Parameter |
Description |
---|---|
Region |
Select a region for the cluster from the drop-down list on the right. Currently, only eu-de is supported. |
AZ |
Select an AZ associated with the cluster region. You can select one or more AZs. For details, see Multi-AZ HA. |
Parameter |
Description |
---|---|
Version |
Select a cluster version from the drop-down list box. |
Name |
Name of a cluster. Cluster names contain 4 to 32 characters. Only letters, numbers, hyphens (-), and underscores (_) are allowed and the value must start with a letter. NOTE:
After a cluster is created, you can modify the cluster name as required. Click the name of a cluster to be modified. On the displayed Basic Information page, click |
Parameter |
Description |
---|---|
Nodes |
Number of nodes in a cluster.
|
CPU Architecture |
Currently, x86 and Kunpeng are supported. The supported type is determined by the actual regional environment. |
Node Specifications |
Specifications of nodes in a cluster. You can select a specified specification based on your needs. Only one node specification can be selected for each cluster. You cannot select the CPU and memory resources that have been sold out. Currently, the following flavors are supported: css.medium.8, css.large.8, css.xlarge.8, css.2xlarge.8, and css.4xlarge.8. After you select a flavor, the CPU and memory corresponding to the current specification are displayed below the parameter. For example, if you select css.medium.8, then 1 vCPUs | 8 GB will be displayed, indicating that the node flavor you select contains one vCPU and 8 GB memory. |
Node Storage Type |
In the current version, the following options are available: Common I/O, High I/O, and Ultra-high I/O. |
Node Storage Capacity |
Storage space. Its value varies with node specifications.
|
Disk Encryption |
If you select this option, the nodes in the cluster you create will use encrypted EVS disks to protect data. By default, this option is not selected. Note that you cannot modify this setting after the cluster is created. Therefore, exercise caution when performing the setting. After you select this option, you need to select an available key from the Key Name drop-down list. If no key is available, click Create/View Key to go to the KMS management console and create or modify a key. For details, see Creating a CMK. Enabling disk encryption has no impact on your operations on a cluster (such as accessing the cluster and importing data to the cluster). However, after you enable disk encryption, operation performance deteriorates by about 10%. NOTE:
|
Master node |
The master node manages all nodes in the cluster. If 20 or more nodes are required to store and analyze the large amount of data, you are advised to enable the master node to ensure cluster stability. Otherwise, you are advised to set only the Nodes parameter and use the nodes as both master and client nodes.. After enabling the master node, specify Node Specifications, Nodes, and Node Storage Type. The value of Nodes must be an odd number equal to or greater than 3. You can set a maximum of nine nodes. The value of Node Storage Capacity is fixed. You can select a storage type based on your needs. By default, the node storage type is High I/O and the node storage capacity is 40 GB. |
Client node |
The client node allows clients to access clusters and analyze data. If more than 20 nodes are required to store and analyze a large amount of data, you are advised to enable the client node to ensure cluster stability. Otherwise, you are advised to set only the Nodes parameter and use the nodes as both master and client nodes.. After enabling the client node, specify Node Specifications, Nodes and Node Storage Type. The value of Nodes ranges from 1 to 32. The value of Node Storage Capacity is fixed. You can select a storage type based on your needs. By default, the node storage type is High I/O and the node storage capacity is 40 GB. |
Cold data node |
The cold data node is used to store historical data, for which query responses can be returned in minutes. If you do not quire a quick query response, store historical data on cold data nodes to reduce costs. After enabling cold data node, configure Node Specifications, Nodes, Node Storage Type, and Node Storage Capacity. The value of Nodes ranges from 1 to 32. Select Node Storage Type and Node Storage Capacity as requirement. After the cold data node is enabled, CSS automatically adds cold and hot tags to related nodes. |
Parameter |
Description |
---|---|
VPC |
A VPC is a secure, isolated, and logical network environment. Select the target VPC. Click View VPC to enter the VPC management console and view the created VPC names and IDs. If no VPC is available, create a VPC. NOTE:
The VPC must contain CIDRs. Otherwise, cluster creation will fail. By default, a VPC will contain CIDRs. |
Subnet |
A subnet provides dedicated network resources that are isolated from other networks, improving network security. Select the target subnet. You can access the VPC management console to view the names and IDs of the existing subnets in the VPC. |
Security Group |
A security group is a collection of access control rules for ECSs that have the same security protection requirements and are mutually trusted in a VPC. To view more details about the security group, click View Security Group. NOTE:
|
Security Mode |
Security mode is disabled. NOTE:
You can enable Security Mode only when you create a cluster. After a cluster is created, its security mode cannot be changed. |
When creating a CSS cluster, you can bind an enterprise project to the cluster if you have enabled enterprise project. You can select an enterprise project created by the current user from the drop-down list or click View Project Project to go to the Enterprise Project Management console and create a new project or view existing projects.
By default, the cluster snapshot function is enabled. If you do not need this function, you can disable Cluster Snapshot.
For details, see Managing Automatic Snapshot Creation.
Automatic Snapshot Creation
You can customize Snapshot Name Prefix, Backup Start Time, and Retention Period (days) as required.
Parameter |
Description |
---|---|
VPC Endpoint Service |
After enabling this function, you can obtain a private domain name for accessing the cluster in the same VPC. For details, see VPC Endpoint Service. |
Kibana Public Access |
Clusters in non-security mode cannot access Kibana through the Internet. |
Tag |
Adding tags to clusters can help you identify and manage your cluster resources. You can customize tags or use tags predefined by TMS. For details, see Managing Tags. |
If the cluster creation fails, create the cluster again.