Home  >  Article  >  Backend Development  >  Redis command organization and usage

Redis command organization and usage

小云云
小云云Original
2017-12-14 13:39:341504browse

This article mainly introduces the relevant information about Redis commands and explains how to use them. Friends who need it can refer to it. I hope it can help everyone.

Commands related to connection operations

  • quit: close the connection (connection)

  • auth: Simple password authentication

Persistence

  • save: Synchronously save data to disk

  • bgsave: Asynchronously save data to disk

  • lastsave: Return the Unix timestamp of the last successful data save to disk

  • shundown: Synchronously save the data to disk and then close the service

Remote service control

  • info: Provided Server information and statistics

  • monitor: Live dump of received requests

  • slaveof: Change replication policy settings

  • config: Configure the Redis server at runtime

Commands for value operations

  • exists (key): Confirm whether a key exists

  • del(key): Delete a key

  • type(key): The type of return value

  • keys(pattern): Returns all keys that satisfy the given pattern

  • randomkey: Randomly returns a key space

  • keyrename(oldname, newname): Rename key

  • dbsize: Return the number of keys in the current database

  • expire: Set the activity time of a key (s)

  • ttl: Get the activity time of a key

  • select(index): Press Index query

  • move(key, dbindex): Move the key in the current database to the dbindex database

  • flushdb: Delete the key in the currently selected database All keys

  • flushall: Delete all keys in all databases

##Commands for String operations

  • set(key, value): Assign value to the string named key in the database

  • ##get(key): Return the string named key in the database The value of string
  • getset(key, value): Assign the last value to the string named key
  • mget(key1, key2 ,…, key N): Returns the value of multiple strings in the library
  • setnx(key, value): Adds a string with the name key and value value
  • setex(key, time, value): Add string to the library and set the expiration time
  • mset(key N, value N): Set multiple batches The value of a string
  • msetnx(key N, value N): If all strings named key i do not exist
  • incr( key): The string named key is incremented by 1 operation
  • incrby(key, integer): The string named key is incremented by integer
  • decr (key): Decrement the string named key by 1.
  • decrby(key, integer): Decrease the string named key by integer
  • append(key, value): append the value of the string named key
  • substr(key, start, end): return the substring of the value of the string named key
Commands for List operations

    rpush(key, value): Add a value to the end of the list named key The element of value
  • lpush(key, value): Add an element of value to the head of the list named key
  • ##llen (key): Returns the length of the list named key
  • ##lrange(key, start, end): Returns the elements between start and end in the list named key

  • ltrim(key, start, end): intercept the list named key

  • ##lindex(key, index): return the list named key Element at index position

  • lset(key, index, value): Assign a value to the element at index position in the list named key

  • ##lrem (key, count, value): Delete the element whose value is value in the list of count keys
  • lpop(key): Return and delete the first element in the list named key
  • rpop(key): Return and delete the last element in the list named key
  • blpop(key1, key2,… key N, timeout): block version of lpop command.
  • brpop(key1, key2,…key N, timeout): block version of rpop.
  • rpoplpush(srckey, dstkey): Return and delete the tail element of the list named srckey, and add the element to the head of the list named dstkey
  • Commands for Set operations

sadd(key, member): Add element member to the set named key

    srem(key, member): Delete the element member in the set named key
  1. spop(key): Randomly return and delete the element named key An element in the set
  2. smove(srckey, dstkey, member): Move to the set element
  3. scard(key): The return name is The cardinality of the set of key
  4. sismember(key, member): whether member is an element of the set named key
  5. sinter(key1, key2,...key N): Find the intersection
  6. sinterstore(dstkey, (keys)): Find the intersection and save the intersection to the set of dstkey
  7. sunion(key1, (keys)): Find the union
  8. sunionstore(dstkey, (keys)): Find the union and save the union to the collection of dstkey
  9. sdiff(key1, (keys)): Find the difference set

  10. sdiffstore(dstkey, (keys)): Find the difference set and save it To the set of dstkey

  11. smembers(key): Returns all elements of the set with the name key

  12. srandmember(key): Returns the name randomly It is an element of the set of key

Command for Hash operation

  1. hset(key, field, value) : Add element field

  2. hget(key, field) to the hash named key

  3. ##hget(key, field): Return the value corresponding to the field in the hash named key

  4. hmget(key, (fields)): Returns the value corresponding to field i in the hash named key

  5. ##hmset(key, (fields)): Returns the value corresponding to field i in the hash named key Add the element field
  6. hincrby(key, field, integer) to the hash: Increase the value of the field in the hash named key by integer
  7. hexists(key, field): Whether there is a field with the key field in the hash named key
  8. hdel(key, field): Delete the field with the key field in the hash named key Domain
  9. hlen(key): Returns the number of elements in the hash named key
  10. hkeys(key): Returns the number of elements named key All keys in the hash
  11. hvals(key): Returns the values ​​corresponding to all keys in the hash named key
  12. hgetall(key): Returns all the keys (fields) in the hash named key and their corresponding values


Related recommendations:

Redis function in php Usage summary

Redis optimization experience summary

What are the types of redis operations######

The above is the detailed content of Redis command organization and usage. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn