89386

89386



memcached Deployment

When using memcached you can use a number of different potential deployment strategies and

topologies. The exact strategy to use depends on your application and environment. When developing

a system for deploying memcached within your system, keep in mind the following points:

•    memcached is only a caching mechanism. It shouldn't be used to storę information that you cannot

otherwise afford to lose and then load from a different location.

•    There is no security built into the memcached protocol. At a minimum, make surę that the servers

running memcached are only accessible from inside your network, and that the network ports being

used are blocked (using a firewall or similar). If the information on the memcached servers that is

being stored is any sensitive, then encrypt the information before storing it in

memcached.

•    memcached does not provide any sort of failover. Because there is no communication between

different memcached instances. If an instance fails, your application must capable of removing it from

the list, reloading the data and then writing data to another memcached instance.

•    Latency between the clients and the memcached can be a problem if you are using different physical

machines for these tasks. If you find that the latency is a problem, move the memcached instances to be on the clients.

•    Key length is determined by the memcached server. The defaułt maximum key size is 250 bytes.

•    Try to use at least two memcached instances, especially for multiple clients, to avoid having a single

point of failure. Ideally, create as many memcached nodes as possible. When adding and removing

memcached instances from a pool, the hashing and distribution of key/value pairs may be affected.

For information on howto avoid problems, see Section 15.6.2.4, “memcached Hashing/Distribution T ypes”.



Wyszukiwarka

Podobne podstrony:
Using MySQL Proxy There are a number of different ways to use MySQL Proxy. At the most basie level,
scheme Flyback Driver 47 - 200 pH 10A If you don’t have the irfp250’s you can use a couple of semico
(YMYA)600W AUDIO AMP Amplifier Circuit diagram Power supply Circuit diagram Audio amp You can use on
memcached Hashing/Distribution Types The memcached Client interface supports a number of different
Biologia e comportamento. PDF eBooks Download for a squished sandwich when you can use the extra lar
Using Replication for Scale-Out You can use replication as a scale-out solution; that is, where you
angol zaw Task 11 Alds to communication You can use these phrases when you’re discussing possibiliti
Crochet Borders1 Graph-paper plans. You can use graph paper to help determine the ideał depth of yo
cw0014 Q Mark each verb (I) if you can use it to complete sentence a, (T) II you i an use it to comp
sc0003 -3- You can use phonetic transcription to illustrate (explain) stylistic variation within RP
sc0004 You can use phonetic transcription to illustrate (explain) accent differences e.g.: between R
sc0005 You can use phonetic/tonetic notation to transcribe intonation /di skjiptiv f9 netiks 8Viggli
Short Tail Long Tail Keyword Short Taił To Long Taił Modifiers You Can Use To Take Your Short Taił K
Step Five rSTEP FIVEV.A. !nterview Best Practices » Create a checklist for the above steps. You can
Enabling Row Movement on a Table Bcforc you can use Flashback Table, you must ensure that row moveme
Using MySQL and memcached with Ruby There are a number of different modules for interfacing to memca

więcej podobnych podstron