Product Advantages
Product Advantages
-
Configure and launch cache servers within minutes, with just a few clicks. Buy on-demand resources and migrate your services to the cloud platform without any modifications.Configure and launch cache servers within minutes, with just a few clicks. Buy on-demand resources and migrate your services to the cloud platform without any modifications.
-
Quickly scale your DCS instances to your desired capacity with just a few clicks, without interrupting services.Quickly scale your DCS instances to your desired capacity with just a few clicks, without interrupting services.
-
HA architecture ensures that faults in a single cache node do not affect services. Username/Password-specific access and audit logs keep your data secure and traceable.HA architecture ensures that faults in a single cache node do not affect services. Username/Password-specific access and audit logs keep your data secure and traceable.
-
DCS for Memcached monitors over 30 metrics for your services based on custom alarm thresholds so that service abnormalities can be detected in a timely manner.DCS for Memcached monitors over 30 metrics for your services based on custom alarm thresholds so that service abnormalities can be detected in a timely manner.
Application Scenarios
-
Gaming
-
E-Commerce
-
Internet
-
Finance
Gaming
DCS for Memcached provides fast access to leaderboards.
Advantages
E-Commerce
DCS for Memcached provides fast concurrent access to frequently requested data, such as best sellers and daily deals, and is scaled easily as loads increase.
Advantages
Internet
DCS for Memcached is ideal for social networking and web apps. The Memcached Set data structure can maintain friend connection data, while the String data can maintain static cache files.
Advantages
Finance
DCS for Memcached delivers high data concurrency, security, and reliability for financial apps.
Advantages
Functions
Functions
-
If a master cache node becomes faulty, the standby cache node will take over traffic within seconds.If a master cache node becomes faulty, the standby cache node will take over traffic within seconds.
-
Choose between single-node and master/standby instances from 2 GB to 64 GB.Choose between single-node and master/standby instances from 2 GB to 64 GB.
-
DCS instances scale without hits, as loads increase.DCS instances scale without hits, as loads increase.
-
DCS clients will not perceive any failover because the instance IP address exposure remains unchanged.
DCS clients will not perceive any failover because the instance IP address exposure remains unchanged.
-
Each DCS instance runs on only one cache node and provides 2 GB to 64 GB in storage capacity. This type of DCS instance is recommended only when caching is needed.Each DCS instance runs on only one cache node and provides 2 GB to 64 GB in storage capacity. This type of DCS instance is recommended only when caching is needed.
-
Each DCS instance provides 2 GB to 64 GB in storage capacity and runs on two cache nodes, one master and one standby. This type of DCS instance is recommended when high availability is needed.
Each DCS instance provides 2 GB to 64 GB in storage capacity and runs on two cache nodes, one master and one standby. This type of DCS instance is recommended when high availability is needed.
-
With just a few clicks on the DCS for Memcached console, scale your instances to the needed capacity with no service downtime (master/standby instances), or with minimal interruption at the minute range (single-node instances).With just a few clicks on the DCS for Memcached console, scale your instances to the needed capacity with no service downtime (master/standby instances), or with minimal interruption at the minute range (single-node instances).
-
By default, data persistence is enabled for master/standby DCS instances. Data is flushed to disks with second-level latency.By default, data persistence is enabled for master/standby DCS instances. Data is flushed to disks with second-level latency.
-
Security measures include user identity authentication, VPCs, subnets, security groups, and audit logs.Security measures include user identity authentication, VPCs, subnets, security groups, and audit logs.
-
You can view more than 30 metrics and customize alarm thresholds and policies.You can view more than 30 metrics and customize alarm thresholds and policies.
-
DCS for Memcached is suitable for scenarios that require large capacities, medium read/write speeds, and few transactions.
DCS for Memcached is suitable for scenarios that require large capacities, medium read/write speeds, and few transactions.
-
You can initiate a manual backup at any time, or create policies to automatically back up data daily during off-peak hours. Each piece of data has three replicas. If an error occurs, or data becomes corrupted, you can restore your data from a backup with just a few clicks.You can initiate a manual backup at any time, or create policies to automatically back up data daily during off-peak hours. Each piece of data has three replicas. If an error occurs, or data becomes corrupted, you can restore your data from a backup with just a few clicks.
-
Tenants in different VPCs or security groups cannot connect with each other or access each other's resources, keeping assets separated and compartmentalized if necessary.Tenants in different VPCs or security groups cannot connect with each other or access each other's resources, keeping assets separated and compartmentalized if necessary.
-
DCS for Memcached works with Cloud Trace Service to record and audit tenant management operations.DCS for Memcached works with Cloud Trace Service to record and audit tenant management operations.
-
DCS for Memcached checks password complexity and protects against password cracking.
DCS for Memcached requires users to change or reset DCS instance passwords periodically.
DCS for Memcached checks password complexity and protects against password cracking.
DCS for Memcached requires users to change or reset DCS instance passwords periodically.
-
Resource usage metrics include CPU usage, physical memory usage, network input/output throughput.Resource usage metrics include CPU usage, physical memory usage, network input/output throughput.
-
Specify your own alarm thresholds and policies based on monitoring metrics to detect service abnormalities in a timely manner.Specify your own alarm thresholds and policies based on monitoring metrics to detect service abnormalities in a timely manner.
Recommended Configurations
Entry-level
2 GB, single-node DCS instance
Micro- and small-sized Internet apps | Testing environments of small- and medium-sized enterprises
-
Up to 10,000 concurrent connections
-
Flexible scaling
-
Distinctive security features
$0.040 USD /hour
Learn moreAdvanced
16 GB, master/standby DCS instance
Medium-sized Internet apps | Production environments of small- and medium-sized enterprises
-
HA architecture
-
Data backup and restoration
-
Data persistence
$0.550 USD /hour
Learn moreProfessional
64 GB, master/standby DCS instance
Medium- and large-sized application systems
-
HA architecture with larger capacity
-
Data backup and restoration
-
Data persistence
$1.750 USD /hour
Learn more