Product Advantages
Product Advantages
-
Usable Off the Shelf Configure and launch cache servers within minutes, with just a few clicks. Buy on-demand resources and migrate your services to the cloud platform without any modifications. Configure and launch cache servers within minutes, with just a few clicks. Buy on-demand resources and migrate your services to the cloud platform without any modifications. -
Easily Scalable Quickly scale your DCS instances to your desired capacity with just a few clicks, without interrupting services. Quickly scale your DCS instances to your desired capacity with just a few clicks, without interrupting services.
-
Secure and Reliable HA architecture ensures that faults in a single cache node do not affect services. Username/Password-specific access and audit logs keep your data secure and traceable. HA architecture ensures that faults in a single cache node do not affect services. Username/Password-specific access and audit logs keep your data secure and traceable. -
Fully Managed DCS for Memcached monitors over 30 metrics for your services based on custom alarm thresholds so that service abnormalities can be detected in a timely manner. DCS for Memcached monitors over 30 metrics for your services based on custom alarm thresholds so that service abnormalities can be detected in a timely manner.
Application Scenarios
-
Gaming -
E-Commerce -
Internet -
Finance
Functions
Functions
-
High Availability If a master cache node becomes faulty, the standby cache node will take over traffic within seconds. If a master cache node becomes faulty, the standby cache node will take over traffic within seconds. -
Flexible Specs Choose between single-node and master/standby instances from 2 GB to 64 GB. Choose between single-node and master/standby instances from 2 GB to 64 GB. -
Scalability DCS instances scale without hits, as loads increase. DCS instances scale without hits, as loads increase.
-
Failover Failover DCS clients will not perceive any failover because the instance IP address exposure remains unchanged. DCS clients will not perceive any failover because the instance IP address exposure remains unchanged.
-
Single-Node DCS Instance Single-Node DCS Instance Each DCS instance runs on only one cache node and provides 2 GB to 64 GB in storage capacity. This type of DCS instance is recommended only when caching is needed. Each DCS instance runs on only one cache node and provides 2 GB to 64 GB in storage capacity. This type of DCS instance is recommended only when caching is needed. -
Master/Standby DCS Instance Master/Standby DCS Instance Each DCS instance provides 2 GB to 64 GB in storage capacity and runs on two cache nodes, one master and one standby. This type of DCS instance is recommended when high availability is needed. Each DCS instance provides 2 GB to 64 GB in storage capacity and runs on two cache nodes, one master and one standby. This type of DCS instance is recommended when high availability is needed.
-
Online Scaling Online Scaling With just a few clicks on the DCS for Memcached console, scale your instances to the needed capacity with no service downtime (master/standby instances), or with minimal interruption at the minute range (single-node instances). With just a few clicks on the DCS for Memcached console, scale your instances to the needed capacity with no service downtime (master/standby instances), or with minimal interruption at the minute range (single-node instances).
-
Data Reliability By default, data persistence is enabled for master/standby DCS instances. Data is flushed to disks with second-level latency. By default, data persistence is enabled for master/standby DCS instances. Data is flushed to disks with second-level latency. -
Security Security measures include user identity authentication, VPCs, subnets, security groups, and audit logs. Security measures include user identity authentication, VPCs, subnets, security groups, and audit logs. -
Metric Monitoring You can view more than 30 metrics and customize alarm thresholds and policies. You can view more than 30 metrics and customize alarm thresholds and policies.
-
Data Persistence Data Persistence DCS for Memcached is suitable for scenarios that require large capacities, medium read/write speeds, and few transactions. DCS for Memcached is suitable for scenarios that require large capacities, medium read/write speeds, and few transactions. -
Data Backup Data Backup You can initiate a manual backup at any time, or create policies to automatically back up data daily during off-peak hours. Each piece of data has three replicas. If an error occurs, or data becomes corrupted, you can restore your data from a backup with just a few clicks. You can initiate a manual backup at any time, or create policies to automatically back up data daily during off-peak hours. Each piece of data has three replicas. If an error occurs, or data becomes corrupted, you can restore your data from a backup with just a few clicks.
-
Network Isolation Network Isolation Tenants in different VPCs or security groups cannot connect with each other or access each other's resources, keeping assets separated and compartmentalized if necessary. Tenants in different VPCs or security groups cannot connect with each other or access each other's resources, keeping assets separated and compartmentalized if necessary. -
Traceability Traceability DCS for Memcached works with Cloud Trace Service to record and audit tenant management operations. DCS for Memcached works with Cloud Trace Service to record and audit tenant management operations. -
User Authorization User Authorization DCS for Memcached checks password complexity and protects against password cracking. DCS for Memcached requires users to change or reset DCS instance passwords periodically. DCS for Memcached checks password complexity and protects against password cracking. DCS for Memcached requires users to change or reset DCS instance passwords periodically.
-
A Wide Range of Metrics A Wide Range of Metrics Resource usage metrics include CPU usage, physical memory usage, network input/output throughput. Resource usage metrics include CPU usage, physical memory usage, network input/output throughput. -
Custom Alarm Thresholds and Policies Custom Alarm Thresholds and Policies Specify your own alarm thresholds and policies based on monitoring metrics to detect service abnormalities in a timely manner. Specify your own alarm thresholds and policies based on monitoring metrics to detect service abnormalities in a timely manner.
Recommended Configurations
Entry-level
-
Up to 10,000 concurrent connections -
Flexible scaling -
Distinctive security features
Advanced
-
HA architecture -
Data backup and restoration -
Data persistence
Professional
-
HA architecture with larger capacity -
Data backup and restoration -
Data persistence