89304

89304



Data Expiry

There are two types of data expiry within a memcached instance. The first type is applied at the point

when you storę a new keyA/alue pair into the memcached instance. If there is not enough space within

a suitable slab to storę the value, then an existing least recently used (LRU) object is removed (evicted)

from the cache to make room for the new item.

The LRU algorithm ensures that the object that is removed is one that is either no longer in active

use or that was used so long ago that its data is potentially out of datę or of little value. However, in

a system where the memory allocated to memcached is smaller than the number of regularly used

objects required in the cache, a lot of expired items could be removed from the cache even though they

are in active use. You use the statistics mechanism to get a better idea of the level of evictions (expired

objects). For morę information, see Section 15.6.4, “Getting memcached Statistics". You can change this eviction behavior by setting the -M command-line option when starting

memcached. This option forces an error to be returned when the memory has been exhausted, instead of automatically evicting older data.

The second type of expiry system is an explicit mechanism that you can set when a keyA/alue pair is

inserted into the cache, or when deleting an item from the cache. Using an expiration time can be a

useful way of ensuring that the data in the cache is up to datę and in linę with your application needs and requirements.

A typical scenario for explicitly setting the expiry time might include caching session data for a user

when accessing a Web site. memcached uses a lazy expiry mechanism where the explicit expiry time

that has been set is compared with the current time when the object is requested.

Only objects that

have notexpired are returned.

You can also set the expiry time when explicitly deleting an object from the cache. In this case, the

expiry time is really a timeout and indicates the period when any attempts to set the value for a given key are rejected.



Wyszukiwarka

Podobne podstrony:
sc insideatoms bmp ArOMS AND RADPOACT!VITYInside atoms 1 ~ i Charge essentials There are two types o
62711 skanowanie0085 (2) There are two types of routines: 1. information routines - descriptions of
s&h 007 PBEFACH There are two ways of writiug and ar-l-auging a succt.-s.sfnl hook. One is to siiupl
s&h 007 PBEFACH There are two ways of writiug and ar-l-auging a succt.-s.sfnl hook. One is to siiupl
2.2.3 Primary and secondary services There are two classes of allocation shown in the following Tabl
ms 018 To the Feflow who is in Doubt There are two kinds of men in the world: one kind, when they wa
Smiiing elevates mood and creates a sense of well-being. There are two kinds of smiles. The first, c
DSC09922 There are two forms of hydrocephalus: Noncommunicationa hydrocephalus-the obstruction to th
There are many types of disorders affecting the blood. The most common disorder of the blood is anae
Different tests There are three types of Covid-19 tests currently available. Each of them serves a d
Reported speech angiekski 2 _____7 Reported Speech There are three types of Reported Speech: stateme
46407 Picture 6 Flying Parts and Wings There are two types °t Wings: Those that are vertical to the
80857 m1456 Two types of typical i5th century pole axe, as widely used by men-at-arms fighting on fo

więcej podobnych podstron