DMS supports unified management of multiple databases including relational databases such as MySQL, SQL Server, PostgreSQL, PolarDB, DRDS, OceanBase, Oracle and etc., data warehouse related databases such as AnalyticDB, Data Lake Analytics, ClickHouse and other OLAP databases, and NoSQL databases such as MongoDB, Redis and others. It is a comprehensive data management service covering data management, structure management, user authorization, security auditing, trend analysis, and data tracing. DMS provides an easy-to-use portal for the centralized management of databases and servers to ensure more secure data, more efficient management and clearer data value.
- Secure Data Communication It helps hundreds of thousands of users manage a large number of database instances and provides security guarantees such as cloud account authorization and auditing.
- Support for Multiple Data Sources Unified support for multiple relational databases, OLAP databases, and NoSQL databases.
- Efficient R&D Provides a graphical interface for data management. Allows you to reuse SQL statements and save SQL windows.
- Visualized Data Analysis Supports data backtracking analysis for MySQL, PolarDB-MySQL database types for a specified period of time.
Convenient Data Management Operations
Visualized viewing and editing of data and table structure through a GUI.
Easy Table Management
You can edit tables using an Excel-like interface. No SQL coding is required to do CRUD (create, retrieve, update, delete) operations or perform analytical tasks.
Visualized Table Restructuring
The GUI is used to design table structure fields, indexes, extension properties and other content visually, and to submit and execute operations in one click. Table structure comparison can easily realize the consistency comparison of table structures between the source database and the target database, and can obtain difference scripts. Table structure synchronization and database cloning allow you to easily compare table structure consistency between the source database and the target database. You can synchronize the table structure to the target database with one click.
Frequently Used SQL Statements
SQL statements frequently used can be saved to DMS for reuse when managing other databases.
SQL Window Recovery
The SQL window you are working on is automatically saved in real time. The page can be restored to the SQL window with SQL statements you are editing before if refreshing or closing by mistake , so that you can continue to edit your code.
Data Import and Export
Easy import and export of database-level and table-level data, supporting SQL scripts and CSV file formats.
Visualized Management of Metadata
Efficient management of metadata.
Easily generate all table structures in the database with one click, brow online, and export to Word, Excel, PDF and other file formats.
Table Creation SQL and Table Structures Export
Export table creation statements of relational and OLAP databases as needed, which can be used to quickly create or build new environments. Export table structure dictionary information of relational and OLAP databases to Excel files as needed for project internal archiving.
Metadata Information Viewing & Retrieval
Support databases and tables global searching and detailed attributes viewing such as table fields and indexes in the database.
Data Security (exclusive to the Security Collaboration control mode)
Secure data access for enterprises in all aspects.
Unified Authorization Management
DMS supports multi-dimensional on-demand authorization of databases, tables, and fields. Enterprise employees no longer have access to database by account and passwords.
Controllable Data Retrieval
Fully support on-demand control of the number of rows returned for each query, the total number of rows queried per day, the total number of queries per day, the timeout for single query, and the maximum table size scanned in a single query.
Intelligent Data Desensitization
Support field naming and table data scanning for data classification definition, combined with field permissions for limited access control of sensitive data. Support the configuration of different desensitization algorithms for fields, effectively shielding key information.
Precise Operational Audits
Accurate logging of people, time, modules, behaviors, all aspects of the operation, which can be audited by the administrator at any time.
Customizable Security Rules
Each database instance can be customized with different security specifications, feasible syntax types, and different operations corresponding to different approval processes.
Change Stability (exclusive to the Security Collaboration control mode)
Guarantees the smooth implementation of every change of the enterprise in an all-round way to avoid database performance fluctuation.
Intelligent SQL Risk Audit
Before the code is tested, SQL text and XML files can be submitted for review to identify SQL injection, non-indexed SQL, and SQL that does not meet the writing specifications, so as to avoid production failures caused by such SQL.
Reliable Data and Structural Changes
Perform full access risk identification and control before, during, and after changes to avoid database performance jitter caused by changes. Provide unlocked table change ability for large amounts of MySQL data and large table structures to avoid locking tables during changes that affect business.
Accurate Data Rollback
Fully support binlog parsing and batch export of rollback scripts for MySQL-type databases, which can help enterprises quickly repair abnormal data.
Efficient Research and Development (exclusive to the Security Collaboration control mode)
Comprehensively improve R&D efficiency of enterprises and reduce the costs.
Efficient R & D Process
Support the definition of various operation specifications and trial processes at the instance level to ensure data security without losing R & D efficiency. For example, the operations in the test environment is exempted from review while strict approval is required in the production environment.
Global Database Management
Support unified management of multiple sources of databases, including cloud databases, ECS self-built databases, local IDC self-built databases, competitor cloud databases, and competitor cloud server self-built databases. Fully support relational databases, OLAP databases, NoSQL databases and other types of databases.
Convenient Cross-instance Query
Real-time association analysis of heterogeneous online databases can be easily completed through a single SQL statement. Currently, MySQL, AnalyticDB for MySQL, PolarDB, DRDS, SQL Server, PostgreSQL, and Redis are supported.
Easy-to-use Data Analysis
Support the scheduling and periodic scheduling management of SQL task nodes to facilitate the deployment and use of periodic tasks. Typical scenarios are data archiving, data migration to analytical databases, the periodic analysis in the analytical database generating reports such as daily, weekly and monthly reports and writing back to the online database to provide online services, etc.
Fully Support Unified Management of On-cloud and Off-cloud Resources
DMS provides an efficient, secure and comprehensive database development environment. The development design and performance diagnosis of more than 20 kinds of relational databases, data warehouses and NoSQL databases could be done with a GUI development environment. The DMS Security Collaboration control mode effectively protects data security through R & D specifications, R & D process, permission control, data desensitization, security audit and change rollback.
Unified Management of Cloud Resources
Support unified management of cloud databases and self-built databases of ECS servers across multiple regions and different cloud accounts.
Secure Non-cloud Resource Management
The on-premises IDC self-built databases, the competitor cloud databases, and the self-build databases on competitor cloud servers are reachable through the VPC leased line and the VPN gateway.
Continuous Database Access Management
Fully realize fine-grained permission control through query, export, change and other operations on instances, databases, tables, sensitive fields, data rows, etc. Effectively avoid database service exceptions and large amounts of data leakage by controlling the full table scan limit, query timeout, query number of rows, and query times of large tables. The operation logs are used to comprehensively record and present the operations of each cloud account in DMS, helping enterprises to achieve compliance audit support for each operation.
Limit Personnel Access of the Database
After logging on to DMS, permissions can be applied as needed. Therefore, operations will be sent to the database after initiation and authorization, personnel no longer use the database account and password.
Fine-grained Permission Management
Support on-demand application of database, table, field, and row-level data object operation permissions. Apply for query, export and change permissions according to different scenarios for related operations, which can be automatically recycled upon expiry, and rejected at source without permissions.
Data Security Assurance
The number of rows returned by each query, the total number of queries per day, and the total number of rows queried per day are controllable and auditable on demand to avoid the outflow of a large amount of data. Sensitive fields are marked on demand to avoid unnecessary data contact.
Data Query Performance Security
The query timeout and the full table scan threshold for large tables are configured on demand to avoid slow queries affecting the provision of database services.
Full Process Control Covering Data Changes, Structure Changes, Code Release
The table structure design specification in the project development process, the release of multiple environments in the development process, every SQL audit before online ensuring compliance with the index, every update of production data, are all related to the stable provision of business services. The DMS Security Collaboration control mode guarantees a smooth implementation before, during and after each change, and reduces every possible change failure.
Change Ability Without Table and Table Structure Locking
All DDL operations before MySQL5.6 and some operations after 5.6 cannot be changed without locking the table. Once the table is locked, it will directly affect the business. For historical data cleansing scenarios such as large batches, each business generally develops its own cleansing logic to avoid disrupting the business. While DMS solves the problem of wasted R&D and the difficulty of uniform management.
SQL Audit Preventing Bad SQL from Going Online
Before the code is tested, SQL text and XML files can be submitted for review to identify and deal with SQL injection, non-indexed SQL, and SQL that does not meet the writing specifications such as queries with non-specified field return and write non-specified fields, so as to avoid production failures caused by such bad SQL.
Change Stability Assurance
When the database is under high load, continuing to issue changes may cause the database to perform abnormally or even be unserviceable. Detection and protection before, during and after the change is the core guarantee for the smooth implementation of each change.
Data Tracing and Rollback
The DMS Security Collaboration control mode can easily manipulate million-class abnormal data recovery. It supports fast retrospective recovery of mastakenly updated data, which can effectively avoid erroneous data erasure and wrong update.
Unified Platform of Enterprise Metadata, Process Management and R&D Collaboration
Provides a brand new working model. Based on the unified management of database resources in the enterprise, all personnel operations that need to interact with the database can be done here. According to different businesses, different R & D specifications, R & D processes, and approval processes can be designed and implemented for the corresponding instances of the business to realize flexible and secure database R & D processes and build an enterprise-specific database DevOps processes.
Development of Table Structure Design Specification and Multi-environment Table Structure Consistency Release Process
Support four types of databases: MySQL, PolarDB-MySQL, DRDS, and OceanBase, and can formulate design specifications and release processes that are flexible to the instance level ensuring that the table structure between multiple environments is completely consistent and avoiding faults caused by inconsistency.
Field-level Concurrent Collaboration Management
Different projects or daily iterations of the same business may have adjustment requirements for different fields. Compared to the traditional solution, A update affects B, B update affects A. The DMS Security Collaboration control mode enables "structural design", which supports A and B to be managed in separate tasks in complete isolation, without interfering with each other, and can be scheduled according to their respective needs, and can be released in iterations without hindrance.
Instance-level Security Rules
For traditional database management solutions, strictness can lead to a large number of approval operations for controllers, which can lead to errors and omissions due to approval fatigue. While looseness can lead to changes for everyone, resulting in completely uncontrollable production stability. The DMS Security Collaboration control mode ensures both the safe use of the database and the R&D efficiency of the enterprise. Support on-demand customization of design specifications, operating specifications and approval processes according to different database instances.
New Working Mode
It is difficult to train a full-time DBA, but with DMS, managers without a database related technical background can be easily empowered to be like a professional DBA by product's default configuration. Research and development personnel submit operations on demand using the product, automatic detection will be done according to security rules, to ensure the approval process and the stable implementation of changes, significantly reduce personnel costs and can effectively improve the R&D efficiency of enterprises.
Comparison of main functions of DMS control modes
|Funcitions||Features||Control mode-Flexible Management||Control mode-Stable Change||Control mode-Security Collaboration|
|Data export||Maximum number of lines exported for free daily||200,000||10 million||Unlimited|
|Maximum number of tasks imported in parallel||1||Unlimited||Unlimited|
|Maximum number of tables exported simultaneously||100||50,000||Unlimited|
|Maximum capacity of tables exported simultaneously||10 GB||Unlimited||Unlimited|
|Task queue types||Global shared queue||Exclusive queue||Exclusive queue|
|Data import||Maximum size of files imported simultaneously||0.1GB||1 GB||Unlimited|
|Task queue types||Global shared queue||Exclusive queue||Exclusive queue|
|Use of SQL windows||Full Large Table Scan Restrictions|
|SQL query timeout and interruption|
|Limit on number of query rows per day|
|Limit on number of queries per day|
|Sensitive data marking and desensitization protection|
|Row-level data permission management|
|Frequently used SQL|
|Maximum number of lines returned for a single query||1,000||10,000||Customize on demand|
|Display of visualized data Query result|
|Intelligent SQL prompts|
|Test data is automatically generated||To be expanded|
|Search for multiple cases|
|Data analytics||Provides periodic task scheduling|
|Performance diagnosis & Optimization (session, trend, lock, space, slow SQL)|
|Table structure Management||Table Structure Comparison|
|Table structure editing|
|Table structure synchronization/database cloning|
|Data dictionary export||Up to five per instance||Unlimited||Unlimited|
|Design specifications of table structures|
|Table structure development process/table structure version management||RDS available for an exclusive account||RDS available for an exclusive account||Cross-Alibaba Cloud account, cross-RDS, and self-built|
|Code Generator (Templates like javaBean)|
|Data security||Authorization granularity of resources||Actual authority||Instance authorization + database account access||Requires database-, table-, field-, and row-level permissions|
|Authorization granularity of operations||Function authorization||Query, export, and change|
|Authorization period||On-demand definition and automatic retraction after permissions expire|
|Access method||Database account numbers and passwords||Database account numbers and passwords||Cloud account authentication (do not contact the database account password)|
|Access source IP||Globally enabled (office network access only)||Globally enabled (office network access only)|
|Operation audit||Refines operations in the module|
|R & D Efficiency||Collaborative R & D|
|The R & D process approval||Customizes on demand|
|Remains stable during changes||Risk identification before changes|
|Risk management measures after changes|
|Changing structures without locking the table|
|Changes data without locking the table|
|Data tracking & rollback||Binlog within 1 hour||Enables batch download without limit||Enables batch download without limit|
|SQL audit before code is released|
|Free of charge||USD $1.00/day||USD $2.00/day|
|Get Started Now||Buy Now||Buy Now|
Upgraded Support For You
1 on 1 Presale Consultation, 24/7 Technical Support, Faster Response, and More Tickets.