From caa95eb381897a635b93aa1259940bd142523e51 Mon Sep 17 00:00:00 2001 From: "Yangkai.Shen" <237497819@qq.com> Date: Mon, 30 Sep 2019 16:11:35 +0800 Subject: [PATCH] =?UTF-8?q?:sparkles:=20spring-boot-demo-ratelimit-redis?= =?UTF-8?q?=20=E5=88=86=E5=B8=83=E5=BC=8F=E9=99=90=E6=B5=81=E5=AE=8C?= =?UTF-8?q?=E6=88=90?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- spring-boot-demo-ratelimit-redis/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/spring-boot-demo-ratelimit-redis/README.md b/spring-boot-demo-ratelimit-redis/README.md index b5fbfbe..c9c6021 100644 --- a/spring-boot-demo-ratelimit-redis/README.md +++ b/spring-boot-demo-ratelimit-redis/README.md @@ -1,6 +1,6 @@ # spring-boot-demo-ratelimit-redis -> 此 demo 主要演示了 Spring Boot 项目如何通过 AOP 结合 Redis 实现分布式限流,旨在保护 API 被恶意频繁访问的问题,是 `spring-boot-demo-ratelimit-guava` 的升级版。 +> 此 demo 主要演示了 Spring Boot 项目如何通过 AOP 结合 Redis + Lua 脚本实现分布式限流,旨在保护 API 被恶意频繁访问的问题,是 `spring-boot-demo-ratelimit-guava` 的升级版。 ## 1. 主要代码 @@ -293,4 +293,4 @@ public class TestController { ## 3. 参考 - [mica-plus-redis 的分布式限流实现](https://github.com/lets-mica/mica/tree/master/mica-plus-redis) -- [Java并发:分布式应用限流 Redis + Lua 实践](https://segmentfault.com/a/1190000016042927) \ No newline at end of file +- [Java并发:分布式应用限流 Redis + Lua 实践](https://segmentfault.com/a/1190000016042927)