当前位置:网站首页>Microservices (distributed architecture)
Microservices (distributed architecture)
2022-04-23 02:48:00 【REMLILI】
Distributed microservices :
- One 、 Microservices : Service split + The remote invocation + Service cluster
-
- ( One ) service :1 One business =1 A project =1 A service
- ( Two ) features : High cohesion 、 Low coupling
- ( 3、 ... and ) Components :
-
- 1、 Registry Center ( Maintain monitoring node information ): Service registration discovery framework
- 2、 Load balancing : In process load balancer
- 3、 Service remote invocation mapping :
- 4、 Flow control / Downgrade / Protect : Fuse ( Circuit breaker ): Service degradation fuse
- 5、 Unified service gateway routing ( entrance ):
- 6、 Unified configuration center :
- 7、 The message bus :
- 8、 Service link monitoring
- ( Four ) Service split : Avoid repetition 、 Database independence
- ( 5、 ... and ) The remote invocation : Business exposure interface 、 Request calling
- Two 、 Microservice implementation :SpringCloud
- 3、 ... and 、 Microservice implementation :SpringCloudAlibaba
- Four 、 Microservice implementation :Dubbo
One 、 Microservices : Service split + The remote invocation + Service cluster
Definition : A well designed distributed architecture
Purpose : High cohesion 、 Low coupling
shortcoming : complex
Noun : heartbeat 、 Particle size
( One ) service :1 One business =1 A project =1 A service
Service split granularity : Different functional units of the application ( service ) To break up ????????????
( Two ) features : High cohesion 、 Low coupling
1、 Single responsibility :
1 Corresponding services 1 A business capability
2、 Service oriented :
Microservices expose business interfaces
3、 autonomous :
Team independence 、 Technology independence 、 Data independence 、 Deploy independent
4、 Strong isolation :
Isolate service calls 、 Fault tolerance 、 Downgrade , Avoid cascading problems
( 3、 ... and ) Components :
1、 Registry Center ( Maintain monitoring node information ): Service registration discovery framework
Eureka 、Zookeeper、Consul、Nacos、Redis
2、 Load balancing : In process load balancer
Ribbon、Nignx、LoadBalancer
3、 Service remote invocation mapping :
Feign(http agreement ) 、Open Feign、Dubbo agreement
4、 Flow control / Downgrade / Protect : Fuse ( Circuit breaker ): Service degradation fuse
Alibaba Sentinel、Hystrix、Resilience4j
Service monitoring and protection
5、 Unified service gateway routing ( entrance ):
Zuul、SpringCloudGateway
Service monitoring and protection
6、 Unified configuration center :
Nacos、 SpringcloudConfig、
7、 The message bus :
Nacos、Bus
Service monitoring and protection
8、 Service link monitoring
Zipkin、Sleuth
( Four ) Service split : Avoid repetition 、 Database independence
Definition : Functional module splitting 、 One function module, one service 、 Independent database for each service
1、 Avoid duplicate development :
Different microservices 、 Don't develop the same business repeatedly
2、 Database independence :
Microservice data independence 、 Do not access databases of other microservices
3、 Business exposure interface : Implement remote call
Microservices can expose their business as interfaces 、 For other microservices to call
( 5、 ... and ) The remote invocation : Business exposure interface 、 Request calling
1、 Business exposure interface : The remote invocation
Microservices can expose their business as interfaces 、 For other microservices to call
Two 、 Microservice implementation :SpringCloud
Components :SpringCloudAlibaba
Realization :SpringBoot Automatic assembly
3、 ... and 、 Microservice implementation :SpringCloudAlibaba
The essence : Implementation part SpringCloud——SpringCloud The components of
Components :SpringCloudAlibaba
Four 、 Microservice implementation :Dubbo
版权声明
本文为[REMLILI]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204220741227492.html
边栏推荐
- Huashu "deep learning" and code implementation: 01 Linear Algebra: basic concepts + code implementation basic operations
- JVM runtime data area (I)
- Flink stream processing engine system learning (III)
- 本地远程访问云服务器的jupyter
- windows MySQL8 zip安装
- MySQL insert free column
- Source code and some understanding of employee management system based on polymorphism
- 解决 注册谷歌邮箱 gmail 手机号无法用于验证
- The shell monitors the depth of the IBM MQ queue and scans it three times in 10s. When the depth value exceeds 5 for more than two times, the queue name and depth value are output.
- Leetcode cooking
猜你喜欢

Deploying sbert model based on torchserve < semantic similarity task >

Target narak

php+mysql对下拉框搜索的内容修改

使用Go语言构建Web服务器
![[wechat applet] set the bottom menu (tabbar) for the applet](/img/e2/98711dfb1350599cbdbdf13508b84f.png)
[wechat applet] set the bottom menu (tabbar) for the applet

Domestic lightweight Kanban scrum agile project management tool

grain rain

Source code and some understanding of employee management system based on polymorphism

解决win7 中powershell挖矿占用CPU100%

ele之Table表格的封装
随机推荐
leetcode 烹飪料理
[suggestion collection] hematemesis sorting out golang interview dry goods 21 questions - hanging interviewer-1
hack the box optimum靶机
How big the program development of single chip microcomputer project can be, it represents your level of knocking code
《信息系统项目管理师总结》第七章 项目沟通管理
Classification and regression tree of machine learning
MySQL complex query uses temporary table / with as (similar to table variable)
Linux Redis ——Redis HA Sentinel 集群搭建详解 & Redis主从部署
If MySQL / SQL server judges that the table or temporary table exists, it will be deleted
ROP Emporium x86_ 64 7 ~ 8 questions
1、 Sequence model
Niuke hand speed monthly race 48 C (I can't understand the difference. It belongs to yes)
Huashu "deep learning" and code implementation: 01 Linear Algebra: basic concepts + code implementation basic operations
OCR recognition PDF file
Cuisine leetcode
Step principle of logical regression in machine learning
Intelligent agricultural management model
[if you want to do a good job, you must first use its tools] Guide for downloading and using paper editing and document management (endnote, latex, jabref, overflow) resources
JZ35 replication of complex linked list
[XJTU計算機網絡安全與管理]第二講 密碼技術