Summary

This chapter presented how to set up basic authentication in Redis and how to obfuscate and disable Redis commands. It also introduced networking techniques to make sure that the Redis connection is safer (firewall, VPC, and SSL encryption). The next chapter will introduce replication, persistence methods (RDB and AOF), data partitioning, and the use of twemproxy to automatically shard data across multiple instances.

Get Redis Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.