access control list (ACL)

Allows you to manage permissions based on key patterns.

More info:, ACL wikipedia

Active-Active database (CRDB)

Geo-distributed databases that span multiple Redis Enterprise Software clusters. Active-Active databases depend on multi-master replication (MMR) and conflict-free replicated data types (CRDTs) to power a simple development experience for geo-distributed applications.

More info: Active-Passive Geo-Distributed Redis, Create an Active-Passive Geo-Replicated Database

Active-Active database instance

A “member database” of a global Active-Active database which is made up of its own master and replica shards spanning a single cluster.

active-passive database replication

Provides applications read-only access to replicas of the data set from different geographical locations. The Redis Enterprise implementation of active-passive replication is called Replica Of.

append-only file (AoF)

Log files that keep a record of data changes by writing to the end of a file. This happens with every write, or every second to allow data recovering the entire dataset by replaying the append-only log from the beginning to the end.

More info: Data Persistence, Data Persistence with Redis Enterprise Software


A Redis Enterprise cluster is composed of identical nodes that are deployed within a data center or stretched across local availability zones.

More info: Database Clustering

Cluster Configuration Store (CSS)

An internally managed Redis database that acts a single repository for all cluster meta-data.

Cluster Node Manager (CNM)

A collection of Redis Enterprise services responsible for provisioning, migration, monitoring, re-sharding, re-balancing, de-provisioning, auto-scaling

conflict-free replicated data types (CRDT)

Techniques used by Redis data types in Active-Active databases that handle conflicting concurrent writes across member Active-Active databases. The Redis Enterprise implementation of CRDT is called an Active-Active database (formerly known as CRDB).

More info: CRDT info, Active-Active Geo-Distributed Redis, CRDT wikipedia

data eviction policy

Defines how excess data is handled when the database exceeds the memory limit.

More info: Data Eviction Policy

Domain Name Service (DNS)

Naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.

More info: DNS wikipedia


Linux command to synchronize a file’s in-core state with a storage device

More info: fsync man page

hash slot

The result of a hash calculation.

More info: Database Clustering

hash tag

A part of the key that is used in the hash calculation.

More info: Database Clustering

master node

Node that operates as the leader of a cluster


Deciding when and where shards will be moved if more network throughput, memory, or CPU resources are needed

multi-factor authentication (MFA)

Method of authenticating users with pieces of evidence of the user’s identity. When MFA is enabled on Redis Enterprise Cloud, users must enter their username, password, and an authentication code when logging in.

More info: Multi-factor authentication

multi-master replication (MMR)

Multi-directional replication that power the efficient replication required to achieve active-active concurrent writes in Active-Active databases.

Out-of-Memory (OOM)

If a member Active-Active database is in an out of memory situation, that member is marked “inconsistent” by Redis Enterprise Software, the member stops responding to user traffic, and the syncer initiates full reconciliation with other peers in the Active-Active database.

participating clusters

Clusters participating in the multi-master replication of an Active-Active database.


Deciding where shards will be created and placed.

quorum node

Node provisioned only for cluster operations that can be elected as a master node. The quorum node participates in the cluster quorum and must be explicitly assigned this role via the rladmin command.

rack-zone awareness

Redis Enterprise feature that helps to ensure high-availability in the event of a rack or zone failure. In the event of a rack or zone failure, the slaves and endpoints in the remaining racks/zones will be promoted.

More info: Rack-zone awareness in Redis Enterprise Software


Distributing keys and their values among new shards.


Moving shards to nodes where more resources are available.

Redis Enterprise Cloud

The cloud version of Redis Enterprise.

Redis Enterprise cluster

Collection of Redis Enterprise nodes. A cluster pools system resources across nodes in the cluster and supports multi-tenant database instances.

Redis Enterprise database

Logical entity that manages your entire dataset across multiple Redis instances. It segments the data into shards and distributes them among nodes.

Redis Enterprise nodes

Physical or virtual machines or containers that runs a collection of Redis Enterprise services

Redis Enterprise Software

The on-premises version of Redis Enterprise.

Redis instance

Single-threaded Redis OSS database.

Redis on Flash (RoF)

Enables your Redis databases to span both RAM and dedicated flash memory (SSD). Redis on Flash manages the location of key values (RAM vs Flash) in the database via a LRU-based (least-recently-used) mechanism.

Replica Of

The Redis Enterprise implementation of active-passive database replication.

More info: Active-Passive Geo-Distributed Redis (Replica-Of)


Database replication provides a mechanism to ensure high availability.

More info: Database replication

role-based access control (RBAC)

A security approach that restricts system access to authorized users.

More info: RBAC wikipedia


Redis process that is part of the Redis clustered database.

More info: Database clustering


Technique that has been used to scale larger data storage and processing loads. Sharding take your data, partitions it into smaller pieces and then send the data to different locations depending on which partition the data has been assigned to.

Simple Authentication and Security Layer (SASL)

Framework for adding authentication support and data security to connection-based protocols via replaceable mechanisms.

More info: SASL wikipedia

snapshot (RDB)

Data persistence file that performs a data dump every one, six, or twelve hours.

Transport Layer Security (TLS)

Protocols that provide communications security over a computer network.

More info: TSL wikipedia

VPC peering

Networking connection between two VPCs that enables you to route traffic between them using private IP addresses. Instances in either VPC can communicate with each other as if they are within the same network.

More info: VPC wikipedia