Patent attributes
Method, computer program product, and computer system are provided. Traffic is collected against a NoSQL database by an activity collector. A database transaction log is periodically extracted and analyzed. The collected traffic and the analyzed database transaction log are input to building a knowledge base of database access patterns. Current traffic is captured and used to compute an activity threshold. Traffic is directed to a workload processor based on the activity threshold. Traffic is directed to an intensive insert/update/delete (IUD) processor in response to the activity threshold exceeding a configured threshold. A plurality of temporary shards is generated along with an adaptive key and adaptive index in the plurality of temporary shards. The intensive IUD processor traffic is re-directed to the plurality of temporary shards while the activity threshold exceeds the configured threshold.