This paper explains the principle and implementation of consistent hash

Why do I need a consistent hashFirst, what is hashHash, generally translated as hash, or transliterated as hash, is to transform an input of any length (also known as pre mapping pre image) into a fixed length output through hash algorithm, and the output is the hash value. This transformation is a compression mapping, that is, the hash value s ...

Posted by smithmr8 on Mon, 29 Nov 2021 17:53:20 -0800

How to deal with sudden traffic peak gracefully in microservice governance

Why do I need to reduce the load In micro service clusters, the call link is perplexing. As a service provider, there is a mechanism to protect itself, which prevents the caller from calling himself down without any brain calls and ensuring the high availability of his services. The most common protection mechanism is the current limiting mecha ...

Posted by ark014 on Mon, 22 Nov 2021 20:32:15 -0800

How to deal with sudden traffic peak gracefully in microservice governance

Why do I need to reduce the loadIn micro service clusters, the call link is perplexing. As a service provider, there is a mechanism to protect itself, which prevents the caller from calling himself down without any brain calls and ensuring the high availability of his services.The most common protection mechanism is the current limiting mechani ...

Posted by buddhika2010 on Mon, 22 Nov 2021 20:18:47 -0800