当前位置:网站首页>Redis design specification
Redis design specification
2022-07-28 02:03:00 【InfoQ】
Key Design specifications for

Java Object storage scheme

Redis Safety suggestion
- Redis Don't be accessed by the Internet , prohibit bind 0.0.0.0 It should be set to bind 192.168.132.128
- change redis The default port of is not 6379, It can be set to others, such as -port 6677
- Redis Use non Root start-up , Do not use root, It can be for redis Create a special account for redis Conduct management .
- Redis To set the password ( Login password and master-slave synchronization password , It is recommended to mix uppercase and lowercase letters with characters in passwords , Improve security ), Don't use the same login password
- Regular backup save/bgsave command Conduct RDB Backup
- Good configuration Linux Firewall rules , Release the minimum range of ports
Redis Memory usage evaluation
Self memory
Buffer memory
Object memory
Redis Memory statistics

Redis Set upper memory limit

Redis Memory recovery strategy
- volatile-lru: Delete the least recently used key
- volatile-lfu: Delete the least frequently used key
- volatile-ttl: In chronological order , Delete expiring key
- volatile-random: Randomly delete data that is about to expire key
- allkeys-lru: Delete the least recently used key
- allkeys-lfu: Delete the least frequently used key
- allkeys-random: Randomly delete all data key
- noeviction: Never expire , If there is a request to add , Returns an error
边栏推荐
- Netease cloud copywriting
- GBase 8c 事务ID和快照
- Establishment of elk log analysis system
- Enterprise operation and maintenance practice - using aliyun container image service to pull and build images of overseas GCR and quay warehouses
- Linux安装mysql8.0.29详细教程
- Software testing interview question: what types of software testing are you familiar with?
- JS what situations can't use json Parse, json.stringify deep copy and a better deep copy method
- Gbase 8C backup control function (III)
- Data security and privacy computing summit - provable security: Learning
- 机器学习如何做到疫情可视化——疫情数据分析与预测实战
猜你喜欢

Fiddler mobile packet capturing agent settings (for Huawei glory 60s)

Embedded classic communication protocol

开源飞控(PX4、ardupilot)

基于 Flink CDC 实现海量数据的实时同步和转换

ue4 unreal NDisplay插件 简易使用 三折幕 详细...

Packet capturing wizard netcapture app packet capturing tutorial "complete"

Forget the root password

Enterprise operation and maintenance practice - using aliyun container image service to pull and build images of overseas GCR and quay warehouses

N32l43x FLASH read \ write \ erase operation summary

Linux安装mysql8.0.29详细教程
随机推荐
[interview: concurrent article 28:volatile] orderliness
N32L43x Flash读\写\擦除操作总结
企业运维实践-使用Aliyun容器镜像服务对海外gcr、quay仓库镜像进行镜像拉取构建
Game 302 of leetcode
Hcip day 12 notes
shell正则和元字符
Redis设计规范
GBase 8c 事务ID和快照
Gbase 8C configuration setting function
focal loss原理及实现
简单为美-编程思路
Data warehouse construction - DWS floor
mongodb/mongoTemplate.upsert批量插入更新数据的实现
Gbase 8C transaction ID and snapshot (V)
暴雪《暗黑破坏神 4》PS5 / PS4 测试版添加到 PlayStation 数据库
What are the important applications of MES system in manufacturing enterprises
Use of recursion: 1. Convert the tiled array to a tree 2. Convert the tree to a tiled array
Gbase 8C database object size function (I)
Leetcode: 515. Find the maximum value in each tree row
How tormenting are weekly and monthly reports? Universal report template recommended collection! (template attached)