Redis6.0 learning notes

1, Introduction to Redis overview 1. NoSQL overview NoSQL refers to not only Sql, which is a non relational database. NoSQL has four categories KV key valueDocument database (bson, MongoDB)Column storage database (HBase, distributed file system)Figure relational database (storing relationships, such as Neo4j) 2. Redis introduction R ...

Posted by neoform on Tue, 01 Feb 2022 23:35:50 +0100

Caffeine, the king of local cache

introduction With the growth of business volume, the cache schemes used generally go through the following steps: 1) query DB directly without cache; 2) Data synchronization + Redis; 3) Multi level cache has three stages. In the first stage, direct DB query can only be used in small traffic scenarios. With the increase of QPS, cache needs to ...

Posted by networkthis on Tue, 01 Feb 2022 15:14:40 +0100

Spring Cache + Redis implements caching

Spring Boot cache Several important concepts & cache annotation CacheCache interface, which defines cache operations. Implementations include RedisCache, EhCacheCache, ConcurrentMapCache, etcCacheManagerThe Cache manager manages various Cache components@CacheableIt is mainly for method configuration, and the results can be cached accordin ...

Posted by chriskiely on Sun, 30 Jan 2022 01:04:37 +0100

Take you hand in hand to disassemble the LRU algorithm

Take you hand in hand to disassemble the LRU algorithm summary LRU algorithm is a cache elimination strategy. The principle is not difficult, but it is more skilled to write bug free algorithms in the interview. It needs to abstract and disassemble the data structure layer by layer. labuladong in this paper will write you beautiful code. ...

Posted by lakshmiyb on Fri, 28 Jan 2022 15:25:20 +0100

mybatis source code analysis extension of L2 cache

1, Review the contents of L2 cache The L2 cache is built on the L1 cache. When receiving the query request, MyBatis will query the L2 cache first. If the L2 cache is not alive In, query the level-1 cache again. If there is no level-1 cache, query the database again. L2 cache - > L1 cache - > database. Unlike the L1 Cache, the L2 Cach ...

Posted by vikette on Wed, 26 Jan 2022 18:44:04 +0100

Summary of Redis | Day5 and Java operation in seven days

1. jedis class 1. First, we need to import the jedis package Latest jedis After that, we put it into the directory at the same level as src, and then right-click the item to find: Next, let's test. At the beginning, I encountered such a problem The reason is that I didn't open the server, so you must remember to open the server. Now let ...

Posted by cmburns69 on Wed, 26 Jan 2022 04:40:30 +0100

Redis learning notes

Redis detailed notes Notes: the Redis course of crazy talking about Java in station B: https://www.bilibili.com/video/BV1S54y1R7SB 1, NoSQL overview 1. Why use NoSQL Now is the era of big data (data that cannot be solved by ordinary databases: big data (mass storage and parallel computing)) SQL => NoSQL 1. Bottleneck in sta ...

Posted by vijdev on Sat, 22 Jan 2022 04:37:34 +0100

Redis cache design and performance optimization

1, Multilevel cache architecture 2, Cache design 1. Cache penetration Cache penetration refers to querying a data that does not exist at all, and neither the cache layer nor the storage layer will hit. Generally, for the sake of fault tolerance, if the data cannot be found from the storage layer, it will not be written to the cache layer. ...

Posted by loureiro on Fri, 21 Jan 2022 14:22:26 +0100

Chapter V use of documents

Chapter V use of documents Use file %Library. The file class provides several class methods that allow various operations on files. Copy file To copy a file, use the CopyFile() method, which returns a Boolean value indicating success or failure. This method takes four parameters: from - specifies the name of the source file.T ...

Posted by PolyPill on Tue, 18 Jan 2022 19:42:51 +0100

Redis source code [sds] [redis source code]

redis string source code analysis For details, please refer to the redis source code SDS H this file /* Note: sdshdr5 is never used, we just access the flags byte directly. * However is here to document the layout of type 5 SDS strings. */ /* In all structures: * len Indicates the length used * alloc Indicates the usable length * ...

Posted by zzz on Tue, 18 Jan 2022 02:37:55 +0100