I believe that the biggest motivation for many people to learn distributed locks is not their own system needs, but the needs of interviewers... Of course, this also shows that the distribution lock is very important. It is often used as an examination question. Before learning, we need to clarify several questions.
Posted by Virii on Thu, 03 Mar 2022 13:15:01 +0100
What is the purpose of redis distributed lock to solve?
In order to solve the problem that synchronized can not achieve synchronization in distributed situations, because synchronized synchronization is the method of one jvm, which can not be done by multiple JVMs.
1. Implement the inventory reduction scenario of redis basic business
Posted by ryan-uk on Thu, 17 Feb 2022 22:49:29 +0100
Etcd distributed lock is not a function api provided by etcd server, but a tool for integrating various features (lease, watch, mvcc, etc.) based on etcd.In the same process, in order to avoid data competition for shared variables, it can usually be avoided by locking and unlocking. However, if multiple processes operate on the same resource, o ...
Posted by iovidiu on Thu, 10 Feb 2022 11:17:10 +0100
First knowledge of distributed lock (II): analysis of ZooKeeper distributed lock principle and practical cases
It's not easy to write. Praise and collect attention so that you can see it next time. Thank you for your support ~
Last time we talked about using Mysql database to realize distributed locking. It is relatively simple to implem ...
Posted by mattvenables on Tue, 01 Feb 2022 01:27:39 +0100
Understanding of using distributed locks
Each distributed lock has its advantages and disadvantages. In extreme cases, such as NPC, there may be wrong results and it is unsafe, as shown in the figure below (both clients think they have obtained the lock),
NPC refers to Network Delay; Process Pause, Process Pause (GC) [such as JAVA GC]; Clock ...
Why do I need distributed locks
In the concurrent scenario, it is necessary to use locks to mutually exclusive access to shared resources to ensure thread safety; Similarly, in the distributed scenario, a mechanism is also needed to ensure mutually exclusive access to multi node shared resources. The implementation mechanism is distributed loc ...
Posted by deerly on Mon, 24 Jan 2022 06:18:40 +0100
This article aims to share experience and welcome your comments
1. Second kill 2. Grab coupons 3. Interface idempotency check
Summary: grab resources
1. Single lock -- > to distributed lock
synchronized () is no longer described here
1.1. Based on opsforvalue() Setifabsent() implementation
Posted by millwardt on Thu, 20 Jan 2022 20:37:22 +0100
Distributed locks are generally implemented in three ways: 1 Database lock; 2. Redis based distributed locks; 3. Distributed lock based on ZooKeeper. This blog will introduce the second way to implement distributed locks based on redis. Although there are various blogs on the Internet that introduce the implementation of redis distribu ...
Posted by Draco_03 on Sat, 15 Jan 2022 14:14:47 +0100
Content introduction Cache penetration refers to data that does not exist in the cache or database, but users constantly initiate requests, such as data with id of "- 1" or data with id of particularly large and nonexistent. At this time, the user is likely to be an attacker, and the attack ...
Posted by vikramjeet.singla on Wed, 29 Dec 2021 15:59:39 +0100
summaryProject address: https://github.com/snower/slockWhat is a state and atomic operations database? Unlike redis, which is mainly used to save data and can efficiently synchronize data between multiple nodes and systems, slock is designed to only save synchronization status and can hardly carry data. The high-performance asynchronous binary ...
Posted by thelinx on Wed, 22 Dec 2021 23:16:28 +0100