Book Image

Mastering Redis

By : Vidyasagar N V, Nelson
Book Image

Mastering Redis

By: Vidyasagar N V, Nelson

Overview of this book

Redis is the most popular, open-source, key value data structure server that provides a wide range of capabilities on which multiple platforms can be be built. Its fast and flexible data structures give your existing applications an edge in the development environment. This book is a practical guide which aims to help you deep dive into the world of Redis data structure to exploit its excellent features. We start our journey by understanding the need of Redis in brief, followed by an explanation of Advanced key management. Next, you will learn about design patterns, best practices for using Redis in DevOps environment and Docker containerization paradigm in detail. After this, you will understand the concept of scaling with Redis cluster and Redis Sentinel , followed by a through explanation of incorporating Redis with NoSQL technologies such as Elasticsearch and MongoDB. At the end of this section, you will be able to develop competent applications using these technologies. You will then explore the message queuing and task management features of Redis and will be able to implement them in your applications. Finally, you will learn how Redis can be used to build real-time data analytic dashboards, for different disparate data streams.
Table of Contents (13 chapters)
12
Index

Summary

This chapter's focus comes full circle to the reasons for using Redis in the first chapter of Master Redis. Redis's role as a "glue" technology is well-suited for connecting various data sources to end targets for many extract-transform-load workloads. We saw a simple example of loading a DP.LA dataset that contains the metadata for a collection of images and other content from the University of Illinois. The speed difference was orders of magnitude faster using the bulk loading options in Redis, where you create Redis protocol (RESP) directly from the incoming data source (the extract and transform steps) to finally being loaded with either Netcat or a special mode in the Redis-cli program. We touched upon minimum security strategies for protecting your Redis instance. We then finished up this chapter by examining two common machine learning techniques – Naïve Bayes and simple linear regression – and showed how Redis can be used for turning...