Next Section: 主从复制-搭建主从结构829 plays

5 秒后自动播放下一节
  Watch Again

Redis entry to proficiency (a must-see for enterprise-level solutions)

Introduction >
ChapterCourseware
Chapter1Chapter One

class schedule

02 minutes03 seconds

Nosql introduction

17 minutes09 seconds

Introduction to redis

07 minutes02 seconds

Redis download, installation and service startup

06 minutes53 seconds

redis basic operations

10 minutes01 seconds

Introduction to data types

07 minutes03 seconds

Basic string operations

07 minutes43 seconds

The confusion between single instruction operation and multi-instruction operation

05 minutes14 seconds

Value increase and decrease operations

07 minutes15 seconds

Data timeliness settings

03 minutes31 seconds
Chapter2Chapter two

Key naming convention

07 minutes14 seconds

Introduction to hash types and basic operations

07 minutes54 seconds

Hash expansion operation and usage precautions

05 minutes35 seconds

hash to implement shopping cart

13 minutes38 seconds

Hash enables rush buying

06 minutes17 seconds

Introduction and basic operations of list type

14 minutes56 seconds

list blocks data acquisition

04 minutes26 seconds

List extension operation deletes data

05 minutes50 seconds

list implements log message queue

08 minutes32 seconds

Set type introduction and basic operations

04 minutes57 seconds
Chapter3third chapter

set operation random data

06 minutes23 seconds

set data intersection and difference operation

07 minutes35 seconds

set implements permission verification

08 minutes17 seconds

set to implement website traffic statistics

03 minutes40 seconds

set implements black and white list

04 minutes12 seconds

Sorted_sort type introduction and basic operations

07 minutes31 seconds

sorted_sort basic operations 2

10 minutes29 seconds

sorted_sort implements ranking list

05 minutes12 seconds

set implements time-sensitive task management

11 minutes52 seconds

set task management with weight

09 minutes06 seconds
Chapter4Chapter Four

Pay-per-use service controls

10 minutes26 seconds

WeChat receiving message sequence control

12 minutes33 seconds

General command key basic operations

04 minutes04 seconds

General command key timeliness control operation

05 minutes07 seconds

General command key query operation

03 minutes48 seconds

General command key other operations

05 minutes07 seconds

General instructions db basic operations

05 minutes10 seconds

General instructions db other operations

04 minutes31 seconds

Introduction to jedis

02 minutes28 seconds

helloworld(jedis version)

06 minutes25 seconds
Chapter5chapter Five

jedis routine operation demonstration

06 minutes21 seconds

Business request number control case requirement analysis

02 minutes04 seconds

Program structure construction

02 minutes16 seconds

Program code implementation

22 minutes35 seconds

Tool making

10 minutes31 seconds

Visual client introduction

05 minutes18 seconds

Install redis in linux environment-install redis based on linux

03 minutes59 seconds

Start the service on the specified port

01 minutes17 seconds

Specify the configuration file to start the service

05 minutes21 seconds

Configuration file startup directory management

04 minutes56 seconds
Chapter6Chapter Six

Introduction to persistence

04 minutes49 seconds

save command

03 minutes49 seconds

RDB related configuration

04 minutes17 seconds

Data recovery process demonstration

01 minutes36 seconds

How the save command works

02 minutes04 seconds

bgsave command and working principle

05 minutes26 seconds

save configuration and working principle

09 minutes00 seconds

Comparison and analysis of advantages and disadvantages of three RDB startup methods

03 minutes53 seconds

Introduction to AOF

03 minutes19 seconds

Basic operations of AOF persistence strategy

11 minutes32 seconds
Chapter7Chapter VII

AOF rewriting concept and command execution

09 minutes04 seconds

AOF automatically rewrites configuration

03 minutes49 seconds

How AOF rewriting works

02 minutes45 seconds

Comparison of RDB and AOF solutions

05 minutes44 seconds

Persistence application scenario analysis

10 minutes27 seconds

Introduction to redis transactions

03 minutes32 seconds

Basic operations of transactions (definition, cancellation, execution)

05 minutes21 seconds

transaction workflow

03 minutes15 seconds

Notes on transaction operations

05 minutes27 seconds

Lock

05 minutes58 seconds
Chapter8chapter eight

Distributed lock

06 minutes34 seconds

Deadlock solution

06 minutes46 seconds

Deletion strategy - concept of expired data

03 minutes47 seconds

The underlying storage structure of expired data

03 minutes17 seconds

Scheduled deletion and lazy deletion

05 minutes18 seconds

Delete regularly

09 minutes34 seconds

eviction policy

13 minutes25 seconds

Server configuration-redis.conf configuration

07 minutes17 seconds

Advanced data types-bitmaps introduction and basic operations

10 minutes56 seconds

bitmaps extended operations

09 minutes12 seconds
Chapter9Chapter nine

HyperLogLog

08 minutes07 seconds

GEO

12 minutes22 seconds

Introduction to master-slave replication

12 minutes58 seconds

The role of master-slave replication

04 minutes33 seconds

Three stages of master-slave replication

04 minutes11 seconds

Master-slave replication workflow (1) Connection establishment phase

04 minutes04 seconds

Master-slave replication-build a master-slave structure

10 minutes29 seconds

Master-slave replication (2) data synchronization phase

07 minutes15 seconds

Things to note during the data synchronization phase

08 minutes25 seconds

Master-slave replication-running id (runid)

04 minutes32 seconds
Chapter10chapter Ten

Master-slave replication-copy buffer and offset

09 minutes06 seconds

Master-slave replication workflow (2) Data synchronization and command propagation stage

06 minutes32 seconds

Master-slave replication-heartbeat mechanism and command propagation phase workflow

06 minutes41 seconds

Master-slave replication FAQ (1)

05 minutes22 seconds

Master-slave replication FAQ (2)

04 minutes27 seconds

Master-slave replication FAQ (3)

04 minutes01 seconds

Introduction to Sentinel

05 minutes54 seconds

Sentinel structure construction

19 minutes58 seconds

How Sentinel works (1)

07 minutes25 seconds

How Sentinel works (2)

01 minutes24 seconds
Chapter11Chapter 11

How Sentinel works (3)

14 minutes13 seconds

Cluster introduction

02 minutes51 seconds

Cluster storage structure design

06 minutes43 seconds

cluster cluster construction

17 minutes23 seconds

Set and get data

02 minutes31 seconds

Master-slave offline and master-slave switching

09 minutes27 seconds

Enterprise-level solution-cache warm-up

04 minutes04 seconds

cache avalanche

11 minutes53 seconds

Cache breakdown

05 minutes59 seconds

cache penetration

11 minutes37 seconds

Performance indicator monitoring

06 minutes28 seconds

Performance indicator monitoring commands

10 minutes48 seconds
  • CancelreplySending
  • Cancelpost a noteSending