Data management

Data Management (DMS) is a database research and development service platform developed by Alibaba. Based on more than 10 years of DBA operation and maintenance management experience, DMS was born as a visualized data management platform with unified management of multiple environmental sources, free of installation and maintenance, can help enterprises safeguard data access, ensure security of data change and improve the database research and development efficiency.

DMS supports unified management of multiple databases including relational databases such as MySQL, SQL Server, PostgreSQL, PolarDB, DRDS, OceanBase, Oracle and etc., data warehouse related databases such as AnalyticDB, Data Lake Analytics, ClickHouse and other OLAP databases, and NoSQL databases such as MongoDB, Redis and others. It is a comprehensive data management service covering data management, structure management, user authorization, security auditing, trend analysis, and data tracing. DMS provides an easy-to-use portal for the centralized management of databases and servers to ensure more secure data, more efficient management and clearer data value.

Benefits

Secure Data Communication
It helps hundreds of thousands of users manage a large number of database instances and provides security guarantees such as cloud account authorization and auditing.
Support for Multiple Data Sources
Unified support for multiple relational databases, OLAP databases, and NoSQL databases.
Efficient R&D
Provides a graphical interface for data management. Allows you to reuse SQL statements and save SQL windows.
Visualized Data Analysis
Supports data backtracking analysis for MySQL, PolarDB-MySQL database types for a specified period of time.

Features

Convenient Data Management Operations

Visualized viewing and editing of data and table structure through a GUI.

Easy Table Management

You can edit tables using an Excel-like interface. No SQL coding is required to do CRUD (create, retrieve, update, delete) operations or perform analytical tasks.

Visualized Table Restructuring

The GUI is used to design table structure fields, indexes, extension properties and other content visually, and to submit and execute operations in one click. Table structure comparison can easily realize the consistency comparison of table structures between the source database and the target database, and can obtain difference scripts. Table structure synchronization and database cloning allow you to easily compare table structure consistency between the source database and the target database. You can synchronize the table structure to the target database with one click.

Frequently Used SQL Statements

SQL statements frequently used can be saved to DMS for reuse when managing other databases.

SQL Window Recovery

The SQL window you are working on is automatically saved in real time. The page can be restored to the SQL window with SQL statements you are editing before if refreshing or closing by mistake , so that you can continue to edit your code.

Data Import and Export

Easy import and export of database-level and table-level data, supporting SQL scripts and CSV file formats.

Visualized Management of Metadata

Efficient management of metadata.

Document Generation

Easily generate all table structures in the database with one click, brow online, and export to Word, Excel, PDF and other file formats.

Table Creation SQL and Table Structures Export

Export table creation statements of relational and OLAP databases as needed, which can be used to quickly create or build new environments. Export table structure dictionary information of relational and OLAP databases to Excel files as needed for project internal archiving.

Metadata Information Viewing & Retrieval

Support databases and tables global searching and detailed attributes viewing such as table fields and indexes in the database.

Data Security (exclusive to the Security Collaboration control mode)

Secure data access for enterprises in all aspects.

Unified Authorization Management

DMS supports multi-dimensional on-demand authorization of databases, tables, and fields. Enterprise employees no longer have access to database by account and passwords.

Controllable Data Retrieval

Fully support on-demand control of the number of rows returned for each query, the total number of rows queried per day, the total number of queries per day, the timeout for single query, and the maximum table size scanned in a single query.

Intelligent Data Desensitization

Support field naming and table data scanning for data classification definition, combined with field permissions for limited access control of sensitive data. Support the configuration of different desensitization algorithms for fields, effectively shielding key information.

Precise Operational Audits

Accurate logging of people, time, modules, behaviors, all aspects of the operation, which can be audited by the administrator at any time.

Customizable Security Rules

Each database instance can be customized with different security specifications, feasible syntax types, and different operations corresponding to different approval processes.

Change Stability (exclusive to the Security Collaboration control mode)

Guarantees the smooth implementation of every change of the enterprise in an all-round way to avoid database performance fluctuation.

Intelligent SQL Risk Audit

Before the code is tested, SQL text and XML files can be submitted for review to identify SQL injection, non-indexed SQL, and SQL that does not meet the writing specifications, so as to avoid production failures caused by such SQL.

Reliable Data and Structural Changes

Perform full access risk identification and control before, during, and after changes to avoid database performance jitter caused by changes. Provide unlocked table change ability for large amounts of MySQL data and large table structures to avoid locking tables during changes that affect business.

Accurate Data Rollback

Fully support binlog parsing and batch export of rollback scripts for MySQL-type databases, which can help enterprises quickly repair abnormal data.

Efficient Research and Development (exclusive to the Security Collaboration control mode)

Comprehensively improve R&D efficiency of enterprises and reduce the costs.

Efficient R & D Process

Support the definition of various operation specifications and trial processes at the instance level to ensure data security without losing R & D efficiency. For example, the operations in the test environment is exempted from review while strict approval is required in the production environment.

Global Database Management

Support unified management of multiple sources of databases, including cloud databases, ECS self-built databases, local IDC self-built databases, competitor cloud databases, and competitor cloud server self-built databases. Fully support relational databases, OLAP databases, NoSQL databases and other types of databases.

Convenient Cross-instance Query

Real-time association analysis of heterogeneous online databases can be easily completed through a single SQL statement. Currently, MySQL, AnalyticDB for MySQL, PolarDB, DRDS, SQL Server, PostgreSQL, and Redis are supported.

Easy-to-use Data Analysis

Support the scheduling and periodic scheduling management of SQL task nodes to facilitate the deployment and use of periodic tasks. Typical scenarios are data archiving, data migration to analytical databases, the periodic analysis in the analytical database generating reports such as daily, weekly and monthly reports and writing back to the online database to provide online services, etc.

Typical Solutions

  • Unified Management Solution of Hybrid Cloud
  • Data Security Solutions
  • Change Stability Solutions
  • Database DevOps Solutions
Unified Management Solution of Hybrid Cloud

Fully Support Unified Management of On-cloud and Off-cloud Resources

DMS provides an efficient, secure and comprehensive database development environment. The development design and performance diagnosis of more than 20 kinds of relational databases, data warehouses and NoSQL databases could be done with a GUI development environment. The DMS Security Collaboration control mode effectively protects data security through R & D specifications, R & D process, permission control, data desensitization, security audit and change rollback.

Problems solved

  • Unified Management of Cloud Resources

    Support unified management of cloud databases and self-built databases of ECS servers across multiple regions and different cloud accounts.

  • Secure Non-cloud Resource Management

    The on-premises IDC self-built databases, the competitor cloud databases, and the self-build databases on competitor cloud servers are reachable through the VPC leased line and the VPN gateway.

Data Security Solutions

Continuous Database Access Management

Fully realize fine-grained permission control through query, export, change and other operations on instances, databases, tables, sensitive fields, data rows, etc. Effectively avoid database service exceptions and large amounts of data leakage by controlling the full table scan limit, query timeout, query number of rows, and query times of large tables. The operation logs are used to comprehensively record and present the operations of each cloud account in DMS, helping enterprises to achieve compliance audit support for each operation.

Problem solved

  • Limit Personnel Access of the Database

    After logging on to DMS, permissions can be applied as needed. Therefore, operations will be sent to the database after initiation and authorization, personnel no longer use the database account and password.

  • Fine-grained Permission Management

    Support on-demand application of database, table, field, and row-level data object operation permissions. Apply for query, export and change permissions according to different scenarios for related operations, which can be automatically recycled upon expiry, and rejected at source without permissions.

  • Data Security Assurance

    The number of rows returned by each query, the total number of queries per day, and the total number of rows queried per day are controllable and auditable on demand to avoid the outflow of a large amount of data. Sensitive fields are marked on demand to avoid unnecessary data contact.

  • Data Query Performance Security

    The query timeout and the full table scan threshold for large tables are configured on demand to avoid slow queries affecting the provision of database services.

Change Stability Solutions

Full Process Control Covering Data Changes, Structure Changes, Code Release

The table structure design specification in the project development process, the release of multiple environments in the development process, every SQL audit before online ensuring compliance with the index, every update of production data, are all related to the stable provision of business services. The DMS Security Collaboration control mode guarantees a smooth implementation before, during and after each change, and reduces every possible change failure.

Problem solved

  • Change Ability Without Table and Table Structure Locking

    All DDL operations before MySQL5.6 and some operations after 5.6 cannot be changed without locking the table. Once the table is locked, it will directly affect the business. For historical data cleansing scenarios such as large batches, each business generally develops its own cleansing logic to avoid disrupting the business. While DMS solves the problem of wasted R&D and the difficulty of uniform management.

  • SQL Audit Preventing Bad SQL from Going Online

    Before the code is tested, SQL text and XML files can be submitted for review to identify and deal with SQL injection, non-indexed SQL, and SQL that does not meet the writing specifications such as queries with non-specified field return and write non-specified fields, so as to avoid production failures caused by such bad SQL.

  • Change Stability Assurance

    When the database is under high load, continuing to issue changes may cause the database to perform abnormally or even be unserviceable. Detection and protection before, during and after the change is the core guarantee for the smooth implementation of each change.

  • Data Tracing and Rollback

    The DMS Security Collaboration control mode can easily manipulate million-class abnormal data recovery. It supports fast retrospective recovery of mastakenly updated data, which can effectively avoid erroneous data erasure and wrong update.

Database DevOps Solutions

Unified Platform of Enterprise Metadata, Process Management and R&D Collaboration

Provides a brand new working model. Based on the unified management of database resources in the enterprise, all personnel operations that need to interact with the database can be done here. According to different businesses, different R & D specifications, R & D processes, and approval processes can be designed and implemented for the corresponding instances of the business to realize flexible and secure database R & D processes and build an enterprise-specific database DevOps processes.

Problem solved

  • Development of Table Structure Design Specification and Multi-environment Table Structure Consistency Release Process

    Support four types of databases: MySQL, PolarDB-MySQL, DRDS, and OceanBase, and can formulate design specifications and release processes that are flexible to the instance level ensuring that the table structure between multiple environments is completely consistent and avoiding faults caused by inconsistency.

  • Field-level Concurrent Collaboration Management

    Different projects or daily iterations of the same business may have adjustment requirements for different fields. Compared to the traditional solution, A update affects B, B update affects A. The DMS Security Collaboration control mode enables "structural design", which supports A and B to be managed in separate tasks in complete isolation, without interfering with each other, and can be scheduled according to their respective needs, and can be released in iterations without hindrance.

  • Instance-level Security Rules

    For traditional database management solutions, strictness can lead to a large number of approval operations for controllers, which can lead to errors and omissions due to approval fatigue. While looseness can lead to changes for everyone, resulting in completely uncontrollable production stability. The DMS Security Collaboration control mode ensures both the safe use of the database and the R&D efficiency of the enterprise. Support on-demand customization of design specifications, operating specifications and approval processes according to different database instances.

  • New Working Mode

    It is difficult to train a full-time DBA, but with DMS, managers without a database related technical background can be easily empowered to be like a professional DBA by product's default configuration. Research and development personnel submit operations on demand using the product, automatic detection will be done according to security rules, to ensure the approval process and the stable implementation of changes, significantly reduce personnel costs and can effectively improve the R&D efficiency of enterprises.

Quick Start

10-minute On-cloud Deployment of projects

Learn more>
Products

See more Alibaba Cloud products

Learn more>
Developer Resources

APIs & SDKs for developers

Learn more>

Comparison of main functions of DMS control modes

Funcitions Features Control mode-Flexible Management Control mode-Stable Change Control mode-Security Collaboration
Data export Maximum number of lines exported for free daily 200,000 10 million Unlimited
Maximum number of tasks imported in parallel 1 Unlimited Unlimited
Maximum number of tables exported simultaneously 100 50,000 Unlimited
Maximum capacity of tables exported simultaneously 10 GB Unlimited Unlimited
Task queue types Global shared queue Exclusive queue Exclusive queue
Data import Maximum size of files imported simultaneously 0.1GB 1 GB Unlimited
Task queue types Global shared queue Exclusive queue Exclusive queue
Use of SQL windows Full Large Table Scan Restrictions
SQL query timeout and interruption
Limit on number of query rows per day
Limit on number of queries per day
Sensitive data marking and desensitization protection
Row-level data permission management
Frequently used SQL
Maximum number of lines returned for a single query 1,000 10,000 Customize on demand
Display of visualized data Query result
SQL formatting
Intelligent SQL prompts
Test data is automatically generated To be expanded
Search for multiple cases
Data analytics Provides periodic task scheduling
Performance diagnosis & Optimization (session, trend, lock, space, slow SQL)
Table structure Management Table Structure Comparison
Table structure editing
Table structure synchronization/database cloning
Data dictionary export Up to five per instance Unlimited Unlimited
Design specifications of table structures
Table structure development process/table structure version management RDS available for an exclusive account RDS available for an exclusive account Cross-Alibaba Cloud account, cross-RDS, and self-built
Code Generator (Templates like javaBean)
Data security Authorization granularity of resources Actual authority Instance authorization + database account access Requires database-, table-, field-, and row-level permissions
Authorization granularity of operations Function authorization Query, export, and change
Authorization period On-demand definition and automatic retraction after permissions expire
Access method Database account numbers and passwords Database account numbers and passwords Cloud account authentication (do not contact the database account password)
Access source IP Globally enabled (office network access only) Globally enabled (office network access only)
Operation audit Refines operations in the module
R & D Efficiency Collaborative R & D
The R & D process approval Customizes on demand
Remains stable during changes Risk identification before changes
Risk management measures after changes
Changing structures without locking the table
Changes data without locking the table
Data tracking & rollback Binlog within 1 hour Enables batch download without limit Enables batch download without limit
SQL audit before code is released
Free of charge USD $1.00/day USD $2.00/day
Get Started Now Buy Now Buy Now

Upgraded Support For You

1 on 1 Presale Consultation, 24/7 Technical Support, Faster Response, and More Tickets.

1 on 1 Presale Consultation

Consulting by experienced cloud experts.Learn More

24/7 Technical Support

Extended service time from 10 hours 5 days a week to 24/7. Learn More

6 Free Tickets per Quarter

The number of free tickets doubled from 3 to 6 per quarter. Learn More

Faster Response

Shorten after-sale response time from 36 hours to 18 hours. Learn More