User Tools

Site Tools



Q. At first glance, having a fiber that loops through all keys in the background to expire them doesn't sound very efficient. But is it as inefficient as it sounds? (2016)

A. This mechanism works exactly the same as the expiration in Memcached. The background fiber uses a tree structure and bounds to find the expired data.


Enter your comment. Wiki syntax is allowed:
C D C S᠎ S
fibers/ttl.txt · Last modified: 2018/05/25 22:26 by eabates

Real Time Web Analytics