Mysql High Performance Memcached (2), mysqlmemcached

Source: Internet
Author: User

Mysql High Performance Memcached (2), mysqlmemcached
This article describes the problems that need to be paid attention to when deploying Memcached and the distributed algorithm of Memcached.


Whether you are a new system or a system that has been online for a long time. We can easily configure Memcached, but we need to pay attention to the following issues before Configuration:


1. memcached is only a caching mechanism. It shouldn't be used to store information that you cannot
Otherwise afford to lose and then load from a different location.
2. There is no security built into the memcached protocol. At a minimum, make sure that the servers
Running memcached are only accessible from inside your network, and that the network ports being
Used are blocked (using a firewall or similar). If the information on the memcached servers that is
Being stored is any sensitive, then encrypt the information before storing it in memcached.
3. memcached does not provide any sort of failover. Because there is no communication
Different memcached instances. If an instance fails, your application must capable of removing it from
The list, reloading the data and then writing data to another memcached instance.
4. Latency between the clients and the memcached can be a problem if you are using different physical
Machines for these tasks. If you find that the latency is a problem, move the memcached instances
Be on the clients.
5. Key length is determined by the memcached server. The default maximum key size is 250 bytes.
6. Try to use at least two memcached instances, especially for multiple clients, to avoid having a single
Point of failure. Ideally, create as your memcached nodes as possible. When adding and removing
Memcached instances from a pool, the hashing and distribution of key/value pairs may be affected.
7. Use Namespace. The memcached cache is a very simple massive key/value storage system, and as such there is no
Way of compartmentalizing data automatically into different sections. For example, if you are storing
Information by the unique ID returned from a MySQL database, then storing the data from two different
Tables cocould run into issues because the same ID might be valid in both tables.
Some interfaces provide an automatic mechanism for creating namespaces when storing information
Into the cache. In practice, these namespaces are merely a prefix before a given ID that is applied
Every time a value is stored or retrieve from the cache.
You can implement the same basic principle by using keys that describe the object and the unique
Identifier within the key that you supply when the object is stored. For example, when storing user data,
Prefix the ID of the user with user: or user -.


Memcached distribution algorithms:
The memcached client interface supports a number of different distribution algorithms that are used in
Multi-server configurations to determine which host shocould be used when setting or getting data from
A given memcached instance. When you get or set a value, a hash is constructed from the supplied
Key and then used to select a host from the list of configured servers. Because the hashing mechanic
Uses the supplied key as the basis for the hash, the same server is selected during both set and get
Operations.
You can think of this process as follows. Given an array of servers (a, B, and c), the client uses
Hashing algorithm that returns an integer based on the key being stored or retrieved. The resulting
Value is then used to select a server from the list of servers configured in the client. Most standard
Client hashing within memcache clients uses a simple modulus calculation on the value against
Number of configured memcached servers. You can summarize the process in pseudo docode:
@ Memcservers = ['a. memc ',' B. memc ', 'C. memc'];
$ Value = hash ($ key );
$ Chosen = $ value % length (@ memcservers );
Replacing the above with values:
@ Memcservers = ['a. memc ',' B. memc ', 'C. memc'];
$ Value = hash ('myid ');
$ Chosen = 7009% 3;
In the above example, the client hashing algorithm chooses the server at index 1 (7009% 3 = 1 ),
And store or retrieve the key and value with that server.
 
Using this method provides a number of advantages:
• The hashing and selection of the server to contact is handled entirely within the client. This
Eliminates the need to perform network communication to determine the right machine to contact.
• Because the determination of the memcached server occurs entirely within the client, the server can
Be selected automatically regardless of the operation being executed (set, get, increment, etc .).
• Because the determination is handled within the client, the hashing algorithm returns the same value
For a given key; values are not affected or reset by differences in the server environment.
• Selection is very fast. The hashing algorithm on the key value is quick and the resulting selection
The server is from a simple array of available machines.
• Using client-side hashing simplifies the distribution of data over each memcached server. Natural
Distribution of the values returned by the hashing algorithm means that keys are automatically spread
Over the available servers.
Providing that the list of servers configured within the client remains the same, the same stored key
Returns the same value, and therefore selects the same server.
However, if you do not use the same hashing mechanic then the same data may be recorded
On different servers by different interfaces, both wasting space on your memcached and leading
Potential differences in the information.

The problem with client-side selection of the server is that the list of the servers (including their
Sequential order) must remain consistent on each client using the memcached servers, and the servers
Must be available. If you try to perform an operation on a key when:
• A new memcached instance has been added to the list of available instances
• A memcached instance has been removed from the list of available instances
• The order of the memcached instances has changed
When the hashing algorithm is used on the given key, but with a different list of servers, the hash
Calculation may choose a different server from the list.
If a new memcached instance is added into the list of servers, as new. memc is in the example below,
Then a GET operation using the same key, myid, can result in a cache-miss. This is because the same
Value is computed from the key, which selects the same index from the array of servers, but index 2
Now points to the new server, not the server c. memc where the data was originally stored. This wocould

Result in a cache miss, even though the key exists within the cache on another memcached instance.



This means that servers c. memc and new. memc both contain the information for key myid, but

Information stored against the key in eachs server may be different in each instance. A more significant
Problem is a much higher number of cache-misses when retrieving data, as the addition of a new
Server changes the distribution of keys, and this in turn requires rebuilding the cached data on

Memcached instances, causing an increase in database reads.


The same effect can occur if you actively manage the list of servers configured in your clients, adding
And removing the configured memcached instances as each instance is identified as being available.
For example, removing a memcached instance when the client notices that the instance can no longer
Be contacted can cause the server selection to fail as described here.
To prevent this causing significant problems and invalidating your cache, you can select the hashing
Algorithm used to select the server. There are two common types of hashing algorithm, consistent and
Modula.
With consistent hashing algorithms, the same key when applied to a list of servers always uses
Same server to store or retrieve the keys, even if the list of configured servers changes. This means
That you can add and remove servers from the configure list and always use the same server for
Given key. There are two types of consistent hashing algorithms available, Ketama and Wheel. Both
Types are supported by libmemcached, and implementations are available for PHP and Java.
Any consistent hashing algorithm has some limitations. When you add servers to an existing list
Configured servers, keys are distributed to the new servers as part of the normal distribution. When you
Remove servers from the list, the keys are re-allocated to another server within the list, meaning that
The cache needs to be re-populated with the information. Also, a consistent hashing algorithm does not
Resolve the issue where you want consistent selection of a server authentication SS multiple clients, but where
Each client contains a different list of servers. The consistency is enforced only within a single client.
With a modula hashing algorithm, the client selects a server by first computing the hash and then
Choosing a server from the list of configured servers. As the list of servers changes, so the server
Selected when using a modula hashing algorithm also changes. The result is the behavior described
Above; changes to the list of servers mean that different servers are selected when retrieving data,
Leading to cache misses and increase in database load as the cache is re-seeded with information.
If you use only a single memcached instance for each client, or your list of memcached servers
Configured for a client never changes, then the selection of a hashing algorithm is irrelevant, as it has
No noticeable effect.
If you change your servers regularly, or you use a common set of servers that are shared among
Large number of clients, then using a consistent hashing algorithm shocould help to ensure that your
Cache data is not duplicated and the data is evenly distributed.






Memory Allocation within memcached:
When you first start memcached, the memory that you have configured is not automatically allocated.
Instead, memcached only starts allocating and reserving physical memory once you start saving
Information into the cache.
When you start to store data into the cache, memcached does not allocate the memory for the data
On an item by item basis. Instead, a slab allocation is used to optimize memory usage and prevent
Memory fragmentation when information expires from the cache.
With slab allocation, memory is reserved in blocks of 1 MB. The slab is divided up into a number
Blocks of equal size. When you try to store a value into the cache, memcached checks the size of
Value that you are adding to the cache and determines which slab contains the right size allocation
The item. If a slab with the item size already exists, the item is written to the block within the slab.
If the new item is bigger than the size of any existing blocks, then a new slab is created, divided up
Blocks of a suitable size. If an existing slab with the right block size already exists, but there are no free
Blocks, a new slab is created. If you update an existing item with data that is larger than the existing
Block allocation for that key, then the key is re-allocated into a suitable slab.
For example, the default size for the smallest block is 88 bytes (40 bytes of value, and the default 48
Bytes for the key and flag data). If the size of the first item you store into the cache is less than 40
Bytes, then a slab with a block size of 88 bytes is created and the value stored.
If the size of the data that you intend to store is larger than this value, then the block size is increased
By the chunk size factor until a block size large enough to hold the value is determined. The block size
Is always a function of the scale factor, rounded up to a block size which is exactly divisible into
Chunk size.





Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.