search
HomeDatabaseRedisWhat is the real role of bind in redis

What is the real role of bind in redis

Mar 10, 2021 am 09:36 AM
bindrediseffect

What is the real role of bind in redis

I have always thought that the role of bind in the redis configuration file is to restrict the redis server to receive redis connection requests from which servers (IP addresses), only the IP addresses specified in bind Only computers can access this redis server.

Facts have proved that the above conclusion is completely wrong.

When I was building a Redis service cluster today, I discovered a misunderstanding about bind in Redis.

For example:

bind 127.0.0.1 is used to restrict that only the local computer can connect to the redis service connection

bind 0.0.0.0 is used to allow any computer to connect to redis Service connection.

Note: The above understandings are all wrong. They happen to be special cases and create an illusion about us.

If you don’t believe it, you can try: (It’s best to give it a try)

bind 10.0.0.1 (or any IP address except 127.0.0.1 and 0.0.0.0)

Then restart redis and you will find that it cannot start.

What is the real role of bind in redis

As for why it cannot start, after you know the true meaning of bind, you will understand the reason why it cannot start.

The correct understanding of bind in Redis is:

bind: is the IP address bound to the local machine, (accurately: the IP address corresponding to the local network card, each network card all have an IP address) instead of redis allowing IP addresses from other computers.

If bind is specified, it means that only Redis requests from the specified network card are allowed. If not specified, it means that Redis requests from any network card can be accepted.

For example: If there are two network cards on the redis server (local machine), each network card corresponds to an IP address, such as IP1 and IP2. (Note that IP1 and IP2 are both the IP addresses of this machine).

Our configuration file: bind IP1. Only if we access the redis server through IP1 are we allowed to connect to the Redis server. If we access the Redis server through IP2, we will not be able to connect to Redis.

Check the IP address corresponding to the local network card: use the ifconfig command.

What is the real role of bind in redis

(Learning video sharing: redis video tutorial)

It can be seen from the above that we have two network cards, that is, we only Can be used: 127.0.0.1 and 172.18.235.206 are the best bind addresses, otherwise redis will not start.

This explains why the above example (bind 10.0.0.1) cannot start because we do not have the corresponding network card IP address. This shows that bind does not specify the IP addresses from which server requests can be accepted in redis.

Instead: bind is used to specify the IP address corresponding to the local network card.

Note:

Explanation of bind 127.0.0.1: (Why only this machine can connect, but not others)

We can see from ifconfig: lo network card (Corresponding to 127.0.0.1 IP address): It is a loopback address (Local Loopback), that is, only the local computer can access this loopback address, and other computers can only access their own loopback addresses.

Then the computer from this lo network card only has this computer, so only this computer can access it, but other computers cannot.

bind 172.18.235.206, as long as the Redis request comes through this network card address (172.18.235.206), you can access redis. I use Alibaba Cloud's server. When I request the redis-cli Alibaba Cloud public IP address on another server, it will connect to the redis server.

Because requests for public network addresses all pass through the eth0 network card address (172.18.235.206), thus receiving this redis request.

When you do not use the loopback address, basically external computers can access the local Redis server.

If we want to restrict only specified hosts to connect to redis, we can only control it through the firewall, but not through the bind parameter in redis.

Use Alibaba Cloud's security group to restrict specified hosts from connecting to port 6379.

Understanding of [protected-mode] in redis:

redis itself cannot restrict [only specified hosts] from connecting to redis. As I said above, bind specification is only used Set interface addresses (interfaces).

1. If your bind is set to: bind 127.0.0.1, this is very safe, because only this host can connect to redis. Even if you do not set a password, it is safe unless someone logs in to you. on the server.

2. If your bind is set to: bind 0.0.0.0, it means that all hosts can connect to redis. (Prerequisite: Your server must open the redis port). Setting a password at this time will provide an additional layer of protection, and only those who know the password can access. That is, any host that knows the password can access your redis.

protected-mode is a security layer of redis itself. The function of this security layer is that only [this machine] can access redis, and no one else can access redis. Three conditions must be met to enable this security layer, otherwise the security layer will be closed:

(1) protected-mode yes (is on)

(2) There is no bind command. Original text: The server is not binding explicitly to a set of addresses using the "bind" directive.

(3) No password is set. Original text: No password is configured.

The redis protection mechanism will be turned on at this time. After it is turned on, only the local machine can access redis. If any of the above three conditions are not met, the protection mechanism will not be enabled.

Related recommendations: redis database tutorial

Original link: https://blog.csdn.net/cw_hello1/article/details/83444013

The above is the detailed content of What is the real role of bind in redis. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:csdn. If there is any infringement, please contact admin@php.cn delete
Redis: Classifying Its Database ApproachRedis: Classifying Its Database ApproachApr 15, 2025 am 12:06 AM

Redis's database methods include in-memory databases and key-value storage. 1) Redis stores data in memory, and reads and writes fast. 2) It uses key-value pairs to store data, supports complex data structures such as lists, collections, hash tables and ordered collections, suitable for caches and NoSQL databases.

Why Use Redis? Benefits and AdvantagesWhy Use Redis? Benefits and AdvantagesApr 14, 2025 am 12:07 AM

Redis is a powerful database solution because it provides fast performance, rich data structures, high availability and scalability, persistence capabilities, and a wide range of ecosystem support. 1) Extremely fast performance: Redis's data is stored in memory and has extremely fast read and write speeds, suitable for high concurrency and low latency applications. 2) Rich data structure: supports multiple data types, such as lists, collections, etc., which are suitable for a variety of scenarios. 3) High availability and scalability: supports master-slave replication and cluster mode to achieve high availability and horizontal scalability. 4) Persistence and data security: Data persistence is achieved through RDB and AOF to ensure data integrity and reliability. 5) Wide ecosystem and community support: with a huge ecosystem and active community,

Understanding NoSQL: Key Features of RedisUnderstanding NoSQL: Key Features of RedisApr 13, 2025 am 12:17 AM

Key features of Redis include speed, flexibility and rich data structure support. 1) Speed: Redis is an in-memory database, and read and write operations are almost instantaneous, suitable for cache and session management. 2) Flexibility: Supports multiple data structures, such as strings, lists, collections, etc., which are suitable for complex data processing. 3) Data structure support: provides strings, lists, collections, hash tables, etc., which are suitable for different business needs.

Redis: Identifying Its Primary FunctionRedis: Identifying Its Primary FunctionApr 12, 2025 am 12:01 AM

The core function of Redis is a high-performance in-memory data storage and processing system. 1) High-speed data access: Redis stores data in memory and provides microsecond-level read and write speed. 2) Rich data structure: supports strings, lists, collections, etc., and adapts to a variety of application scenarios. 3) Persistence: Persist data to disk through RDB and AOF. 4) Publish subscription: Can be used in message queues or real-time communication systems.

Redis: A Guide to Popular Data StructuresRedis: A Guide to Popular Data StructuresApr 11, 2025 am 12:04 AM

Redis supports a variety of data structures, including: 1. String, suitable for storing single-value data; 2. List, suitable for queues and stacks; 3. Set, used for storing non-duplicate data; 4. Ordered Set, suitable for ranking lists and priority queues; 5. Hash table, suitable for storing object or structured data.

How to implement redis counterHow to implement redis counterApr 10, 2025 pm 10:21 PM

Redis counter is a mechanism that uses Redis key-value pair storage to implement counting operations, including the following steps: creating counter keys, increasing counts, decreasing counts, resetting counts, and obtaining counts. The advantages of Redis counters include fast speed, high concurrency, durability and simplicity and ease of use. It can be used in scenarios such as user access counting, real-time metric tracking, game scores and rankings, and order processing counting.

How to use the redis command lineHow to use the redis command lineApr 10, 2025 pm 10:18 PM

Use the Redis command line tool (redis-cli) to manage and operate Redis through the following steps: Connect to the server, specify the address and port. Send commands to the server using the command name and parameters. Use the HELP command to view help information for a specific command. Use the QUIT command to exit the command line tool.

How to build the redis cluster modeHow to build the redis cluster modeApr 10, 2025 pm 10:15 PM

Redis cluster mode deploys Redis instances to multiple servers through sharding, improving scalability and availability. The construction steps are as follows: Create odd Redis instances with different ports; Create 3 sentinel instances, monitor Redis instances and failover; configure sentinel configuration files, add monitoring Redis instance information and failover settings; configure Redis instance configuration files, enable cluster mode and specify the cluster information file path; create nodes.conf file, containing information of each Redis instance; start the cluster, execute the create command to create a cluster and specify the number of replicas; log in to the cluster to execute the CLUSTER INFO command to verify the cluster status; make

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment