Home Database Redis What is the solution to redis avalanche and penetration

What is the solution to redis avalanche and penetration

Jun 18, 2021 am 10:31 AM
redis

The solution is: 1. Cache penetration, you can also cache empty data and use Bloom filters; 2. Cache avalanche, you can set the corresponding hotspot key to never expire, combine multiple caches, and purchase Third-party Redis and staggered expiration time, the expiration time can be randomly generated.

What is the solution to redis avalanche and penetration

The operating environment of this tutorial: Windows 7 system, Redis version 5.0.10, DELL G3 computer.

Redis cache penetration and solutions

1. Cache penetration

1. When the key queried by the user does not exist in redis, the corresponding id does not exist in the database. If it is attacked by illegal users, a large number of requests will be hit directly on the db, causing downtime and affecting the entire system. This phenomenon is called cache penetration.

2. Solution 1: Cache empty data, such as empty strings, empty objects, empty arrays or lists, the code is as follows

if (list != null && list.size() > 0) {
     redisOperator.set("subCat:" + rootCatId, JsonUtils.objectToJson(list));
} else {
     redisOperator.set("subCat:" + rootCatId, JsonUtils.objectToJson(list), 5*60);
}
Copy after login

3. Solution 2: Bloom Filter

Bloom filter: Determine whether an element is in an array, as shown in the figure below. It uses binary to store and occupies a relatively small memory. 0 represents non-existence and 1 represents existence, which increases query efficiency. Soon, when a value is saved, an algorithm will be used to save the corresponding value to a certain position on the Bloom filter set. There may be multiple keys at a certain position. When a non-existent key value is passed in, , matches the set, and if it does not match, it will return a null

Disadvantages: 1. 1% misjudgment rate, when a key does not exist in the Bloom array, but due to this misjudgment rate, Under certain circumstances, it is judged that the key exists. The longer the array, the lower the false positive rate, and the shorter the array, the higher the false positive rate.

2. When we want to delete a certain key value, it is The content in our database and redis will be deleted, but it cannot be deleted in the Bloom array, because there will be a key at a certain position in the array. If we want to delete it, we will change 1 to 0, but all the keys in it will be changed. All values ​​are deleted

3. The code complexity will also increase because we have to maintain an additional collection. When we use redis cluster, Bloom filter must be used in combination with redis

What is the solution to redis avalanche and penetration

2. Redis cache avalanche

1. Cache avalanche: The data in the cache fails in large batches, and then this use requires a large number of requests to come in, but because all the keys in redis If it fails, all requests will be sent to the db, causing downtime

2. Solution

  • Set the corresponding hotspot key to never expire

  • The expiration time is staggered, the expiration time is randomly generated, and the expiration time of hotspot data is set longer, and the expiration time of non-hotspot data can be set shorter.

  • Multiple cache combinations, for example: To request entry, you can request redis now. When redis does not exist, request memcache. If it does not exist, request db

  • Purchase third-party Redis (Alibaba Cloud or Tencent Cloud) redis)

Related tutorial recommendations: Redis tutorial

The above is the detailed content of What is the solution to redis avalanche and penetration. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Solution to 0x80242008 error when installing Windows 11 10.0.22000.100 Solution to 0x80242008 error when installing Windows 11 10.0.22000.100 May 08, 2024 pm 03:50 PM

1. Start the [Start] menu, enter [cmd], right-click [Command Prompt], and select Run as [Administrator]. 2. Enter the following commands in sequence (copy and paste carefully): SCconfigwuauservstart=auto, press Enter SCconfigbitsstart=auto, press Enter SCconfigcryptsvcstart=auto, press Enter SCconfigtrustedinstallerstart=auto, press Enter SCconfigwuauservtype=share, press Enter netstopwuauserv , press enter netstopcryptS

Golang API caching strategy and optimization Golang API caching strategy and optimization May 07, 2024 pm 02:12 PM

The caching strategy in GolangAPI can improve performance and reduce server load. Commonly used strategies are: LRU, LFU, FIFO and TTL. Optimization techniques include selecting appropriate cache storage, hierarchical caching, invalidation management, and monitoring and tuning. In the practical case, the LRU cache is used to optimize the API for obtaining user information from the database. The data can be quickly retrieved from the cache. Otherwise, the cache can be updated after obtaining it from the database.

Caching mechanism and application practice in PHP development Caching mechanism and application practice in PHP development May 09, 2024 pm 01:30 PM

In PHP development, the caching mechanism improves performance by temporarily storing frequently accessed data in memory or disk, thereby reducing the number of database accesses. Cache types mainly include memory, file and database cache. Caching can be implemented in PHP using built-in functions or third-party libraries, such as cache_get() and Memcache. Common practical applications include caching database query results to optimize query performance and caching page output to speed up rendering. The caching mechanism effectively improves website response speed, enhances user experience and reduces server load.

How to upgrade Win11 English 21996 to Simplified Chinese 22000_How to upgrade Win11 English 21996 to Simplified Chinese 22000 How to upgrade Win11 English 21996 to Simplified Chinese 22000_How to upgrade Win11 English 21996 to Simplified Chinese 22000 May 08, 2024 pm 05:10 PM

First you need to set the system language to Simplified Chinese display and restart. Of course, if you have changed the display language to Simplified Chinese before, you can just skip this step. Next, start operating the registry, regedit.exe, directly navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNlsLanguage in the left navigation bar or the upper address bar, and then modify the InstallLanguage key value and Default key value to 0804 (if you want to change it to English en-us, you need First set the system display language to en-us, restart the system and then change everything to 0409) You must restart the system at this point.

How to use Redis cache in PHP array pagination? How to use Redis cache in PHP array pagination? May 01, 2024 am 10:48 AM

Using Redis cache can greatly optimize the performance of PHP array paging. This can be achieved through the following steps: Install the Redis client. Connect to the Redis server. Create cache data and store each page of data into a Redis hash with the key "page:{page_number}". Get data from cache and avoid expensive operations on large arrays.

Can navicat connect to redis? Can navicat connect to redis? Apr 23, 2024 pm 05:12 PM

Yes, Navicat can connect to Redis, which allows users to manage keys, view values, execute commands, monitor activity, and diagnose problems. To connect to Redis, select the "Redis" connection type in Navicat and enter the server details.

How to find the update file downloaded by Win11_Share the location of the update file downloaded by Win11 How to find the update file downloaded by Win11_Share the location of the update file downloaded by Win11 May 08, 2024 am 10:34 AM

1. First, double-click the [This PC] icon on the desktop to open it. 2. Then double-click the left mouse button to enter [C drive]. System files will generally be automatically stored in C drive. 3. Then find the [windows] folder in the C drive and double-click to enter. 4. After entering the [windows] folder, find the [SoftwareDistribution] folder. 5. After entering, find the [download] folder, which contains all win11 download and update files. 6. If we want to delete these files, just delete them directly in this folder.

PHP Redis caching applications and best practices PHP Redis caching applications and best practices May 04, 2024 am 08:33 AM

Redis is a high-performance key-value cache. The PHPRedis extension provides an API to interact with the Redis server. Use the following steps to connect to Redis, store and retrieve data: Connect: Use the Redis classes to connect to the server. Storage: Use the set method to set key-value pairs. Retrieval: Use the get method to obtain the value of the key.

See all articles