Security
BetterKV is fast, but security still starts with deployment discipline. Treat it like any other Redis-compatible data service: private network first, explicit auth, and least privilege.
Security baseline
- bind only to loopback or private interfaces
- enable authentication before exposing the service to applications
- use ACLs for role separation
- prefer TLS for production traffic
- disable or restrict dangerous admin commands
Network hardening
betterkv.conf
Authentication
Simple password:
betterkv.conf
ACL file:
/etc/betterkv/users.acl
TLS
betterkv.conf
Restrict dangerous commands
betterkv.conf
Security checklist
- private bind addresses only
-
protected-mode yes - strong password or ACLs
- TLS for production links
- dangerous commands restricted
- non-root service user
- firewall rules in front of the service
Comparison note
Security should not be a differentiator by hand-wavy marketing. If you compare BetterKV with Redis and Valkey here, keep the message grounded: compatible operational model, modern deployment defaults, and Elastic License 2.0 for BetterKV.
License
BetterKV is licensed under Elastic License 2.0.