How Do I Detect Big Keys and Hot Keys in Advance?
- Configure alarm rules for the Memory Usage metric of the instance nodes.
If a node has a big key, the memory usage of the node is much higher than that of other nodes. In this case, an alarm is triggered to help you find the potentially problematic key.
- Configure alarm rules for the Maximum Inbound Bandwidth, Maximum Outbound Bandwidth, and CPU Usage metrics of the instance nodes.
If a node has a hot key, the bandwidth and CPU usage of the node is much higher than that of other nodes. In this case, an alarm is triggered to help you find the potentially problematic key.
The preceding method for discovering hot keys can be used for DCS Redis 3.0 instances, because hot key analysis is not supported by DCS Redis 3.0 instances.
For details about setting alarm rules, see Setting Alarm Rules for Critical Metrics.
For details about the operations of big key and hot key analysis, see Analyzing Big Keys and Hot Keys.
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.