High Availability Redis: Distributed System Practices

Advanced 4.2

12 months 30 days

$348.00 $278.00

0 Learners 30 Reviews 1 Favorites

17%
80%
3%
0%
0%
4.2
  • Overview
  • Outline
  • Reviews
  • Packages

The course includes basics of Redis, introduction to using experience, Java and Python client demonstrations, and Redis usage specifications. It goes from simple to in-depth explanation, accompanied by related projects developed by Redis in the enterprise and practical experience of large-scale Redis. It is a must-have for development and operation and maintenance personnel to systematically learn Redis.

First meeting Redis

  • learners 'guidance
    18:17
  • First meeting Redis
    15:05
  • Who is using Redis?
    13:25
  • redis feature catalog
    12:56
  • Feature 1-Fast speed
    18:13
  • Feature 2-Persistence
    17:49
  • Feature 3-Data Structure
    16:44
  • Feature 4-Multilingual Client
    26:55
  • Feature 5-Rich in features
    14:12
  • Feature 6-Simple
    21:51
  • Feature 7-Copying
    26:43
  • Feature 8-Highly Available Distributed
    17:13
  • Typical usage scenarios for redis
    27:06
  • Introduction to three start-up methods of redis
    19:57
  • Common redis configurations
    25:43
  • redis installation and launch demonstration
    21:12

Understanding and use of APIs

  • - Course catalog
    13:09
  • - General command
    23:44
  • Data structure and internal coding
    12:58
  • single-threaded
    20:23
  • string
    28:34
  • hash (1)
    29:10
  • hash (2)
    26:38
  • list(1)
    13:48
  • list(2)
    28:38
  • set
    23:22
  • zset
    17:55

Use of Redis client

  • course catalog
    20:15
  • Java client: Jedis
    28:16
  • Python client: redis-py
    22:27
  • Go client: Introduction to redigo
    18:00
  • Jedis Configuration Optimization (Part 1)
    22:45
  • Jedis Configuration Optimization (Part 2)
    28:06

Swiss Army Knife Redis Other Features

  • course catalog
    16:14
  • slow query
    27:19
  • pipeline
    28:20
  • publish-subscribe
    13:43
  • bitmap
    28:23
  • hyperloglog
    12:23
  • geo
    18:13

Redis persistence trade-offs and choices

  • directory
    12:50
  • The role of persistence
    10:01
  • RDB(1)
    22:26
  • RDB(2)
    29:40
  • RDB(3)
    23:11
  • AOF(1)
    12:57
  • AOF(2)
    28:01
  • AOF experiment
    14:49
  • Choice between RDB and AOF
    11:13

Common persistent development operation and maintenance issues

  • Frequently Asked Questions Directory
    10:21
  • fork
    26:06
  • Subprocess overhead and optimization
    13:34
  • AOF blocking
    11:03

Principles and Optimization of Redis Replication

  • directory
    28:42
  • What is master-slave replication
    12:59
  • Master-slave replication configuration-introduction
    21:42
  • Master-slave replication configuration-operations
    28:32
  • runid and copy offset
    22:06
  • full copy
    16:12
  • Full replication overhead + partial replication
    27:16
  • fault handling
    12:36
  • Master-slave replication common issues
    20:21

Redis Sentinel

  • Sentinel-Directory
    18:02
  • Master-slave replication highly available?
    15:23
  • redis sentinel architecture
    11:06
  • redis sentinel installation and configuration
    16:58
  • redis sentinel installation demonstration-1
    28:00
  • redis sentinel installation demonstration-2
    21:45
  • Java client
    16:55
  • Python client
    15:56
  • Implementation Principle-1-Failover Drill
    29:54
  • Implementation Principle-2. Failover Drill (Client)
    28:50
  • Implementation Principle-3. Fault Drill (Log Analysis)
    23:30
  • Three scheduled tasks
    17:53
  • Subjective and objective offline
    11:36
  • leader election
    14:48
  • failover
    18:24
  • Common Development and Operation Issues-Contents
    19:03
  • Node operation and maintenance
    11:40
  • Highly available read-write separation
    21:55
  • this chapter summarizes
    24:45

First encounter with Redis Cluster

  • Contents of this chapter
    19:23
  • Call for clusters
    15:50
  • Introduction to Data Distribution
    17:25
  • node redundancy partition
    27:59
  • consistent hash partitioning
    20:30
  • virtual slot hash distribution
    25:29
  • basic architecture
    12:28
  • Native installation
    10:47
  • Native Installation-1.Prepare Nodes
    22:32
  • Native installation-2. Node handshake
    29:36
  • Native Installation-3. Distribution Slot
    12:23
  • Native Installation-4. Assign Master and Slave
    14:05
  • Ruby Environmental Preparation-Instructions
    25:58
  • Ruby Environment Preparation-Operation
    20:51
  • redis-trib builds clusters
    15:44
  • Native commands and redis-trib.rb
    28:13

Deep into Redis Cluster

  • Cluster Scaling Directory
    22:56
  • Principle of cluster scaling
    16:07
  • Expand Cluster-1.Join Node
    11:12
  • Expand Cluster-2. Join a Cluster
    11:30
  • Expand Cluster-3. Migrate Slots and Data
    17:09
  • Cluster Capacity Expansion Demonstration-1
    10:10
  • Cluster Capacity Expansion Demonstration-2
    15:44
  • Cluster Size Reduction-Description
    28:51
  • Cluster downsizing-Operation
    15:44
  • Client Routing-Directory
    16:12
  • moved exception description and operation
    11:07
  • ask redirect
    29:49
  • Implementation principle of smart client
    23:56
  • JedisCluster performs source code analysis
    11:56
  • smart client JedisCluster-Contents
    27:58
  • Basic usage of JedisCluster
    10:23
  • Integrate spring-1
    20:02
  • Integrate spring-2
    12:23
  • multi-node operation command
    29:13
  • Batch operation optimization
    20:53
  • Failover-Contents
    13:31
  • fault detection
    26:05
  • fault recovery
    10:48
  • fault simulation
    14:41
  • Common Development and Operation Issues in Redis Cluster-Contents
    28:21
  • cluster integrity
    21:22
  • bandwidth consumption
    26:13
  • PubSub Radio
    14:25
  • Cluster Tilt-Contents
    23:05
  • data skew
    27:36
  • Request tilt
    13:07
  • read-write separation
    15:33
  • data migration
    20:31
  • Cluster vs Single Machine
    17:34
  • this chapter summarizes
    20:16

Cache design and optimization

  • directory
    17:48
  • Benefits and costs of caching
    10:29
  • Cache update strategy
    27:02
  • Cache granularity issues
    12:29
  • Cache penetration issues
    26:19
  • Cache avalanche optimization
    17:47
  • bottomless pit problem
    28:55
  • Reconstruction and optimization of hot keys
    16:02
  • this chapter summarizes
    19:32

Redis cloud platform CacheCloud

  • _Catalog
    24:36
  • _Redis scale problems
    21:07
  • _Quick build
    23:00
  • machine deployment
    18:46
  • application access
    10:30
  • user function
    22:28
  • Operation and maintenance functions
    15:22

course summary

  • _Course summary
    10:18

Addendum: Redis Bloom Filter

  • _Catalog_
    18:56
  • Lead out Bloom filter
    24:16
  • Basic principles of bloom filters
    20:29
  • Bloom filter error rate
    29:35
  • Local Bloom Filter
    22:56
  • Redis Bloom
    23:36
  • Redis Distributed Bloom Filter
    10:57

Redis Development Specifications

  • key design
    25:15
  • value design
    12:28
  • How to discover bigkey
    11:17
  • Deletion of bigkey
    21:26
  • Choose a reasonable data structure
    19:29
  • Key value life cycle management
    28:15
  • Command optimization skills
    28:27
  • Java client optimization
    12:12
  • Optimization of connection pool parameters 1
    14:52
  • Optimization of connection pool parameters 2
    24:00
  • Optimization of connection pool parameters 3
    17:36

memory management

  • Introduction to Redis memory optimization
    14:36
  • Redis memory consumption
    14:11
  • client buffer
    12:06
  • buffer memory
    24:20
  • object memory
    29:04
  • Memory setting upper limit
    27:35
  • Memory reclamation strategy
    20:14
  • memory optimization
    15:43
  • Client buffer optimization
    23:04

Common pits for development and maintenance

  • redis development and operation of those pits
    21:10
  • Explanation and demonstration of overcommit_memory parameter
    28:48
  • Explanation of other parameters
    27:23
  • Safe redis
    24:05
  • Seven Rules of Safety
    22:27
  • Hot key
    21:57
0
30
1