redis learns master-slave replication Master/slave

What is
Jargon: This is what we call master-slave replication. After the host data is updated, it is configured according to the configuration. and strategy, automatically synchronized to the master/slaver mechanism of the standby machine. The Master is mainly for writing, and the Slave is mainly for reading.
What can be done
Reading and writing separation
Disaster recovery
Recommended (free):redis
##How to play
• Configure slave (library) but not master (library) • Slave library configuration command: slaveof master library IP master library port
• Every time you disconnect from the master, you need to reconnect, unless you configure it in redis.conf File (specific location: redis.conf search
# REPLICATION
#)
• info replication
• Modify configuration file details operation
• Copy multiple redis.conf files, press 'redis[ port].conf'Rename
• Turn on daemonize yes
• pid file name
• Specify port
• Log file name
(painting, etc.) copy; copy; repeat (experiment); (especially the answer to the defense)
replication English [ˌreplɪ'keɪʃ(ə)n] American [ˌreplɪ'keɪʃ(ə)n] n.
3 common tricks
One master and two slaves (one host, two slaves)
Init
Set the slave through slaveof 127.0.0.1 6379d
At this time, one master and two slaves are set up
Set k4 v4 in the master, and get in the two slaves k4 can be displayed.
1. If I set k1 and k2 before slave, can the slave machine check their values?
Yes, the slave machine can only play from beginning to end after receiving it. Play all of them on the host
2. At this time, set k6 v6 is set on the host. And set k6 v66 is also set on the two slaves. What will happen at this time? First come first served, the latter overrides. Can the slave and the host execute the same command?
The master writes as the master, and the slave reads as the master.
At this time, the slave cannot write and an exception is reported.
3. The host is dead? What are the chances? From the machine? Stay put?
Still slave, stay put. If you can’t take over, the leader is back, everything will be the same as before
4. Is the slave machine dead? Recover from inability to function?
passing on the fire
Core idea: decentralization
The previous Slave can be the Master of the next slave, and the Slave can also receive connections and connections from other slaves. Synchronous request, then the slave becomes the next master in the chain, which can effectively reduce the writing pressure of the master (slave of slaves is still a slave)
Midway change direction: the previous data will be cleared and the latest copy will be re-established
slaveof new main library IP new main library port
Anti-customer-based
SLAVEOF no one
Stop the current database from synchronizing with other databases and turn it into the primary database
Copying Principle
After the slave is successfully started and connected to the master, it will send a sync command
The master receives the command to start the background save process, and at the same time collects all received is used to modify the data set command. After the background process is executed, the master will transfer the entire data file to the slave to complete a complete synchronization
Full copy: After the slave service receives the database file data, it will save it and loaded into memory.
Incremental replication: Master continues to pass all new collected modification commands to slave in order to complete synchronization
However, as long as the master is reconnected, a full synchronization (full replication) will be automatically executed
Sentinel mode(sentinel)
A group of sentinels can monitor multiple masters at the same time (patrol sentinel)What is it
An automatic version that is mainly anti-customer. It can monitor whether the host fails in the background. If it fails, it will automatically switch from the slave database to the main database based on the number of votes.How to play (usage steps)
### 1. Adjust the structure, 6379 brings 6380 and 6381
2. Create a new sentinel.conf file, the name must not be wrong
3. Configure the sentinel, fill in the content
1.sentinel monitor The name of the monitored database (Choose your own name) 127.0.0.1 6379 1
ˆ ˆ 2. The last number 1 above means that after the host hangs up, the salve will vote to see who will take over as the host. The person who gets the number of votes will become the host (PS. It is different from the description on the official website. , there are official documents below)
4. Start Sentinel
1. redis-sentinel /sentinel.conf (the above directories are configured according to their actual conditions, and the directories may be different)
5. Normal master-slave demonstration
6. The original master is down
7. Vote for a new one
8. Restart the master and slave and continue working, check info replication
Question: If the previously hung master is restarted, Will there be a conflict between the two masters?
Answer: No, the original master becomes a slave
Disadvantages of replication
Replication delay
Because all write operations are It is operated on the Master first, and then synchronized to the slave, so there is a certain delay in synchronizing from the Master to the Slave machine. When the system is very busy, the delay problem will be more serious, and the increase in the number of Slave machines will also make this problem worse. serious.
More related free learning recommendations: redis tutorial
The above is the detailed content of redis learns master-slave replication Master/slave. For more information, please follow other related articles on the PHP Chinese website!
How to read an element by its index using LINDEX?Jul 23, 2025 am 01:20 AMLINDEX is a command in Redis to get the element of the specified index position in a list. Its syntax is LINDEXkeyindex, which supports positive and negative indexes. Positive numbers start from the head, 0 represents the first element; negative numbers are counted from the tail, and -1 is the last element. This command is suitable for scenes where you only need to get a single element and is more efficient than LRANGE. Pay attention to when using: 1. Make sure that the index is within the list length range, otherwise nil will be returned; 2. The list length can be obtained through LLEN to verify the index legitimacy; 3. Support negative indexes to facilitate access to the end elements; 4. Avoid frequent use of large lists, because their time complexity is O(N) may affect performance.
What happens to a message if there are no subscribers?Jul 23, 2025 am 01:16 AMIfamessageispublishedtoatopicorchannelwithnosubscribers,ittypicallygetslostunlessspecificmechanismsareinplace.1.InRabbitMQ,messagesmaystayinaqueueuntilaconsumerconnectsifnoconsumerisbound.2.InPub/SubsystemslikeGoogleCloudPub/Sub,messagesareusuallydis
What is the difference between an in-memory database and a disk-based database?Jul 23, 2025 am 12:16 AM1. The memory database stores data in RAM, which is suitable for scenarios that require ultra-low latency, but is easily lost after power failure; 2. The disk database stores data on a hard disk or SSD, which has data durability and is suitable for applications that cannot tolerate data loss; 3. The memory database is fast and suitable for real-time analysis, high-frequency trading and other scenarios, while the disk database is suitable for large-scale data and long-term storage; 4. The memory database requires additional measures to ensure durability, and the cost is high. Choice should be determined based on speed, reliability and cost requirements.
How to retrieve a range of elements from a list using LRANGE?Jul 23, 2025 am 12:01 AMLRANGE is used to take out elements of the specified range from the Redis list, supporting positive and negative indexes; 1. Use 0 to -1 for the entire list; 2. Use 0 to N-1 for the first N; 3. Use -N to -1 for the last N; 4. Use -N to -1 for the page; 4. Use paging to control by start and stop; note that starting is greater than the length or stop exceeds the end, will return empty or valid part, and start>stop also returns empty, which is suitable for cache, log, queue and other scenarios.
What are 'slowlog' commands and how do you configure them?Jul 22, 2025 am 12:36 AMRedisslowlog is a log system that records commands that take too long to execute, and is used to identify performance issues. 1. It records each command that exceeds the specified execution time, including log ID, timestamp, execution time, commands and parameters; 2. Use redis-clislowlogget to view the log, and the 10 slowest commands are returned by default, and the number can be specified by parameters; 3. Use slowlog-log-slower-than to configure the threshold, which is 10 milliseconds by default, -1 means recording all commands, and 0 means disable; 4. The maximum number of log entries is controlled by slowlog-max-len, and the default is 128, which can be adjusted but will occupy memory; 5. It is often used to troubleshoot slowdowns in applications, impacts and characteristics of new functions.
How to set multiple key-value pairs in one command using MSET?Jul 22, 2025 am 12:22 AMRedis's MSET command allows multiple key-value pairs to be set in one operation. The basic syntax is MSETkey1value1key2value2...keyNvalueN, for example, MSETusernamejohn_doeemailjohn@example.comstatusactive can store multiple user information at once. Using MSET has the following advantages over using SET commands multiple times: 1. Improve efficiency and reduce network round trips; 2. Ensure the atomicity of the operation (all success or failure); 3. Make the code more concise and easy to maintain. But two points should be noted: 1. MSET will overwrite existing keys, which may lead to data loss; 2. The command does not provide details
What is Redis Cluster and how does it provide horizontal scaling?Jul 22, 2025 am 12:16 AMRedisCluster achieves horizontal expansion through data sharding, dividing the key space into 16,384 hash slots, each node is responsible for a portion of the slots. 1. Automatic data sharding: Use the CRC16 algorithm to map keys to specific slots to avoid single-point bottlenecks; 2. Distributed architecture: No central coordinator, communication between nodes through gossip protocol, supporting master-slave replication to ensure high availability; 3. Automatic rebalancing: Automatically reassign slots when adding and deleting nodes; 4. Client redirection: The client connects any node and is directed to the correct node. Deployment requires at least three master nodes, use the redis-cli command to create a cluster and configure a client driver that supports the cluster. Common problems include multi-key operations that need to coexist, network partitioning may cause brain splits,
What is the use case for the blocking version BRPOPLPUSH?Jul 22, 2025 am 12:05 AMBRPOPLPUSH is suitable for blocking task queues, atomic data transfers and simulated delay queue scenarios. 1. Implement a task queue with blocking: In the producer-consumer model, this command allows consumers to automatically block and wait when there is no task, avoiding wasting resources; 2. Move elements atomically and retain backups: Ensure that the process of taking out elements from one list and inserting into another list is uninterrupted, suitable for scenarios where task processing fails to be retryed or analyzed; 3. Used to implement circular queues or delay queue logic: By combining additional judgment logic, lightweight delay queues can be simulated, and the task can be determined according to conditions.


Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Notepad++7.3.1
Easy-to-use and free code editor

Dreamweaver CS6
Visual web development tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment







