Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Example Analysis of bigkey scan script in redis

2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >

Share

Shulou(Shulou.com)05/31 Report--

This article shares with you the content of a sample analysis of bigkey scanning scripts in redis. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.

I did a stress test on this script. The number of redis memory is 15GB, and the number of focus keys is between 40K and 80K. In this case, Aliyun's script can not run successfully at all (the estimated time to run out is in days). The main reason is that you need to interact with redis multiple times each time you confirm a key. So, I modified its script by adding pipeline and debug object methods, and the script is as follows:

Import sysimport redis def find_big_key_normal (db_host, db_port, db_password, db_num): client = redis.StrictRedis (host=db_host, port=db_port, password=db_password, db=db_num) iS0 temp = client.scan (cursor=i) Count=1000) j = 0 while temp [0] > 0: i=temp [0] j=j+len (temp [1]) try: r = client.pipeline (transaction=False) for k in temp [1]: r.debug_object (k) tempA = r.execute () x = 0 for key in tempA: length = key.get ("serializedlength") # # type = key.get ("encoding") if length > 10240: type = client.type (temp [1] [x]) print temp [1] [x], type Length x=x+1 except: print "an execption come" temp = client.scan (cursor=i,count=1000) if _ _ name__ ='_ _ main__': if len (sys.argv)! = 4: print 'Usage: python', sys.argv [0], 'host port password' exit (1) db_host = sys.argv [1] db_port = sys.argv [2] db_password = sys.argv [3] r = redis.StrictRedis (host=db_host, port=int (db_port)) Password=db_password) nodecount = 1 keyspace_info = r.info ("keyspace") for db in keyspace_info: print 'check', db,'', keyspace_ info [db] find_big_key_normal (db_host, db_port, db_password, db.replace ("db", ""))

I also did a stress test on the above script, where the number of redis memory is 15 GB, the number of focus keys is 2KW, the number of focus ops is between 40K and 80K, in this case:

The script runs in 10 minutes and is fully available.

Thank you for reading! This is the end of this article on "sample analysis of bigkey scanning scripts in redis". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, you can share it for more people to see!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Database

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report