Home Database Redis How to solve the problem when redis memory is full

How to solve the problem when redis memory is full

Jul 05, 2019 pm 03:13 PM

How to solve the problem when redis memory is full

Redis memory is full Solution:

1, increase the memory.

2, use memory elimination strategy.

3, Redis cluster.

Focus on 2 and 3:

The second point:

We know that the maxmemory parameter of the redis configuration file can control its maximum available memory size (bytes ).

So what should I do when the required memory exceeds maxmemory?

At this time, the maxmemory-policy in the configuration file comes into play.

The default value is noeviction.

Below I will list the elimination rules for deleting redis keys when the available memory is insufficient.

Rule description:

1. volatile-lru

Use the LRU algorithm to delete a key (only for keys with a set survival time)

2. allkeys-lru

Use the LRU algorithm to delete a key

3, volatile-random

Delete a key randomly (only for keys with a set survival time)

4. allkeys-random

Delete a key randomly

5.volatile-ttl

Delete the key with the latest survival time

6.noeviction

Do not delete the key, only return an error

LRU algorithm, least recently used, least recently used algorithm. That is to say, the least recently used key is deleted by default.

But you must pay attention to one thing! Redis does not accurately delete the least recently used key among all keys, but randomly selects 3 keys and deletes the least recently used key among these three keys.

Then the number 3 can also be set, and the corresponding location is maxmeory-samples in the configuration file.

3. How to do the cluster

Redis only supports single instance, memory Generally up to 10~20GB. For systems with 100 to 200GB of memory, it needs to be supported through clustering.

There are three methods of Redis clustering: client sharding, proxy sharding, and RedisCluster (more on this in a later article.)

1. Client sharding

Implement routing through business code

Advantages: You can control the sharding algorithm yourself, and the performance is better than that of the proxy

Disadvantages: High maintenance costs, expansion/shrinking and other operation and maintenance operations need to be done by yourself Research and development

2. Agent sharding

The agent program receives data requests from the business program, and distributes these requests to the correct Redis instance according to the routing rules and returns them to the business program. Implemented using middleware such as Twemproxy and Codis.

Advantages: Easy operation and maintenance, the program does not need to worry about how to connect the Redis instance

Disadvantages: It will cause performance consumption (about 20%), cannot smoothly expand/shrink, and needs to execute scripts to migrate data , inconvenient (Codis optimizes and implements pre-sharding based on Twemproxy to achieve Auto Rebalance).

3. Redis Cluster

Advantages: Official cluster solution, no central node, direct connection to the client, good performance

Disadvantages: The solution is too heavy and cannot be smoothed Expansion/reduction requires the execution of corresponding scripts, which is inconvenient, too new, and there are no corresponding mature solutions.

For more Redis-related knowledge, please visit the Redis Usage Tutorial column!

The above is the detailed content of How to solve the problem when redis memory is full. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do I choose a shard key in Redis Cluster? How do I choose a shard key in Redis Cluster? Mar 17, 2025 pm 06:55 PM

The article discusses choosing shard keys in Redis Cluster, emphasizing their impact on performance, scalability, and data distribution. Key issues include ensuring even data distribution, aligning with access patterns, and avoiding common mistakes l

How do I implement authentication and authorization in Redis? How do I implement authentication and authorization in Redis? Mar 17, 2025 pm 06:57 PM

The article discusses implementing authentication and authorization in Redis, focusing on enabling authentication, using ACLs, and best practices for securing Redis. It also covers managing user permissions and tools to enhance Redis security.

How do I use Redis for job queues and background processing? How do I use Redis for job queues and background processing? Mar 17, 2025 pm 06:51 PM

The article discusses using Redis for job queues and background processing, detailing setup, job definition, and execution. It covers best practices like atomic operations and job prioritization, and explains how Redis enhances processing efficiency.

How do I implement cache invalidation strategies in Redis? How do I implement cache invalidation strategies in Redis? Mar 17, 2025 pm 06:46 PM

The article discusses strategies for implementing and managing cache invalidation in Redis, including time-based expiration, event-driven methods, and versioning. It also covers best practices for cache expiration and tools for monitoring and automat

How do I monitor the performance of a Redis Cluster? How do I monitor the performance of a Redis Cluster? Mar 17, 2025 pm 06:56 PM

Article discusses monitoring Redis Cluster performance and health using tools like Redis CLI, Redis Insight, and third-party solutions like Datadog and Prometheus.

How do I use Redis for pub/sub messaging? How do I use Redis for pub/sub messaging? Mar 17, 2025 pm 06:48 PM

The article explains how to use Redis for pub/sub messaging, covering setup, best practices, ensuring message reliability, and monitoring performance.

How do I secure Redis against common vulnerabilities? How do I secure Redis against common vulnerabilities? Mar 17, 2025 pm 06:57 PM

Article discusses securing Redis against vulnerabilities, focusing on strong passwords, network binding, command disabling, authentication, encryption, updates, and monitoring.

How do I use Redis for session management in web applications? How do I use Redis for session management in web applications? Mar 17, 2025 pm 06:47 PM

The article discusses using Redis for session management in web applications, detailing setup, benefits like scalability and performance, and security measures.

See all articles