock based on JVM implementation and a set of code level locking mechanism lock provided by jdk. We often use these two locks in concurrent programming to ensure the correctness of code running in multi-threaded environment. However, these l ...

Posted by DJ Judas on Sat, 30 Oct 2021 11:10:29 -0700

Real time statistics of orders by time period (zset based on redis)

1, Demand On the C-side App, whether the user can select distribution within a certain time period requires real-time statistics of the number of orders in each period (every hour or every half an hour) in the background, and determines the distribution period that the user can select by considering the pressure requests of picking and packagi ...

Posted by jaimec on Fri, 29 Oct 2021 01:58:00 -0700

redis installation and five core data structures

  catalogue 1. redis installation 2.Redis's single thread and high performance 3. Five core data structures are most commonly used in redis Internet 3.1 common string operations 3.2 string common scenarios 3.2.1 single value cache 3.2.2 object cache 3.2.3 distributed lock 3.2.4 counter 3.2.5 counter 3.2.6 Web Cluster session shari ...

Posted by Sikk Industries on Thu, 28 Oct 2021 06:50:19 -0700

[distributed application] distributed lock learning summary

catalogue Application scenario: Basic principle: Implementation method 1: Using redis as distributed lock Implementation mode 2: Using redistribution as a distributed lock Application scenario: In current distributed applications, there are often scenarios where high concurrent traffic accesses db. In order to prevent the database from ...

Posted by RockyShark on Thu, 28 Oct 2021 06:17:25 -0700

redis source code analysis -- 6. Implementation of skip list

skiplist is a very useful data structure, which is also common in interviews. Its efficiency is basically equivalent to that of red black tree, and its coding implementation is much simpler than that of red black tree 1. How to implement a dict by yourself Unlike C + +, java and other high-level languages with built-in map, C language does ...

Posted by DamienRoche on Wed, 27 Oct 2021 08:20:37 -0700

Data elimination strategy lfu of redis

Because the elimination strategy of lru of redis focuses on the access time of keys. If it is a one-time key traversal operation, many keys that are not being accessed will remain in memory and the data that needs to be accessed immediately will be eliminated. Therefore, lfu is introduced into redis 4.0.0. lfu is optimized on the basis of lru, ...

Posted by Foser on Wed, 27 Oct 2021 07:03:49 -0700