Book Image

Redis 4.x Cookbook

Book Image

Redis 4.x Cookbook

Overview of this book

Redis is considered the world's most popular key-value store database. Its versatility and the wide variety of use cases it enables have made it a popular choice of database for many enterprises. Based on the latest version of Redis, this book provides both step-by-step recipes and relevant the background information required to utilize its features to the fullest. It covers everything from a basic understanding of Redis data types to advanced aspects of Redis high availability, clustering, administration, and troubleshooting. This book will be your great companion to master all aspects of Redis. The book starts off by installing and configuring Redis for you to get started with ease. Moving on, all the data types and features of Redis are introduced in detail. Next, you will learn how to develop applications with Redis in Java, Python, and the Spring Boot web framework. You will also learn replication tasks, which will help you to troubleshoot replication issues. Furthermore, you will learn the steps that need to be undertaken to ensure high availability on your cluster and during production deployment. Toward the end of the book, you will learn the topmost tasks that will help you to troubleshoot your ecosystem efficiently, along with extending Redis by using different modules.
Table of Contents (21 chapters)
Title Page
Dedication
Packt Upsell
Foreword
Contributors
Preface
13
Windows Environment Setup
Index

Securing Redis


Security is apparently one of the fundamental concerns in any production environment. However, Redis itself provides very limited features in terms of security, because it is designed to be deployed in an environment where all clients are trusted. The original design idea of Redis is more focused on the optimization of maximum performance and simplicity rather than the full authentication and access control support. Although most of Redis' security relies on the outside of Redis (OS, firewall), there is still something we can do to protect a Redis Server from unwanted access and attack. In this recipe, we will discuss some common practices to secure Redis in the production environment.

Getting ready…

You need to finish the installation of the Redis Server, as we described in the Downloading and installing Redis recipe in Chapter 1Getting Started with Redis.

How to do it...

Let's discuss how to secure Redis with proper network configuration. It is never advisable to expose a...