Você está na página 1de 2

######################## CACHING STRATEGIES ###################################

Lazy Loading

Whenever your application requests data, it first makes the request to the
ElastiCache cache. If the data exists in the cache and is current, ElastiCache
returns the data to your application. If the data does not exist in the cache, or
the data in the cache has expired, your application requests the data from your
data store which returns the data to your application. Your application then writes
the data received from the store to the cache so it can be more quickly retrieved
next time it is requested.

Lazy Loading caches improve the write performance and are good for write-heavy
workloads. When combined with read-through, it works good for mixed workloads,
where the most recently updated and accessed data is always available in cache.

Write-Through Cache

In this strategy, data is first written to the cache and then to the database.
Write-Through Cache introduces extra write latency because data is written to the
cache first and then to the main database. But when paired with read-through
caches, we get all the benefits of read-through and we also get data consistency
guarantee, freeing us from using cache invalidation techniques.

TTL- time to live


Time to live (TTL) is an integer value that specifies the number of seconds (Redis
can specify seconds or milliseconds) until the key expires. When an application
attempts to read an expired key, it is treated as though the key is not found,
meaning that the database is queried for the key and the cache is updated. This
does not guarantee that a value is not stale, but it keeps data from getting too
stale and requires that values in the cache are occasionally refreshed from the
database.

############################# MAX MEMORY#####################################


Maxmemory configuration directive

The maxmemory configuration directive is used in order to configure Redis to use a


specified amount of memory for the data set.

When the specified amount of memory is reached, it is possible to select among


different behaviors, called policies. Redis can just return errors for commands
that could result in more memory being used, or it can evict some old data in order
to return back to the specified limit every time new data is added.

The exact behavior Redis follows when the maxmemory limit is reached is configured
using the maxmemory-policy configuration directive.

The following policies are available:

noeviction: return errors when the memory limit was reached and the client is
trying to execute commands that could result in more memory to be used (most write
commands, but DEL and a few more exceptions).
allkeys-lru: evict keys by trying to remove the less recently used (LRU) keys
first, in order to make space for the new data added.
volatile-lru: evict keys by trying to remove the less recently used (LRU) keys
first, but only among keys that have an expire set, in order to make space for the
new data added.
allkeys-random: evict keys randomly in order to make space for the new data
added.
volatile-random: evict keys randomly in order to make space for the new data
added, but only evict keys with an expire set.
volatile-ttl: evict keys with an expire set, and try to evict keys with a
shorter time to live (TTL) first, in order to make space for the new data added.

The policies volatile-lru, volatile-random and volatile-ttl behave like noeviction


if there are no keys to evict matching the prerequisites.

Rule of thumb for eviction policies to choose:

Use the allkeys-lru policy when you expect a power-law distribution in the
popularity of your requests, that is, you expect that a subset of elements will be
accessed far more often than the rest. This is a good pick if you are unsure.
Use the allkeys-random if you have a cyclic access where all the keys are
scanned continuously, or when you expect the distribution to be uniform (all
elements likely accessed with the same probability).
Use the volatile-ttl if you want to be able to provide hints to Redis about
what are good candidate for expiration by using different TTL values when you
create your cache objects.

The volatile-lru and volatile-random policies are mainly useful when you want to
use a single instance for both caching and to have a set of persistent keys.
However it is usually a better idea to run two Redis instances to solve such a
problem.

It is also worth to note that setting an expire to a key costs memory, so using a
policy like allkeys-lru is more memory efficient since there is no need to set an
expire for the key to be evicted under memory pressure.

######################################DATA SECURITY################################
To help keep your data secure, Amazon ElastiCache and Amazon EC2 provide mechanisms
to guard against unauthorized access of your data on the server.

Amazon ElastiCache for Redis also provides optional encryption features for data on
clusters running Redis versions 3.2.6, 4.0.10 or later:

In-transit encryption encrypts your data whenever it is moving from one place
to another, such as between nodes in your cluster or between your cluster and your
application.

At-rest encryption encrypts your on-disk data during sync and backup
operations.

If you want to enable in-transit or at-rest encryption, you must meet the following
conditions.

Your cluster or replication group must be running Redis 3.2.6, 4.0.10 or later.

Your cluster or replication group must be created in a Amazon VPC.

Optionally, you can also use AUTH and the AUTH token (password) needed to
perform operations on this cluster or replication group.

Você também pode gostar