Creating an HBase Cluster
You can centrally manage clusters with CloudTable. A cluster is necessary for using CloudTable. This section describes how to create a cluster on the CloudTable console.
Created HBase clusters can be accessed without passing Kerberos authentication. If you have requirements on cluster access security, you are advised to use the HBase component on MRS.
Prerequisites
- The VPC and security group of the cluster to be created must be the same as those of the ECS on the public network. Otherwise, the client cannot access the cluster.
- Before creating a cluster, you must configure inbound security group rules for the host. For details, see "Configuring Security Group Rules" in Elastic Cloud Server User Guide. For details about the security group port, see "Getting Started > Quickly Creating an HBase Cluster and Querying Offline Data > Adding a Security Group".
- Before creating a cluster, you must add the ICMP protocol to the security group rules so that you can view the status of each node by pinging the node IP address on the management plane. For details, see "Configuring Security Group Rules" in the Elastic Cloud Server User Guide.
Creating a Cluster
- Log in to the CloudTable management console.
- Select a region in the upper left corner.
- Click Create Cluster. The Create Cluster page is displayed.
- Configure basic cluster information by referring to the following table.
Table 1 Parameters Parameter
Description
Region
Working zone of the cluster.
AZ
Select the AZ associated with the cluster's region.
Billing Mode
Select Pay-per-use.
Table 2 Network configuration parameters Parameter
Description
Name
Name of a cluster.
The cluster name must consist of 4 to 32 characters and must begin with a letter. It may include only letters, digits, and hyphens (-) but must not contain any other special characters. Additionally, the cluster name is case-insensitive.
VPC
A VPC is a secure, isolated, and logical network environment.
You can select an existing VPC or click View VPC to create a new one.
For details about how to create a VPC, see in Virtual Private Cloud.
Subnet
A subnet provides dedicated network resources that are logically isolated from other networks, improving network security.
A subnet is automatically created when a VPC is created. If you want to create a subnet, you can refer to Virtual Private Cloud.
Security Group
A security group is used to control ECS access within a security group or between security groups by defining access rules. You can define different access control rules for a security group. These rules can specify which ECS ports or protocols are accessible and can be used to control inbound and outbound network traffic of VMs. After an ECS is added to the security group, it is protected by these access control rules. ECSs that do not belong to the security group cannot communicate with ECSs in the security group.
The underlying compute unit of a CloudTable cluster is ECS. In terms of security and stable service running, the ECSs must be added to the same security group in the same VPC. VPCs isolate networks and security groups specify which ports and protocols can be opened in the VPC.
You can use an existing security group or click View Security Group to create a new one.
For more information about security groups, see Security > Security Group > Security Group Overview in the Virtual Private Cloud User Guide.
Database Engine
Select the type of cluster to be created.
Table 3 Master node configuration Parameter
Description
Compute
Select proper compute specifications based on service requirements. Each specification displays the CPU, memory, and recommended application scenarios of a single node.
NOTE:- Available compute specifications:
- 4U16G
- 8U16G
- 8U32G
- 16U32G
- 16U64G
- 32U64G
- 32U128G
- 64U128G
Storage
Ultra-high I/O is recommended.
Nodes
Use the default value 2.
Table 4 Core node configuration Parameter
Description
Compute
Select proper compute specifications based on service requirements. Each specification displays the CPU, memory, and recommended application scenarios of a single node.
NOTE:- Available compute specifications:
- 4U16G
- 8U16G
- 8U32G
- 16U32G
- 16U64G
- 32U64G
- 32U128G
- 64U128G
Storage
Select the disk specifications and capacity of the HBase compute node.
NOTE:- Available storage specifications:
- Common I/O
- High I/O
- Ultra-high I/O
- The capacity ranges from 400 GB to 30,000 GB per node.
Nodes
Set the number of nodes in a cluster. The value ranges from 2 to 20.
Enable Security Channel
This is enabled by default. Enabling security channel may cause performance deterioration in a cluster.
Enable Thrift Server
This is disabled by default. You can enable this to ensure that HBase supports multi-language access.
Enterprise Project
You can group related cloud resources (for example, resources used for the same purpose) and manage them by enterprise project.
NOTE:- You can delete a user that was authorized to manage an enterprise project if the enterprise's business has changed and the user should not have the permissions to manage the enterprise project.
- You can delete a user or multiple users.
- After a user that was authorized to manage an enterprise project is deleted, the user cannot manage the enterprise project. If the user needs to manage the enterprise project, authorize the user to manage the enterprise project again.
- Available compute specifications:
- Click Next.
- Confirm the details of the order and click Submit. The cluster creation task is submitted successfully.
- Click Back to Cluster List to view the cluster status.
The cluster creation task takes some time. The initial status of the cluster is Creating. After the cluster is created, the cluster status changes to In service.
- Prerequisites
- Creating a Cluster