I have always thought that the role of bind in the redis configuration file is to restrict the redis server to receive redis connection requests from which servers (IP addresses), only the IP addresses specified in bind Only computers can access this redis server.
Facts have proved that the above conclusion is completely wrong.
When I was building a Redis service cluster today, I discovered a misunderstanding about bind in Redis.
For example:
bind 127.0.0.1 is used to restrict that only the local computer can connect to the redis service connection
bind 0.0.0.0 is used to allow any computer to connect to redis Service connection.
Note: The above understandings are all wrong. They happen to be special cases and create an illusion about us.
If you don’t believe it, you can try: (It’s best to give it a try)
bind 10.0.0.1 (or any IP address except 127.0.0.1 and 0.0.0.0)
Then restart redis and you will find that it cannot start.
As for why it cannot start, after you know the true meaning of bind, you will understand the reason why it cannot start.
The correct understanding of bind in Redis is:
bind: is the IP address bound to the local machine, (accurately: the IP address corresponding to the local network card, each network card all have an IP address) instead of redis allowing IP addresses from other computers.
If bind is specified, it means that only Redis requests from the specified network card are allowed. If not specified, it means that Redis requests from any network card can be accepted.
For example: If there are two network cards on the redis server (local machine), each network card corresponds to an IP address, such as IP1 and IP2. (Note that IP1 and IP2 are both the IP addresses of this machine).
Our configuration file: bind IP1. Only if we access the redis server through IP1 are we allowed to connect to the Redis server. If we access the Redis server through IP2, we will not be able to connect to Redis.
Check the IP address corresponding to the local network card: use the ifconfig command.
(Learning video sharing: redis video tutorial)
It can be seen from the above that we have two network cards, that is, we only Can be used: 127.0.0.1 and 172.18.235.206 are the best bind addresses, otherwise redis will not start.
This explains why the above example (bind 10.0.0.1) cannot start because we do not have the corresponding network card IP address. This shows that bind does not specify the IP addresses from which server requests can be accepted in redis.
Instead: bind is used to specify the IP address corresponding to the local network card.
Note:
Explanation of bind 127.0.0.1: (Why only this machine can connect, but not others)
We can see from ifconfig: lo network card (Corresponding to 127.0.0.1 IP address): It is a loopback address (Local Loopback), that is, only the local computer can access this loopback address, and other computers can only access their own loopback addresses.
Then the computer from this lo network card only has this computer, so only this computer can access it, but other computers cannot.
bind 172.18.235.206, as long as the Redis request comes through this network card address (172.18.235.206), you can access redis. I use Alibaba Cloud's server. When I request the redis-cli Alibaba Cloud public IP address on another server, it will connect to the redis server.
Because requests for public network addresses all pass through the eth0 network card address (172.18.235.206), thus receiving this redis request.
When you do not use the loopback address, basically external computers can access the local Redis server.
If we want to restrict only specified hosts to connect to redis, we can only control it through the firewall, but not through the bind parameter in redis.
Use Alibaba Cloud's security group to restrict specified hosts from connecting to port 6379.
Understanding of [protected-mode] in redis:
redis itself cannot restrict [only specified hosts] from connecting to redis. As I said above, bind specification is only used Set interface addresses (interfaces).
1. If your bind is set to: bind 127.0.0.1, this is very safe, because only this host can connect to redis. Even if you do not set a password, it is safe unless someone logs in to you. on the server.
2. If your bind is set to: bind 0.0.0.0, it means that all hosts can connect to redis. (Prerequisite: Your server must open the redis port). Setting a password at this time will provide an additional layer of protection, and only those who know the password can access. That is, any host that knows the password can access your redis.
protected-mode is a security layer of redis itself. The function of this security layer is that only [this machine] can access redis, and no one else can access redis. Three conditions must be met to enable this security layer, otherwise the security layer will be closed:
(1) protected-mode yes (is on)
(2) There is no bind command. Original text: The server is not binding explicitly to a set of addresses using the "bind" directive.
(3) No password is set. Original text: No password is configured.
The redis protection mechanism will be turned on at this time. After it is turned on, only the local machine can access redis. If any of the above three conditions are not met, the protection mechanism will not be enabled.
Related recommendations: redis database tutorial
Original link: https://blog.csdn.net/cw_hello1/article/details/83444013
The above is the detailed content of What is the real role of bind in redis. For more information, please follow other related articles on the PHP Chinese website!

Redis's database methods include in-memory databases and key-value storage. 1) Redis stores data in memory, and reads and writes fast. 2) It uses key-value pairs to store data, supports complex data structures such as lists, collections, hash tables and ordered collections, suitable for caches and NoSQL databases.

Redis is a powerful database solution because it provides fast performance, rich data structures, high availability and scalability, persistence capabilities, and a wide range of ecosystem support. 1) Extremely fast performance: Redis's data is stored in memory and has extremely fast read and write speeds, suitable for high concurrency and low latency applications. 2) Rich data structure: supports multiple data types, such as lists, collections, etc., which are suitable for a variety of scenarios. 3) High availability and scalability: supports master-slave replication and cluster mode to achieve high availability and horizontal scalability. 4) Persistence and data security: Data persistence is achieved through RDB and AOF to ensure data integrity and reliability. 5) Wide ecosystem and community support: with a huge ecosystem and active community,

Key features of Redis include speed, flexibility and rich data structure support. 1) Speed: Redis is an in-memory database, and read and write operations are almost instantaneous, suitable for cache and session management. 2) Flexibility: Supports multiple data structures, such as strings, lists, collections, etc., which are suitable for complex data processing. 3) Data structure support: provides strings, lists, collections, hash tables, etc., which are suitable for different business needs.

The core function of Redis is a high-performance in-memory data storage and processing system. 1) High-speed data access: Redis stores data in memory and provides microsecond-level read and write speed. 2) Rich data structure: supports strings, lists, collections, etc., and adapts to a variety of application scenarios. 3) Persistence: Persist data to disk through RDB and AOF. 4) Publish subscription: Can be used in message queues or real-time communication systems.

Redis supports a variety of data structures, including: 1. String, suitable for storing single-value data; 2. List, suitable for queues and stacks; 3. Set, used for storing non-duplicate data; 4. Ordered Set, suitable for ranking lists and priority queues; 5. Hash table, suitable for storing object or structured data.

Redis counter is a mechanism that uses Redis key-value pair storage to implement counting operations, including the following steps: creating counter keys, increasing counts, decreasing counts, resetting counts, and obtaining counts. The advantages of Redis counters include fast speed, high concurrency, durability and simplicity and ease of use. It can be used in scenarios such as user access counting, real-time metric tracking, game scores and rankings, and order processing counting.

Use the Redis command line tool (redis-cli) to manage and operate Redis through the following steps: Connect to the server, specify the address and port. Send commands to the server using the command name and parameters. Use the HELP command to view help information for a specific command. Use the QUIT command to exit the command line tool.

Redis cluster mode deploys Redis instances to multiple servers through sharding, improving scalability and availability. The construction steps are as follows: Create odd Redis instances with different ports; Create 3 sentinel instances, monitor Redis instances and failover; configure sentinel configuration files, add monitoring Redis instance information and failover settings; configure Redis instance configuration files, enable cluster mode and specify the cluster information file path; create nodes.conf file, containing information of each Redis instance; start the cluster, execute the create command to create a cluster and specify the number of replicas; log in to the cluster to execute the CLUSTER INFO command to verify the cluster status; make


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

WebStorm Mac version
Useful JavaScript development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment