Redis

Use Redis effectively for caching, queues, and data structures with proper expiration and persistence.

MIT-0 · Free to use, modify, and redistribute. No attribution required.
4 · 1.5k · 15 current installs · 15 all-time installs
byIván@ivangdavila
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and declared dependency (redis-cli as optional) align with the content: caching, queues, data structures, expiry, persistence, clustering, and memory management. Nothing requested that is unrelated to operating Redis.
Instruction Scope
SKILL.md contains only Redis usage guidance and example commands (SET, EXPIRE, XADD, EVAL, etc.). It does not instruct reading unrelated files, pulling external URLs, or accessing unrelated environment variables. Note: it advises using EVAL (Lua) and other powerful commands — if the agent actually executes those against a reachable Redis instance, those commands will run with whatever privileges the Redis connection has.
Install Mechanism
No install spec — instruction-only skill. Nothing is downloaded or written to disk by the skill itself.
Credentials
No environment variables, credentials, or config paths are requested. The single binary listed (redis-cli) is appropriate for the stated purpose.
Persistence & Privilege
The skill does not request permanent presence, does not modify other skills, and uses default invocation settings. It is user-invocable and not always-enabled.
Assessment
This is a coherent, instruction-only Redis best-practices guide and contains no hidden installs or credential requests. Before allowing an agent to execute these instructions (or giving it network access to Redis instances), consider that many example commands mutate data (SET, XADD, EVAL, etc.). If your agent can run redis-cli or reach Redis servers, it could make changes or run arbitrary Lua via EVAL with whatever access the connection has. If you want to limit risk, keep the agent isolated from production Redis endpoints, avoid giving it credentials, or only allow read-only/monitoring access when testing.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk973mvtq54gfx0bqem2ykdyhy180wr1k

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔴 Clawdis
OSLinux · macOS · Windows
Any binredis-cli

SKILL.md

Expiration (Memory Leaks)

  • Keys without TTL live forever—set expiry on every cache key: SET key value EX 3600
  • Can't add TTL after SET without another command—use SETEX or SET ... EX
  • EXPIRE resets on key update by default—SET removes TTL; use SET ... KEEPTTL (Redis 6+)
  • Lazy expiration: expired keys removed on access—may consume memory until touched
  • SCAN with large database: expired keys still show until cleanup cycle runs

Data Structures I Underuse

  • Sorted sets for rate limiting: ZADD limits:{user} {now} {request_id} + ZREMRANGEBYSCORE for sliding window
  • HyperLogLog for unique counts: PFADD visitors {ip} uses 12KB for billions of uniques
  • Streams for queues: XADD, XREAD, XACK—better than LIST for reliable queues
  • Hashes for objects: HSET user:1 name "Alice" email "a@b.com"—more memory efficient than JSON string

Atomicity Traps

  • GET then SET is not atomic—another client can modify between; use INCR, SETNX, or Lua
  • SETNX for locks: SET lock:resource {token} NX EX 30—NX = only if not exists
  • WATCH/MULTI/EXEC for optimistic locking—transaction aborts if watched key changed
  • Lua scripts are atomic—use for complex operations: EVAL "script" keys args

Pub/Sub Limitations

  • Messages not persisted—subscribers miss messages sent while disconnected
  • At-most-once delivery—no acknowledgment, no retry
  • Use Streams for reliable messaging—XREAD BLOCK + XACK pattern
  • Pub/Sub across cluster: message goes to all nodes—works but adds overhead

Persistence Configuration

  • RDB (snapshots): fast recovery, but data loss between snapshots—default every 5min
  • AOF (append log): less data loss, slower recovery—appendfsync everysec is good balance
  • Both off = pure cache—acceptable if data can be regenerated
  • BGSAVE for manual snapshot—doesn't block but forks process, needs memory headroom

Memory Management (Critical)

  • maxmemory must be set—without it, Redis uses all RAM, then swap = disaster
  • Eviction policies: allkeys-lru for cache, volatile-lru for mixed, noeviction for persistent data
  • INFO memory shows usage—monitor used_memory vs maxmemory
  • Large keys hurt eviction—one 1GB key evicts poorly; prefer many small keys

Clustering

  • Hash slots: keys distributed by hash—same slot required for multi-key operations
  • Hash tags: {user:1}:profile and {user:1}:sessions go to same slot—use for related keys
  • No cross-slot MGET/MSET—error unless all keys in same slot
  • MOVED redirect: client must follow—use cluster-aware client library

Common Patterns

  • Cache-aside: check Redis, miss → fetch DB → write Redis—standard caching
  • Write-through: write DB + Redis together—keeps cache fresh
  • Rate limiter: INCR requests:{ip}:{minute} with EXPIRE—simple fixed window
  • Distributed lock: SET ... NX EX + unique token—verify token on release

Connection Management

  • Connection pooling: reuse connections—creating is expensive
  • Pipeline commands: send batch without waiting—reduces round trips
  • QUIT on shutdown—graceful disconnect
  • Sentinel or Cluster for HA—single Redis is SPOF

Common Mistakes

  • No TTL on cache keys—memory grows until OOM
  • Using as primary database without persistence—data loss on restart
  • Blocking operations in single-threaded Redis—KEYS * blocks everything; use SCAN
  • Storing large blobs—Redis is RAM; 100MB values are expensive
  • Ignoring maxmemory—production Redis without limit will crash host

Files

1 total
Select a file
Select a file to preview.

Comments

Loading comments…