


One article to understand the five major data types and application scenarios of Redis
❝Learning knowledge points in this article Redis five major data types: string, hash, list, set, sorted_set The application scenarios of each of the five major types
❞
Foreword
❝Kaka compiled a roadmap to create an interview guide, and prepared to write articles according to this roadmap. Later, I found that I was adding knowledge points that were not supplemented. I also look forward to your partners joining in to help add some information. See you in the comments section!
❞

1. string type
1-1 Basic operations of string type data
Add/modify data:set key value
Get data:get key
Delete data:del key
Add/modify multiple data: mset key value key1 value1
Get multiple data: mget key key1
Append information to the end of the original data (add it if it does not exist): append key value
##1-2 String type increase and decrease operations
Set the value to increase the value in the specified range:incr key defaults to increase by 1 each time | incrby key value each time a new value is addedSet the data to decrease the specified range:
decr key | decrby key value is the same as adding new one
「Application scenario」
Control the primary key id of the database table, which is the database table Provides primary key generation strategies to ensure the consistency of primary keys in data tables.1-3 string type aging operation
Set expiration time:setex key seconds value
「Application Scenario」
Implement the time-limited voting function: for example, a WeChat account can vote once an hour Realize hot information: such as popular products in the e-commerce industry and popular news on news websites1-4 String type application scenarios
#High-frequency visits to the homepage of Weibo big V, for the number of fans and followers , Weibo numbers need to be updated from time to time. This is high-frequency information, and we can use the string type of redis to solve it. Set user information for Big V in redis, using the user's primary key and attributes as key values. The following is an implementation case.
Here we need to briefly talk about the key naming rules: table name primary key primary key value field: field value. Naming according to such rules can manage our key values very well.
We can also use another way to achieve it, which is to directly follow the key with a structure. For example, The above two methods can be implemented, but the first one can be very convenient for any One value is managed, and the second is that you have to change it once every time. Depending on the business scenario, just refresh it regularly.
2. Hash type
2-1 hash type data Basic operations
#Add/modify data:hset key field value
Get data: hget key field
| hgetall key
Delete data: hdel key field field1
Add / Modify multiple data: hmset key field value field1 value1
Get multiple data: hmget key field field1
Get the number of fields in the table : hlen key
Get whether a field exists in the table: hexists key field
2- 2 Extended operations for hash type data
Get all field values in the hash table: hkeys key
Get all field values in the hash table: hvals key
Set the value of the specified field and increase the value of the specified range: hincrby key field increment
| hincrbyfloat key field increment
##2-3 hash business scenario shopping cart
Source of this picture Since the network is not self-made, it just simulates the shopping cart scenarioIn the above picture, we can see the information in the shopping cart. Next, we use redis to implement this shopping cart.
In the above picture, we will have a problem that the product information storage will be repeated in large quantities. All We also need to hash the products individually. As shown in the figure below, only the product ID is storedThere are two setting methods, one is to set multiple fields, and the other is to store it directly as json. If the information does not change frequently, you can use json
to provide you with a method
hsetnx key field value
. If it exists, it will not be added, if not, it will be added. This function is used to prevent overwriting and useless operations when different users add the same product
3. List type
#Data storage requirements: store multiple data and distinguish the order of storage space for the data Required data structure: One storage space stores multiple data, and the entry sequence can be reflected through the data List type: Save multiple data, the bottom layer uses a doubly linked list storage structure to implement
3-1 Basic operations of list type data
Add/modify data: lpush key value value1
| rpush key value value1
Get data: lrange key start end
| lindex key index
| llen key
Delete data: rpop key
| lpop key

3-2 Extended operations for list type data
Get and remove data within the specified time: blpop key1 key2 timeout | brpop key1 key2 timeout
Write a simple case for this function , easy to understand
After the terminal command on the left is executed, it will wait for 30 seconds to return the deleted data
When the add command on the right is executed, the left side will directly return the deleted data
3-3 list business scenario
# Above we know the basic operations of list and execute lpop key or rpop key You can delete from the do or from the right, but now there is a scenario where the likes business is done in the circle of friends, and then the data is deleted from the middle. The case is as shown below
We first add a b c d to list5
Then remove c
After checking, only a b d is left
4. set type
New storage requirements: store large amounts of data and provide higher efficiency for query convenience Required storage structure: able to save large amounts of data, efficient internal storage mechanism, easy to query Set type: exactly the same as hash storage structure, only stores keys, not values (nil), and values are not allowed to be repeated

4-1 Basic operations of set type data
Add/modify data:sadd key member member1
Get data:smembers key
Delete data:srem key member1
Get Total amount of collection data: scard key
Judge whether the collection contains the specified data: sismember key member

4-2 set type data expansion operation
#Randomly obtain the specified number of data in the set: srandmember key count
Randomly obtain a certain data in the collection and remove the changed data set from the collection: spop key
4-3 Set type business scenario recommendation information
Randomly push hot information, hot news, hot-selling travel, application app recommendations, follow-up recommendations, etc.
Due to the recent Kaka Write discuz, this case is to achieve attention recommendation.
Case 1: Store corresponding users in the set according to a certain recommendation mechanism, and then randomly obtain 2 users who need to be recommended each time

Case 2: Store corresponding users in the set according to a certain recommendation mechanism, and then the users recommended every day based on the date cannot be repeated

4-4 set type business scenario mining user relationship
The intersection, union, and difference of two sets
<span style="display: block; background: url(https://my-wechat.mdnice.com/point.png); height: 30px; width: 100%; background-size: 40px; background-repeat: no-repeat; background-color: #272822; margin-bottom: -7px; border-radius: 5px; background-position: 10px 10px;"></span><code class="hljs" style="overflow-x: auto; padding: 16px; color: #ddd; display: -webkit-box; font-family: Operator Mono, Consolas, Monaco, Menlo, monospace; font-size: 12px; -webkit-overflow-scrolling: touch; letter-spacing: 0px; padding-top: 15px; background: #272822; border-radius: 5px;"><span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">sinter</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key1</span><br/><span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">sunion</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key1</span><br/><span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">sdiff</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key1</span><br/></code>
The intersection, union, and difference of two sets are stored in the specified set
<span style="display: block; background: url(https://my-wechat.mdnice.com/point.png); height: 30px; width: 100%; background-size: 40px; background-repeat: no-repeat; background-color: #272822; margin-bottom: -7px; border-radius: 5px; background-position: 10px 10px;"></span><code class="hljs" style="overflow-x: auto; padding: 16px; color: #ddd; display: -webkit-box; font-family: Operator Mono, Consolas, Monaco, Menlo, monospace; font-size: 12px; -webkit-overflow-scrolling: touch; letter-spacing: 0px; padding-top: 15px; background: #272822; border-radius: 5px;"><span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">sinterstore</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">destination</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key1</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key2</span><br/><span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">sunionstore</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">destination</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key1</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key2</span><br/><span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">sdiffstore</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">destination</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key1</span> <span class="hljs-selector-tag" style="color: #f92672; font-weight: bold; line-height: 26px;">key2</span><br/></code>
Case: We need to mine a mutual friend for information. For example, the number of jointly followed friends on WeChat public accounts, QQ’s recommendation mechanism for adding new friends, and in-depth mining of users’ direct connections
Based on the above cases, we can use difference sets to realize QQ’s friends who are likely to know each other.
4-5 set type business scenario to implement the PV UV IP record of the website
PV directly uses string type incr statistics That is,
UV and IP are independent and not repeated, use set to operate.
We know above that set has a characteristic that it cannot be repeated. We can easily implement this function based on this. Then use scar key to count the quantity.
As for UV as an independent visitor, you can use local cookies to achieve it. In the same way, pass the cookie to redis for recording
5. The sorted_set type
does not support sorting among the previous four types. The sorted_set type we will look at below supports both the storage of big data and the sorting function
5-1. Basic operations of sorted_set type
##Add data:zadd key score member
zrange key start stop | zrevrange key start stop
Delete data: zrem key member
Get data based on conditions:
zrangebyscore key min max limit | zrevrangescore key max min
Conditional deletion of data: zremrangebyrank key start stop | zremrangebyscore key min max
Get the total amount of collection data: zcard key | zcount key min max
Set intersection and union operations: zinterstore destination numkeys key | zunionstore destination numkeys key
(This command will not be demonstrated, you can check the document yourself. It is similar to set, except that the sum of all intersections will be given Add it up. Then there is numkeys here. This parameter is a total of several keys for calculation. How many keys are needed later)
Get the index corresponding to the data: zrank key member | zrevrank key member
socre value acquisition and modification: zscore key member | zincrby key increment member
Related recommendations: "<a href="https://www.php.cn/redis/" target="_blank">redis tutorial</a>"
Summary
The above is a brief introduction and specific application of the redis data type. In the following article, we will conduct actual combat based on specific needs. .
❝Persistence in learning, persistence in blogging, and persistence in sharing are the beliefs that Kaka has always upheld since his career. I hope that Kaka’s articles in the huge Internet can bring you a little Silk help. See you next time.
❞
The above is the detailed content of One article to understand the five major data types and application scenarios of Redis. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

1. Start the [Start] menu, enter [cmd], right-click [Command Prompt], and select Run as [Administrator]. 2. Enter the following commands in sequence (copy and paste carefully): SCconfigwuauservstart=auto, press Enter SCconfigbitsstart=auto, press Enter SCconfigcryptsvcstart=auto, press Enter SCconfigtrustedinstallerstart=auto, press Enter SCconfigwuauservtype=share, press Enter netstopwuauserv , press enter netstopcryptS

The caching strategy in GolangAPI can improve performance and reduce server load. Commonly used strategies are: LRU, LFU, FIFO and TTL. Optimization techniques include selecting appropriate cache storage, hierarchical caching, invalidation management, and monitoring and tuning. In the practical case, the LRU cache is used to optimize the API for obtaining user information from the database. The data can be quickly retrieved from the cache. Otherwise, the cache can be updated after obtaining it from the database.

In PHP development, the caching mechanism improves performance by temporarily storing frequently accessed data in memory or disk, thereby reducing the number of database accesses. Cache types mainly include memory, file and database cache. Caching can be implemented in PHP using built-in functions or third-party libraries, such as cache_get() and Memcache. Common practical applications include caching database query results to optimize query performance and caching page output to speed up rendering. The caching mechanism effectively improves website response speed, enhances user experience and reduces server load.

First you need to set the system language to Simplified Chinese display and restart. Of course, if you have changed the display language to Simplified Chinese before, you can just skip this step. Next, start operating the registry, regedit.exe, directly navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNlsLanguage in the left navigation bar or the upper address bar, and then modify the InstallLanguage key value and Default key value to 0804 (if you want to change it to English en-us, you need First set the system display language to en-us, restart the system and then change everything to 0409) You must restart the system at this point.

Using Redis cache can greatly optimize the performance of PHP array paging. This can be achieved through the following steps: Install the Redis client. Connect to the Redis server. Create cache data and store each page of data into a Redis hash with the key "page:{page_number}". Get data from cache and avoid expensive operations on large arrays.

Yes, Navicat can connect to Redis, which allows users to manage keys, view values, execute commands, monitor activity, and diagnose problems. To connect to Redis, select the "Redis" connection type in Navicat and enter the server details.

1. First, double-click the [This PC] icon on the desktop to open it. 2. Then double-click the left mouse button to enter [C drive]. System files will generally be automatically stored in C drive. 3. Then find the [windows] folder in the C drive and double-click to enter. 4. After entering the [windows] folder, find the [SoftwareDistribution] folder. 5. After entering, find the [download] folder, which contains all win11 download and update files. 6. If we want to delete these files, just delete them directly in this folder.

Redis is a high-performance key-value cache. The PHPRedis extension provides an API to interact with the Redis server. Use the following steps to connect to Redis, store and retrieve data: Connect: Use the Redis classes to connect to the server. Storage: Use the set method to set key-value pairs. Retrieval: Use the get method to obtain the value of the key.
