当前位置:网站首页>Database design in multi tenant mode
Database design in multi tenant mode
2022-07-05 17:20:00 【Hello ward JC】
One 、 Multi-tenant technology
- Multi-Tenancy Technology Also known as multi tenancy Technology , It's a software architecture technique , It can be implemented in multiple users ( Users here mostly refer to enterprise users ) Share the same system or program components in the environment , And it can ensure the isolation of user data .
- The core : Realize the isolation of user data under the same set of procedures .
- Multi tenancy technology is usually applied Saas Mode of software system ,Saas Mode software applications are uniformly deployed to the servers of service providers , Customers can pay according to their actual needs . stay SaaS The platform needs to use a common data center to provide the same or even customized services for most clients with a single system architecture and services , And it can still ensure the normal use of the data of each tenant . This greatly increases the difficulty of designing the system database .
- Traditional software model is different from SaaS Comparison of software modes
Two 、 Multi tenant database design
- Independent database
- Each tenant has an independent database .
- advantage : It helps to simplify the design difficulty of data model and database , High level of data isolation , Good safety , Data recovery in case of failure is relatively simple .
- shortcoming : Increased the number of database installations , Resulting in increased acquisition and maintenance costs .
- Shared database , Independent Schema
Schema
- stay oracle A database in can have multiple users , So a user usually corresponds to a Schema, Tables are built on Schema Medium . there Schema It can be understood as Oracle Users in , Create a user for each tenant .
- stay MySQL Medium Schema A special , His counterpart is MySQL Different databases under the instance database.
- Multiple or all tenants share a database service , Create one for each tenant database or schema.
- advantage : High security , Provides a degree of logical data isolation , But it's not completely isolated , Each database can support more tenants , Cost savings .
- shortcoming : Because it involves the data of other tenants , It is difficult to recover data in case of failure ; Cross tenant data statistics are difficult .
- Shared database , Shared data table
- All tenants share a database 、 A set of database tables , Add tenants to the table ID To identify which tenant the record belongs to .
- advantage : Because all tenants use a unified database, the cost is low .
- shortcoming : Lowest isolation level , Minimum safety , The system design 、 Database design is difficult , Data backup and recovery is the most difficult .
边栏推荐
- Using C language to realize palindrome number
- High number | summary of calculation methods of volume of rotating body, double integral calculation of volume of rotating body
- Understand the usage of functions and methods in go language
- Use of ThinkPHP template
- ternary operator
- ThoughtWorks global CTO: build the architecture according to needs, and excessive engineering will only "waste people and money"
- [Jianzhi offer] 66 Build product array
- C# TCP如何设置心跳数据包,才显得优雅呢?
- What else do you not know about new map()
- MySQL queries the latest qualified data rows
猜你喜欢
High number | summary of calculation methods of volume of rotating body, double integral calculation of volume of rotating body
浏览器渲染原理以及重排与重绘
Wsl2.0 installation
33:第三章:开发通行证服务:16:使用Redis缓存用户信息;(以减轻数据库的压力)
MySql 查询符合条件的最新数据行
stirring! 2022 open atom global open source summit registration is hot!
7. Scala class
The first EMQ in China joined Amazon cloud technology's "startup acceleration - global partner network program"
Application of threshold homomorphic encryption in privacy Computing: Interpretation
winedt常用快捷键 修改快捷键latex编译按钮
随机推荐
微信公众号网页授权登录实现起来如此简单
Embedded -arm (bare board development) -2
Embedded-c Language-1
Excuse me, is the redis syntax used in DMS based on the commands of the redis community version of the cloud database
阈值同态加密在隐私计算中的应用:解读
Is it safe and reliable to open futures accounts on koufu.com? How to distinguish whether the platform is safe?
mysql中取出json字段的小技巧
Application of threshold homomorphic encryption in privacy Computing: Interpretation
The second day of learning C language for Asian people
C how TCP restricts the access traffic of a single client
叩富网开期货账户安全可靠吗?怎么分辨平台是否安全?
Is it safe to open futures accounts online? Will there be more liars online? Doesn't feel very reliable?
Etcd 构建高可用Etcd集群
What else do you not know about new map()
干货!半监督预训练对话模型 SPACE
Error in composer installation: no composer lock file present.
基于Redis实现延时队列的优化方案小结
Function sub file writing
[7.7 live broadcast preview] the lecturer of "typical architecture of SaaS cloud native applications" teaches you to easily build cloud native SaaS applications. Once the problem is solved, Huawei's s
easyNmon使用汇总