Message queue MQ is essentially a queue. Its simplest operation is to join and dequeue. It determines when and what conditions to join the queue and when and what conditions to deque according to the program. In other words, if you encounter a scenario where the business requirements of the enqueuing system and the dequeuing system are inconsistent, you can consider whether to use message queues to implement it. There are many applicable scenarios. Here are a few common scenarios and explanations.
1: Asynchronous processing, application decoupling, distributed
Scenario: The processing results of the main business on the sub-business are not the same When you care.
Case: The relationship between the order system, logistics system, financial system and operation log recording system in the e-commerce system.
Popular explanation: Xiao Ming is a cake shop assistant. After he made the cake, he put it in the window, marked "completed" on the corresponding order, and then continued to make the next cake. He didn't care how or when the cake was sold.
Implementation: Use a queue middleware or middle system to store the common parts of several business systems and process them independently. The processing progress of each system can be recorded using its own independent tag. After all systems have completed operations, perform dequeuing operations or persist data storage.
Note: The disaster recovery capability of intermediate data needs to be considered to ensure that the business process can be restored when a failure occurs and is recovered. Ensure that every piece of data can be processed correctly.
2: Peak processing
Scenario: Traffic is unbalanced at various time points
Case: flash sale, Rush Buy
Explanation: Xiao Ming takes a long time to make cakes. After the order comes, he first registers it into a list, and then makes it one by one in order. When the order quantity is too large, a "Sold Out" sign will be temporarily displayed. .
Implementation: Use single-threaded tools to queue business requirements. When the business request reaches the threshold, a friendly prompt is given and the user's request is rejected.
Notes: For peak demand, you can post prompts such as "Temporarily unavailable for purchase, please wait" during peak periods to prevent the impact of traffic on subsequent business. For needs such as flash sales that stop as soon as they are available, the issue of over-issuance needs to be considered. You can add a quota counter, or issue a flash sale completion mark when the flash sale quota is full. After the subsequent processing program detects the completion mark, subsequent processing will be performed.
3: Delivery Guarantee
Scenario: The content needs to be strictly executed one by one, and the execution is guaranteed to be successful. When the execution is unsuccessful or interrupted, you can Recovery
Case: Banking and financial systems, systems that need to improve disaster recovery capabilities
Explanation: The cake made by Xiao Ming needs to be inspected and signed by the customer before he can continue to make the next cake.
Implementation: After the queuing system writes the business requirements into the message queue, it will proceed to the next business processing. The subsequent processing program processes the queue contents one by one, and issues a "Complete Permit" after the processing is completed. The content in the message queue can only be deleted from the message queue after obtaining the "Complete Permission".
Note: Focus on issues related to disaster recovery, such as business recovery issues and repeated processing issues.
Four: Sorting Guarantee
Scenario: The content in the message queue has a strict order.
Case: Queuing and waiting system
Explanation: Xiao Ming needs to strictly follow the order of making cakes.
Implementation: The queuing system writes the contents into the message queue one by one, arranges them in a single line, and extracts the data in a first-in, first-out order for subsequent processing.
Note: You need to use a single thread to ensure there is only one production line.
5: Scalability
Scenario: When using publish-subscribe mode, add new subscribers
Case: After registering a user , in the model of sending successful SMS, add a function of sending email
Implementation: Multiple consumers subscribe to the middle layer of a message, and then the publisher publishes the information to the middle layer. Consumers who subscribe to this middle layer can receive this message and perform subsequent processing. in this structure. If you want to add a message subsequent processing component, you only need to subscribe this component to the middle layer.
Note: Ensure that there is no deep coupling between businesses to prevent interference during expansion.
The above are several commonly used scenarios for message queues. Message queues can smooth out the differences between systems and improve system stability. There are many applicable scenarios.
When selecting the message queue medium, it is recommended that students do not have to maximize the conditions and goals at the beginning. What conditions must be used to perfectly solve the problem? The program still requires long-term maintenance and optimization process.
Although the performance degradation of Redis is still very serious when the traffic is high and a large amount of persistent data is required, it is still recommended that you learn queues from Redis. In the course, you only understand the application of queues by changing the process. Scenarios and ideas, any online project is constantly optimized and improved. If you want to solve all problems perfectly through a set of videos, I’m sorry that I can’t do it. The needs and application scenarios of each job are different, so there are different It will be improved according to specific needs when needed.
When judging the queue demand, you need to add a counter field when judging the application of queue conditions. Judge the length of the current queue each time it is pushed into the queue. If the number exceeds the limited flash sale number, it will not enter the queue program.
In actual use, there is no need to deliberately pursue where message queues need to be added. Instead, it should be reasonably selected and used according to the actual situation when conducting business separation and decoupling, as well as some special demands.
Related recommendations:
Detailed explanation of PHP message queue
PHP message queue implementation and application
php message queue class example sharing
The above is the detailed content of Common usage scenarios of message queues in PHP. For more information, please follow other related articles on the PHP Chinese website!

PHP type prompts to improve code quality and readability. 1) Scalar type tips: Since PHP7.0, basic data types are allowed to be specified in function parameters, such as int, float, etc. 2) Return type prompt: Ensure the consistency of the function return value type. 3) Union type prompt: Since PHP8.0, multiple types are allowed to be specified in function parameters or return values. 4) Nullable type prompt: Allows to include null values and handle functions that may return null values.

In PHP, use the clone keyword to create a copy of the object and customize the cloning behavior through the \_\_clone magic method. 1. Use the clone keyword to make a shallow copy, cloning the object's properties but not the object's properties. 2. The \_\_clone method can deeply copy nested objects to avoid shallow copying problems. 3. Pay attention to avoid circular references and performance problems in cloning, and optimize cloning operations to improve efficiency.

PHP is suitable for web development and content management systems, and Python is suitable for data science, machine learning and automation scripts. 1.PHP performs well in building fast and scalable websites and applications and is commonly used in CMS such as WordPress. 2. Python has performed outstandingly in the fields of data science and machine learning, with rich libraries such as NumPy and TensorFlow.

Key players in HTTP cache headers include Cache-Control, ETag, and Last-Modified. 1.Cache-Control is used to control caching policies. Example: Cache-Control:max-age=3600,public. 2. ETag verifies resource changes through unique identifiers, example: ETag: "686897696a7c876b7e". 3.Last-Modified indicates the resource's last modification time, example: Last-Modified:Wed,21Oct201507:28:00GMT.

In PHP, password_hash and password_verify functions should be used to implement secure password hashing, and MD5 or SHA1 should not be used. 1) password_hash generates a hash containing salt values to enhance security. 2) Password_verify verify password and ensure security by comparing hash values. 3) MD5 and SHA1 are vulnerable and lack salt values, and are not suitable for modern password security.

PHP is a server-side scripting language used for dynamic web development and server-side applications. 1.PHP is an interpreted language that does not require compilation and is suitable for rapid development. 2. PHP code is embedded in HTML, making it easy to develop web pages. 3. PHP processes server-side logic, generates HTML output, and supports user interaction and data processing. 4. PHP can interact with the database, process form submission, and execute server-side tasks.

PHP has shaped the network over the past few decades and will continue to play an important role in web development. 1) PHP originated in 1994 and has become the first choice for developers due to its ease of use and seamless integration with MySQL. 2) Its core functions include generating dynamic content and integrating with the database, allowing the website to be updated in real time and displayed in personalized manner. 3) The wide application and ecosystem of PHP have driven its long-term impact, but it also faces version updates and security challenges. 4) Performance improvements in recent years, such as the release of PHP7, enable it to compete with modern languages. 5) In the future, PHP needs to deal with new challenges such as containerization and microservices, but its flexibility and active community make it adaptable.

The core benefits of PHP include ease of learning, strong web development support, rich libraries and frameworks, high performance and scalability, cross-platform compatibility, and cost-effectiveness. 1) Easy to learn and use, suitable for beginners; 2) Good integration with web servers and supports multiple databases; 3) Have powerful frameworks such as Laravel; 4) High performance can be achieved through optimization; 5) Support multiple operating systems; 6) Open source to reduce development costs.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver Mac version
Visual web development tools

Dreamweaver CS6
Visual web development tools