springboot+redis 實現(xiàn)分布式限流令牌桶的示例代碼
網(wǎng)上找了很多redis分布式限流方案,要不就是太大,需要引入第三方j(luò)ar,而且還無法正常運(yùn)行,要不就是定時任務(wù)定時往key中放入數(shù)據(jù),使用的時候調(diào)用,嚴(yán)重影響性能,所以著手自定義實現(xiàn)redis令牌桶。只用到了spring-boot-starter-data-redis包,并且就幾行代碼。
2、環(huán)境準(zhǔn)備a、idea新建springboot項目,引入spring-data-redis包b、編寫令牌桶實現(xiàn)方法RedisLimitExcutorc、測試功能,創(chuàng)建全局?jǐn)r截器,測試功能
3、上代碼maven添加依賴
<dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-data-redis</artifactId></dependency>
令牌桶實現(xiàn)方法RedisLimitExcutor
package com.example.redis_limit_demo.config;import org.springframework.beans.factory.annotation.Autowired;import org.springframework.data.redis.core.StringRedisTemplate;import org.springframework.data.redis.core.script.DefaultRedisScript;import org.springframework.data.redis.core.script.RedisScript;import org.springframework.stereotype.Component;import java.util.ArrayList;import java.util.List;/** * 令牌桶實現(xiàn) */@Componentpublic class RedisLimitExcutor { private StringRedisTemplate stringRedisTemplate; @Autowired public void setStringRedisTemplate(StringRedisTemplate stringRedisTemplate) {this.stringRedisTemplate = stringRedisTemplate; } /** * 令牌的 * * @param keykey值 * @param limitCount 容量 * @param seconds 時間間隔 * @return */ public boolean tryAccess(String key, int limitCount, int seconds) {String luaScript = buildLuaScript();RedisScript<Long> redisScript = new DefaultRedisScript<>(luaScript, Long.class);List<String> keys = new ArrayList<>();keys.add(key);Long count = stringRedisTemplate.execute(redisScript, keys, String.valueOf(limitCount), String.valueOf(seconds));if (count != 0) { return true;} else { return false;} } /** * 腳本 * * @return */ private static final String buildLuaScript() {StringBuilder lua = new StringBuilder();lua.append(' local key = KEYS[1]');lua.append('nlocal limit = tonumber(ARGV[1])');lua.append('nlocal curentLimit = tonumber(redis.call(’get’, key) or '0')');lua.append('nif curentLimit + 1 > limit then');lua.append('nreturn 0');lua.append('nelse');lua.append('n redis.call('INCRBY', key, 1)');lua.append('nredis.call('EXPIRE', key, ARGV[2])');lua.append('nreturn curentLimit + 1');lua.append('nend');return lua.toString(); }}
攔截器配置WebAppConfig
package com.example.redis_limit_demo.config;import org.springframework.context.annotation.Bean;import org.springframework.context.annotation.Configuration;import org.springframework.web.servlet.config.annotation.InterceptorRegistry;import org.springframework.web.servlet.config.annotation.WebMvcConfigurer;/** * 攔截器配置 */@Configurationpublic class WebAppConfig implements WebMvcConfigurer { @Override public void addInterceptors(InterceptorRegistry registry) {registry.addInterceptor(getRequestInterceptor()).addPathPatterns('/**'); } @Bean public RequestInterceptor getRequestInterceptor() {return new RequestInterceptor(); }}
攔截器實現(xiàn)RequestInterceptor
package com.example.redis_limit_demo.config;import org.springframework.beans.factory.annotation.Autowired;import org.springframework.context.annotation.Configuration;import org.springframework.web.servlet.HandlerInterceptor;import javax.servlet.http.HttpServletRequest;import javax.servlet.http.HttpServletResponse;import java.net.InetAddress;import java.net.UnknownHostException;/** * 攔截器實現(xiàn) */@Configurationpublic class RequestInterceptor implements HandlerInterceptor { @Autowired private RedisLimitExcutor redisLimitExcutor; /** * 只有返回true才會繼續(xù)向下執(zhí)行,返回false取消當(dāng)前請求 * * @param request * @param response * @param handler * @return */ @Override public boolean preHandle(HttpServletRequest request, HttpServletResponse response, Object handler) {/** * 根據(jù)實際情況設(shè)置QPS */String url = request.getRequestURI();String ip = getIpAdd(request);//QPS設(shè)置為5,手動刷新接口可以測試出來if (!redisLimitExcutor.tryAccess(ip+url, 5, 1)) { throw new RuntimeException('調(diào)用頻繁');} else { return true;} } public static final String getIpAdd(HttpServletRequest request) {String ipAddress = request.getHeader('x-forwarded-for');if (ipAddress == null || ipAddress.length() == 0 || 'unknown'.equalsIgnoreCase(ipAddress)) { ipAddress = request.getHeader('Proxy-Client-IP');}if (ipAddress == null || ipAddress.length() == 0 || 'unknown'.equalsIgnoreCase(ipAddress)) { ipAddress = request.getHeader('WL-Proxy-Client-IP');}if (ipAddress == null || ipAddress.length() == 0 || 'unknown'.equalsIgnoreCase(ipAddress)) { ipAddress = request.getRemoteAddr(); if (ipAddress.equals('127.0.0.1') || ipAddress.equals('0:0:0:0:0:0:0:1')) {// 根據(jù)網(wǎng)卡取本機(jī)配置的IPInetAddress inet = null;try { inet = InetAddress.getLocalHost();} catch (UnknownHostException e) { return null;}ipAddress = inet.getHostAddress(); }}// 如果通過代理訪問,可能獲取2個IP,這時候去第二個(代理服務(wù)端IP)if (ipAddress.split(',').length > 1) { ipAddress = ipAddress.split(',')[1].trim();}return ipAddress; }}
測試controller
package com.example.redis_limit_demo.controller;import org.springframework.web.bind.annotation.RequestMapping;import org.springframework.web.bind.annotation.RestController;@RequestMapping('demo')@RestControllerpublic class DemoController { @RequestMapping('limit') public String demo() {//todo 寫業(yè)務(wù)邏輯return 'aaaaa'; }}4、運(yùn)行項目,訪問接口
http://localhost:8080/demo/limit
當(dāng)刷新頻率高了以后,就會報錯
5、碼云地址(GitHub經(jīng)常訪問不到)
備注:
1、 redis的key可以根據(jù)實際情況設(shè)置,入例子中的ip+url,可以將全部流量進(jìn)行控制,防止惡意刷接口,但需要注意的是,使用ip方式,要將QPS設(shè)置大一些,因為會出現(xiàn)整個大廈公用一個ip的情況。也可以使用url+userName,將QPS設(shè)置小一點,可以更加精準(zhǔn)的限制api的訪問。2、可以將拋出異常進(jìn)行全局捕獲和統(tǒng)一返回。
到此這篇關(guān)于springboot+redis 實現(xiàn)分布式限流令牌桶的示例代碼的文章就介紹到這了,更多相關(guān)springboot redis分布式限流令牌桶內(nèi)容請搜索好吧啦網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章希望大家以后多多支持好吧啦網(wǎng)!
相關(guān)文章:
1. python中scrapy處理項目數(shù)據(jù)的實例分析2. js抽獎轉(zhuǎn)盤實現(xiàn)方法分析3. IntelliJ IDEA導(dǎo)入jar包的方法4. Python requests庫參數(shù)提交的注意事項總結(jié)5. 教你在 IntelliJ IDEA 中使用 VIM插件的詳細(xì)教程6. SpringBoot參數(shù)校驗與國際化使用教程7. iOS實現(xiàn)點贊動畫特效8. python操作mysql、excel、pdf的示例9. 通過Python pyecharts輸出保存圖片代碼實例10. vue-electron中修改表格內(nèi)容并修改樣式
