当前位置:网站首页>Working principle of sentinel series (concept)
Working principle of sentinel series (concept)
2022-06-13 05:40:00 【codain】
Sentinel The core function of is mainly divided into three parts : Workflow 、 Data structure and current limiting algorithm , The architecture is as follows :

Pictured above , We can see that , The call link is Sentinel The main work flow of , It's made up of all kinds of Slot Of slots , Will be different Slot String together in a certain order ( In fact, it is the responsibility chain model ), So as to combine different functions , The function mentioned here is mainly current limiting 、 Downgrade 、 System protection ,Sentinel Each slot in the Slot All have different responsibilities , such as :LogSlot, Just look at the name , This slot is responsible for logging ,FlowSlot Is responsible for current limiting, etc , Responsibilities are relatively separated , Each module focuses on maintaining a function
stay Sentinel in , In fact, all resources have corresponding resource names , That is to say resourceName, Each time a resource is accessed, a corresponding Entry object , Creating Entry Colleague , A series of functional slots will also be created (slot chain), These slots form a chain of responsibility , And each has a different responsibility , As follows :
1、NodeSelectorSlot: Collect the call path of resources , Store call stack in dressing structure , It is used to limit current and degrade according to the calling path
2、ClusterBuilderSlot: It is responsible for creating cluster nodes with resource name dimension statistics ClusterNode, Create each level ClusterNode Press call source prigin The division of StatisticNode
3、LogSlot: In case of current limiting 、 Fuse 、 Be responsible for recording logs during system protection
4、AuthoritySlot: Access control , Support blacklist and whitelist strategies
5、SystemSlot: Control the total inlet flow , The limiting conditions are, in turn, total QPS、 Bus number 、RT threshold 、 The operating system is currently load、 The operating system is currently CPU utilization
6、FlowSlot: According to the current limiting rules and each Node Current limiting judgment shall be conducted for the same level data in
7、DegradeSlot: According to the fusing rules and each Node Service degradation based on the statistics in
8、StatisticSlot: Count the number of requests from different dimensions 、 Passing number 、 Current limiting number 、 Number of threads, etc runtime Information , These data are stored in DefaultNode、OriginNode and ClusterNode in
边栏推荐
- Difference between deviation and variance in deep learning
- A simple recursion problem of linked list
- The reason why the process cannot be shut down after a spark job is executed and the solution
- Unity游戏优化[第二版]学习记录6
- Basic operations of MySQL auto correlation query
- 2021.9.29学习日志-MIME类型
- Case - count the number of occurrences of each string in the string
- 16 the usertask of a flowable task includes task assignment, multi person countersignature, and dynamic forms
- Jeffery0207 blog navigation
- MySQL main query and sub query
猜你喜欢

JS output uincode code

Case -- the HashSet set stores the student object and traverses

How to Algorithm Evaluation Methods

The reason why the process cannot be shut down after a spark job is executed and the solution

Automatic database backup (using Navicat)

One of PowerShell optimizations: prompt beautification

Byte buddy print execution time and method link tracking

About Evaluation Metrics

AUTOSAR实战教程pdf版

Install harbor (online offline)
随机推荐
Unity游戏优化(第2版)学习记录7
Use the browser to cut the entire page (take chrome as an example)
Case - simulated landlords (upgraded version)
Shell instance
为什么那么多人讨厌A-Spice
顶部下滑沉浸式dialog
MySQL built-in functions
The 13th week of the second semester of sophomore year
How to Algorithm Evaluation Methods
MySQL performs an inner join on query. The query result is incorrect because the associated fields have different field types.
Mysql database crud operation
Use of mongodb
2021.9.29 learning log MIME type
890. Find and Replace Pattern
Database design
Browser screenshot method (long screenshot, node screenshot, designated area screenshot)
Solutions to conflicts between xampp and VMware port 443
Basic operations of MySQL auto correlation query
Float type value range
Parallelgateway and exclusivegateway of 14 gateways