当前位置:网站首页>Talk about the essence of interface idempotent and consumption idempotent
Talk about the essence of interface idempotent and consumption idempotent
2022-04-23 07:59:00 【Dream river dream】
Interface idempotency and how to prevent message duplication and how to solve it ?
idempotent : Executing multiple times has the same impact on business data as executing once
The essence : There are no errors in the data
Solving problems from the essence , Add distributed locks before executing code , And then determine ( Determine whether data can be inserted , Whether it can be updated , Can I delete ). Since the plus distribution lock involves the of the lock key What is it? ? Recommended service key, Not the only request ID Or the only message ID. Because there may be two different requests / All messages want to manipulate the same data , The data is not safe .
版权声明
本文为[Dream river dream]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230629085984.html
边栏推荐
- SAP TR手动导入系统操作手册
- Towords Open World Object Detection
- 《内网安全攻防:渗透测试实战指南》读书笔记(五):域内横向移动分析及防御
- Houdini>流体,刚体导出学习过程笔记
- Unity get real geographic map application terrain notes
- C smoothprogressbar custom progress bar control
- Reptile learning notes, learning reptile, read this article is enough
- Encapsulate the debug function of unity
- IDEA快捷键
- MySQL8. 0 installation / uninstallation tutorial [window10 version]
猜你喜欢
Shapley Explanation Networks
Unity get real geographic map application terrain notes
Chapter V investment real estate
Houdini > rigid body, rigid body breaking RBD
How does Apache Hudi accelerate traditional batch mode?
The projection vector of a vector to a plane
Towords Open World Object Detection
Houdini terrain and fluid solution (simulated debris flow)
SQL sorts string numbers
庄懂的TA笔记(六)<FakeEnvReflect && 生锈,锈迹效果>
随机推荐
关于unity获取真实地理地图转3D化的相关链接
Série de pénétration Intranet: icmpsh du tunnel Intranet
《内网安全攻防:渗透测试实战指南》读书笔记(五):域内横向移动分析及防御
Reptile learning notes, learning reptile, read this article is enough
第四章 无形资产
SAP GUI security
Mysql database backup and recovery under Linux (full + incremental)
Internal network security attack and defense: a practical guide to penetration testing (IV): Authority improvement analysis and defense
C # control the camera, rotate and drag the observation script (similar to scenes observation mode)
Using lambda expression to solve the problem of C file name sorting (whether it is 100 or 11)
SAP GUI安全性
内网渗透系列:内网隧道之icmp_tran
How to present your digital portfolio: suggestions from creative recruiters
Intranet penetration series: icmpsh of Intranet tunnel
Weblux file upload and download
内网渗透系列:内网隧道之dns2tcp
TA notes of Zhuang understand (zero) < bedding and learning methods >
TA notes of Zhuang understand (VII) < Lambert + Phong + shadow + 3evcolor + Ao >
MySQL--锁的奥秘--数据怎么锁
Solve the problem of deploying mysql8 in docker with correct password but unable to log in to MySQL