当前位置:网站首页>Introduction to microservices
Introduction to microservices
2022-06-12 15:12:00 【CXgeng】
Introduction to microservice
List of articles
Preface
For example, we shop online , First, you should go to the shopping website to search for goods , This search function can be developed into a microservice , We can also see the recommendation of related products , These recommendations can also be a micro service , Later, for example, add a shopping cart , Place the order , Payment and other functions can be developed into independent microservices
One 、 Features of microservices ?
- Microservice is an architectural style
- Microservices divide an application into a group of small services
- Microservices each service runs in its own process , That is, independent deployment and upgrade
- Microservices use lightweight services between services http Interaction , In general use json Exchange data
- Microservices are divided around business functions
- It can be deployed independently by fully automated deployment mechanism
- De centralization , Service autonomy , Services can use different languages , Different storage mechanisms
Two 、 Microservice framework function
Microservices have these characteristics , So as a microservice framework , such as Spring Cloud , What functions does a have ? The functions of microservice framework are mainly reflected in the following aspects .
- Registry Center : Service providers and consumers , Can register and get service information from the registry
- Configuration center : There are many services involved in the service architecture , Unified management of configuration files is required
- Service link tracking : For load calls between services , Need to track through the link , Get specific participants , If there is a problem with the call link, it can be quickly located
- Load balancing : The service invocation service will adopt a certain load balancing strategy , To ensure high availability of services
- Service fault tolerance : By fusing 、 Downgrade 、 Service fault tolerance policy , Protect the system effectively , Degradation occurs when a service or dependent service is abnormal , Return guaranteed data , Fusing refers to multiple failures of dependent services , Then the fuse opens , Not trying to call , Directly return the degradation information . Regularly detect service availability , If restored, call
- The service gateway : Conduct current limiting when the user requests overload 、 line up 、 Overload protection 、 Black and white list 、 Abnormal user filtering and interception can be realized through the service gateway
- Service publishing and rollback : Blue and green deployment 、 Grayscale 、AB Test Wait for the release strategy , Application can be rolled back quickly
- Service dynamic scaling , Containerization : According to the service load , Nodes can be added and reduced quickly manually or automatically
边栏推荐
- Is it safe to open an account for flush mobile stock trading
- 学习是一件逆人性的事情(成为高手的内功心法)
- 启明智显分享| 2.8寸手持中控屏应用方案
- C constant, cannot be changed
- Industrial end: a new battlefield of 618
- Phpstudy indicates that the hosts file may not exist or be blocked from being opened. How to resolve the failure of synchronizing hosts
- Chapter I exercises of program construction and interpretation
- NETCORE combined with cap event bus to realize distributed transaction -- Introduction (1)
- Solution to the new database prompt on the pagoda panel that the database name cannot be greater than 16 bits
- ngork实现内网穿透--免费
猜你喜欢
随机推荐
Rust tip - running the tensorrt model through FFI programming
C语言打开中文路径文件
Error 1105: message:\“raft entry is too large
左对齐,右对齐,随机数,goto,比较输出bool
频繁项集产生强关联规则的过程
How to set public IP access on the H3C gr5200 router
Rust小技巧 - 通过FFI编程运行tensorrt模型
Learning is an inhumane thing (becoming an expert's internal mind skill)
Apprendre est une chose contre la nature humaine
IMU的学习记录
Module yaml error: Unexpected key in data: static_ context [line 9 col 3]
Autofac Beginner (1)
3D reconstruction system | L3 incremental motion recovery structure (incremental SFM)
About layoffs in Internet companies
简单的爬虫框架:解析51job页面岗位信息
ROS中tf学习笔记
Solve log4j2 vulnerability and be attacked by mining and zombie process viruses
Installation and use of mat
3D reconstruction system | L3 dual view motion recovery structure (SFM binocular SFM)
Structure example









