Key Concepts
Key
A unique identifier that stores data. Keys can hold different data types like strings, lists, or hashes.
TTL
Time-To-Live in seconds. Keys can expire automatically after a set duration.
Namespace
Keys are often organized using colons (e.g.,
user:123:profile). The browser displays these as folders.Pattern
Wildcard expressions to match multiple keys (e.g.,
cache:* matches all cache keys).Required Permissions
| Action | Permission |
|---|---|
| View keys | iam:project:infrastructure:redis:read |
| Create keys | iam:project:infrastructure:redis:write |
| Update keys | iam:project:infrastructure:redis:write |
| Delete keys | iam:project:infrastructure:redis:delete |
Supported Key Types
| Type | Description | Use Case |
|---|---|---|
| String | Simple key-value pair | Caching, counters, flags |
| List | Ordered sequence of strings | Queues, recent items, feeds |
| Set | Unordered collection of unique strings | Tags, unique visitors |
| Sorted Set | Set with score-based ordering | Leaderboards, priority queues |
| Hash | Field-value map | Objects, user profiles |
| Stream | Append-only log | Event sourcing, messaging |
How to Browse Keys
Your connection and database selections are saved. The browser will restore your last view on next visit.
How to Create a Key
Choose Creation Method
Select a method:
- Templates: Pre-configured key templates for common patterns
- Manual: Build the key from scratch
- Import: Paste JSON data to create a key
Key Name Rules
| Rule | Description |
|---|---|
| Length | 1-512 characters |
| Spaces | Not allowed in key names |
| Special Characters | Most characters allowed, use colons for namespacing |
How to View Key Details
How to Edit a String Key
How to Edit a Hash Key
How to Edit a List Key
How to Edit a Set Key
How to Edit a Sorted Set Key
How to Rename a Key
How to Set TTL
TTL Options
| Option | Duration |
|---|---|
| No Expiry | Key never expires |
| 1 minute | 60 seconds |
| 5 minutes | 300 seconds |
| 1 hour | 3600 seconds |
| 1 day | 86400 seconds |
| 1 week | 604800 seconds |
| Custom | Enter seconds manually |
Set TTL to -1 to remove expiration from a key.
How to Delete a Key
How to Bulk Delete Keys
Bulk delete allows you to remove multiple keys matching a pattern.Choose Method
Select a method:
- Quick Actions: Pre-defined cleanup patterns
- Pattern: Enter a custom wildcard pattern
Enter Pattern
Use wildcard patterns to match keys:
cache:*matches all keys starting withcache:*:tempmatches all keys ending with:tempsession:*:datamatches keys with this pattern
Pattern Syntax
| Pattern | Matches |
|---|---|
* | All keys (use with caution) |
cache:* | Keys starting with cache: |
*:temp | Keys ending with :temp |
user:*:session | Keys matching the pattern |
? | Single character wildcard |
How to Delete Selected Keys from Tree
Key Templates
When creating keys, templates provide pre-configured structures:| Template | Type | Use Case |
|---|---|---|
| Cache Entry | String | General caching |
| Session Data | Hash | User sessions |
| Task Queue | List | Background jobs |
| Rate Limiter | String | API rate limiting |
| Feature Flag | String | Feature toggles |
| Leaderboard | Sorted Set | Rankings |
Troubleshooting
Key not appearing after creation
Key not appearing after creation
- Click the refresh button to reload the key list
- Verify you’re viewing the correct database
- Check if the key has a very short TTL and expired
Cannot edit key value
Cannot edit key value
- You need write permission
- The key type may not support the operation
- Check if another process is modifying the key
Key shows wrong type
Key shows wrong type
- Redis keys have a fixed type once created
- To change type, delete and recreate the key
- Verify you’re looking at the correct key
Bulk delete matched too many keys
Bulk delete matched too many keys
- Always preview matches before deleting
- Use more specific patterns
- Use the checkbox selection to exclude keys
Cannot delete key
Cannot delete key
- You need delete permission
- The key may have been deleted by another process
- Check for connection issues
Key value appears truncated
Key value appears truncated
- Very large values may be truncated in the UI
- Use Redis CLI for viewing complete large values
- Lists and sets are paginated
FAQ
What is the maximum key size?
What is the maximum key size?
Redis allows key names up to 512 MB, but shorter keys are recommended for performance. Keep key names under 1 KB and use meaningful but concise naming.
What is the maximum value size?
What is the maximum value size?
String values can be up to 512 MB. Lists, sets, and hashes can contain over 4 billion elements. Practical limits depend on available memory.
Can I search for keys by value?
Can I search for keys by value?
Redis does not support value-based search natively. Keys are found by name pattern only. Consider using a search index or naming convention for lookups.
What happens when TTL expires?
What happens when TTL expires?
Redis automatically deletes the key when TTL reaches zero. Active expiration occurs during access; passive expiration runs periodically.
Can I copy a key to another database?
Can I copy a key to another database?
Not directly in the UI. Use Redis CLI with
COPY command (Redis 6.2+) or DUMP/RESTORE for cross-database key copying.What is key encoding?
What is key encoding?
Redis uses different internal encodings for efficiency (e.g., ziplist, quicklist, hashtable). Encoding changes automatically based on data size.
How are keys organized in the tree?
How are keys organized in the tree?
Keys are split by colon (
:) separator to create a folder hierarchy. user:123:profile appears under user > 123 > profile.What's the difference between List push left vs right?
What's the difference between List push left vs right?
Push left (
LPUSH) adds to the beginning; push right (RPUSH) adds to the end. Use left for stack behavior, right for queue behavior.Best Practices
Naming Conventions
Use consistent, hierarchical naming:TTL Management
- Always set TTL on cache keys to prevent unbounded growth
- Use appropriate durations: sessions (hours), cache (minutes to days)
- Monitor keys without TTL to prevent memory issues
Key Organization
- Keep namespaces shallow (2-3 levels)
- Use consistent separators (colon recommended)
- Avoid spaces and special characters in key names
- Consider key length impact on memory
Bulk Operations
- Always preview before bulk delete
- Use specific patterns to avoid accidental deletions
- Test patterns on non-production databases first
- Consider impact on running applications