Tagged articles
3240 articles
Page 32 of 33
Java Backend Technology
Java Backend Technology
Mar 4, 2017 · Backend Development

How Spring Session Uses Redis to Share Distributed Sessions Across Domains

This article explains the inner workings of Spring Session with Redis, detailing how web.xml configuration, DelegatingFilterProxy, and the springSessionRepositoryFilter collaborate to replace the default HttpSession, wrap requests and responses, and enable distributed session sharing in a Java backend environment.

Distributed SessionJavaSpring Session
0 likes · 6 min read
How Spring Session Uses Redis to Share Distributed Sessions Across Domains
dbaplus Community
dbaplus Community
Feb 28, 2017 · Databases

How to Stop Bitcoin Ransomware Attacks on MySQL and Other Databases

This article reviews recent ransomware campaigns targeting MySQL, MongoDB, ElasticSearch, Hadoop, and Redis, explains how attackers exploit weak password policies, and provides concrete MySQL password‑policy settings, password‑less login configuration, and security checklists for multiple database platforms.

MongoDBPassword policymysql
0 likes · 13 min read
How to Stop Bitcoin Ransomware Attacks on MySQL and Other Databases
Architecture Digest
Architecture Digest
Feb 28, 2017 · Big Data

Architecture and Real‑Time Processing Design of Tencent Analytics (TA)

This article explains the architecture, real‑time computation framework, and storage solutions of Tencent Analytics, detailing how massive TB‑level web‑traffic data are collected via JavaScript, processed in memory‑centric streaming components, and stored using Redis and LevelDB to achieve second‑level updates.

Big DataLevelDBNoSQL
0 likes · 13 min read
Architecture and Real‑Time Processing Design of Tencent Analytics (TA)
转转QA
转转QA
Feb 13, 2017 · Databases

Redis Connection Pool Saturation: A Debugging Tale

A developer recounts how a Redis connection pool overflow across dozens of clusters was traced to a single misbehaving service, diagnosed with netstat and ps commands, and resolved by adjusting configuration and stopping the offending process, illustrating practical troubleshooting of connection limits.

Connection PoolOperationsmonitoring
0 likes · 4 min read
Redis Connection Pool Saturation: A Debugging Tale
ITPUB
ITPUB
Jan 21, 2017 · Databases

How Redis Implements LRU Eviction: Deep Dive with Python Example

This article explains Redis's LRU eviction mechanism, starting with a brief LRU overview, presenting a Python LRU cache implementation, then detailing Redis's internal LRU clock, object fields, maxmemory policies, and both active and passive eviction processes, highlighting configuration impacts on performance.

Cache EvictionLRUMemory Management
0 likes · 15 min read
How Redis Implements LRU Eviction: Deep Dive with Python Example
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jan 5, 2017 · Databases

Redis vs Memcached: Architecture, Data Types, and Real-World Use Cases

This article examines the MySQL‑Memcached architecture, explains Memcached’s slab memory management, compares Redis and Memcached across performance, memory efficiency, persistence and data structures, details Redis’s core data types and their internal implementations, and showcases practical use‑cases such as caching, ranking, queues, Pub/Sub and real‑time analytics.

Data StructuresMemcachedredis
0 likes · 27 min read
Redis vs Memcached: Architecture, Data Types, and Real-World Use Cases
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jan 4, 2017 · Backend Development

Scaling Web Systems to 100M Visits: Load Balancing, Caching, and DB Tactics

This article explores how a web system can evolve from handling 100,000 daily visits to over 100 million by implementing multi‑layered load‑balancing strategies, optimizing MySQL with indexing and connection pooling, leveraging Redis and cache clusters, and employing geographic distribution and disaster‑recovery techniques to ensure performance and reliability.

MySQL optimizationcachingdistributed architecture
0 likes · 22 min read
Scaling Web Systems to 100M Visits: Load Balancing, Caching, and DB Tactics
Tencent Cloud Developer
Tencent Cloud Developer
Dec 26, 2016 · Databases

Analysis of Redis Design: Network Model, Data Structures, Memory Management, Persistence, and Clustering

The article dissects Redis’s architecture by examining its single‑threaded reactor network model, core data structures and memory‑management tactics, AOF/RDB persistence mechanisms, and master‑slave, Sentinel, and Cluster multi‑node strategies, highlighting how each design choice balances speed, memory usage, and system complexity.

Event-drivenMemory ManagementPersistence
0 likes · 16 min read
Analysis of Redis Design: Network Model, Data Structures, Memory Management, Persistence, and Clustering
dbaplus Community
dbaplus Community
Dec 14, 2016 · Backend Development

Master Memcached, Redis, and RabbitMQ: Install, Configure, and Use with Python

This guide walks through the fundamentals, installation steps, configuration details, and Python integration for three essential backend services—Memcached for high‑performance caching, Redis for persistent key‑value storage, and RabbitMQ for reliable messaging—complete with command‑line examples, code snippets, and best‑practice tips.

Backend DevelopmentMemcachedMessage Queue
0 likes · 19 min read
Master Memcached, Redis, and RabbitMQ: Install, Configure, and Use with Python
Architecture Digest
Architecture Digest
Nov 26, 2016 · Databases

Redis Cache Update Strategies and Best Practices

This article summarizes common Redis cache update problems, compares four update approaches—including proactive, passive, and pre‑loading methods—and recommends a pre‑load strategy with key versioning to avoid data loss, improve performance, and reduce memory waste.

CacheUpdate Strategydatabase
0 likes · 8 min read
Redis Cache Update Strategies and Best Practices
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Nov 24, 2016 · Fundamentals

Why Redlock May Not Be the Ultimate Distributed Lock (And What to Use Instead)

This article reviews the evolution of distributed locking—from simple MySQL table locks to Redis cache locks and the Redlock algorithm—examines expert criticisms of Redlock’s correctness, presents the Redis author’s rebuttal, and ultimately recommends Zookeeper as a more reliable solution for high‑availability distributed locks.

CacheConsensusRedlock
0 likes · 22 min read
Why Redlock May Not Be the Ultimate Distributed Lock (And What to Use Instead)
Qunar Tech Salon
Qunar Tech Salon
Nov 23, 2016 · Databases

Redis Client/Server Interaction Process: A Step‑by‑Step Overview

This article provides a comprehensive, source‑code‑driven walkthrough of the Redis client‑server interaction, detailing the six main steps from socket establishment to command execution and response, while also covering auxiliary mechanisms such as beforeSleep processing, key expiration strategies, and the underlying epoll I/O multiplexing model.

Key ExpirationSocketclient-server
0 likes · 16 min read
Redis Client/Server Interaction Process: A Step‑by‑Step Overview
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 17, 2016 · Operations

Why Large Redis Instances Cause Disasters and How to Prevent Them

This article examines the operational challenges of oversized Redis instances—including slow failover, prolonged slave resynchronization, network‑induced avalanches, and persistence blocking—and offers practical mitigation strategies such as key expiration, data compression, and using high‑performance alternatives like Pika.

Database operationsMemory ManagementPerformance Optimization
0 likes · 9 min read
Why Large Redis Instances Cause Disasters and How to Prevent Them
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 15, 2016 · Databases

How to Set Up Redis Master‑Slave Replication in Minutes

This guide walks you through configuring a simple Redis master‑slave setup, covering the benefits, step‑by‑step file modifications, essential replication directives, testing procedures, and common pitfalls to ensure high availability and read/write separation.

Configurationdatabasehigh availability
0 likes · 5 min read
How to Set Up Redis Master‑Slave Replication in Minutes
dbaplus Community
dbaplus Community
Nov 1, 2016 · Information Security

Exploiting Message Queue Injection to Hijack Distributed Nodes with Celery

The article explains how insecure serialization in message‑queue middleware, especially Python's pickle used by Celery, can be abused to inject malicious payloads that trigger remote code execution on distributed workers, and it demonstrates detection and exploitation techniques against vulnerable Redis and MongoDB brokers.

ExploitMessage QueuePython
0 likes · 17 min read
Exploiting Message Queue Injection to Hijack Distributed Nodes with Celery
dbaplus Community
dbaplus Community
Oct 30, 2016 · Databases

Memcached vs Redis: Architecture, Memory Management & Persistence

This article provides a detailed comparison of Memcached and Redis by examining their service models, event loops, memory allocation strategies, database structures, persistence mechanisms (RDB and AOF), transaction support, and publish‑subscribe features, highlighting the design choices, trade‑offs, and implementation nuances of each key‑value caching system.

MemcachedMemory ManagementPersistence
0 likes · 35 min read
Memcached vs Redis: Architecture, Memory Management & Persistence
Architecture Digest
Architecture Digest
Oct 17, 2016 · Databases

Common Redis Data Types, Memory Optimizations, and Persistence Mechanisms

This article explains Redis's five primary data types—String, Hash, List, Set, and Sorted Set—detailing their commands, use‑cases, internal encodings, memory‑saving configuration parameters, and the available persistence strategies, while offering practical recommendations for production deployments.

Data TypesPersistencedatabases
0 likes · 14 min read
Common Redis Data Types, Memory Optimizations, and Persistence Mechanisms
ITPUB
ITPUB
Oct 15, 2016 · Databases

Mastering Redis: Data Types, Memory Tweaks, and Persistence Strategies

This article explains Redis's five core data types, their internal representations and typical commands, details memory‑saving parameters for each type, compares the four persistence methods with their trade‑offs, and offers practical recommendations for optimal performance and stability.

Data TypesMemory Optimizationdatabase
0 likes · 16 min read
Mastering Redis: Data Types, Memory Tweaks, and Persistence Strategies
dbaplus Community
dbaplus Community
Oct 12, 2016 · Backend Development

How JD’s Flash‑Sale System Handles Millions of Requests with Redis‑Lua

This article explains the design of JD’s flash‑sale (抢购) system, covering its business model, core Redis‑based inventory management, Lua scripting for atomic stock deduction, rate‑limiting, asynchronous logging with JMQ, and fail‑over strategies to ensure high‑concurrency reliability.

Backend ArchitectureLua scriptinge‑commerce
0 likes · 12 min read
How JD’s Flash‑Sale System Handles Millions of Requests with Redis‑Lua
Meituan Technology Team
Meituan Technology Team
Oct 1, 2016 · Backend Development

Analysis of Mutual Exclusion and Idempotency Issues in Distributed Systems and Their Solutions

The article examines how distributed systems face mutual‑exclusion and idempotency challenges, explains traditional thread and process synchronization, then details distributed‑lock techniques (e.g., Zookeeper, Redis, Tair, Cerberus) and global‑ID‑based idempotent services, emphasizing the importance of external storage, fault‑tolerance, and proper lock granularity for reliable high‑throughput applications.

IdempotencyJava concurrencyZooKeeper
0 likes · 36 min read
Analysis of Mutual Exclusion and Idempotency Issues in Distributed Systems and Their Solutions
ITPUB
ITPUB
Sep 25, 2016 · Databases

How Redis 2.8 Introduces Partial Replication to Avoid Full Sync on Network Glitches

This article explains Redis’s master‑slave replication mechanism, compares the full‑copy process of Redis 2.4.16 with the partial‑copy improvements introduced in Redis 2.8, details the state machine, replication‑cron workflow, repl_backlog buffer, run‑id handling, and configuration options for optimizing partial synchronization during network interruptions.

BackendPartial SyncReplication
0 likes · 11 min read
How Redis 2.8 Introduces Partial Replication to Avoid Full Sync on Network Glitches
dbaplus Community
dbaplus Community
Sep 20, 2016 · Backend Development

Zero‑Intrusion Data Fallback with Nginx + Lua: A Practical Guide

This article explains how to design a robust, zero‑intrusion data fallback component for high‑traffic web services using Nginx, Lua, and AOP principles, covering problem definition, architectural options, detailed execution steps, configuration snippets, storage choices, and performance monitoring.

Data FallbackLuaNginx
0 likes · 11 min read
Zero‑Intrusion Data Fallback with Nginx + Lua: A Practical Guide
MaGe Linux Operations
MaGe Linux Operations
Sep 19, 2016 · Databases

Master Redis Cluster Setup: From Basics to Scaling Nodes

Learn how to build and manage a Redis cluster on Linux, covering the rationale for clustering, hash slot mechanics, node configuration, adding/removing nodes, resharding, and integrating master‑slave replicas, with step‑by‑step commands and practical examples.

ClusterDevOpsdatabase
0 likes · 11 min read
Master Redis Cluster Setup: From Basics to Scaling Nodes
GF Securities FinTech
GF Securities FinTech
Sep 14, 2016 · Big Data

Scaling Real-Time Stock Market Data with Redis, Lua, and Go Goroutines

Exploring how a securities firm processes billions of daily stock‑market indicators in real time, this article compares an in‑process Redis + Lua solution with an out‑of‑process Goroutine‑based architecture, detailing data flow, performance trade‑offs, and scalability considerations for high‑frequency time‑series workloads.

Luaparallel computingreal-time data
0 likes · 12 min read
Scaling Real-Time Stock Market Data with Redis, Lua, and Go Goroutines
ITPUB
ITPUB
Aug 21, 2016 · Backend Development

How to Diagnose and Prevent Redis Data Loss in Production

This article examines common causes of Redis data loss, walks through a real‑world incident where 90,000 keys vanished, and provides concrete monitoring, configuration, and operational safeguards to detect and avoid such failures.

BackendData lossOperations
0 likes · 11 min read
How to Diagnose and Prevent Redis Data Loss in Production
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Aug 12, 2016 · Databases

Why Redis Replicas Return Expired Keys and How to Prevent It

The article explains how Redis replicas can return keys that should have expired due to the master‑only expiration process, describes the three expiration strategies (lazy, periodic, active), and offers practical solutions such as using SCAN or upgrading to Redis 3.2 to avoid stale reads.

CacheExpirationReplication
0 likes · 9 min read
Why Redis Replicas Return Expired Keys and How to Prevent It
dbaplus Community
dbaplus Community
Aug 12, 2016 · Backend Development

Designing a High‑Performance In‑Memory Cache: Structures, Locks, and Go Concurrency

This article explores the fundamentals of building a high‑performance in‑memory cache, covering the relationship between caches and KV stores, various cache types, core data structures such as hash tables, lock strategies, rehash techniques, memory management, and network models, with practical examples and Go‑based concurrency designs.

GoMemoryManagementhashtable
0 likes · 20 min read
Designing a High‑Performance In‑Memory Cache: Structures, Locks, and Go Concurrency
Java High-Performance Architecture
Java High-Performance Architecture
Aug 5, 2016 · Databases

5 Essential Redis Tips from Heroku to Boost Performance

Heroku shares five practical Redis recommendations—including using connection pools, naming clients, selecting key eviction policies, avoiding the KEYS command, and configuring connection timeouts—to improve performance, manage resources, and simplify troubleshooting in production environments.

Client NamingConnection PoolKey Eviction
0 likes · 4 min read
5 Essential Redis Tips from Heroku to Boost Performance
Architecture Digest
Architecture Digest
Jul 31, 2016 · Game Development

Maintaining Game World State with Data Services: Architecture, Sharding, and High Availability

This article examines how to maintain game world state using data services, discussing traditional DB proxy processes, the role of Redis as a cache and database, stateless versus stateful services, sharding, high‑availability mechanisms such as Sentinel, Zookeeper, and the overall architecture for scalable MMO back‑ends.

Data Servicegame serverhigh availability
0 likes · 32 min read
Maintaining Game World State with Data Services: Architecture, Sharding, and High Availability
Architect
Architect
Jul 21, 2016 · Databases

Redis Ziplist (Compressed List) Principles and Applications

This article explains Redis’s ziplist (compressed list) memory layout, detailing its overall encoding, node structure—including previous length, encoding, and content fields—illustrates how various Redis data types employ ziplist encoding, and analyzes the benefits and trade‑offs of using this structure.

Data StructuresMemory Optimizationredis
0 likes · 10 min read
Redis Ziplist (Compressed List) Principles and Applications
Architect
Architect
Jul 3, 2016 · Databases

Understanding Redis Cluster Partitioning Implementation

This article explains how Redis Cluster automatically distributes data across nodes, how clients locate the correct node using slot hashing and hash tags, and how resharding and slot migration are performed without downtime, providing a detailed overview of the partitioning mechanism.

ClusterKey hashingPartitioning
0 likes · 10 min read
Understanding Redis Cluster Partitioning Implementation
ITPUB
ITPUB
Jul 2, 2016 · Databases

Understanding NoSQL: Key-Value, Columnar, and Document Databases Explained

An overview of NoSQL database types—including key‑value stores like Redis, column‑oriented systems such as BigTable and HBase, and document databases like MongoDB—covers their architectures, strengths, typical use cases, and key factors to consider when selecting a NoSQL solution for web applications.

ColumnarDocumentMongoDB
0 likes · 8 min read
Understanding NoSQL: Key-Value, Columnar, and Document Databases Explained
ITPUB
ITPUB
Jun 25, 2016 · Operations

Why Large Redis Deployments Fail: Failover, Scaling, and Memory Pitfalls

The article examines how oversized Redis instances cause catastrophic failures during primary node crashes, scaling bursts, and network issues, explains the costly re‑synchronization steps, presents real‑world timing data, and offers practical memory‑reduction strategies to keep Redis operations reliable.

failoverredisscaling
0 likes · 8 min read
Why Large Redis Deployments Fail: Failover, Scaling, and Memory Pitfalls
Java High-Performance Architecture
Java High-Performance Architecture
Jun 24, 2016 · Databases

Boost Redis Performance: Reduce Latency with Multi-Param Commands, Pipelining, and Smart Command Choices

This article explains how Redis' single‑threaded nature can cause latency and offers three optimization strategies—reducing network I/O, shortening command queues, and cutting execution time—through multi‑parameter commands, pipelining, and avoiding costly operations.

Command LatencyMulti-parameter Commandspipelining
0 likes · 3 min read
Boost Redis Performance: Reduce Latency with Multi-Param Commands, Pipelining, and Smart Command Choices
Efficient Ops
Efficient Ops
Jun 19, 2016 · Databases

One‑Click Docker Deployment of a Redis Sharding Cluster

This guide explains how to build Docker images, configure Redis, and orchestrate containers to create a fully automated, one‑click Redis sharding cluster, covering preparation, scripting, configuration, and verification steps.

ClusterDatabase DeploymentDevOps
0 likes · 11 min read
One‑Click Docker Deployment of a Redis Sharding Cluster
21CTO
21CTO
Jun 12, 2016 · Backend Development

Mastering Rate Limiting: Token Bucket, Leaky Bucket, and Real‑World Implementations

This article explains why caching, degradation, and rate limiting are essential for high‑concurrency systems, details token‑bucket and leaky‑bucket algorithms, shows application‑level, distributed, and edge‑level throttling techniques, and provides practical Java, Guava, Redis‑Lua, and Nginx‑Lua code examples.

GuavaJavaNginx
0 likes · 17 min read
Mastering Rate Limiting: Token Bucket, Leaky Bucket, and Real‑World Implementations
ITPUB
ITPUB
May 25, 2016 · Databases

Mastering Redis Replication: Features, Mechanics, and Deployment Guide

Redis replication offers high‑availability through master‑slave syncing, supporting multiple slaves, cascading replication, non‑blocking data transfer, read‑write separation, and optional disk‑less sync, with detailed steps for configuration, safety considerations, partial resynchronization, and practical deployment examples.

Master‑SlaveReplicationdatabase
0 likes · 8 min read
Mastering Redis Replication: Features, Mechanics, and Deployment Guide
dbaplus Community
dbaplus Community
May 24, 2016 · Databases

Which NoSQL DB Fits Your Node Project? HBase, Redis, MongoDB, Couchbase, LevelDB Compared

This article provides a detailed comparison of five popular NoSQL databases—HBase, Redis, MongoDB, Couchbase, and LevelDB—covering their data models, performance characteristics, CAP classification, Node.js client options, advantages, drawbacks, and ideal use‑cases to help developers choose the right storage solution for a new Node project.

CouchbaseHBaseLevelDB
0 likes · 28 min read
Which NoSQL DB Fits Your Node Project? HBase, Redis, MongoDB, Couchbase, LevelDB Compared
Baidu Maps Tech Team
Baidu Maps Tech Team
May 11, 2016 · Backend Development

Mastering Cache Strategies: When to Use LRU, LFU, and Consistency Techniques

This article explains why caching is essential for high‑performance data retrieval, compares LRU and LFU eviction policies, presents three Redis‑based cache implementations, and discusses consistency challenges and solutions such as eviction ordering, consistent hashing, and delayed eviction in distributed systems.

ConsistencyLFULRU
0 likes · 10 min read
Mastering Cache Strategies: When to Use LRU, LFU, and Consistency Techniques
Big Data and Microservices
Big Data and Microservices
May 11, 2016 · Backend Development

How to Build a Scalable Flash‑Sale System that Handles Massive Traffic

This article analyzes flash‑sale (抢购) business scenarios, outlines a layered architecture separating business and data layers, explains decoupling front‑end pressure, uses Redis‑based queues and caching to manage high‑frequency inventory checks, and describes multi‑party reconciliation mechanisms to ensure reliable stock consistency under extreme load.

Backend ArchitectureSystem Designdatabase
0 likes · 11 min read
How to Build a Scalable Flash‑Sale System that Handles Massive Traffic
MaGe Linux Operations
MaGe Linux Operations
Apr 19, 2016 · Databases

How to Set Up a Codis Cluster on Linux with Go: Step‑by‑Step Guide

This article provides a comprehensive, step‑by‑step tutorial for installing Go 1.4, compiling Codis from source, configuring Zookeeper, setting up Codis server, proxy, and dashboard, and deploying a three‑node Codis cluster on Linux, including all necessary environment variables and command examples.

ClusterCodisGo
0 likes · 11 min read
How to Set Up a Codis Cluster on Linux with Go: Step‑by‑Step Guide
dbaplus Community
dbaplus Community
Apr 13, 2016 · Databases

Secure Redis Cluster: Adding Password Authentication and Automated Node Management

This guide explains why the official Redis Cluster tools lack password support, outlines the security risks of an unauthenticated cluster, and introduces a custom management utility that adds password authentication, automates slot migration, and simplifies adding or removing nodes, complete with step‑by‑step testing procedures.

Cluster ManagementData MigrationRedis Cluster
0 likes · 8 min read
Secure Redis Cluster: Adding Password Authentication and Automated Node Management
MaGe Linux Operations
MaGe Linux Operations
Apr 2, 2016 · Operations

How to Install GitLab on Debian: Complete Step‑by‑Step Guide

This guide walks through the complete installation of GitLab on a Debian system, covering package installation, Ruby and Go setup, system user creation, database configuration, Redis setup, cloning the source, configuring GitLab, initializing the database, and starting the service.

DebianGoInstallation
0 likes · 18 min read
How to Install GitLab on Debian: Complete Step‑by‑Step Guide
21CTO
21CTO
Mar 25, 2016 · Backend Development

How to Share Tomcat Sessions via Redis: Step-by-Step Setup Guide

This tutorial walks through configuring Redis for Tomcat session sharing on Windows, covering environment setup, Gradle compilation of the tomcat-redis-session-manager plugin, jar deployment, context.xml configuration, and verification of shared session IDs across multiple Tomcat instances.

GradleJavaTomcat
0 likes · 8 min read
How to Share Tomcat Sessions via Redis: Step-by-Step Setup Guide
Efficient Ops
Efficient Ops
Mar 22, 2016 · Databases

Scaling PB‑Level Data: Mastering Redis, Codis, and MySQL Sharding

In this technical share, the operations director explains how his team tackled PB‑scale data challenges by scaling Redis with Codis, implementing multi‑dimensional MySQL sharding, using vertical and horizontal partitioning, and optimizing storage with TokuDB, offering practical insights for high‑throughput system design.

CodisPB-level Datamysql
0 likes · 15 min read
Scaling PB‑Level Data: Mastering Redis, Codis, and MySQL Sharding
Efficient Ops
Efficient Ops
Mar 15, 2016 · Operations

How to Use Redis for Efficient Deduplication in Operations Data Analysis

This article explains practical methods for deduplicating and counting data in operational analytics using Redis, covering SET, ZSET, BITSET, HyperLogLog, and Bloom filter structures, their advantages, limitations, and suitable scenarios for real‑time and large‑scale metric calculations.

HyperLogLogdeduplicationredis
0 likes · 10 min read
How to Use Redis for Efficient Deduplication in Operations Data Analysis
Java High-Performance Architecture
Java High-Performance Architecture
Mar 8, 2016 · Databases

Understanding Redis Memory Eviction: 6 Policies Explained

When Redis reaches its maxmemory limit, it can use one of six eviction policies—volatile‑lru, allkeys‑lru, volatile‑random, allkeys‑random, volatile‑ttl, or noeviction—to decide which keys to remove, with defaults and configurable sampling influencing performance and accuracy.

Cachedatabasesmemory eviction
0 likes · 2 min read
Understanding Redis Memory Eviction: 6 Policies Explained
High Availability Architecture
High Availability Architecture
Feb 26, 2016 · Databases

Weibo Database Architecture: Evolution, Optimization, and Design Practices

This article details the evolution of Weibo's database platform—from its early single‑master design through rapid scaling, vertical and horizontal sharding, automation, Redis enhancements, custom middleware, and future plans—offering practical insights into high‑availability, high‑performance data engineering for large‑scale social media services.

AutomationDatabase ArchitectureWeibo
0 likes · 23 min read
Weibo Database Architecture: Evolution, Optimization, and Design Practices
21CTO
21CTO
Feb 25, 2016 · Backend Development

Mastering Multi‑Layer Caching in Rails with Nginx, Redis, and MySQL

This article explains six practical caching strategies—from client‑side HTTP 304 handling to Nginx static caching, full‑page, fragment, query, and database caches—using Ruby on Rails, Nginx, MySQL, and Redis to dramatically improve web application performance.

RailsWeb Developmentcaching
0 likes · 12 min read
Mastering Multi‑Layer Caching in Rails with Nginx, Redis, and MySQL
21CTO
21CTO
Feb 4, 2016 · Backend Development

How Tumblr Scaled to 5 Billion Page Views: Inside Their Distributed Architecture

This article examines how Tumblr handled rapid growth—processing 5 billion daily page views, 40 k requests per second, and terabytes of data—by evolving from a LAMP stack to a Scala‑based, Finagle‑driven distributed system with HBase, Redis, Kafka, and a cell architecture that supports massive real‑time dashboards.

Backend ArchitectureDistributed SystemsFinagle
0 likes · 21 min read
How Tumblr Scaled to 5 Billion Page Views: Inside Their Distributed Architecture
Efficient Ops
Efficient Ops
Feb 2, 2016 · Databases

Why Codis Outperforms Twemproxy: A Deep Dive into Redis Cluster Solutions

This article examines Redis clustering techniques, compares client‑side sharding, proxy sharding, and Redis Cluster, critiques Twemproxy's limitations, and presents Codis's architecture, performance benchmarks, and practical tips for seamless migration and high‑availability in modern operations.

CodisTwemproxydatabase clustering
0 likes · 11 min read
Why Codis Outperforms Twemproxy: A Deep Dive into Redis Cluster Solutions
Java High-Performance Architecture
Java High-Performance Architecture
Jan 30, 2016 · Databases

Understanding Redis 3 Cluster: Key Concepts, Features, and Operations

Redis 3 now officially supports clustering, introducing hash slots and dynamic node management to simplify key distribution, scaling, and fault tolerance, allowing seamless read/write operations across multiple nodes without manual hashing, and offering features like online node addition, automatic slave monitoring, and performance‑aware key allocation.

ClusterHash Slotdatabase
0 likes · 4 min read
Understanding Redis 3 Cluster: Key Concepts, Features, and Operations
Qunar Tech Salon
Qunar Tech Salon
Jan 14, 2016 · Databases

Understanding Redis’s Reactor Pattern and I/O Multiplexing

This article explains how Redis, a high‑performance in‑memory database, uses a single‑process single‑thread architecture combined with the Reactor pattern and I/O multiplexing techniques such as select, poll, epoll, and kqueue to efficiently handle massive client connections.

BackendEvent-drivenI/O Multiplexing
0 likes · 12 min read
Understanding Redis’s Reactor Pattern and I/O Multiplexing
Architect
Architect
Jan 11, 2016 · Backend Development

Understanding Redis’s Reactor Pattern and I/O Multiplexing

This article explains how Redis, a single‑process single‑threaded in‑memory database, uses the Reactor pattern and various I/O multiplexing techniques such as select, poll, epoll, and kqueue to efficiently handle thousands of concurrent client connections.

Backend ArchitectureI/O MultiplexingReactor Pattern
0 likes · 12 min read
Understanding Redis’s Reactor Pattern and I/O Multiplexing
Java High-Performance Architecture
Java High-Performance Architecture
Dec 23, 2015 · Backend Development

Ensuring Safe Redis Queues with RPOPLPUSH and Blocking Commands

Redis lists enable simple message queues, but using LPOP/RPOP can lose messages if a consumer crashes; employing the atomic RPOPLPUSH (or its blocking BRPOPLPUSH) command safeguards delivery, and choosing blocking over non‑blocking operations reduces wasted polling and improves resource efficiency.

Blocking CommandsMessage QueueRPOPLPUSH
0 likes · 4 min read
Ensuring Safe Redis Queues with RPOPLPUSH and Blocking Commands
21CTO
21CTO
Dec 20, 2015 · Backend Development

How Twitter Scales Redis to 105 TB RAM and 39 M QPS

This article summarizes Yao Yu's "Scaling Redis at Twitter" talk, detailing why Twitter chose Redis, the massive memory and QPS requirements, custom data models, Hybrid List and BTree extensions, cluster management, and operational lessons for building a high‑performance caching service.

Cluster ManagementTwitterbackend infrastructure
0 likes · 21 min read
How Twitter Scales Redis to 105 TB RAM and 39 M QPS
Architect
Architect
Dec 14, 2015 · Databases

Redis Cluster: Application Cases, Pros & Cons, and Technical Analysis

This article reviews real‑world Redis Cluster deployments from Youdao, Qihoo 360 and Mango TV, analyzes its architectural drawbacks, client challenges, implementation limitations, performance impact, and summarizes the overall advantages and disadvantages of using Redis Cluster as a distributed database solution.

Case StudyClusterdatabase
0 likes · 13 min read
Redis Cluster: Application Cases, Pros & Cons, and Technical Analysis
Architect
Architect
Dec 13, 2015 · Databases

Redis Partitioning: How to Store Data Across Multiple Redis Instances

This article explains the concept, benefits, methods, and practical considerations of partitioning data across multiple Redis instances, covering range and hash partitioning, consistent hashing, implementation options, drawbacks, and recommended tools such as Redis Cluster and Twemproxy.

PartitioningRedis ClusterTwemproxy
0 likes · 11 min read
Redis Partitioning: How to Store Data Across Multiple Redis Instances
dbaplus Community
dbaplus Community
Dec 12, 2015 · Backend Development

How Memcached and Redis Work: Architecture, Protocols, and Memory Management

This article breaks down the core architecture, request protocols, and memory management mechanisms of Memcached and Redis, comparing their server models, highlighting their strengths and trade‑offs, and offering practical guidance for selecting and tuning these distributed caching solutions.

BackendMemcacheddistributed cache
0 likes · 8 min read
How Memcached and Redis Work: Architecture, Protocols, and Memory Management
Architect
Architect
Dec 12, 2015 · Databases

Understanding Redis Master‑Slave Replication and Its Configuration

This article explains how Redis master‑slave replication works, covering asynchronous copying, partial resynchronization, disk‑less replication, safety considerations when persistence is disabled, read‑only slaves, authentication, and configuration options such as slaveof and write‑restriction based on slave count.

ConfigurationMaster‑SlaveReplication
0 likes · 10 min read
Understanding Redis Master‑Slave Replication and Its Configuration
Architect
Architect
Dec 11, 2015 · Backend Development

Implementing Distributed Locks with Redis: The RedLock Algorithm

This article explains how to build reliable distributed locks using Redis, introduces the official RedLock algorithm, discusses safety properties, compares it with simple failover approaches, and provides implementation details, performance considerations, and lock‑extension techniques.

Redlockconcurrencydistributed-lock
0 likes · 16 min read
Implementing Distributed Locks with Redis: The RedLock Algorithm
21CTO
21CTO
Dec 11, 2015 · Backend Development

From Simple Polling to Scalable Microservices: JD’s Dongdong IM Evolution

This article chronicles the architectural journey of JD’s Dongdong instant‑messaging platform, detailing its early simple polling design, subsequent performance and scalability challenges, and the progressive shifts toward service‑oriented, micro‑service, and cloud‑native architectures that support massive user growth.

Backend ArchitectureIM SystemMicroservices
0 likes · 11 min read
From Simple Polling to Scalable Microservices: JD’s Dongdong IM Evolution
Architect
Architect
Dec 10, 2015 · Databases

Understanding Redis maxmemory Configuration and Approximate LRU Eviction Policies

Redis provides a configurable maxmemory setting to limit memory usage, and offers several eviction policies—including allkeys‑lru, volatile‑lru, and random strategies—implemented via an approximate LRU algorithm whose behavior can be tuned with maxmemory‑samples, allowing administrators to balance performance and memory reclamation.

LRUMemory Managementeviction
0 likes · 11 min read
Understanding Redis maxmemory Configuration and Approximate LRU Eviction Policies
21CTO
21CTO
Dec 9, 2015 · Backend Development

How Worktile Built a Scalable MEAN Stack with Real‑Time Messaging

This article explains how Worktile’s team collaboration platform combines a single‑page AngularJS front‑end with Node.js, Redis, MongoDB, and ejabberd XMPP services to achieve cross‑platform access, native‑like interactions, and high‑performance real‑time updates for over 100,000 teams.

AngularJSMEAN stackNode.js
0 likes · 10 min read
How Worktile Built a Scalable MEAN Stack with Real‑Time Messaging
ITPUB
ITPUB
Dec 4, 2015 · Backend Development

How to Measure and Optimize System Load Capacity for High‑Concurrency Backends

This guide explains key metrics, influencing factors, and practical tuning steps—including bandwidth, hardware, OS limits, TCP parameters, and server configurations—to assess and improve a backend system's maximum request handling capacity under high concurrency.

Linux TuningLoad TestingNginx
0 likes · 19 min read
How to Measure and Optimize System Load Capacity for High‑Concurrency Backends