Cache population

A threat intel cache as depicted in the diagram is populated in two steps. In the initial step, when the entire cache is empty, a bulk-load of data is performed into the cache to make it ready to serve the clients. Once the bulk load of data is in place, an incremental load is then performed. This incremental load could be based on date ranges or any other conditions. These sets of conditions are usually defined as a set of rules that the business service uses.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.19.59.0