
Foreword:
We know that the redis server is an event-driven program, which needs to handle two types of events, namely file events and time events.
So what is the redis event processing process like? Let’s take a look at the picture below:

The aeMain function schedules and executes file events and time events by calling the aeProcessEvents function. Event-related information is recorded in aeEventLoop. First, obtain the execution time interval n of the shortest time event through the aeSearchNearestTimer function, then call the aeApiPoll function to obtain the monitored socket, and finally execute the event processing functions rfileProc and wfileProc corresponding to the socket, and finally execute the time event function processTimeEvents
File Event
Redis has developed its own network event processor based on the Reactor model. This processor is called a file event handler:
The file event processor uses an IO multiplexer to listen to multiple sockets and associate different event processors with the socket according to the tasks currently performed by the socket
When the monitored socket is ready to perform operations such as connection response (accept), read (read), write (write), close (close), etc., when a file event occurs, these file events The processor will call the event handler previously associated with the socket to process the event
The composition of the file event handler
(Learning video sharing: redis video tutorial)

Handler of file events
Redis has written multiple handlers for file events:
Connection response processor: When the Redis server is initialized, the program will associate this connection response processor with the AE_READABLE event of the service listening suite. When a client uses the connect function to connect to the server listening socket Yes, the socket will generate the AE_READABLE event, trigger the connection response processor to execute, and perform the corresponding socket response operation
Command request processor: When a client connects After the response processor successfully connects to the server, the server will associate the AE_READABLE event of the client socket with the command request processor. When the client sends a command request to the server, the socket will generate an AE_READABLE event and trigger the command request. The processor executes and performs the corresponding socket read operation
Command reply processor: When the server has a command reply that needs to be passed to the client, the server will socket the client The AE_WRITABLE event of the interface is associated with the command reply processor. When the client is ready to receive the command reply from the server, the AE_WRITABLE event will be generated, triggering the execution of the command reply processor and performing the corresponding socket write operation.
A complete client-server connection event
The server listens to the AE_READABLE event of the package word, and generates AE_READABLE when the client sends a connection request event, the server will respond to the client's connection request, associate the AE_READABLE event of the client socket with the command request processor, and the client can send a command request to the server
The client sends a command request to the server. The client socket will generate an AE_READABLE event, triggering the command processor to execute. Executing the command will generate a corresponding command reply. The server will combine the AE_WRITABLE event of the client socket with the command. Reply processor association
When the client attempts to read the command reply, the client socket will generate an AE_WRITABLE event, triggering the execution of the command reply processor. When the command reply processor replies to the command After all is written to the socket, the server will contact the association between the AE_WRITABLE event of the client socket and the command reply handler
Time event
Redis Time events are divided into timed events and periodic events. A time event consists of three attributes:
id: the globally unique ID created by the server for the time and time when: the arrival time of the time and time is recorded (UNIX timestamp with millisecond precision) timeProc: time event processor

All time events of the server are placed in an unordered linked list. Whenever the time event executor runs, it traverses the entire linked list, finds all arriving time events, and calls the corresponding event handler. The Redis server in normal mode only uses one time event, serverCron, and in benchmark mode, the server only uses two time events, so the performance of event execution is not affected.
Related recommendations: redis database tutorial
The above is the detailed content of Analysis of redis event processing process. For more information, please follow other related articles on the PHP Chinese website!
How to read an element by its index using LINDEX?Jul 23, 2025 am 01:20 AMLINDEX is a command in Redis to get the element of the specified index position in a list. Its syntax is LINDEXkeyindex, which supports positive and negative indexes. Positive numbers start from the head, 0 represents the first element; negative numbers are counted from the tail, and -1 is the last element. This command is suitable for scenes where you only need to get a single element and is more efficient than LRANGE. Pay attention to when using: 1. Make sure that the index is within the list length range, otherwise nil will be returned; 2. The list length can be obtained through LLEN to verify the index legitimacy; 3. Support negative indexes to facilitate access to the end elements; 4. Avoid frequent use of large lists, because their time complexity is O(N) may affect performance.
What happens to a message if there are no subscribers?Jul 23, 2025 am 01:16 AMIfamessageispublishedtoatopicorchannelwithnosubscribers,ittypicallygetslostunlessspecificmechanismsareinplace.1.InRabbitMQ,messagesmaystayinaqueueuntilaconsumerconnectsifnoconsumerisbound.2.InPub/SubsystemslikeGoogleCloudPub/Sub,messagesareusuallydis
What is the difference between an in-memory database and a disk-based database?Jul 23, 2025 am 12:16 AM1. The memory database stores data in RAM, which is suitable for scenarios that require ultra-low latency, but is easily lost after power failure; 2. The disk database stores data on a hard disk or SSD, which has data durability and is suitable for applications that cannot tolerate data loss; 3. The memory database is fast and suitable for real-time analysis, high-frequency trading and other scenarios, while the disk database is suitable for large-scale data and long-term storage; 4. The memory database requires additional measures to ensure durability, and the cost is high. Choice should be determined based on speed, reliability and cost requirements.
How to retrieve a range of elements from a list using LRANGE?Jul 23, 2025 am 12:01 AMLRANGE is used to take out elements of the specified range from the Redis list, supporting positive and negative indexes; 1. Use 0 to -1 for the entire list; 2. Use 0 to N-1 for the first N; 3. Use -N to -1 for the last N; 4. Use -N to -1 for the page; 4. Use paging to control by start and stop; note that starting is greater than the length or stop exceeds the end, will return empty or valid part, and start>stop also returns empty, which is suitable for cache, log, queue and other scenarios.
What are 'slowlog' commands and how do you configure them?Jul 22, 2025 am 12:36 AMRedisslowlog is a log system that records commands that take too long to execute, and is used to identify performance issues. 1. It records each command that exceeds the specified execution time, including log ID, timestamp, execution time, commands and parameters; 2. Use redis-clislowlogget to view the log, and the 10 slowest commands are returned by default, and the number can be specified by parameters; 3. Use slowlog-log-slower-than to configure the threshold, which is 10 milliseconds by default, -1 means recording all commands, and 0 means disable; 4. The maximum number of log entries is controlled by slowlog-max-len, and the default is 128, which can be adjusted but will occupy memory; 5. It is often used to troubleshoot slowdowns in applications, impacts and characteristics of new functions.
How to set multiple key-value pairs in one command using MSET?Jul 22, 2025 am 12:22 AMRedis's MSET command allows multiple key-value pairs to be set in one operation. The basic syntax is MSETkey1value1key2value2...keyNvalueN, for example, MSETusernamejohn_doeemailjohn@example.comstatusactive can store multiple user information at once. Using MSET has the following advantages over using SET commands multiple times: 1. Improve efficiency and reduce network round trips; 2. Ensure the atomicity of the operation (all success or failure); 3. Make the code more concise and easy to maintain. But two points should be noted: 1. MSET will overwrite existing keys, which may lead to data loss; 2. The command does not provide details
What is Redis Cluster and how does it provide horizontal scaling?Jul 22, 2025 am 12:16 AMRedisCluster achieves horizontal expansion through data sharding, dividing the key space into 16,384 hash slots, each node is responsible for a portion of the slots. 1. Automatic data sharding: Use the CRC16 algorithm to map keys to specific slots to avoid single-point bottlenecks; 2. Distributed architecture: No central coordinator, communication between nodes through gossip protocol, supporting master-slave replication to ensure high availability; 3. Automatic rebalancing: Automatically reassign slots when adding and deleting nodes; 4. Client redirection: The client connects any node and is directed to the correct node. Deployment requires at least three master nodes, use the redis-cli command to create a cluster and configure a client driver that supports the cluster. Common problems include multi-key operations that need to coexist, network partitioning may cause brain splits,
What is the use case for the blocking version BRPOPLPUSH?Jul 22, 2025 am 12:05 AMBRPOPLPUSH is suitable for blocking task queues, atomic data transfers and simulated delay queue scenarios. 1. Implement a task queue with blocking: In the producer-consumer model, this command allows consumers to automatically block and wait when there is no task, avoiding wasting resources; 2. Move elements atomically and retain backups: Ensure that the process of taking out elements from one list and inserting into another list is uninterrupted, suitable for scenarios where task processing fails to be retryed or analyzed; 3. Used to implement circular queues or delay queue logic: By combining additional judgment logic, lightweight delay queues can be simulated, and the task can be determined according to conditions.


Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Notepad++7.3.1
Easy-to-use and free code editor

Dreamweaver CS6
Visual web development tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment







