Tag

Cache Penetration

0 views collected around this technical thread.

JD Tech
JD Tech
Jan 6, 2025 · Backend Development

Cache Big‑Key and Hot‑Key Issues: Case Study, Root‑Cause Analysis, and Mitigation Strategies

This article examines a real‑world incident where oversized and frequently accessed Redis cache keys caused cache penetration and network bandwidth saturation during a high‑traffic promotion, analyzes the underlying reasons, and presents concrete solutions and preventive measures for backend systems.

Big KeyCache PenetrationRedis
0 likes · 7 min read
Cache Big‑Key and Hot‑Key Issues: Case Study, Root‑Cause Analysis, and Mitigation Strategies
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Dec 18, 2024 · Fundamentals

Understanding Bloom Filters and Their Support in Redis

This article explains the probabilistic Bloom filter data structure, its characteristics and typical use cases such as cache‑penetration prevention, details its simple implementation steps, demonstrates how Redis (via Redisson) provides built‑in Bloom filter support with Java code examples, and summarizes its practical benefits.

Bloom FilterCache PenetrationJava
0 likes · 7 min read
Understanding Bloom Filters and Their Support in Redis
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Nov 11, 2024 · Backend Development

Cache Penetration and Four Effective Mitigation Strategies

Cache penetration, a common issue in large-scale websites where malicious or non‑existent key requests bypass caches and overload databases, can cause crashes; this article explains the problem and presents four mitigation techniques—caching empty objects, rate limiting, blacklist mechanisms, and Bloom filters—to protect backend systems.

Bloom FilterCacheCache Penetration
0 likes · 4 min read
Cache Penetration and Four Effective Mitigation Strategies
Practical DevOps Architecture
Practical DevOps Architecture
Sep 5, 2024 · Backend Development

Common Cache Issues and Their Solutions

This article explains four typical cache problems—penetration, avalanche, breakdown, and distributed cache efficiency—describing their causes and offering practical mitigation strategies such as top‑level filtering, Bloom filters, staggered expirations, null caching, and locking mechanisms.

CacheCache AvalancheCache Breakdown
0 likes · 3 min read
Common Cache Issues and Their Solutions
Top Architect
Top Architect
Aug 21, 2024 · Backend Development

Handling Redis Cache Penetration, Avalanche, and Breakdown in High‑Concurrency Scenarios

This article explains the four common Redis cache pitfalls—cache penetration, avalanche, breakdown, and data inconsistency—demonstrates how they can crash high‑traffic systems, and provides practical Java/Spring Boot solutions such as empty‑object caching, Bloom filters, distributed locks, and delayed double‑delete strategies.

Bloom FilterCache AvalancheCache Penetration
0 likes · 27 min read
Handling Redis Cache Penetration, Avalanche, and Breakdown in High‑Concurrency Scenarios
IT Services Circle
IT Services Circle
Mar 11, 2024 · Backend Development

Cache Penetration, Cache Breakdown, and Cache Avalanche: Causes and Solutions

This article explains cache penetration, cache breakdown, and cache avalanche, describing their causes, differences, and practical mitigation strategies such as parameter validation, caching null keys, Bloom filters, rate limiting, hot‑key pre‑warming, and distributed locking, with Java code examples.

Bloom FilterCacheCache Avalanche
0 likes · 10 min read
Cache Penetration, Cache Breakdown, and Cache Avalanche: Causes and Solutions
Architect's Guide
Architect's Guide
Jan 2, 2024 · Backend Development

Cache Strategies and Common Issues: Consistency, Penetration, and Avalanche

The article explains why excessive database reads become a performance bottleneck, introduces a cache layer between applications and MySQL, details common caching patterns such as Cache‑Aside, Read‑Through, Write‑Through and Write‑Behind, and discusses consistency, penetration, and avalanche problems along with practical mitigation techniques.

Cache AvalancheCache ConsistencyCache Penetration
0 likes · 9 min read
Cache Strategies and Common Issues: Consistency, Penetration, and Avalanche
Top Architect
Top Architect
Nov 28, 2023 · Backend Development

Implementing Sign‑In and Statistics with Redis BitMap in Spring Boot

This article explains how to use Redis BitMap to build an efficient sign‑in feature and monthly statistics in a Spring Boot microservice, covering basic BitMap commands, key design, code implementation, testing procedures, and a cache‑penetration mitigation strategy.

BitMapCache PenetrationRedis
0 likes · 12 min read
Implementing Sign‑In and Statistics with Redis BitMap in Spring Boot
Top Architect
Top Architect
Oct 12, 2023 · Backend Development

Cache Strategies: Consistency Issues, Penetration, Avalanche and Mitigation Techniques

The article explains why high‑frequency disk reads can become a performance bottleneck, introduces common caching patterns such as Cache‑Aside, Read‑Through, Write‑Through and Write‑Behind, discusses consistency problems, cache penetration and avalanche, and presents practical solutions like null‑caching, Bloom filters, distributed locks, staggered TTLs, Redis‑Cluster and Hystrix.

Cache AvalancheCache ConsistencyCache Penetration
0 likes · 10 min read
Cache Strategies: Consistency Issues, Penetration, Avalanche and Mitigation Techniques
Architect
Architect
Oct 10, 2023 · Backend Development

Cache Strategies: Consistency, Penetration, Avalanche and Common Patterns

This article explains why high‑frequency database reads become a performance bottleneck, introduces common caching patterns such as Cache‑Aside, Read‑Through, Write‑Through and Write‑Behind, discusses consistency challenges, and provides practical solutions for cache penetration and avalanche scenarios.

Cache AvalancheCache ConsistencyCache Penetration
0 likes · 10 min read
Cache Strategies: Consistency, Penetration, Avalanche and Common Patterns
Code Ape Tech Column
Code Ape Tech Column
Aug 31, 2023 · Backend Development

Implementing Sign‑in and Statistics with Redis BitMap in Spring Boot

This article explains how to implement a user sign‑in feature and its statistical analysis using Redis BitMap within a Spring Boot backend, covering basic BitMap commands, integration steps, core source code, continuous sign‑in calculation, and a bitmap‑based solution for cache penetration.

BitMapCache PenetrationRedis
0 likes · 11 min read
Implementing Sign‑in and Statistics with Redis BitMap in Spring Boot
Cognitive Technology Team
Cognitive Technology Team
Jun 3, 2023 · Backend Development

Avoiding Cache Pitfalls: Avalanche, Breakdown, Penetration, and Data Consistency

This article explains cache avalanche, breakdown, and penetration, describes why they occur, and provides practical strategies such as pre‑warming, staggered expiration, mutex/queue protection, double‑layer caching, Bloom filters, and consistent update patterns to keep backend systems stable and data consistent.

Cache AvalancheCache BreakdownCache Penetration
0 likes · 5 min read
Avoiding Cache Pitfalls: Avalanche, Breakdown, Penetration, and Data Consistency
IT Services Circle
IT Services Circle
May 2, 2023 · Fundamentals

Bloom Filter: Principles, Guava & Redisson Implementations, and Practical Usage

This article explains the Bloom filter data structure, its mathematical foundations and false‑positive analysis, demonstrates how to implement it with Google Guava and Redisson in Java, and discusses practical considerations such as cache‑penetration mitigation, deletion strategies, and periodic rebuilding.

Bloom FilterCache PenetrationGuava
0 likes · 15 min read
Bloom Filter: Principles, Guava & Redisson Implementations, and Practical Usage
Architect's Guide
Architect's Guide
Mar 12, 2023 · Backend Development

Redis Interview Questions: Solving Cache Penetration, Cache Breakdown, and Cache Avalanche

This article explains the concepts of cache penetration, cache breakdown (stampede), and cache avalanche in Redis, and provides practical solutions such as parameter validation, null‑value caching, Bloom filters, mutex locks, hot‑data non‑expiration, and randomizing expiration times, accompanied by Java code examples.

CacheCache AvalancheCache Breakdown
0 likes · 9 min read
Redis Interview Questions: Solving Cache Penetration, Cache Breakdown, and Cache Avalanche
Top Architect
Top Architect
Feb 23, 2023 · Databases

Redis Cache Eviction Strategies and Solutions for Penetration, Breakdown, and Avalanche

This article explains Redis eviction policies, compares strategies like allkeys‑lru, volatile‑ttl, and noeviction, and provides practical solutions for cache penetration, breakdown, and avalanche to maintain system stability under high concurrency.

Cache EvictionCache PenetrationRedis
0 likes · 11 min read
Redis Cache Eviction Strategies and Solutions for Penetration, Breakdown, and Avalanche
Architect's Guide
Architect's Guide
Feb 21, 2023 · Backend Development

Redis Cache Eviction Strategies and Solutions for Penetration, Breakdown, and Avalanche

This article explains Redis eviction policies such as allkeys‑lru, volatile‑ttl, and others, discusses how the eviction process works, and provides practical solutions for cache penetration, breakdown (stampede), and avalanche, including Bloom filters, mutex locks, and randomized TTLs.

Cache AvalancheCache BreakdownCache Eviction
0 likes · 10 min read
Redis Cache Eviction Strategies and Solutions for Penetration, Breakdown, and Avalanche
Architect's Guide
Architect's Guide
Jan 6, 2023 · Backend Development

Redis Interview Questions: Solving Cache Penetration, Cache Breakdown, and Cache Avalanche

This article explains common Redis caching issues—cache penetration, cache breakdown, and cache avalanche—detailing their causes and practical mitigation techniques such as parameter validation, null caching, Bloom filters, mutex locks, hot‑data strategies, and staggered expiration to ensure system stability.

CacheCache AvalancheCache Breakdown
0 likes · 9 min read
Redis Interview Questions: Solving Cache Penetration, Cache Breakdown, and Cache Avalanche
Selected Java Interview Questions
Selected Java Interview Questions
Dec 23, 2022 · Backend Development

Effective Cache Strategies for Large Distributed Systems

This article explains how to design and use client‑side, CDN, and server‑side caches—including Redis data structures, consistency patterns, and mitigation techniques for cache breakdown, penetration, and avalanche—to achieve high performance and reliability in billion‑user distributed applications.

Cache ConsistencyCache PenetrationRedis
0 likes · 23 min read
Effective Cache Strategies for Large Distributed Systems
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 19, 2022 · Databases

Using Redis Bloom Filter to Prevent Cache Penetration and Understanding Redis Memory Eviction Policies

This article explains cache penetration scenarios, outlines Redis memory eviction strategies, introduces RedisBloom's Bloom filter and Cuckoo filter for detecting illegal requests, provides configuration details, and demonstrates practical commands to mitigate cache penetration in backend systems.

Bloom FilterCache PenetrationMemory Eviction
0 likes · 10 min read
Using Redis Bloom Filter to Prevent Cache Penetration and Understanding Redis Memory Eviction Policies
Architect
Architect
Nov 25, 2022 · Fundamentals

Understanding Bloom Filters and Their Role in Preventing Cache Penetration

This article explains cache penetration, introduces Bloom filters as a space‑efficient probabilistic data structure, demonstrates how to implement them with Guava and Redis in Java, and discusses practical usage scenarios and performance considerations.

Bloom FilterCache PenetrationData Structures
0 likes · 17 min read
Understanding Bloom Filters and Their Role in Preventing Cache Penetration