Advanced
Тема интерфейса

Creating a Doris Cluster

You can centrally manage clusters with CloudTable. A cluster is necessary for using CloudTable. This section describes how to create a cluster on the CloudTable console.

Prerequisites

  • The VPC and security group of the cluster to be created must be the same as those of the ECS on the public network. Otherwise, the client cannot access the cluster.
  • Before creating a cluster, you must configure inbound security group rules. For details, see "Configuring Security Group Rules" in the Elastic Cloud Server User Guide.
  • Before creating a cluster, you must add the ICMP protocol to the security group rules so that you can view the status of each node by pinging the node IP address on the management plane. For details, see "Configuring Security Group Rules" in the Elastic Cloud Server User Guide.

Procedure

  1. Log in to the CloudTable console.
  2. Select a region in the upper left corner.
  3. Click Buy Cluster in the upper right corner.
  4. Configure basic cluster information by referring to the following table.

    Table 1 Region

    Parameter

    Description

    Region

    Current working zone of the cluster.

    • Select the region for the cluster nodes to run.

    AZ

    Select the AZ associated with the cluster's region.

    Billing Mode

    Select Pay-per-use.

    Table 2 Cluster and network configuration

    Parameter

    Description

    Name

    Name of a cluster.

    The cluster name must consist of 4 to 32 characters and must begin with a letter. It may include only letters, digits, and hyphens (-) but must not contain any other special characters. Additionally, the cluster name is case-insensitive.

    VPC

    A Virtual Private Cloud (VPC) is a secure, isolated, logical network environment.

    Retain the default settings. If there is no available VPC, click View VPC to access the VPC console and create a VPC.

    Subnet

    Specify a VPC subnet.

    A subnet provides dedicated network resources that are isolated from other networks, improving network security.

    Security Group

    A security group is used to control ECS access within a security group or between security groups by defining access rules. You can define different access control rules for a security group. These rules can specify which ECS ports or protocols are accessible and can be used to control inbound and outbound network traffic of VMs. After an ECS is added to the security group, it is protected by these access control rules. ECSs that do not belong to the security group cannot communicate with ECSs in the security group.

    You can use an existing security group or click View Security Group to create a new one.

    For more information about security groups, see Security > Security Group > Security Group Overview.

    Database Engine

    Select the type of cluster to be created.

    Doris Kernel

    Engine version of the component.

    Figure 1 FE node configuration


    Table 3 FE node configuration parameters

    Parameter

    Description

    Compute

    Select proper compute specifications based on service requirements. Each specification displays the CPU, memory, and recommended application scenarios of a single node.

    NOTE:

    Available computing specifications:

    • 8U16G
    • 16U32G
    • 32U64G
    • 64U128G
    • 4U16G
    • 8U32G
    • 16U64G
    • 32U128G
    • 64U256G

    Storage

    Select the disk specifications and capacity of the Doris compute node.

    NOTE:
    • Available storage specifications:
      • High I/O
      • Ultra-high I/O
      • Extreme SSD
    • The capacity ranges from 200 GB to 2,000 GB per node.

    Nodes

    Specify the number of nodes in the cluster.

    You can add 3 to 5 FE nodes.

    Table 4 BE node configuration (EVS)

    Parameter

    Description

    Compute

    Select proper compute specifications based on service requirements. Each specification displays the CPU, memory, and recommended application scenarios of a single node.

    NOTE:

    Available computing specifications:

    • 4 vCPUs and 16 GB memory (It is advised to utilize this specification solely for functional testing purposes. For deployment in a production environment, a configuration with 8 vCPUs and 32 GB memory or higher is recommended.)
    • 8U16G
    • 16U32G
    • 32U64G
    • 64U128G
    • 8U32G
    • 16U64G
    • 32U128G
    • 64U256G

    Storage

    Select the disk specifications and capacity of the Doris compute node.

    NOTE:
    • Available storage specifications:
      • High I/O
      • Ultra-high I/O
      • Extreme SSD
    • The capacity ranges from 400 GB to 10,000 GB per node.

    Nodes

    Specify the number of nodes in the cluster.

    You can add 3 to 100 BE nodes.

    Table 5 Password setting parameters

    Parameter

    Description

    Enterprise Project

    You can group related cloud resources (for example, resources used for the same purpose) and manage them by enterprise project.

    NOTE:
    • You can delete a user that was authorized to manage an enterprise project if the enterprise's business has changed and the user should not have the permissions to manage the enterprise project.
    • You can delete a user or multiple users.
    • After a user that was authorized to manage an enterprise project is deleted, the user cannot manage the enterprise project. If the user needs to manage the enterprise project, authorize the user to manage the enterprise project again.

    Username

    Doris management user, which is used to connect to the Doris cluster. The default value is admin and cannot be changed.

    Password

    Set the password of the admin user.

    The password complexity requirements are as follows:

    • The password must contain 8 to 12 characters.
    • The password must contain at least four types of the following characters: uppercase and lowercase letters, digits, and special characters ($@!%*?&).
    • The password cannot be the same as the username or the username spelled backwards.
    • The strong and weak password check should be performed.
      NOTE:

      Change the password regularly and keep it secure.

    Confirm Password

    Enter the password of the admin user again for confirmation.

    Broker Process

    Whether to enable the Broker process, which is used to import data for customers. After the cluster is created, this process cannot be enabled.

    Enable Https

    Whether to enable HTTPS access channel encryption. The HTTPS port number is 8050.

    NOTE:
    • When HTTPS is enabled, only the MySQL 8.0 or later client can be used to connect to the cluster. The connection port is 9030. For details, see Connecting to a Doris Cluster.
    • The HTTPS option is enabled during cluster creation and cannot be disabled later.
    • If the HTTPS option is not enabled during cluster creation, it cannot be enabled later.

    Enable Interface Authentication

    After this function is enabled, account and password authentication needs to be added for REST APIs within the cluster. This may marginally impact performance.

    NOTE:
    • This parameter is displayed when Enable Https is toggled on.
    • After this option is enabled, you need to add account and password authentication when using REST APIs in the Doris cluster, such as APIs for modifying parameters and obtaining cluster monitoring data.

  5. Set the parameters and click Buy Now.
  6. On the displayed page, confirm the cluster specification order information and click Submit. The cluster creation task is submitted.
  7. Click Back to Cluster List to view the cluster status.

    The cluster creation task takes some time. The initial status of the cluster is Creating. After the cluster is created, the cluster status changes to In service.