Value Proposition

Multi-dimensional Security Management

Security pre-protection (domain name access control, database security group, and account management), security encryption (SSL link encryption, block-level transparent database encryption, and encryption function), and security post-audit (bypass audit service)

Highly Reliable Best Practices

Dual-machine hot standby architecture and storage shared by active and standby nodes; three disaster recovery mechanisms and synchronous replication of master and slave data; backup within seconds and multiple data recovery methods to effectively prevent data loss and make data secure and reliable.

High-performance Data Processing

Relying on years of financial system management experience and production practices, it flexibly provides the best performance parameter configuration based on the actual scenarios; it also upgrades the specifications of service instances as required to enhance their performance, and supports read-write separation deployment to significantly improve the query efficiency.

Easy-to-Use and Cost-Effective

Flexible billing can save the cost and make the service available upon subscription; operations such as adding, deleting, restarting, backing up, temporarily recovering and expanding RDS instances and changing their parameters can be completed through the console and multi-dimensional performance monitoring data are provided for users’ analysis.

Use Cases

  • For systems with simple business logic and high read and write concurrency, MySQL can provide excellent support. The product provides dual-machine high availability and shared storage architecture for storing and processing financial transaction data, account data, and so on. Based on Ping An Group’s accumulation of financial business scenarios for many years, it provides a disaster recovery system through three centers in two places to meet the requirements of the financial regulators.

  • Recommend to use with: Elastic Load Balancing Elastic Compute Service Redis
  • As the final data storage medium of the server, for Read Mostly scenarios, read-only instances can be added to the hotspot library, which will greatly improve the reading capability. The dual-system hot standby and the same-city deployment architecture can guarantee the security and stability of the data platform.

  • Recommend to use with: Elastic Load Balancing Elastic Compute Service Redis

Success Stories

Product Features

Functionality

Creation and Management

Obtaining RDS rapidly: select a region and volume specification to obtain RDS instances easily.
Manage RDS: Operations such as deleting, restarting, backing up, temporarily recovering and expanding RDS instances and changing their parameters can be completed through the console.
Console: a private bastion machine is provided to enable users to use the database Client easily, providing greater flexibility and control over RDS instance management.

Setting Access Strategies

Domain name access control: With domain name as the access portal, an access control list (ACL) is provided for the domain name service, and only a tenant’s own VPC can access the domain name.
Set database security group: By defining the access whitelist, the database security group CDFW is used for access control at the bottom of the product. Only the IP or subnet authorized by the database whitelist is allowed to access the database.
SSL encrypted transmission: Users can choose to enable SSL connection between an application and the database, ensuring that full-link communications are encrypted.

Rapid Expansion

Rapid expansion of computing resources: The CPU and memory capacity of the instances can be adjusted as needed to improve business processing capabilities. A single instance can support up to 16 cores and 128 GB of memory.
Online expansion of storage resources: it can not only support unlimited expansion of storage space, but also cope with sudden IO load and provide better IO expansion capability.

Backup Management

Customized backup: users can customize backup storage strategies and backup cycles.
Manual backup: users can back up the instances in a certain time point as they want.
Temporary instance recovery: Instances can be recovered by accurate time or backup piece; the temporary instance can be accessed for free for 7 days to facilitate data verification and recovery.
The technical scheme of block-level backup is adopted to ensure the backup time is independent of data volume and that the backup is reliable.

Monitoring and Warning

Monitoring service: provide multi-dimensional performance monitoring data for users’ analysis.
Customized alarm: when an indicator exceeds a certain threshold, it will automatically alert users the risk in advance, and also help users quickly locate and solve problems.

Help and Documentation

Call us

400-151-8800

Email us

cloud@pingan.com

Online customer service

Instant reply

Technical Support

cloud products