search
HomeDatabaseRedisWhat do redis cache avalanche, cache breakdown, and cache penetration mean?

What do redis cache avalanche, cache breakdown, and cache penetration mean?

What is redis cache?

Redis cache is an open source log-type Key-Value database written in ANSIC language, supports network, can be memory-based and persistent, and provides APIs in multiple languages.

What is the role of redis cache?

The use of Redis cache greatly improves the performance and efficiency of applications, especially in data query. But at the same time, it also brings some problems. Among them, the most critical issue is the consistency of data. Strictly speaking, this problem has no solution. If the consistency requirements of the data are very high, then caching cannot be used.

Another typical problem is cache penetration, cache avalanche and cache breakdown. At present, the industry also has relatively popular solutions. This article is not intended to solve these three problems more perfectly, nor is it intended to subvert popular solutions in the industry. Instead, we will demonstrate these three problem phenomena through actual code operations. The reason for doing this is because it is difficult to have a very vivid concept in the mind just by looking at the academic explanations of these issues. With actual code demonstrations, we can deepen our understanding and understanding of these issues.

Cache penetration

Cache penetration refers to querying data that must not exist in a database. The normal process of using cache is roughly that data query first performs cache query. If the key does not exist or the key has expired, then query the database and put the queried object into the cache. If the database query object is empty, it will not be placed in the cache.

Code flow

1. Pass the parameter into the primary key ID of the object

2. Get the object from the cache based on the key

3. If the object is not empty , return directly

4. If the object is empty, query the database

5. If the object queried from the database is not empty, put it in the cache (set the expiration time) Imagine In this case, what will happen if the parameter passed in is -1? This -1 is an object that definitely does not exist. The database will be queried every time, and every query will be empty, and the cache will not be performed every time. If there is a malicious attack, this vulnerability can be exploited to put pressure on the database or even crush it. Even if UUID is used, it is easy to find a non-existent KEY and carry out attacks.

In my work, the editor will use the method of caching null values, which is step 5 in [Code Process]. If the object queried from the database is empty, it will also be put into the cache, just the set cache The expiration time is shorter, for example, set to 60 seconds.

(Learning video sharing: redis video tutorial)

Cache avalanche

Cache avalanche refers to a certain time Segment, cache centralized expiration.

One of the reasons for the avalanche is that when I write this article, it is almost midnight on Double 12, and there will soon be a wave of panic buying. This wave of products will be put in more intensively. Caching, assuming one hour. Then at one o'clock in the morning, the cache of this batch of products has expired. The access queries for this batch of products all fall on the database, which will generate periodic pressure peaks for the database.

When the editor is working on e-commerce projects, he usually uses different categories of goods and caches them for different periods. Products in the same category, plus a random factor. This can spread the cache expiration time as much as possible. Moreover, the cache time of products in popular categories will be longer and the cache time of products in unpopular categories will be shorter, which can also save the resources of the cache service.

In fact, centralized expiration is not very fatal. The more fatal cache avalanche is when a node of the cache server is down or disconnected from the network. Because the naturally formed cache avalanche must create caches intensively during a certain period of time, then the database can withstand the pressure at that time. At this time, the database can also withstand the pressure. It's nothing more than periodic pressure on the database. The downtime of the cache service node will put unpredictable pressure on the database server, and it is very likely that the database will be overwhelmed in an instant.

Cache breakdown

Cache breakdown refers to a key that is very hot and is constantly carrying large concurrency. Large concurrency focuses on accessing this point. , when the key expires, the continuous large concurrency breaks through the cache and directly requests the database, which is like cutting a hole in a barrier.

When the editor was working on an e-commerce project, this product became a "hot item".

In fact, in most cases, it is difficult for this kind of explosion to cause overwhelming pressure on the database server. There are very few companies that have reached this level. Therefore, the pragmatic editor has made early preparations for the main products so that the cache will never expire. Even if some products become popular by themselves, they can just set them to never expire.

To be simple, the mutex key mutex lock is really not useful.

Learning tutorial sharing: redis database tutorial

The above is the detailed content of What do redis cache avalanche, cache breakdown, and cache penetration mean?. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:传陆编程. If there is any infringement, please contact admin@php.cn delete
es和redis区别es和redis区别Jul 06, 2019 pm 01:45 PM

Redis是现在最热门的key-value数据库,Redis的最大特点是key-value存储所带来的简单和高性能;相较于MongoDB和Redis,晚一年发布的ES可能知名度要低一些,ES的特点是搜索,ES是围绕搜索设计的。

一起来聊聊Redis有什么优势和特点一起来聊聊Redis有什么优势和特点May 16, 2022 pm 06:04 PM

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了关于redis的一些优势和特点,Redis 是一个开源的使用ANSI C语言编写、遵守 BSD 协议、支持网络、可基于内存、分布式存储数据库,下面一起来看一下,希望对大家有帮助。

实例详解Redis Cluster集群收缩主从节点实例详解Redis Cluster集群收缩主从节点Apr 21, 2022 pm 06:23 PM

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了Redis Cluster集群收缩主从节点的相关问题,包括了Cluster集群收缩概念、将6390主节点从集群中收缩、验证数据迁移过程是否导致数据异常等,希望对大家有帮助。

Redis实现排行榜及相同积分按时间排序功能的实现Redis实现排行榜及相同积分按时间排序功能的实现Aug 22, 2022 pm 05:51 PM

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了Redis实现排行榜及相同积分按时间排序,本文通过实例代码给大家介绍的非常详细,对大家的学习或工作具有一定的参考借鉴价值,希望对大家有帮助。

详细解析Redis中命令的原子性详细解析Redis中命令的原子性Jun 01, 2022 am 11:58 AM

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了关于原子操作中命令原子性的相关问题,包括了处理并发的方案、编程模型、多IO线程以及单命令的相关内容,下面一起看一下,希望对大家有帮助。

一文搞懂redis的bitmap一文搞懂redis的bitmapApr 27, 2022 pm 07:48 PM

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了bitmap问题,Redis 为我们提供了位图这一数据结构,位图数据结构其实并不是一个全新的玩意,我们可以简单的认为就是个数组,只是里面的内容只能为0或1而已,希望对大家有帮助。

实例详解Redis实现排行榜及相同积分按时间排序功能的实现实例详解Redis实现排行榜及相同积分按时间排序功能的实现Aug 26, 2022 pm 02:09 PM

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了Redis实现排行榜及相同积分按时间排序,本文通过实例代码给大家介绍的非常详细,下面一起来看一下,希望对大家有帮助。

一起聊聊Redis实现秒杀的问题一起聊聊Redis实现秒杀的问题May 27, 2022 am 11:40 AM

本篇文章给大家带来了关于redis的相关知识,其中主要介绍了关于实现秒杀的相关内容,包括了秒杀逻辑、存在的链接超时、超卖和库存遗留的问题,下面一起来看一下,希望对大家有帮助。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!