O'Reilly logo

Mastering Redis by Jeremy Nelson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter started with some memory-related directives that can be set and then we looked at the various policies for key eviction when Redis reaches the limits of its available memory. Different memory-efficient encoding for small hashes, lists, sorted sets, and sets under special conditions, sets were examined next. We then looked at using bitmap strings as random access arrays followed by using hashes more effectively as a high-level key-value store that is more memory efficient. Finally, we took a look at how to use the Redis latency monitor mode to track problematic and long-running Redis commands followed by a couple of tips for improving running Redis on Linux. The next chapter switches the focus to software development and starting ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required