Redis
The open source, in-memory data store used by millions of developers as a database, cache, streaming engine, and message broker.
redis> PING
"PONG"
redis> HSET user:1 name antirez vocation artist
(integer) 2
redis> SET e 2.71
"OK"
redis> INCRBYFLOAT e 0.43
"3.14"
redis> RENAME e pi
"OK"
redis>
Preparation
Install & launch Redis
Learn the Redis CLI
Countdown
Experiment with Redis data structures
Explore Redis clients
<3>Liftoff3>
See Redis programming patterns
Join to the community
Core capabilities
- In-memory data structures
Well-known as a "data structure server", with support for strings, hashes, lists, sets, sorted sets, streams, and more. - Programmability
Server-side scripting with Lua and server-side stored procedures with Redis Functions. - Extensibility
A module API for building custom extensions to Redis in C, C++, and Rust. - Persistence
Keeps the dataset in memory for fast access, but can also persist all writes to permanent storage to survive reboots and system failures. - Clustering
Horizontal scalability with hash-based sharding, scaling to millions of nodes with automatic re-partitioning when growing the cluster. - High availability
Replication with automatic failover for both standalone and clustered deployments.
Use cases
Redis' versatile in-memory data structures enable building data infrastructure for real-time applications that require low latency and high-throughput.
Redis' speed makes it ideal for caching database queries, complex computations, API calls, and session state.
The stream data type enables high-rate data ingestion, messaging, event sourcing, and notifications.
Redis Stack use cases
Searchable Redis
Index and query Redis data structures and data models; run complex aggregations and full-text search on your Redis data.
Document database
Model domain entirely in Redis, and query your JSON data efficiently without ever having to use a cache.
Telemetry
Ingest continuous readings from devices in the field, storing as time series data or analyzing and deduplicating with probabilistic data structures.
Identity and resource management
Define digital resources and ACLs as a graph, and compute permissions in real-time with a single Cypher query.
Vector similarity search
Query vector embeddings to power images search, recommendation engines, and natural language text processing.
Fraud detection
All the tools to detect fraud in real time, probabilistic queries, vector search, and even processing using streams.