Security News
PyPI’s New Archival Feature Closes a Major Security Gap
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
redis-utils-cli
Advanced tools
A Node.js based command line interface (CLI) for performing pattern based Redis functions
$ npm install redis-utils-cli -g
Copy
Copy keys from one Redis instance to another
Arguments
Options include
Delete
Delete keys from a Redis instance.
Arguments
List
List all keys and hash fields that match a specified pattern.
Arguments
Count
Display a numeric count of all keys that match a specified pattern.
Arguments
h?llo
matches hello, hallo and hxlloh*llo
matches hllo and heeeelloh[ae]llo
matches hello and hallo, but not hilloh[^e]llo
matches hallo, hbllo, ... but not helloh[a-b]llo
matches hallo and hblloUse \ to escape special characters if you want to match them verbatim.
(basically, what you are already familiar with using Redis)
$ redis-utils copy someauth@10.2.1.44/0 127.0.0.1/0 -p users:*
Copies all keys matching the pattern users:*
from 10.2.1.44, db: 0
into 127.0.0.1, db: 0
(Because -o
was not included, it would only copy data if the keys do not exist in destination)
For hashes, if you want to copy data based on the existence of hash fields instead of keys, use the -m field
option.
$ redis-utils del 127.0.0.1 users:*
Deletes all keys matching the pattern users:*
from 127.0.0.1, db: 0
$ redis-utils list 127.0.0.1 users:*
Displays in the terminal, all keys (with some additional details) matching the pattern users:*
from 127.0.0.1, db: 0
$ redis-utils count 127.0.0.1 users:*
Displays in the terminal, a numeric count of all keys matching the pattern users:*
from 127.0.0.1, db: 0
It is important to note that these commands use the Redis command keys
and
by their recommendation, should be used only in production environments with extreme
care as it may ruin performance when executed against large databases.
Read the Redis Documentation for more information.
(The MIT License)
Copyright (c) 2016 Gabriel McAdams <ghmcadams@yahoo.com>
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the 'Software'), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
FAQs
Simple command line tools for Redis
We found that redis-utils-cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
Research
Security News
Malicious npm package postcss-optimizer delivers BeaverTail malware, targeting developer systems; similarities to past campaigns suggest a North Korean connection.
Security News
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.