In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article will explain in detail what web components are commonly used on cloud platforms. The editor thinks it is very practical, so I share it with you as a reference. I hope you can get something after reading this article.
Elastic load balancing ELB
Elastic load balancing (Elastic Load Balance) automatically distributes access traffic to multiple CVMs to expand the external service capability of the application system and achieve a higher level of application fault tolerance.
Application scenario
1. Disaster recovery across availability zones in the same city, and the load distribution capacity can be automatically expanded according to the actual number of user visits. Support dual-active disaster recovery across availability zones to achieve seamless real-time switching
two。 Large portals. In view of the high traffic volume of large portals, users' access traffic is evenly distributed to multiple back-end CVMs through elastic load balancing to ensure that the business runs quickly and smoothly.
3. E-commerce business shows a strong tidal effect. Through seamless integration with auto scaling and other services, ELB automatically creates back-end CVMs and automatically distributes traffic to new CVMs, relieving the system pressure during the promotion peak. The cluster supports 100 million concurrent connections to meet the demands of massive traffic.
Load balancing scheduling algorithm
1. Weighted polling algorithm
two。 Weighted minimum connections: the cluster supports 100 million concurrent connections to meet the demands of massive traffic
3. Source IP algorithm: perform consistent Hash operation on the requested source IP address to get a specific value. At the same time, the back-end server is numbered, and the request is distributed to the corresponding numbered server according to the operation result.
4. Connection ID algorithm: use the connection ID field in the message to carry on the consistent hash algorithm, get a specific value, at the same time, number the back-end server, and distribute the request to the corresponding numbered server according to the operation result. This allows access to different connection ID to be distributed while requests for the same connection ID are always dispatched to a specific server. This method is suitable for the message flow of load balancing QUIC protocol applications.
Other featur
1. Support access control, whitelist
two。 Access log, which can view and analyze the detailed access records of layer-7 cloud load balancer HTTP and HTTPS, including request time, client IP address, request path and server response.
3. Cut the flow. Switch to the back-end Server Group tab and click the row of the back-end server group. The modification of the allocation policy takes effect immediately, and does not affect the traffic forwarding of established connections, but only the traffic allocation of new connections.
Cloud container engine
Cloud Container engine (Cloud Container Engine, referred to as CCE) provides a highly scalable, high-performance enterprise-class Kubernetes cluster that supports running Docker containers. With the Cloud Container engine, you can easily deploy, manage, and extend containerized applications on your.
Use it to create Kubernetes clusters, mirrors to create stateless workloads, stateful workloads.
WAF web Application Firewall
Web applies firewall WAF to multi-dimensional detection and protection of website business traffic, intelligently identify malicious request characteristics and defend against unknown threats.
When enabled, all public network traffic on your website first passes through the Web application firewall. Malicious attack traffic is detected and filtered on the Web application firewall, and normal traffic is returned to the origin server IP, thus ensuring the security, stability and availability of the origin server IP.
Semantic analysis + regular expression twin engines are used to accurately detect multi-dimensional traffic and accurately identify attack traffic.
Support 11 kinds of code restore, can identify more metamorphosis attacks, reduce the risk of Web application firewall being bypassed, in short, to prevent malicious attacks.
This is the end of this article on "what web components are commonly used on cloud platforms". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.