EBOOK – REDIS IN ACTION

This book covers the use of Redis, an in-memory database/data structure server.

  • Foreword
  • Preface
  • Acknowledgments
  • About this Book
  • About the Cover Illustration
  • Part 1: Getting Started
  • Part 2: Core concepts
  • Part 3: Next steps
  • Appendix A
  • Appendix B
  • Buy the paperback

    4.7 Summary

    Through this chapter, we’ve covered topics that can help keep Redis performing well
    while keeping your data secure against system failures. The first half of the chapter primarily
    discussed the use of persistence and replication to prepare for failures and deal
    with failures. The latter half dealt with keeping your data from being corrupted, using
    pipelines to improve performance, and diagnosing potential performance problems.

    If there are two things you should take from this chapter, they are that the use of
    replication and append-only files can go a long way toward keeping your data safe,
    and that using WATCH/MULTI/EXEC can keep your data from being corrupted by multiple
    clients working on the same data.

    Hopefully our discussion of WATCH/MULTI/EXEC introduced in chapter 3 has helped
    you to better understand how to fully utilize transactions in Redis. In chapter 6, we’ll
    revisit transactions, but now let’s move on to chapter 5, where you’ll learn more about
    using Redis to help with system administration tasks.