class schedule
02 minutes03 secondsNosql introduction
17 minutes09 secondsIntroduction to redis
07 minutes02 secondsRedis download, installation and service startup
06 minutes53 secondsredis basic operations
10 minutes01 secondsIntroduction to data types
07 minutes03 secondsBasic string operations
07 minutes43 secondsThe confusion between single instruction operation and multi-instruction operation
05 minutes14 secondsValue increase and decrease operations
07 minutes15 secondsData timeliness settings
03 minutes31 secondsKey naming convention
07 minutes14 secondsIntroduction to hash types and basic operations
07 minutes54 secondsHash expansion operation and usage precautions
05 minutes35 secondshash to implement shopping cart
13 minutes38 secondsHash enables rush buying
06 minutes17 secondsIntroduction and basic operations of list type
14 minutes56 secondslist blocks data acquisition
04 minutes26 secondsList extension operation deletes data
05 minutes50 secondslist implements log message queue
08 minutes32 secondsSet type introduction and basic operations
04 minutes57 secondsset operation random data
06 minutes23 secondsset data intersection and difference operation
07 minutes35 secondsset implements permission verification
08 minutes17 secondsset to implement website traffic statistics
03 minutes40 secondsset implements black and white list
04 minutes12 secondsSorted_sort type introduction and basic operations
07 minutes31 secondssorted_sort basic operations 2
10 minutes29 secondssorted_sort implements ranking list
05 minutes12 secondsset implements time-sensitive task management
11 minutes52 secondsset task management with weight
09 minutes06 secondsPay-per-use service controls
10 minutes26 secondsWeChat receiving message sequence control
12 minutes33 secondsGeneral command key basic operations
04 minutes04 secondsGeneral command key timeliness control operation
05 minutes07 secondsGeneral command key query operation
03 minutes48 secondsGeneral command key other operations
05 minutes07 secondsGeneral instructions db basic operations
05 minutes10 secondsGeneral instructions db other operations
04 minutes31 secondsIntroduction to jedis
02 minutes28 secondshelloworld(jedis version)
06 minutes25 secondsjedis routine operation demonstration
06 minutes21 secondsBusiness request number control case requirement analysis
02 minutes04 secondsProgram structure construction
02 minutes16 secondsProgram code implementation
22 minutes35 secondsTool making
10 minutes31 secondsVisual client introduction
05 minutes18 secondsInstall redis in linux environment-install redis based on linux
03 minutes59 secondsStart the service on the specified port
01 minutes17 secondsSpecify the configuration file to start the service
05 minutes21 secondsConfiguration file startup directory management
04 minutes56 secondsIntroduction to persistence
04 minutes49 secondssave command
03 minutes49 secondsRDB related configuration
04 minutes17 secondsData recovery process demonstration
01 minutes36 secondsHow the save command works
02 minutes04 secondsbgsave command and working principle
05 minutes26 secondssave configuration and working principle
09 minutes00 secondsComparison and analysis of advantages and disadvantages of three RDB startup methods
03 minutes53 secondsIntroduction to AOF
03 minutes19 secondsBasic operations of AOF persistence strategy
11 minutes32 secondsAOF rewriting concept and command execution
09 minutes04 secondsAOF automatically rewrites configuration
03 minutes49 secondsHow AOF rewriting works
02 minutes45 secondsComparison of RDB and AOF solutions
05 minutes44 secondsPersistence application scenario analysis
10 minutes27 secondsIntroduction to redis transactions
03 minutes32 secondsBasic operations of transactions (definition, cancellation, execution)
05 minutes21 secondstransaction workflow
03 minutes15 secondsNotes on transaction operations
05 minutes27 secondsLock
05 minutes58 secondsDistributed lock
06 minutes34 secondsDeadlock solution
06 minutes46 secondsDeletion strategy - concept of expired data
03 minutes47 secondsThe underlying storage structure of expired data
03 minutes17 secondsScheduled deletion and lazy deletion
05 minutes18 secondsDelete regularly
09 minutes34 secondseviction policy
13 minutes25 secondsServer configuration-redis.conf configuration
07 minutes17 secondsAdvanced data types-bitmaps introduction and basic operations
10 minutes56 secondsbitmaps extended operations
09 minutes12 secondsHyperLogLog
08 minutes07 secondsGEO
12 minutes22 secondsIntroduction to master-slave replication
12 minutes58 secondsThe role of master-slave replication
04 minutes33 secondsThree stages of master-slave replication
04 minutes11 secondsMaster-slave replication workflow (1) Connection establishment phase
04 minutes04 secondsMaster-slave replication-build a master-slave structure
10 minutes29 secondsMaster-slave replication (2) data synchronization phase
07 minutes15 secondsThings to note during the data synchronization phase
08 minutes25 secondsMaster-slave replication-running id (runid)
04 minutes32 secondsMaster-slave replication-copy buffer and offset
09 minutes06 secondsMaster-slave replication workflow (2) Data synchronization and command propagation stage
06 minutes32 secondsMaster-slave replication-heartbeat mechanism and command propagation phase workflow
06 minutes41 secondsMaster-slave replication FAQ (1)
05 minutes22 secondsMaster-slave replication FAQ (2)
04 minutes27 secondsMaster-slave replication FAQ (3)
04 minutes01 secondsIntroduction to Sentinel
05 minutes54 secondsSentinel structure construction
19 minutes58 secondsHow Sentinel works (1)
07 minutes25 secondsHow Sentinel works (2)
01 minutes24 secondsHow Sentinel works (3)
14 minutes13 secondsCluster introduction
02 minutes51 secondsCluster storage structure design
06 minutes43 secondscluster cluster construction
17 minutes23 secondsSet and get data
02 minutes31 secondsMaster-slave offline and master-slave switching
09 minutes27 secondsEnterprise-level solution-cache warm-up
04 minutes04 secondscache avalanche
11 minutes53 secondsCache breakdown
05 minutes59 secondscache penetration
11 minutes37 secondsPerformance indicator monitoring
06 minutes28 secondsPerformance indicator monitoring commands
10 minutes48 secondsCaching is a core component of current enterprise-level applications. Today's mainstream e-commerce, life services, live broadcast and other fields are inseparable from the use of cache. As the current mainstream caching technology, Redis has become the first choice for Internet companies. The cache structure design based on redis cluster currently accounts for half of the market in the same field.