This topic describes how to create an OpenSearch cluster. You can create an OpenSearch cluster in either of the following ways:
Table 1 lists key parameters that differentiate between different types of clusters.
Cluster Type | Security Mode | HTTPS Access | Internet Access | OpenSearch Dashboards Public Network Access |
|---|---|---|---|---|
Cluster with the security mode disabled | Disabled | N/A | Cannot be enabled | Cannot be enabled |
Cluster in security mode + HTTP | Enabled | Disabled | Cannot be enabled | Can be enabled |
Cluster in security mode + HTTPS | Enabled | Enabled | Can be enabled | Can be enabled |
You have planned the OpenSearch cluster configuration by following the instructions in OpenSearch Cluster Planning Suggestions.
Alternatively, choose Clusters > OpenSearch in the navigation tree on the left. Click Create Cluster in the upper right corner. The Create Cluster page is displayed.
Parameter | Description |
|---|---|
Region | Select the region where the cluster is located. ECSs in different regions cannot communicate with each other over an intranet. For lower network latency and quicker resource access, select the nearest region. |
AZ | Select one or more AZs associated with the cluster region. A maximum of three AZs can be configured. For details about the use of multiple AZs, see Suggestions on Multi-AZ Deployment. |
Type | Choose OpenSearch. |
Version | Select a cluster version from the drop-down list. |
Name | User-defined cluster name. The cluster name must start with a letter and can contain 4 to 32 characters. Only letters, digits, hyphens (-), and underscores (_) are allowed. |
Cluster Description | Add a description for the cluster for easy recognition. The value can contain 0 to 128 characters. |
Nodes | Number of nodes in the cluster. Select a number from 1 to 32. You are advised to configure at least three nodes to ensure cluster availability.
NOTE: If the number of data nodes in a cluster is not evenly divisible by the number of AZs, data in the cluster may be unevenly distributed, affecting data query or write performance. |
CPU Architecture | x86. The supported types depend on the actual regional environment. |
Node Specifications | Data node flavor. You can select a specified specification based on your needs. Each cluster supports only one specification. |
Node Storage Type | If you select EVS for node storage, you need to further select the EVS disk type for data nodes of the cluster. Options include Common I/O, High I/O, Ultra-high I/O. |
Node Storage Capacity | Data node storage capacity. Its value range varies with node specifications. The node storage capacity must be a multiple of 20. |
Master node | The master node is responsible for important cluster management tasks, such as metadata management, index creation and deletion, and shard allocation. It plays a critical role in metadata management, node management, stability guarantee, and cluster operation control for large-scale clusters. After enabling the master node, specify Node Specifications, Nodes, and Node Storage Type. The value of Nodes must be an odd number greater than or equal to 3. Up to nine nodes are supported. The value of Node Storage Capacity is fixed. You can select a storage type based on your needs. |
Client node | Client nodes receive and coordinate external requests, such as search and write requests. They play an important role in handling high-load queries, complex aggregations, managing a large number of shards, and improving cluster scalability. After enabling the client node, specify Node Specifications, Nodes and Node Storage Type. The value of Nodes ranges from 1 to 32. The value of Node Storage Capacity is fixed. You can select a storage type based on your needs. |
Cold data node | Cold data nodes are used to store query latency-insensitive data in large quantities. They offer an effective way to manage large datasets and cut storage costs. After enabling cold data nodes, configure Node Specifications, Nodes, Node Storage Type, and Node Storage Capacity. The value of Nodes ranges from 1 to 32. Select Node Storage Type and Node Storage Capacity as required. When cold data nodes are enabled, you can switch between cold and hot data nodes. For details, see Switching Between Hot and Cold Storage for an OpenSearch Cluster. NOTE: If the number of cold data nodes in a cluster is not evenly divisible by the number of AZs, data in the cluster may be unevenly distributed, affecting data query or write performance. |
Enterprise Project | When creating a CSS cluster, you can bind an enterprise project to the cluster if you have enabled the enterprise project function. Select an enterprise project from the Enterprise Project drop-down list, or click View Enterprise Project to go to the Enterprise Project Management Service page and check existing enterprise projects. |
Parameter | Description |
|---|---|
VPC | Specify a VPC to isolate the cluster's network. Click View VPC to go to the VPC management console and check the created VPCs. If no VPC is available, contact the CSS administrator to create a new VPC. For details, see section "Creating a VPC and Subnet" in VPC User Guide. NOTE: The VPC must contain CIDRs. Otherwise, cluster creation will fail. By default, a created VPC contains CIDRs. |
Subnet | A subnet provides dedicated network resources that are isolated from other networks, improving network security. Select a subnet needed by the cluster in the current VPC. |
Security Group | A security group serves as a virtual firewall that provides access control policies for clusters. Select a security group for the cluster. Click View Security Group to go to the security group list, where you can view details about security groups. NOTE: Ensure that Port Range/ICMP Type is set to a port range that includes port 9200 for the selected security group. |
Security Mode | Whether to enable the security mode for the cluster.
|
HTTPS Access | HTTPS access can be enabled only when security mode is enabled for the cluster. With HTTPS access enabled, communication will be encrypted when you access the cluster. If the OpenSearch cluster version is 2.x or later, HTTPS is enabled by default and cannot be disabled when the security mode is enabled. NOTE: Compared with a non-security mode cluster that uses HTTP, a security-mode cluster that uses HTTPS has lower read performance. The performance loss is estimated at around 20% under high concurrency. If you want fast read performance as well as the isolation and permission control (such as indexes, documents, and fields) enabled by the security mode, you can disable HTTPS Access. After HTTPS Access is disabled, HTTP protocol is used for cluster communication. In this case, data security cannot be ensured and public IP address cannot be used. |
Public IP Address | This parameter is available only when Security Mode and HTTPS Access are enabled. When Public IP Address is enabled, a public IP address is automatically assigned, which will enable access to the security cluster from the Internet. For details, see Configuring Public Network Access for an OpenSearch Cluster. |
Cluster snapshots are disabled by default. To enable them, toggle on Cluster Snapshots. To store snapshots automatically created in OBS, an agency will need to be created in order to access OBS. Fees will be incurred for using standard OBS storage.
Parameter | Description |
|---|---|
OBS Bucket | From the drop-down list, select an OBS bucket for storing snapshots. You can also click Create Bucket on the right to create a new OBS bucket. The newly created or existing OBS bucket must meet the following requirements:
|
Backup Path | Storage path of the snapshot in the OBS bucket. The backup path cannot:
CAUTION: Only standard OBS storage can be used to store snapshots. Do not apply OBS lifecycle rules to the backup path. |
Maximum Backup Rate (per Second) | The parameter sets the maximum backup rate per node. When it is exceeded, flow control is triggered to prevent excessive resource usage and ensure system stability. The actual backup rate may not reach the configured value, as it depends on factors such as OBS performance and disk I/O. Value format: number + unit
Default value: 40 MB The value 0MB means there is no limit on how fast data is backed up to snapshots. An overly high backup rate may lead to excessive resource usage, which may impact cluster stability. Configure this parameter carefully to maintain optimal performance. |
Maximum Recovery Rate (per Second) | The parameter sets the maximum recovery rate per node. When it is exceeded, flow control is triggered to prevent excessive resource usage and ensure system stability. The actual recovery rate may not reach the configured value, as it depends on factors such as OBS performance and disk I/O. Value format: number + unit
The default value is 0MB, indicating no limit. An overly high recovery rate may lead to excessive resource usage, which may impact cluster stability. Configure this parameter carefully to maintain optimal performance. For OpenSearch clusters, the recovery rate is also limited by the indices.recovery.max_bytes_per_sec parameter.
NOTE:
|
IAM Agency | IAM agency authorized by the current account for CSS to access or maintain data stored in OBS. If no agency is available, contact the CSS administrator to create one. The selected IAM agency must meet the following requirements:
WARNING: The agency name can contain only letters (case-sensitive), digits, underscores (_), and hyphens (-). Otherwise, the backup will fail. |
Parameter | Description |
|---|---|
Snapshot Name Prefix | The snapshot name prefix contains 1 to 32 characters and must start with a lowercase letter. Only lowercase letters, digits, hyphens (-), and underscores (_) are allowed. A snapshot name consists of a snapshot name prefix and a timestamp, for example, snapshot-1566921603720. |
Time Zone | Time zone for the backup time. Specify Backup Started Time based on the time zone. |
Backup Start Time | Specify the start time of auto backup. Select a time from the drop-down list. The interval can be Daily, Hourly, or weekly (by selecting a specific day of the week), and the backup time can be set to any hour from 00:00 to 23:00 (full hours only). |
VPC Endpoint
VPC Endpoint enables you to access resources across Virtual Private Clouds (VPCs) using a dedicated gateway, without exposing the network information of servers. When VPC Endpoint is enabled, a VPC endpoint will be created by default. You can select Create Private Domain Name if necessary. Users will be able to access this cluster across VPCs through node IP addresses or a private domain name.
Parameter | Description |
|---|---|
Create Private Domain Name | If Create Private Domain Name is selected, the system generates a node IP address and also automatically creates a private domain name, which enables users to access this cluster from within the same VPC. If it is not selected, only a node IP address is generated. |
VPC Endpoint Whitelist | In VPC Endpoint Whitelist, you can add accounts that are allowed to access the cluster using a node IP address or private domain name.
NOTE: To obtain your authorized account ID, point to your username in the upper right corner, and choose My Credentials. Copy the value of Account ID. |
OpenSearch Dashboards Public Network Access
This parameter is available only when the security mode is enabled for the cluster. By enabling this option, you can obtain a public IP address for accessing OpenSearch Dashboards.
Parameter | Description |
|---|---|
Bandwidth | Bandwidth for accessing Kibana through a public IP address. Value range: 1 to 100 Unit: Mbit/s |
Access Control | If you disable this function, all IP addresses can access OpenSearch Dashboards from the public network. If you enable this function, only IP addresses or IP address ranges that are on the whitelist can access OpenSearch Dashboards through from the public network. |
Whitelist | IP addresses or IP address ranges that are allowed to access the cluster from the public network. Use commas (,) to separate different values. This parameter can be configured only when Access Control is enabled. You are advised to enable the whitelist. NOTE: The whitelist that controls OpenSearch Dashboards public network access depends on whitelist support by the ELB service. After you update the whitelist, the new settings take effect immediately for new connections. For existing persistent connections using the IP addresses that have been removed from the whitelist, the new settings take effect in approximately 1 minute after these connections are disconnected. |
If cluster creation fails, try creating the cluster again by rectifying the errors returned.