当前位置:网站首页>Redis -- why is the string length of string emstr the upper limit of 44 bytes?
Redis -- why is the string length of string emstr the upper limit of 44 bytes?
2022-04-23 07:59:00 【Dream river dream】
redis Structure of objects
Such a structure occupies 16 byte
string The structure of the object
1)string Code the first –64 Bit signed integer
2)string Code the second –embstr
3)string Code the third –raw
This structure requires memory allocation twice , Primary distribution 16 Bytes of redis Object structure , Primary distribution sds object ,sds It's dynamic expansion , Strategy is : The length of the string is less than 1M Before , The expansion space is doubled , That is to keep 100% Redundant null
between . When the length exceeds 1M after , In order to avoid the waste of redundant space after doubling , Each expansion only allocates more 1M The size of the redundant space .
版权声明
本文为[Dream river dream]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230629085779.html
边栏推荐
- SAP GUI安全性
- [unity VFX] Introduction notes of VFX special effects - spark production
- When using flash, the code ends automatically without an error, the connection cannot be maintained, and the URL cannot be accessed.
- Electronic builder package error: proxyconnect TCP: Dial TCP: 0: connectex
- Enterprise wechat login free jump self built application
- Intranet security attack and defense: a practical guide to penetration testing (6): domain controller security
- Apache Hudi 如何加速传统的批处理模式?
- Online Safe Trajectory Generation For Quadrotors Using Fast Marching Method and Bernstein Basis Poly
- C#控制相机,旋转,拖拽观察脚本(类似Scenes观察方式)
- Unity 获取一个资源被那些资源引用
猜你喜欢
BUUCTF MISC刷題
Houdini地形与流体解算(模拟泥石流)
When using flash, the code ends automatically without an error, the connection cannot be maintained, and the URL cannot be accessed.
《内网安全攻防:渗透测试实战指南》读书笔记(八):权限维持分析及防御
SAP self created table log function is enabled
内网渗透系列:内网隧道之dns2tcp
ABAP ALV显示金额与导出金额不一致
CTF-MISC学习之从开始到放弃
Internal network security attack and defense: a practical guide to penetration testing (5): analysis and defense of horizontal movement in the domain
Houdini>流体,刚体导出学习过程笔记
随机推荐
Ribbon启动流程
SQL user-defined scalar value function that looks up relevant column values n times forward or backward according to a specified table name, column name and column value
MySQL in window10 version does not work after setting remote access permission
Intranet penetration series: icmpsh of Intranet tunnel
读取修改resource文件夹下的json文件
第五章 投资性房地产
攻防世界MISC刷题1-50
Houdini流体>>粒子流体导出到unity笔记
C SVG path parser of xamarin version
C problem of marking the position of polygons surrounded by multiple rectangles
C # use laida criterion (3) σ Criteria) reject abnormal data (.Net reject singular values in a group of data)
CTF-MISC学习之从开始到放弃
Complete learning from scratch, machine learning and deep learning, including theory and code implementation, mainly using scikit and mxnet, and some practices (on kaggle)
IT高薪者所具备的人格魅力
Unity gets a resource that is referenced by those resources
Chapter IV intangible assets
《内网安全攻防:渗透测试实战指南》读书笔记(六):域控制器安全
企业微信免登录跳转自建应用
索引被锁数据无法写入ES问题处理
Weblux file upload and download