gds

Context

gds is used to import and export data of GaussDB(DWS). For details, see "Importing Data" and "Exporting Data" in the Developer Guide.

Syntax

gds [ OPTION ] -d DIRECTORY

The -d and -H parameters are mandatory and option is optional. gds provides the file data of DIRECTORY for GaussDB(DWS) to access.

Before starting GDS, you need to ensure that your GDS version is consistent with the database version. Otherwise, the database will display an error message and terminate the import and export operations. You can view the specific version through the -V parameter.

Parameter Description

Examples

Data file is saved in the /data directory, the IP address is 192.168.0.90, and the listening port number is 5000.

gds -d /data/ -p 192.168.0.90:5000 -H 10.10.0.1/24 

Data file is saved in the subdirectory of the /data directory, the IP address is 192.168.0.90, and the listening port number is 5000.

gds -d /data/ -p 192.168.0.90:5000 -H 10.10.0.1/24 -r

Data file is saved in the /data directory, the IP address is 192.168.0.90, and the listening port number is 5000 which is running on the backend. The log file is saved in the /log/gds_log.txt file, and the specified number of the concurrently imported working threads is 32.

gds -d /data/ -p 192.168.0.90:5000 -H 10.10.0.1/24 -l /log/gds_log.txt -D  -t 32

Data file is saved in the /data directory, the IP address is 192.168.0.90, and the listening port number is 5000. Only the IP address of 10.10.0.* can be connected.

gds -d /data/ -p 192.168.0.90:5000 -H 10.10.0.1/24

Data files are stored in the /data/ directory, the IP address of the directory is 192.168.0.90, and the listening port number is 5000. Only the node whose IP address is 10.10.0.* can be connected to. The node communicates with the cluster using the SSL authentication mode, and the certificate files are stored in the /certfiles/ directory.

gds -d /data/ -p 192.168.0.90:5000 -H 10.10.0.1/24 --enable-ssl --ssl-dir /certfiles/
  • One GDS provides the import and export services for one cluster only at a time.
  • For security purpose, specify the IP address and the listening port through -p.
  • The certificate file includes the root certificate cacert.pem, level-2 certificate file client.crt, and private key file client.key.
  • The password protection files client.key.rand and client.key.cipher are used when the system loading certificates.