Summary

This chapter presented common Redis pitfalls such as using the wrong data type, using multiple Redis databases, and not using namespaces for key names. It also told you how to avoid them. Then it showed the pitfalls of the swap space, not planning the memory properly, and using an inappropriate persistence strategy.

The next chapter will discuss some security techniques, such as authentication, firewall configuration, and SSL encryption.

Get Redis Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.