Join us for RedisConf and Hackathon, April 20-21
Through this chapter, we’ve covered topics that can help keep Redis performing well
while keeping your data secure against system failures. The first half of the chapter primarily
discussed the use of persistence and replication to prepare for failures and deal
with failures. The latter half dealt with keeping your data from being corrupted, using
pipelines to improve performance, and diagnosing potential performance problems.
If there are two things you should take from this chapter, they are that the use of
replication and append-only files can go a long way toward keeping your data safe,
and that using WATCH/MULTI/EXEC can keep your data from being corrupted by multiple
clients working on the same data.
Hopefully our discussion of WATCH/MULTI/EXEC introduced in chapter 3 has helped
you to better understand how to fully utilize transactions in Redis. In chapter 6, we’ll
revisit transactions, but now let’s move on to chapter 5, where you’ll learn more about
using Redis to help with system administration tasks.
TRY REDIS ENTERPRISE CLOUD FREE
Redis Enterprise Cloud provides complete automation of day-to-day database operations. Start now with 30MB of free storage.
© 2021 Redis Labs. Redis and the cube logo are registered trademarks of Redis Labs Ltd.