Q. At first glance, having a fiber that loops through all keys in the background to expire them doesn't sound very efficient. But is it as inefficient as it sounds? (2016)
A. This mechanism works exactly the same as the expiration in Memcached. The background fiber uses a tree structure and bounds to find the expired data.