Unlock instant, AI-driven research and patent intelligence for your innovation.

Database access management method and system, electronic equipment and storage medium

A technology for access management and database, applied in database indexing, structured data retrieval, etc., can solve the problems of Redis memory occupation, poor stability, and long time consumption, and achieve the effect of improving reliability, stability, and utilization

Active Publication Date: 2019-05-03
JIANGSU MANYUN SOFTWARE TECH CO LTD
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Each application needs to be configured separately, which not only takes a long time and is inefficient, but also cannot be monitored uniformly. When there is a problem with Redis, it is difficult to quickly locate it;
[0006] 2. It is impossible to monitor whether the application is configured with a usage monitoring scheme. When some applications that are not configured with a usage monitoring scheme have problems after they go online, it is easy to affect other applications associated with Redis, and the stability is poor;
[0007] 3. Some applications configure their usage monitoring scheme to use long-time commands at will, which greatly affects other applications that share the same Redis;
[0008] 4. Some keys without an expiration time occupy Redis memory, but only memory growth can be found at the Redis level, and it is impossible to locate the memory growth caused by which application system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database access management method and system, electronic equipment and storage medium
  • Database access management method and system, electronic equipment and storage medium
  • Database access management method and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this application will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals denote the same or similar structures in the drawings, and thus their repeated descriptions will be omitted.

[0033] The database access management method of the present application is executed by a proxy service, and the proxy service proxy application interacts with the database to realize the access management of each application to the database. The access management method of the present application can be applied to various types of databases, and is especially suitable for Key-Value (key-value) type Redis databases.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a database access management method and system, electronic equipment and a storage medium, which are used for solving the problem that database access cannot be monitored in a unified manner. The access management method is executed by a proxy service and comprises the following steps: receiving an access request initiated by an application, and analyzing a key carried by the access request; transmitting the access request carrying the configured key to a database, and returning response data of the database; establishing a key value set by taking each key as an index; monitoring the key value set of each key, obtaining a key which is not configured with expiration time and has access interval time exceeding a first interval threshold, and adding the key to a deletion queue; and according to the sequence of the deletion queue, sequentially marking the keys of which the access interval time exceeds a second interval threshold value as expired keys, and sending a deletion request carrying each expired key to the database. According to the invention, unified monitoring of database access by each application is realized through access interaction of the proxy service proxy application and the database.

Description

technical field [0001] The present application relates to the technical field of data processing, in particular, to a database access management method, system, electronic equipment and storage medium. Background technique [0002] Redis is a high-performance non-relational Key-Value (key-value) database, which can act as a cache container in the system, reduce access to the database, ensure system stability, and improve system response time. Thousands of requests. [0003] The performance of Redis is very high, but there are often problems in its use. For example, if the expiration time of the key is not set, the key will occupy memory for a long time and cause waste; use very performance-consuming commands, such as deleting a large key; the name of the key is arbitrary, resulting in an error After the problem, the corresponding responsible person cannot be found, and the problem cannot be dealt with in the first time, etc. [0004] In response to these problems, some Red...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/22
Inventor 邹祥文
Owner JIANGSU MANYUN SOFTWARE TECH CO LTD