search
HomeDatabaseRedisWhere to configure cache cleaning policy in redis

Where to configure cache cleaning policy in redis

When using Redis as a cache, if the memory space is full, old data will be automatically evicted. Memcached works this way by default, and most developers are familiar with it. (Recommended study: Redis Video Tutorial)

LRU is the only recycling algorithm supported by Redis. This article introduces in detail the maxmemory instruction used to limit the maximum memory usage, and explains in depth what Redis uses. Approximate LRU algorithm.

maxmemory configuration directive

maxmemory is used to specify the maximum memory that Redis can use. It can be set in the redis.conf file or dynamically modified during operation through the CONFIG SET command.

For example, to set a memory limit of 100MB, you can configure it in the redis.conf file like this:

maxmemory 100mb

Set maxmemory to 0, which means no memory limit. Of course, there is an implicit limitation for 32-bit systems: up to 3GB of RAM.

When memory usage reaches the maximum limit, if new data needs to be stored, Redis may directly return an error message or delete some old data depending on the configured policies.

Eviction policy

When the maximum memory limit (maxmemory) is reached, Redis determines the specific behavior based on the policy configured by maxmemory-policy.

The current version, the strategies supported by Redis 3.0 include:

noeviction: Do not delete the strategy. When the maximum memory limit is reached, if more memory is needed, directly Return error message. Most write commands will cause more memory to be occupied (with rare exceptions, such as DEL).

allkeys-lru: Common to all keys; delete the least recently used (LRU) keys first.

volatile-lru: Only the part with expire set; delete the least recently used (LRU) key first.

allkeys-random: Common to all keys; randomly delete some keys.

volatile-random: Only limited to the part where expire is set; randomly delete a part of the key.

volatile-ttl: Only limited to the part where expire is set; keys with short remaining time (time to live, TTL) will be deleted first.

If the expire key is not set and the prerequisites are not met; then the behavior of volatile-lru, volatile-random and volatile-ttl strategies is basically the same as noeviction (no deletion).

You need to choose an appropriate eviction strategy based on the characteristics of the system. Of course, you can also dynamically set the eviction policy through commands during operation, and monitor cache misses and hits through the INFO command for tuning.

Generally speaking:

If it is divided into hot data and cold data, it is recommended to use the allkeys-lru strategy. That is, some of the keys are often read and written. If you are not sure about the specific business characteristics, then allkeys-lru is a good choice.

If you need to read and write all keys in a loop, or the access frequency of each key is similar, you can use the allkeys-random strategy, that is, the probability of reading and writing all elements is almost the same.

If you want Redis to filter keys that need to be deleted based on TTL, please use the volatile-ttl strategy.

The main application scenarios of volatile-lru and volatile-random strategies are: instances with both cache and persistent keys. Generally speaking, for scenarios like this, two separate Redis instances should be used.

It is worth mentioning that setting expire will consume additional memory, so using the allkeys-lru strategy can make more efficient use of memory, because this way you no longer need to set the expiration time.

Internal implementation of eviction

The eviction process can be understood as follows:

The client executes a command, resulting in Redis Data increases and takes up more memory.

Redis checks the memory usage. If it exceeds the maxmemory limit, some keys will be cleared according to the policy.

Continue to execute the next command, and so on.

During this process, the memory usage will continuously reach the limit value, then exceed it, and then delete some keys, and the usage will drop below the limit value again.

If a certain command causes a large amount of memory usage (such as saving a large set through a new key), the memory usage may significantly exceed the maxmemory limit for a period of time.

Approximate LRU algorithm

Redis does not use the complete LRU algorithm. The automatically evicted key is not necessarily the one that best satisfies the LRU characteristics. Instead, a small number of key samples are extracted through the approximate LRU algorithm, and then the key with the oldest access time is deleted.

The eviction algorithm has been greatly optimized since Redis 3.0, using pool as a candidate. This greatly improves the algorithm efficiency and is closer to the real LRU algorithm.

In the Redis LRU algorithm, the accuracy of the algorithm can be tuned by setting the number of samples. Configure through the following instructions:

maxmemory-samples 5

Why not use full LRU implementation? The reason is to save memory. But the behavior of Redis is basically equivalent to LRU. The following is a behavioral comparison chart between Redis LRU and the complete LRU algorithm.

Where to configure cache cleaning policy in redisDuring the test, access starts from the first key, so the first key is the best eviction object.

You can see three types of points from the picture, forming three different strips.

The light gray part indicates the evicted object.

The gray part indicates "not evicted" objects.

The green part indicates the objects added later.

In the pure LRU algorithm implementation, the first half of the old keys are released. The LRU algorithm of Redis only releases longer keys probabilistically.

As you can see, in Redis 3.0, the effect of 5 samples is much better than that of Redis 2.8. Of course, Redis 2.8 is also good, the last accessed key is basically still in the memory. When using 10 samples in Redis 3.0, it is very close to the pure LRU algorithm.

Note that LRU is only a probability model used to predict that a certain key may continue to be accessed in the future. In addition, if the data access situation conforms to the power law distribution (power law), then for most requests , LRU will perform well.

In the simulation, we found that if power law access is used, the results of pure LRU and Redis are very different, or even invisible.

Of course, you can also increase the number of samples to 10, at the cost of consuming some additional CPU, so that the results are closer to the real LRU, and the difference can be judged through cache miss statistics.

It is easy to set the sample size, just use the command CONFIG SET maxmemory-samples

For more Redis related technical articles, please visit the Redis Getting Started Tutorial column Get studying!

The above is the detailed content of Where to configure cache cleaning policy in redis. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to read an element by its index using LINDEX?How to read an element by its index using LINDEX?Jul 23, 2025 am 01:20 AM

LINDEX is a command in Redis to get the element of the specified index position in a list. Its syntax is LINDEXkeyindex, which supports positive and negative indexes. Positive numbers start from the head, 0 represents the first element; negative numbers are counted from the tail, and -1 is the last element. This command is suitable for scenes where you only need to get a single element and is more efficient than LRANGE. Pay attention to when using: 1. Make sure that the index is within the list length range, otherwise nil will be returned; 2. The list length can be obtained through LLEN to verify the index legitimacy; 3. Support negative indexes to facilitate access to the end elements; 4. Avoid frequent use of large lists, because their time complexity is O(N) may affect performance.

What happens to a message if there are no subscribers?What happens to a message if there are no subscribers?Jul 23, 2025 am 01:16 AM

Ifamessageispublishedtoatopicorchannelwithnosubscribers,ittypicallygetslostunlessspecificmechanismsareinplace.1.InRabbitMQ,messagesmaystayinaqueueuntilaconsumerconnectsifnoconsumerisbound.2.InPub/SubsystemslikeGoogleCloudPub/Sub,messagesareusuallydis

What is the difference between an in-memory database and a disk-based database?What is the difference between an in-memory database and a disk-based database?Jul 23, 2025 am 12:16 AM

1. The memory database stores data in RAM, which is suitable for scenarios that require ultra-low latency, but is easily lost after power failure; 2. The disk database stores data on a hard disk or SSD, which has data durability and is suitable for applications that cannot tolerate data loss; 3. The memory database is fast and suitable for real-time analysis, high-frequency trading and other scenarios, while the disk database is suitable for large-scale data and long-term storage; 4. The memory database requires additional measures to ensure durability, and the cost is high. Choice should be determined based on speed, reliability and cost requirements.

How to retrieve a range of elements from a list using LRANGE?How to retrieve a range of elements from a list using LRANGE?Jul 23, 2025 am 12:01 AM

LRANGE is used to take out elements of the specified range from the Redis list, supporting positive and negative indexes; 1. Use 0 to -1 for the entire list; 2. Use 0 to N-1 for the first N; 3. Use -N to -1 for the last N; 4. Use -N to -1 for the page; 4. Use paging to control by start and stop; note that starting is greater than the length or stop exceeds the end, will return empty or valid part, and start>stop also returns empty, which is suitable for cache, log, queue and other scenarios.

What are 'slowlog' commands and how do you configure them?What are 'slowlog' commands and how do you configure them?Jul 22, 2025 am 12:36 AM

Redisslowlog is a log system that records commands that take too long to execute, and is used to identify performance issues. 1. It records each command that exceeds the specified execution time, including log ID, timestamp, execution time, commands and parameters; 2. Use redis-clislowlogget to view the log, and the 10 slowest commands are returned by default, and the number can be specified by parameters; 3. Use slowlog-log-slower-than to configure the threshold, which is 10 milliseconds by default, -1 means recording all commands, and 0 means disable; 4. The maximum number of log entries is controlled by slowlog-max-len, and the default is 128, which can be adjusted but will occupy memory; 5. It is often used to troubleshoot slowdowns in applications, impacts and characteristics of new functions.

How to set multiple key-value pairs in one command using MSET?How to set multiple key-value pairs in one command using MSET?Jul 22, 2025 am 12:22 AM

Redis's MSET command allows multiple key-value pairs to be set in one operation. The basic syntax is MSETkey1value1key2value2...keyNvalueN, for example, MSETusernamejohn_doeemailjohn@example.comstatusactive can store multiple user information at once. Using MSET has the following advantages over using SET commands multiple times: 1. Improve efficiency and reduce network round trips; 2. Ensure the atomicity of the operation (all success or failure); 3. Make the code more concise and easy to maintain. But two points should be noted: 1. MSET will overwrite existing keys, which may lead to data loss; 2. The command does not provide details

What is Redis Cluster and how does it provide horizontal scaling?What is Redis Cluster and how does it provide horizontal scaling?Jul 22, 2025 am 12:16 AM

RedisCluster achieves horizontal expansion through data sharding, dividing the key space into 16,384 hash slots, each node is responsible for a portion of the slots. 1. Automatic data sharding: Use the CRC16 algorithm to map keys to specific slots to avoid single-point bottlenecks; 2. Distributed architecture: No central coordinator, communication between nodes through gossip protocol, supporting master-slave replication to ensure high availability; 3. Automatic rebalancing: Automatically reassign slots when adding and deleting nodes; 4. Client redirection: The client connects any node and is directed to the correct node. Deployment requires at least three master nodes, use the redis-cli command to create a cluster and configure a client driver that supports the cluster. Common problems include multi-key operations that need to coexist, network partitioning may cause brain splits,

What is the use case for the blocking version BRPOPLPUSH?What is the use case for the blocking version BRPOPLPUSH?Jul 22, 2025 am 12:05 AM

BRPOPLPUSH is suitable for blocking task queues, atomic data transfers and simulated delay queue scenarios. 1. Implement a task queue with blocking: In the producer-consumer model, this command allows consumers to automatically block and wait when there is no task, avoiding wasting resources; 2. Move elements atomically and retain backups: Ensure that the process of taking out elements from one list and inserting into another list is uninterrupted, suitable for scenarios where task processing fails to be retryed or analyzed; 3. Used to implement circular queues or delay queue logic: By combining additional judgment logic, lightweight delay queues can be simulated, and the task can be determined according to conditions.

See all articles

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.