Tagged articles
23 articles
Page 1 of 1
dbaplus Community
dbaplus Community
Nov 5, 2025 · Databases

Why KEYS Is Dangerous in Redis and How SCAN or Indexing Solves It

The article explains why using the KEYS command in Redis is a blocking operation that can cripple production systems, demonstrates the safe, incremental SCAN approach, and proposes an index‑based architecture or replica scans for high‑frequency or offline key‑lookup scenarios.

KEYSSCANdatabase
0 likes · 8 min read
Why KEYS Is Dangerous in Redis and How SCAN or Indexing Solves It
Tech Freedom Circle
Tech Freedom Circle
Sep 16, 2025 · Backend Development

Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid

The article explains how to perform fuzzy queries in Redis using KEYS, SCAN, and collection‑type scans, enumerates commands that can block the single‑threaded server such as KEYS *, HGETALL, LRANGE, and provides practical mitigation strategies like incremental scans, key sharding, and asynchronous deletion.

BlockingSCANdangerous-commands
0 likes · 24 min read
Redis Fuzzy Search Techniques and the Most Dangerous Commands to Avoid
Tech Freedom Circle
Tech Freedom Circle
Sep 2, 2025 · Databases

Avoid Redis Blocking: Dangerous Commands and How to Prevent Outages

In Redis's single‑threaded model, commands with O(n) or higher complexity—such as KEYS, HGETALL, LRANGE, SMEMBERS, and DEL on large keys—can block the server during traffic spikes, but using incremental scans, key splitting, and async deletion can eliminate the risk and keep services responsive.

BlockingCommand OptimizationDatabase Performance
0 likes · 23 min read
Avoid Redis Blocking: Dangerous Commands and How to Prevent Outages
IT Services Circle
IT Services Circle
Jun 11, 2025 · Databases

How to Count 100 Million Redis Keys Efficiently Without Crashing the Cluster

This article explains why the KEYS * command is dangerous for large Redis deployments and presents several practical alternatives—including SCAN, multithreaded SCAN, cluster‑wide parallel scans, built‑in counters, and real‑time incremental counting—along with code samples, performance comparisons, and guidance on choosing the right solution.

ClusterKey CountingSCAN
0 likes · 10 min read
How to Count 100 Million Redis Keys Efficiently Without Crashing the Cluster
Su San Talks Tech
Su San Talks Tech
Jun 9, 2025 · Databases

How to Efficiently Count 100 Million Redis Keys Without Crashing Your Cluster

This article explains why the KEYS command is dangerous for large keyspaces, introduces the SCAN command and its multithreaded variants, discusses distributed counting strategies, compares built‑in counters and real‑time incremental approaches, and provides guidance on selecting the best solution for your Redis deployment.

Key CountingSCANdatabase
0 likes · 10 min read
How to Efficiently Count 100 Million Redis Keys Without Crashing Your Cluster
dbaplus Community
dbaplus Community
Jan 2, 2025 · Databases

Why the Redis KEYS Command Is Dangerous and How to Replace It

The article explains that Redis's KEYS command scans all keys, blocks the server for seconds, can trigger failover issues, and provides faster alternatives like SCAN or storing keys in a set, while also showing how KEYS works in a Redis Cluster and its real‑world latency measurements.

ClusterKEYS commandSCAN
0 likes · 5 min read
Why the Redis KEYS Command Is Dangerous and How to Replace It
ITPUB
ITPUB
Jun 15, 2024 · Databases

Resolving Oracle RAC VIP Failover and SCAN IP Load‑Balancing Issues

This article walks through real‑world Oracle RAC failures caused by misconfigured VIP failover and SCAN IP load‑balancing, explains how to diagnose the symptoms, provides correct TAF and listener settings, and highlights essential configuration tips to ensure reliable high‑availability operation.

Database ConfigurationOracleRAC
0 likes · 9 min read
Resolving Oracle RAC VIP Failover and SCAN IP Load‑Balancing Issues
JD Retail Technology
JD Retail Technology
Oct 31, 2023 · Databases

How to Identify and Eliminate Redis BigKey Bottlenecks

This article explains what constitutes a Redis BigKey, why oversized keys degrade performance through data skew, network blocking, slow queries and CPU pressure, and provides practical detection methods, open‑source tooling, and mitigation techniques such as lazy‑free deletion, incremental scans, and key sharding.

BigKeyDELETESCAN
0 likes · 21 min read
How to Identify and Eliminate Redis BigKey Bottlenecks
Architecture Digest
Architecture Digest
Aug 9, 2023 · Databases

Using Redis SCAN to Safely Enumerate Keys Instead of KEYS

The article explains why using the KEYS command on a large Redis dataset can block the server, introduces the SCAN command as a non‑blocking alternative with cursor‑based iteration, and provides usage examples and best‑practice tips for safely listing prefixed keys.

CacheKEYSSCAN
0 likes · 4 min read
Using Redis SCAN to Safely Enumerate Keys Instead of KEYS
ITPUB
ITPUB
Feb 22, 2022 · Databases

Understanding and Solving Redis Big‑Key Problems

This article explains what constitutes a Redis big key, why it harms performance, how to detect it with tools like bigkeys, redis‑rdb‑tools, and monitoring, and provides practical removal, compression, and sharding strategies to mitigate the issue.

Big KeySCANUNLINK
0 likes · 9 min read
Understanding and Solving Redis Big‑Key Problems
Architect's Tech Stack
Architect's Tech Stack
Nov 13, 2020 · Databases

How to Safely Scan Large Redis Keyspaces with the SCAN Command

This article explains why using the KEYS command on massive Redis datasets can cause service blockage, analyzes the underlying O(n) traversal cost, and demonstrates how the incremental SCAN command with cursor, MATCH, and COUNT options provides a non‑blocking alternative for efficiently iterating keys.

SCANkey managementperformance
0 likes · 5 min read
How to Safely Scan Large Redis Keyspaces with the SCAN Command
Architecture Digest
Architecture Digest
Dec 10, 2019 · Databases

Using Redis SCAN to Safely Enumerate Keys Instead of KEYS

The article explains why using the KEYS command on large Redis datasets can cause service blockage and demonstrates how the SCAN command with MATCH and COUNT options provides a non‑blocking, incremental way to list keys, including syntax and practical examples.

CursorKEYSSCAN
0 likes · 5 min read
Using Redis SCAN to Safely Enumerate Keys Instead of KEYS
ITPUB
ITPUB
Jul 26, 2019 · Databases

Why KEYS Can Crash Redis and How SCAN Keeps It Responsive

The article explains how using the KEYS command on millions of Redis keys blocks the single‑threaded server, causing outages, and demonstrates how the incremental SCAN command with cursor, MATCH, and COUNT options provides a safe, non‑blocking way to iterate large keyspaces.

KEYSSCANdatabase
0 likes · 5 min read
Why KEYS Can Crash Redis and How SCAN Keeps It Responsive
ITPUB
ITPUB
Jun 11, 2019 · Databases

Why KEYS Can Crash Your Redis and How SCAN Keeps It Running

The article explains how using the KEYS command on large Redis datasets can block the single‑threaded server and cause outages, and demonstrates how the incremental SCAN command safely retrieves keys without impacting performance, including syntax, options, and practical examples.

KEYSSCANdatabase
0 likes · 4 min read
Why KEYS Can Crash Your Redis and How SCAN Keeps It Running
Big Data Technology Architecture
Big Data Technology Architecture
May 8, 2019 · Databases

Understanding HBase Scan Process and Its Performance Compared to Parquet and Kudu

The article explains why HBase read operations are complex due to its LSM‑Tree storage and multi‑version design, details the step‑by‑step Scan workflow, discusses the reasons for its multi‑request architecture, compares scan performance with Parquet and Kudu, and offers recommendations for large‑scale data scanning.

HBaseLSM‑TreeSCAN
0 likes · 7 min read
Understanding HBase Scan Process and Its Performance Compared to Parquet and Kudu
Meituan Technology Team
Meituan Technology Team
Jul 26, 2018 · Databases

Understanding and Optimizing Redis Rehash Mechanism and Scan Behavior

The article details how Redis’s incremental rehashing can double memory usage and trigger massive key eviction and scan inconsistencies in large‑scale clusters, explains the underlying dictionary structures, demonstrates the cursor bug when tables shrink, and presents a memory‑guard and scan‑cursor patch that resolves both problems.

CMemory ManagementRehash
0 likes · 26 min read
Understanding and Optimizing Redis Rehash Mechanism and Scan Behavior
Java High-Performance Architecture
Java High-Performance Architecture
Aug 5, 2016 · Databases

5 Essential Redis Tips from Heroku to Boost Performance

Heroku shares five practical Redis recommendations—including using connection pools, naming clients, selecting key eviction policies, avoiding the KEYS command, and configuring connection timeouts—to improve performance, manage resources, and simplify troubleshooting in production environments.

Client NamingConnection PoolKey Eviction
0 likes · 4 min read
5 Essential Redis Tips from Heroku to Boost Performance