Celery v5.0.5 DocumentationLeak Protection The --max-tasks-per- child option is used for user tasks leaking resources, like memory or file descriptors, that are simply out of your control. Read more…. User Components Each worker before use, this instance is called an application (or app for short). The application is thread-safe so that multiple Celery applications with different configurations, components, and tasks can co-exist including the name of the app class (Celery), the name of the current main module (__main__), and the memory address of the object (0x100469fd0). Main Name Only one of these is important, and that’s the main0 码力 | 2315 页 | 2.14 MB | 1 年前3
Celery v5.0.1 DocumentationLeak Protection The --max-tasks-per- child option is used for user tasks leaking resources, like memory or file descriptors, that are simply out of your control. Read more…. User Components Each worker before use, this instance is called an application (or app for short). The application is thread-safe so that multiple Celery applications with different configurations, components, and tasks can co-exist including the name of the app class (Celery), the name of the current main module (__main__), and the memory address of the object (0x100469fd0). Main Name Only one of these is important, and that’s the main0 码力 | 2313 页 | 2.13 MB | 1 年前3
Celery v5.0.2 DocumentationLeak Protection The --max-tasks-per- child option is used for user tasks leaking resources, like memory or file descriptors, that are simply out of your control. Read more…. User Components Each worker before use, this instance is called an application (or app for short). The application is thread-safe so that multiple Celery applications with different configurations, components, and tasks can co-exist including the name of the app class (Celery), the name of the current main module (__main__), and the memory address of the object (0x100469fd0). Main Name Only one of these is important, and that’s the main0 码力 | 2313 页 | 2.14 MB | 1 年前3
Celery v5.0.0 DocumentationLeak Protection The --max-tasks-per- child option is used for user tasks leaking resources, like memory or file descriptors, that are simply out of your control. Read more…. User Components Each worker before use, this instance is called an application (or app for short). The application is thread-safe so that multiple Celery applications with different configurations, components, and tasks can co-exist including the name of the app class (Celery), the name of the current main module (__main__), and the memory address of the object (0x100469fd0). Main Name Only one of these is important, and that’s the main0 码力 | 2309 页 | 2.13 MB | 1 年前3
Celery v4.0.0 DocumentationLeak Protection The --max-tasks-per- child option is used for user tasks leaking resources, like memory or file descriptors, that are simply out of your control. Read more…. User Components Each worker before use, this instance is called an application (or app for short). The application is thread-safe so that multiple Celery applications with different configurations, components, and tasks can co-exist including the name of the app class (Celery), the name of the current main module (__main__), and the memory address of the object (0x100469fd0). Main Name Only one of these is important, and that’s the main0 码力 | 2106 页 | 2.23 MB | 1 年前3
Celery 2.2 Documentationprocessing the task should be as close to the data as possible. The best would be to have a copy in memory, the worst would be a full transfer from another continent. If the data is far away, you could try sending a broadcast message to all the workers, the workers then keep a list of revoked tasks in memory. If you want tasks to remain revoked after worker restart you need to specify a file for these to of tasks a worker can execute before it’s replaced by a new process. This is useful if you have memory leaks you have no control over for example from closed source C extensions. The option can be set0 码力 | 505 页 | 878.66 KB | 1 年前3
Celery 3.0 DocumentationLeak Protection The --max-tasks-per- child option is used for user tasks leaking resources, like memory or file descriptors, that are simply out of your control. Read more…. User Components Each worker before use, this instance is called an application (or app for short). The application is thread-safe so that multiple Celery applications with different configurations, components, and tasks can co-exist including the name of the app class (Celery), the name of the current main module (__main__), and the memory address of the object (0x100469fd0). Main Name Only one of these is important, and that’s the main0 码力 | 2110 页 | 2.23 MB | 1 年前3
Celery 2.2 Documentationprocessing the task should be as close to the data as possible. The best would be to have a copy in memory, the worst would be a full transfer from another continent. If the data is far away, you could try sending a broadcast message to all the workers, the workers then keep a list of revoked tasks in memory. If you want tasks to remain revoked after worker restart you need to specify a file for these to of tasks a worker can execute before it’s replaced by a new process. This is useful if you have memory leaks you have no control over for example from closed source C extensions. The option can be set0 码力 | 314 页 | 1.26 MB | 1 年前3
Celery 2.5 DocumentationThere are several choices available, including: • Using RabbitMQ RabbitMQ is feature-complete, safe and durable. If not losing tasks is important to you, then this is your best option. • Using Redis processing the task should be as close to the data as possible. The best would be to have a copy in memory, the worst would be a full transfer from another continent. If the data is far away, you could try sending a broadcast message to all the workers, the workers then keep a list of revoked tasks in memory. If you want tasks to remain revoked after worker restart you need to specify a file for these to0 码力 | 400 页 | 1.40 MB | 1 年前3
Celery 2.4 DocumentationThere are several choices available, including: • Using RabbitMQ RabbitMQ is feature-complete, safe and durable. If not losing tasks is important to you, then this is your best option. • Using Redis processing the task should be as close to the data as possible. The best would be to have a copy in memory, the worst would be a full transfer from another continent. If the data is far away, you could try sending a broadcast message to all the workers, the workers then keep a list of revoked tasks in memory. If you want tasks to remain revoked after worker restart you need to specify a file for these to0 码力 | 395 页 | 1.54 MB | 1 年前3
共 51 条
- 1
- 2
- 3
- 4
- 5
- 6













