This book covers the use of Redis, an in-memory database/data structure server.

open all | close all

4.7 Summary

Through this chapter, we’ve covered topics that can help keep Redis performing well
while keeping your data secure against system failures. The first half of the chapter primarily
discussed the use of persistence and replication to prepare for failures and deal
with failures. The latter half dealt with keeping your data from being corrupted, using
pipelines to improve performance, and diagnosing potential performance problems.

If there are two things you should take from this chapter, they are that the use of
replication and append-only files can go a long way toward keeping your data safe,
and that using WATCH/MULTI/EXEC can keep your data from being corrupted by multiple
clients working on the same data.

Hopefully our discussion of WATCH/MULTI/EXEC introduced in chapter 3 has helped
you to better understand how to fully utilize transactions in Redis. In chapter 6, we’ll
revisit transactions, but now let’s move on to chapter 5, where you’ll learn more about
using Redis to help with system administration tasks.