1. PingTo test whether the connection survives:Redis 127.0.0.1:6379> PingPONGBefore executing the following command, we stop the Redis serverRedis 127.0.0.1:6379> PingCould not connect to Redis at 127.0.0.1:6379:connection refusedBefore executing the following command, we start the Redis serverNot connected> PingPONGRedis 127.0.0.1:6379>The first ping indicates
Redis provides a rich command to manipulate databases and various data types, which can be used on Linux endpoints. In programming, such as various language packs, these commands have a corresponding method. The following is a summary of the commands provided by Redis. Key-Value Related
value is the number of elements that were successfully added (ignored elements are not counted).
sremThe same is true for commands, delete elements, and if the element exists to delete the success, the return value is the number of elements that were successfully deleted.
2, get all the elements in the collection
Smembers Key
3, determine whether the element is in the collection
Sismember Key Member
The time complexity of
############################### # By default, Redis is asynchronously exporting data to disk. This mode is good enough in many applications, but the Redis process # issues or power outages can cause write loss over time (depending on the configured Save command). # # AOF is a more reliable alternative to persistence mode, such as using the default data write file policy (see following configuration) #
1 Create-Save-view-deleteSet name maojun;exists name;get Name;del name;2 serialization of recordsSet name maojun;exists name;dump name; Exit client is entered, exists Name,name still exists.3 Setting the time to live-modify the time to liveSet name maojun;exists name;expire name 30;expire name 3000;ttl name;4 inserting a few records-view all keysMset One 1 Twon 2 three 3;key *;5 Records moved from Db0 to DB1.Select 0;set name maojun;get name;move name 1;select 1;get name;6 removal of key expirat
replace; alter database $ dbname set online"
Incremental recovery: osql-U $ user-P "$ password"-d master-S $ instance-Q "alter database $ dbname set offline with rollback immediate; restore database $ dbname from disk = '$ filename' with replace, NORECOVERY; restore database $ dbname from dist =' $ diff_filename 'with recovery; alter database $ dbname set online"
III. oracle:
Oracle uses rman for backup and recovery. if you are interested, you can learn more about the specific use of rman.
IV.
set than list fee memory (to store fractions, hashes, jump tables).
Ii. common commands for Redis ordered sets
Redis ordered set of commonly used commands are:,,,, zadd zrange zremrangebyrank zremrangebyscore zcard etc., these are used relatively high frequency, there are some parameters of the description. Let's ta
element content group can be synthesized as a new key by a given pattern (patern), sorted by the content of the new key, and returned with a sorted set of elements.For example:The pattern ' name* ' represents the use of the fill in the Key1 collection *, gets 3 new key name1 name2 Name3 then sorts the values of these 3 keys, and the result of the sort is key1 the order in which the collection is returned.[Limit start Count]Limit can be used to limit the number of returned resultsFor example:Sta
First, Redis simple introduction
Redis is a member of the NoSQL family, a memory-type database of key-value pairs. But it supports saving the data locally. This is better than memcached.
Disadvantage: There is no local data buffer, there is no complete data aggregation support
Advantages: Simple configuration, easy to use, high performance, support for different data types (hashes, lists, sets, sorted se
First, overview:
Redis was defined at the beginning of the design as a long uninterrupted service process, so most of the system configuration parameters can be effective without restarting the process. Even switching the current persistence mode from AOF to RDB does not require a reboot.In Redis, a set of commands related to server administration, including the
Redis is a database of key-value pairs with 5 of the primary data types :String type (string), hash type (hash), list type (lists), collection type (set), Ordered collection type (zset)One: String typeThe string type is the most basic type of redis, and it can store any form of string. The other four types are different forms of string types.The most basic command: GET, SET Syntax: GET Key,set Key value val
Commands related to connection operations
Quit: Close connection (connection)
Auth: simple Password Authentication
Persistence
save: Save data synchronously to disk
bgsave: Asynchronously saves data to disk
lastsave: Returns the Unix timestamp
shundown: Save data synchronously to disk, and then close the service
remote Service Control
info: Provides server information and stat
The various data types supported by Redis include String,list, set, sorted set, and hash.REdis is essentially a key-value db, so let's start by looking at his key. First, the key is also a string type, but the key cannot include boundary characters. because key is not a binary safe string, such as "My Key" and "mykey\n" keys that contain spaces and line breaks are not allowed. by the way, the use of binary characters is not restricted within
server side, such as unions, intersections, and differences. Because these operations are done on the server side, they are highly efficient and also save a lot of network IO overhead.Sadd Test_set a b c dsmembers Test_setsrem Test_set ASorted-sets basic operations: Sorted-sets and sets types are very similar, both are collections of strings and do not allow duplicate members to appear in a set. The main difference between them is that each member of the sorted-sets has a fraction (score) assoc
Xinxing analyzes key-related commands in Redis, and Xinxing analyzes rediskey
In Redis, we can also directly operate on keys. The following are common commands:
(1) keypattern: It indicates getting all the keys matching pattern. Note that we should avoid using this command because it is very time-consuming for large da
access swap files, preferably do not exceed the machine's core number, if set to 0, then all the swap file operation is serial, may cause a relatively long delay. The default value is 4Vm-max-threads 427. Set when replying to the client, whether to merge the smaller package into one package send, the default is to turn onGlueoutputbuf Yes28. Specifies that a special hashing algorithm is used when more than a certain number or maximum element exceeds a critical valueHash-max-zipmap-entries 64Has
Recently in the maintenance of a cache with the Redis project, encountered a product needs to eliminate the need to clean up the user's data, because each time to clear a lot of user data, each manual deletion is more cumbersome, and finally adopted a batch script to execute the command of the Purge
The command to be executed begins with a command line in a text file, similar to this one, and named Command.txt
Zrem incr:cjapp1271:day:20150805 12378
Redis Performance Metrics monitoring commandsIn the process of learning, we must learn to use help frequently to understand the specific use of commands.1.info (monitoring typically uses this command to read data)127.0.0.1:6379> Help InfoINFO [Section]Summary:get information and statistics about the serversince:1.0.0Group:server127.0.0.1:6379> Info# Serverredis_version:3.0.7redis_git_sha1:00000000redis_git_
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.