Databases
Redis Key Cleanup: Expire Cache Data That Should Not Be Permanent
Redis key cleanup starts when cache data behaves like permanent state. Keys without TTLs, oversized prefixes, abandoned rate-limit buckets, and old session formats can fill memory while the team is unsure which values are safe to expire.
The useful output is a Redis prefix review with producer, consumer, TTL policy, memory impact, rebuild path, and rollout plan. Keep the review concrete: Add TTLs at the write path before manually clearing old keys, then make the next action visible to the team that owns the risk. That matters because the cleanup can still go wrong when removing keys that act like durable state.
Key takeaways
- Treat each cleanup candidate as an owned system with dependencies, not anonymous clutter.
- Use a full traffic cycle plus deploy and session lifetimes for the affected prefixes before deciding that “quiet” means “unused.”
- Prefer reversible changes first when removing keys that act like durable state is still plausible.
- Leave behind a Redis prefix review with producer, consumer, TTL policy, memory impact, rebuild path, and rollout plan so the next review starts with context.
- Measure the result as lower spend, lower risk, less operational drag, or clearer ownership.
Classify Key Prefixes
Start with one Redis database or prefix family where TTLs, memory use, producers, consumers, and fallback behavior can be reviewed together. The best cleanup scope is small enough that owners can answer quickly but wide enough to include the attachments that make removal risky.
| Field | Why it matters |
|---|---|
| Owner | Cleanup needs a person or team that can accept the decision |
| Current purpose | A short reason to keep the item, written in present tense |
| Last meaningful use | read/write activity, size, query plans, job dependencies, and retention rules |
| Dependency evidence | database metrics, query logs, application references, and reporting schedules |
| Risk if wrong | The outage, data loss, access failure, or rollback gap the review must avoid |
| Next action | Keep, reduce, archive, disable, remove, or investigate |
Do not make the inventory larger than the decision. A short list with owners and evidence beats a perfect spreadsheet that nobody is willing to act on.
Redis Evidence to Collect
The useful question is not “how old is it?” It is “what would break, become harder to recover, or lose accountability if this disappeared?” For Redis key cleanup, collect enough evidence to answer that without relying on naming conventions.
| Check | What to look for | Cleanup signal |
|---|---|---|
| Prefix purpose | Key naming, producer code, consumer code, and fallback behavior | The prefix is cache data, not source-of-truth state |
| Expiration shape | TTL coverage, idle time, key count, and memory by prefix | Keys remain forever without a product reason |
| State risk | Sessions, locks, idempotency keys, queues, and rate limits | The value can expire without losing correctness |
| Rebuild path | Database source, recomputation cost, warm-up behavior, and alerting | The team can tolerate misses after expiration changes |
Use several signals together. Activity can miss monthly jobs and incident-only paths. Ownership can be stale. Cost can distract from security or recovery risk. The strongest case combines runtime data, dependency checks, owner review, and a rollback plan.
If the evidence conflicts, label the item “investigate” with a named owner and review date. That is still progress because the next review starts with a narrower question.
Example Prefix Review
Use an inventory table to classify Redis prefixes before adding TTLs or clearing old keys.
prefix,producer,consumer,ttl_policy,memory_class,rebuild_source,next_action
session:,web,auth middleware,24h,medium,login flow,keep
old-report:,report job,none,none,high,warehouse,add expiry
Treat the output as a candidate list. Do not pipe these checks into delete commands; add owner review, dependency checks, and a rollback path first.
Add Expiry at the Write Path
Use the least permanent move that proves the decision. In Redis key cleanup, removal is only one possible outcome; reducing size, narrowing permission, shortening retention, archiving, or disabling a trigger may produce the same benefit with less risk.
- Add TTLs at the write path before manually clearing old keys.
- Test expiration on one prefix or environment before changing global eviction policy.
- Keep durable workflow state out of Redis or document why it is intentionally durable.
Track the cleanup candidate with a simple priority score:
| Score | Good sign | Bad sign |
|---|---|---|
| Impact | Meaningful spend, risk, toil, noise, or confusion disappears | The item is cheap and low-risk but politically distracting |
| Confidence | Owner, purpose, and dependency path are understood | The team is guessing from age or name |
| Reversibility | Restore, recreate, re-enable, or rollback path exists | Deletion would be the first real test |
| Prevention | A rule can stop recurrence | The same pattern will return next month |
Start with high-impact, high-confidence, reversible candidates. Defer confusing items only if they get an owner and a date; otherwise “defer” becomes another word for keeping waste permanently.
Keys That Are Really State
Some cleanup candidates are supposed to look quiet. Do not rush these cases:
- Locks, idempotency keys, queues, job progress, and session formats.
- Keys created by old application versions that still run during rolling deploys.
- Cold-cache spikes that can overload the backing database after aggressive expiry.
For these cases, use a longer observation window, explicit owner approval, and a staged reduction. The point is not to avoid cleanup; it is to avoid making the first proof of dependency an outage.
Run the Prefix Review
Run Redis key cleanup as a decision review, not an open-ended hygiene project.
- Pick the narrow scope and export the candidate list.
- Add owner, current purpose, last-use evidence, dependency checks, and risk if wrong.
- Remove obvious false positives, then ask owners to choose keep, reduce, archive, disable, remove, or investigate.
- Apply the least permanent useful change first.
- Watch the signals that would reveal a bad decision.
- Complete the final removal only after the review window closes.
- Save a Redis prefix review with producer, consumer, TTL policy, memory impact, rebuild path, and rollout plan.
For broader cleanup planning, use the cleanup library to pair this guide with related notes. If the cleanup has infrastructure impact, pair it with a visible owner, a rollback path, and a measurable business case. For infrastructure cleanup, the main cloud cost optimization checklist is a useful companion.
Make TTLs Part of Creation
Prevention should change the creation path, not just the cleanup path. For Redis key cleanup, the useful prevention fields are data owner, retention policy, recreate path, and review date. Make those fields part of normal creation and review.
- Require every new Redis prefix to declare owner, data class, TTL, and rebuild source.
- Add prefix-level memory and no-TTL reviews to normal operations.
- Prefer write-path expiration over cleanup scripts.
The recurring review should be short: sort by impact, pick the unclear items, assign owners, and close the loop on anything nobody claims. If the review keeps producing the same class of candidate, fix the creation path instead of celebrating repeated cleanup.
Example Decision Record
Use a compact record so the cleanup can be reviewed later without reconstructing the whole investigation.
| Field | Example entry for this cleanup |
|---|---|
| Candidate | Unbounded Redis keys in cache systems |
| Why it looked stale | Low recent activity, unclear owner, or no current consumer after the first review |
| Evidence checked | Prefix purpose, Expiration shape, and owner confirmation |
| First reversible move | Add TTLs at the write path before manually clearing old keys |
| Watch signal | The metric, alert, job, route, query, or owner complaint that would show the cleanup was wrong |
| Final action | Keep, reduce, archive, disable, or remove after a full traffic cycle plus deploy and session lifetimes for the affected prefixes |
| Prevention rule | Require every new Redis prefix to declare owner, data class, TTL, and rebuild source |
This record is intentionally small. If the decision needs a long narrative, the candidate is probably not ready for removal yet. Keep investigating until the owner, evidence, reversible move, and prevention rule are clear.
FAQ
How often should teams do Redis key cleanup?
Use a full traffic cycle plus deploy and session lifetimes for the affected prefixes for the first decision, then set a recurring cadence based on change rate. Fast-moving non-production systems may need monthly review; slower systems can be quarterly if every unclear item has an owner and a review date.
What is the safest first action?
The safest first action is usually ownership repair plus evidence collection. After that, add ttls at the write path before manually clearing old keys. That creates a visible test before permanent deletion.
What should not be removed quickly?
Do not rush anything connected to locks, idempotency keys, queues, job progress, and session formats. Also slow down when the cleanup affects recovery, compliance, customer-specific behavior, rare schedules, or security response.
How do you make the decision useful later?
Write the decision as a small operational record: candidate, owner, evidence, chosen action, watch signals, rollback path, final date, and prevention rule. That format helps future engineers, search engines, and AI assistants understand the cleanup without guessing.