redis is a key-value storage system, which can be used in the following scenarios, 1, 2, and 5 are more commonly used
1. Cache
Hot data (data that is often queried but not often modified or deleted), the first choice is to use redis cache. (Recommended learning: Redis video tutorial)
2. Counter
Single thread avoids concurrency problems, high performance, such as inventory reduction.
3. Queue
is equivalent to a messaging system. ActiveMQ, RocketMQ and other tools are similar, but I personally think it is okay to use it simply if the data consistency requirements are high. Or use professional systems such as RocketMQ.
4. Bit operations
Use setbit, getbit, and bitcount commands, such as counting user sign-ins, counting the number of deduplication logins, whether a user is online, etc.;
Construct a long enough array in redis. Each array element can only have two values 0 and 1, and then the subscript index of this array is used to represent the user ID in our example above (must be a number) , then it is obvious that this large array with a length of hundreds of millions can build a memory system through subscripts and element values (0 and 1), and the several scenarios I mentioned above can also be realized. The commands used are: setbit, getbit, bitcount
5, distributed lock and single-thread
to verify repeated requests from the front end (similar situations can be freely expanded), Filtering can be done through redis: for each request, the hash of the request IP, parameters, interface, etc. is used as a key to store redis (idempotent request), how long the validity period is set, and then when the next request comes, first search in redis to see if there is this key, and then verify whether it is a repeated submission within a certain period of time.
The flash kill system is based on the single-threaded feature of redis to prevent database "explosion"
6. The latest list
Redis's LPUSH command builds the List .
7. Ranking list
Whoever scores higher will be ranked higher. Command: ZADD (sorted set).
For more Redis-related technical articles, please visit the Redis Getting Started Tutorial column to learn!
The above is the detailed content of Where is redis generally used?. For more information, please follow other related articles on the PHP Chinese website!

Redis是现在最热门的key-value数据库,Redis的最大特点是key-value存储所带来的简单和高性能;相较于MongoDB和Redis,晚一年发布的ES可能知名度要低一些,ES的特点是搜索,ES是围绕搜索设计的。

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了关于redis的一些优势和特点,Redis 是一个开源的使用ANSI C语言编写、遵守 BSD 协议、支持网络、可基于内存、分布式存储数据库,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了Redis Cluster集群收缩主从节点的相关问题,包括了Cluster集群收缩概念、将6390主节点从集群中收缩、验证数据迁移过程是否导致数据异常等,希望对大家有帮助。

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了Redis实现排行榜及相同积分按时间排序,本文通过实例代码给大家介绍的非常详细,对大家的学习或工作具有一定的参考借鉴价值,希望对大家有帮助。

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了关于原子操作中命令原子性的相关问题,包括了处理并发的方案、编程模型、多IO线程以及单命令的相关内容,下面一起看一下,希望对大家有帮助。

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了Redis实现排行榜及相同积分按时间排序,本文通过实例代码给大家介绍的非常详细,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了bitmap问题,Redis 为我们提供了位图这一数据结构,位图数据结构其实并不是一个全新的玩意,我们可以简单的认为就是个数组,只是里面的内容只能为0或1而已,希望对大家有帮助。

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了关于实现秒杀的相关内容,包括了秒杀逻辑、存在的链接超时、超卖和库存遗留的问题,下面一起来看一下,希望对大家有帮助。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

Dreamweaver Mac version
Visual web development tools

WebStorm Mac version
Useful JavaScript development tools

Notepad++7.3.1
Easy-to-use and free code editor

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
