当前位置:网站首页>Redis key operation
Redis key operation
2022-07-06 01:40:00 【Freezing point contract】
operation key
keys * : View all... Of the current library key
exists key: Judge a certain key Whether there is
type key: Judge key What type is it
del key: Delete the specified key The data of
unlink key: Asynchronously delete the specified key( Only will keys from keyspace Delete from metadata , The real deletion will be done asynchronously later )
expire key 10: Set up key The expiration date is 10s
ttl key: see key How much more? s Be overdue ,-1 Represents never expires ,-2 Indicates that it has expired
select db: Switch to the specified library
dbsize: View the current library's key Number
flushdb: Empty the current library
flushall: Empty all libraries
边栏推荐
- False breakthroughs in the trend of London Silver
- Une image! Pourquoi l'école t'a - t - elle appris à coder, mais pourquoi pas...
- [Yu Yue education] Liaoning Vocational College of Architecture Web server application development reference
- Folio. Ink is a free, fast and easy-to-use image sharing tool
- 【SSRF-01】服务器端请求伪造漏洞原理及利用实例
- dried food! Accelerating sparse neural network through hardware and software co design
- Leetcode 208. Implement trie (prefix tree)
- Paddle framework: paddlenlp overview [propeller natural language processing development library]
- How to get all sequences in Oracle database- How can I get all sequences in an Oracle database?
- XSS learning XSS lab problem solution
猜你喜欢

Redis-字符串类型
![[solved] how to generate a beautiful static document description page](/img/c1/6ad935c1906208d81facb16390448e.png)
[solved] how to generate a beautiful static document description page

How does the crystal oscillator vibrate?

一圖看懂!為什麼學校教了你Coding但還是不會的原因...
![[Jiudu OJ 09] two points to find student information](/img/35/25aac51fa3e08558b1f6e2541762b6.jpg)
[Jiudu OJ 09] two points to find student information

Basic operations of databases and tables ----- non empty constraints

Accelerating spark data access with alluxio in kubernetes

A Cooperative Approach to Particle Swarm Optimization

Yii console method call, Yii console scheduled task
![[ssrf-01] principle and utilization examples of server-side Request Forgery vulnerability](/img/43/a8f302eb69beff4037aadda808f886.png)
[ssrf-01] principle and utilization examples of server-side Request Forgery vulnerability
随机推荐
XSS learning XSS lab problem solution
[Jiudu OJ 09] two points to find student information
SPIR-V初窺
2022年广西自治区中职组“网络空间安全”赛题及赛题解析(超详细)
Cookie concept, basic use, principle, details and Chinese transmission
[Yu Yue education] Liaoning Vocational College of Architecture Web server application development reference
Loop structure of program (for loop)
Force buckle 9 palindromes
Redis守护进程无法停止解决方案
Mathematical modeling learning from scratch (2): Tools
【Flask】获取请求信息、重定向、错误处理
How does Huawei enable debug and how to make an image port
安装Redis
leetcode-2.回文判断
[technology development -28]: overview of information and communication network, new technology forms, high-quality development of information and communication industry
Netease smart enterprises enter the market against the trend, and there is a new possibility for game industrialization
Leetcode sum of two numbers
500 lines of code to understand the principle of mecached cache client driver
Folio. Ink is a free, fast and easy-to-use image sharing tool
UE4 unreal engine, editor basic application, usage skills (IV)