Tagged articles
22 articles
Page 1 of 1
Ma Wei Says
Ma Wei Says
Oct 2, 2025 · Databases

Essential Redis Best Practices: Keys, Memory, Security, and Performance

This guide outlines practical Redis best‑practice rules covering key naming conventions, data‑size limits, expiration strategies, script and transaction usage, client connection handling, and security measures to help you build fast, stable, and secure production systems.

Key DesignMemory ManagementSecurity
0 likes · 9 min read
Essential Redis Best Practices: Keys, Memory, Security, and Performance
ITPUB
ITPUB
Feb 14, 2025 · Databases

Why Did Redis Crash at 100% Memory? Deep Dive into Buffer Overflows and Mitigation

An incident where massive key traffic pushed Redis memory usage to 100% revealed that buffer memory, not the dataset itself, exhausted the instance, leading to timeouts and crashes; the analysis explains the root causes, shows detailed INFO MEMORY output, and provides practical mitigation guidelines.

CacheKey DesignMemory Management
0 likes · 25 min read
Why Did Redis Crash at 100% Memory? Deep Dive into Buffer Overflows and Mitigation
Ximalaya Technology Team
Ximalaya Technology Team
Sep 8, 2023 · Backend Development

Cache Selection and Usage Guidelines for Ximalaya Services

Ximalaya’s cache guidelines define four Redis‑based types (master‑slave, Codis‑Redis, Cloud Database Redis, XCache) with cache or store modes, prescribe using Cloud Redis for clusters and XCache for large KV, enforce short readable keys, TTLs, limited batch sizes, safe commands, isolated clusters, and compression to ensure stability and performance.

BackendKey Designcache best practices
0 likes · 9 min read
Cache Selection and Usage Guidelines for Ximalaya Services
Laravel Tech Community
Laravel Tech Community
May 4, 2023 · Databases

Redis Development Guidelines: Key Design, Command Usage, and Best Practices

This article outlines comprehensive Redis development standards, covering key naming conventions, value design, lifecycle management, command usage guidelines, prohibited commands, batch operations, transaction considerations, and Lua scripting constraints, aiming to reduce common pitfalls and improve performance and maintainability.

Command Best PracticesKey Designdatabase
0 likes · 6 min read
Redis Development Guidelines: Key Design, Command Usage, and Best Practices
Java High-Performance Architecture
Java High-Performance Architecture
Dec 31, 2022 · Databases

Mastering Alibaba Cloud Redis: Key Design, Commands, and Client Best Practices

This guide details Alibaba Cloud Redis development standards, including readable key naming, value size limits, safe command usage, client connection pooling, eviction policies, useful tooling, and efficient big‑key deletion methods, helping engineers build high‑performance, reliable Redis services.

Alibaba CloudBigKey ManagementClient Pooling
0 likes · 11 min read
Mastering Alibaba Cloud Redis: Key Design, Commands, and Client Best Practices
21CTO
21CTO
Sep 6, 2022 · Databases

Best Practices for Using Alibaba Cloud Redis: Key Design, Commands, and Client Tips

This guide outlines comprehensive best‑practice recommendations for Alibaba Cloud Redis, covering readable key naming, value size limits, safe command usage, client connection pooling, encryption, eviction policies, and efficient big‑key deletion techniques to improve performance and reliability.

Alibaba CloudBigKey ManagementClient Best Practices
0 likes · 11 min read
Best Practices for Using Alibaba Cloud Redis: Key Design, Commands, and Client Tips
Top Architect
Top Architect
Jun 12, 2022 · Databases

Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and Tooling

This article outlines comprehensive guidelines for Alibaba Cloud Redis, covering readable and concise key naming, value size limits, appropriate data types, key lifecycle management, safe command usage, client connection pooling, encryption, eviction policies, and tools for synchronization, big‑key detection, and efficient deletion.

Alibaba CloudCommand OptimizationKey Design
0 likes · 8 min read
Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and Tooling
dbaplus Community
dbaplus Community
Apr 21, 2021 · Backend Development

21 Essential Redis Practices: Key Design, Pipelines, Locks, and Performance Tips

This guide compiles 21 practical Redis usage guidelines covering key naming conventions, value size limits, expiration strategies, batch operations, risky commands, distributed lock patterns, cache consistency, capacity planning, and common pitfalls like cache penetration, snowball, and hot‑key issues, helping developers and operators build reliable, high‑performance Redis deployments.

Cache ConsistencyKey DesignPipeline
0 likes · 21 min read
21 Essential Redis Practices: Key Design, Pipelines, Locks, and Performance Tips
JavaEdge
JavaEdge
Mar 29, 2021 · Backend Development

How to Mitigate Redis Performance Issues Caused by Large Keys

When a Redis key stores a very large value, it can block the single‑threaded server and waste memory, so this article explains practical techniques such as splitting keys, using hash structures, and bucket‑based hashing to reduce I/O pressure and memory consumption.

BackendKey Designredis
0 likes · 4 min read
How to Mitigate Redis Performance Issues Caused by Large Keys
Laravel Tech Community
Laravel Tech Community
Jun 17, 2020 · Databases

Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Integration, and Tools

This article outlines comprehensive development guidelines for Alibaba Cloud Redis, covering readable and concise key naming, avoiding big keys, proper command selection, safe client usage with connection pools, eviction policies, and practical code examples for deleting large hashes, lists, sets, and sorted sets.

Client IntegrationCommand UsageJava
0 likes · 11 min read
Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Integration, and Tools
Top Architect
Top Architect
Jun 8, 2020 · Databases

Best Practices and Development Guidelines for Using Alibaba Cloud Redis

This article outlines comprehensive development guidelines for Alibaba Cloud Redis, covering key naming conventions, value design, command best practices, client usage patterns, related tools, and detailed code examples for safely deleting large keys across various data structures.

Alibaba CloudCacheJava
0 likes · 12 min read
Best Practices and Development Guidelines for Using Alibaba Cloud Redis
Architecture Digest
Architecture Digest
Dec 14, 2019 · Databases

Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and BigKey Management

This article presents comprehensive guidelines for Alibaba Cloud Redis, covering readable and concise key naming, value design to avoid big keys, safe command usage, client connection pooling and circuit‑breaker patterns, appropriate eviction policies, and practical code examples for deleting large hashes, lists, sets, and sorted sets.

JavaKey Designbest practices
0 likes · 12 min read
Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and BigKey Management
Big Data Technology & Architecture
Big Data Technology & Architecture
Jun 4, 2019 · Databases

Best Practices and Guidelines for Using Alibaba Cloud Redis

This article presents comprehensive Alibaba Cloud Redis development guidelines covering key‑value design, value handling, command usage, client configuration, lifecycle management, related tools, and code examples to help developers avoid common pitfalls and improve performance.

Alibaba CloudBigKey DetectionClient Best Practices
0 likes · 11 min read
Best Practices and Guidelines for Using Alibaba Cloud Redis
Java Captain
Java Captain
Apr 27, 2019 · Databases

Redis Key Design, Command Usage, and Client Best Practices

This guide presents comprehensive best‑practice recommendations for designing Redis keys, choosing appropriate data types, managing key lifecycles, safely using commands, optimizing client connections, handling big keys, and selecting eviction policies to ensure high performance and reliability in production environments.

CacheKey Designbest practices
0 likes · 12 min read
Redis Key Design, Command Usage, and Client Best Practices
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Dec 7, 2018 · Databases

Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and Tools

This guide outlines comprehensive best‑practice recommendations for Alibaba Cloud Redis, covering key naming conventions, value size limits, safe command usage, client connection strategies, memory eviction policies, and useful auxiliary tools to improve reliability and performance.

Client ConfigurationCommand OptimizationKey Design
0 likes · 7 min read
Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and Tools
Full-Stack Internet Architecture
Full-Stack Internet Architecture
May 27, 2018 · Databases

Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and Tools

This article outlines Alibaba Cloud Redis development guidelines, covering key naming conventions, value design, command usage, client configuration, lifecycle management, and recommended tools, providing practical recommendations to avoid common pitfalls, improve performance, and ensure reliable operation of Redis in production environments.

Alibaba CloudKey Designbest practices
0 likes · 9 min read
Best Practices for Using Alibaba Cloud Redis: Key Design, Command Usage, Client Configuration, and Tools
ITPUB
ITPUB
Dec 22, 2017 · Databases

Mastering Redis: Key Design and Data‑Type Use Cases

This guide explains Redis’s core features, shows how to design clear key naming conventions, and demonstrates practical applications of the string, hash, list, set, and sorted‑set data types with concrete commands and examples for building fast, memory‑based caches.

Backend DevelopmentData TypesKey Design
0 likes · 10 min read
Mastering Redis: Key Design and Data‑Type Use Cases
ITPUB
ITPUB
Nov 30, 2017 · Databases

Mastering Redis: Key Design and Data Type Use Cases

This guide explains Redis's core characteristics, practical key‑naming conventions, and detailed application scenarios for each data type—including strings, hashes, lists, sets, and sorted sets—complete with code examples and performance tips.

Data TypesKey Designcaching
0 likes · 9 min read
Mastering Redis: Key Design and Data Type Use Cases
Java Backend Technology
Java Backend Technology
Jun 19, 2017 · Databases

Design Efficient Redis Keys for Pattern‑Matching Queries

This article explains how to design concise Redis keys that enable multi‑condition and fuzzy queries by using a structured naming convention, demonstrates the implementation within a Java SSM project, and provides code snippets for key assembly, querying, and deletion.

JavaKey DesignSSM
0 likes · 6 min read
Design Efficient Redis Keys for Pattern‑Matching Queries