Creating a Custom Cluster
The first step of using MRS is to create a cluster. This section describes how to create a cluster on the Custom Config tab of the MRS management console.
You can create an IAM user or user group on the IAM management console and grant it specific operation permissions, to perform refined resource management after registering an account. For details, see Creating an MRS User.
- Log in to the MRS console.
- Click Create Cluster. The page for creating a cluster is displayed.
When creating a cluster, pay attention to quota notification. If a resource quota is insufficient, increase the resource quota as prompted and create a cluster.
- Click the Custom Config tab.
- Configure cluster information by referring to Software Configurations and click Next.
- Configure cluster information by referring to Hardware Configurations and click Next.
- Set advanced options by referring to (Optional) Advanced Configuration and click Create Now.
If Kerberos authentication is enabled for a cluster, check whether Kerberos authentication is required. If yes, click Continue. If no, click Back to disable Kerberos authentication and then create a cluster.
- Click Back to Cluster List to view the cluster status.
For details about cluster status during creation, see the description of the status parameters in Table 1.
It takes some time to create a cluster. The initial status of the cluster is Starting. After the cluster has been created successfully, the cluster status becomes Running.
On the MRS management console, a maximum of 10 clusters can be concurrently created, and a maximum of 100 clusters can be managed.
Software Configurations
Parameter |
Description |
---|---|
Region |
Select a region. Cloud service products in different regions cannot communicate with each other over an intranet. For low network latency and quick access, select the nearest region. |
Cluster Name |
The cluster name must be unique. A cluster name can contain 1 to 64 characters. Only letters, digits, hyphens (-), and underscores (_) are allowed. The default name is mrs_xxxx. xxxx is a random collection of letters and digits. |
Cluster Version |
Currently, MRS 1.8.9, 2.0.1, 3.1.0-LTS.1, 3.1.2-LTS.3, and 3.2.0-LTS.1 are supported. |
Cluster Type |
The cluster types are as follows:
NOTE:
|
Components |
MRS components are as follows..
Components of an analysis cluster:
Components of a streaming cluster:
|
Hardware Configurations
Parameter |
Description |
---|---|
Cross-AZ Deployment This parameter is available in MRS 3.1.0-LTS.1 or later. |
MRS supports cross-AZ cluster deployment. When an AZ is faulty, other AZs can still provide services, implementing powerful DR capabilities and ensuring stable running of the customer's system. To use this function, contact technical support. When this function is enabled and all components are deployed in the cluster, the memory of the Master node must be at least 64 GB.
|
AZ |
Select the AZ associated with the region of the cluster. An AZ is a physical area that uses independent power and network resources. AZs are physically isolated but interconnected through the internal network. This improves the availability of applications. You are advised to create clusters in different AZs. |
VPC |
A VPC is a secure, isolated, and logical network environment. Select the VPC for which you want to create a cluster and click View VPC to view the name and ID of the VPC. If no VPC is available, create one. |
Subnet |
A subnet provides dedicated network resources that are isolated from other networks, improving network security. Select the subnet for which you want to create a cluster. Click View Subnet to view details about the selected subnet. If no subnet is created in the VPC, go to the VPC console and choose Subnets > Create Subnet to create one. For details about how to configure network ACL outbound rules, see How Do I Configure a Network ACL Outbound Rule?
NOTE:
The number of IP addresses required by creating an MRS cluster depends on the number of cluster nodes and selected components, but not the cluster type. In MRS, IP addresses are automatically assigned to clusters during cluster creation basically based on the following formula: Quantity of IP addresses = Number of cluster nodes + 2 (one for Manager; one for the DB). In addition, if the Hadoop, Hue, Sqoop, and Presto or Loader and Presto components are selected during cluster deployment, one IP address is added for each component. To create a ClickHouse cluster independently, the number of IP addresses required is calculated as follows: Number of IP addresses = Number of cluster nodes + 1 (for Manager). |
Security Group |
A security group is a set of ECS access rules. It provides access policies for ECSs that have the same security protection requirements and are mutually trusted in a VPC. When you create a cluster, you can select Auto create from the drop-down list of Security Group to create a security group or select an existing security group.
NOTE:
When you select a security group created by yourself, ensure that the inbound rule contains a rule in which Protocol is set to All, Port is set to All, and Source is set to a trusted accessible IP address range. Do not use 0.0.0.0/0 as a source address. Otherwise, security risks may occur. If you do not know the trusted accessible IP address range, select Auto create. |
EIP |
After binding an EIP to an MRS cluster, you can use the EIP to access the Manager web UI of the cluster. When creating a cluster, you can select an available EIP from the drop-down list and bind it. If no EIP is available in the drop-down list, click Manage EIP to access the EIPs service page to create one.
NOTE:
This parameter is valid only in MRS 1.8.0 or later. The EIP must be in the same region as the cluster. |
Enterprise Project |
Select the enterprise project to which the cluster belongs. To use an enterprise project, create one on the Enterprise > Project Management page. The Enterprise Management console of the enterprise project is designed for resource management. It helps enterprises manage cloud-based personnel, resources, permissions, and finance in a hierarchical manner, such as management of companies, departments, and projects. |
Parameter |
Description |
---|---|
CPU Architecture |
CPU architecture supported by MRS. This parameter is available in MRS 3.2.0-LTS.1 or later. x86: The x86-based CPU architecture uses Complex Instruction Set Computing (CISC). Each instruction can be used to execute low-level hardware operations. The number of instructions is large, and the length of each instruction is different. Therefore, executing such an instruction is complex and time-consuming.
|
Common Template |
This parameter is valid only when Cluster Type is set to Custom. For details, see Custom Cluster Template Description. |
Node Type |
MRS provides three types of nodes:
|
Instance Specifications |
Instance specifications of Master or Core nodes. MRS supports host specifications determined by CPU, memory, and disk space. Click to configure the instance specifications, system disk, and data disk parameters of the cluster node.
NOTE:
|
System Disk |
Storage type and storage space of the system disk on a node.
Storage type can be any of the following:
|
Data Disk |
Data disk storage space of a node. To increase data storage capacity, you can add disks at the same time when creating a cluster. The following two application scenarios are involved.
The storage type can be any of the following:
NOTE:
More nodes in a cluster require higher disk capacity of Master nodes. To ensure stable cluster running, set the disk capacity of the Master node to over 600 GB if the number of nodes is 300 and increase it to over 1 TB if the number of nodes reaches 500. |
Instance Count |
Number of Master and Core nodes. For Master nodes:
At least one Core node must exist and the total number of Core and Task nodes cannot exceed 500. Task: Click to add a Task node. Click to modify the instance specifications and disk configuration of a Task node. Click to delete the added Task node.
NOTE:
|
Topology Adjustment |
If the deployment mode in the Common Node does not meet the requirements, set Topology Adjustment to Enable and adjust the instance deployment mode based on service requirements. For details, see Topology Adjustment for a Custom Cluster. This parameter is valid only when Cluster Type is set to Custom. |
(Optional) Advanced Configuration
Parameter |
Description |
---|---|
Tag |
For details, see Adding a Tag to a Cluster. |
Hostname Prefix |
Enter the prefix for the computer hostname of an ECS in the cluster. |
Auto Scaling |
Auto scaling can be configured only after you specify Task node specifications in the Configure Hardware step. For details about how to configure Task node specifications, see Configuring Auto Scaling Rules. |
Bootstrap Action |
For details, see Adding a Bootstrap Action. This parameter is not available in MRS 3.x. |
Agency |
By binding an agency, ECSs or BMSs can manage some of your resources. Determine whether to configure an agency based on the actual service scenario. For example, you can configure an agency of the ECS type to automatically obtain the AK/SK to access OBS. For details, see Configuring a Storage-Compute Decoupled Cluster (Agency). The MRS_ECS_DEFAULT_AGENCY agency has the OBSOperateAccess permission of OBS and the CESFullAccess (for users who have enabled fine-grained policies), CES Administrator, and KMS Administrator permissions in the region where the cluster is located. |
Metric Sharing |
Monitoring metrics of big data components are collected. If a fault occurs when you use a cluster, share the monitoring metrics with technical support for troubleshooting. This parameter is not available in MRS 3.x. |
OBS Permission Control |
Users who have enabled fine-grained permission control can use this function to grant permissions on different directories in OBS file systems to different MRS users. For details, see Configuring Fine-Grained Permissions for MRS Multi-User Access to OBS. This parameter is not available in MRS 3.x. |
Data Disk Encryption |
Whether to encrypt data in the data disk mounted to the cluster. This function is disabled by default. To use this function, you must have the Security Administrator and KMS Administrator permissions. This parameter is not available in MRS 3.x. Keys used by encrypted data disks are provided by the Key Management Service (KMS) of the Data Encryption Workshop (DEW), secure and convenient. Therefore, you do not need to establish and maintain the key management infrastructure. Click Data Disk Encryption to enable or disable the data disk encryption function. |
Key ID |
This parameter is displayed only when the Data Disk Encryption function is enabled. This parameter indicates the key ID corresponding to the selected key name. This parameter is not available in MRS 3.x. |
Key Name |
This parameter is mandatory when the Data Disk Encryption function is enabled. Select the name of the key used to encrypt the data disk. By default, the default master key named evs/default is selected. You can select another master key from the drop-down list. This parameter is not available in MRS 3.x. If disks are encrypted using a CMK, which is then disabled or scheduled for deletion, the disks can no longer be read from or written to, and data on these disks may never be restored. Exercise caution when performing this operation. Click View Key List to enter a page where you can create and manage keys. |
Alarm |
If the alarm function is enabled, the cluster maintenance personnel can be notified in a timely manner to locate faults when the cluster runs abnormally or the system is faulty. |
Rule Name |
Name of the rule for sending alarm messages. The value can contain only digits, letters, hyphens (-), and underscores (_). |
Topic Name |
Select an existing topic or click Create Topic to create a topic. To deliver messages published to a topic, you need to add a subscriber to the topic. For details, see Adding Subscriptions to a Topic. A topic serves as a message sending channel, where publishers and subscribers can interact with each other. |
Kerberos Authentication |
Whether to enable Kerberos authentication when logging in to Manager.
|
Username |
Name of the administrator of Manager. admin is used by default. |
Password |
Password of the Manager administrator The following requirements must be met:
Password Strength: The colorbar in red, orange, and green indicates weak, medium, and strong password, respectively. |
Confirm Password |
Enter the password of the Manager administrator again. |
Key Pair |
Key pairs are used to log in to ECS nodes of the cluster. Select a key pair from the drop-down list. Select "I acknowledge that I have obtained private key file SSHkey-xxx and that without this file I will not be able to log in to my ECS." If you have never created a key pair, click View Key Pair to create or import a key pair. And then, obtain a private key file. A key pair, also called an SSH key, consists of a public key and a private key. You can create an SSH key and download the private key for authenticating remote login. For security, a private key can only be downloaded once. Keep it secure. Use an SSH key in either of the following two methods:
|
Secure Communications |
MRS clusters provision, manage, and use big data components through the management console. Big data components are deployed in a user's VPC. If the MRS management console needs to directly access big data components deployed in the user's VPC, you need to enable the corresponding security group rules after you have obtained user authorization. This authorization process is called secure communications. For details, see Communication Security Authorization. If the secure communications function is not enabled, MRS clusters cannot be created. |
Failed to Create a Cluster
If a cluster fails to be created, the failed task will be managed on the Manage Failed Tasks page. Choose Clusters > Active Clusters. Click shown in Figure 1 to go to the Manage Failed Tasks page. In the Status column, hover the cursor over to view the failure cause. You can delete failed tasks by referring to Viewing Failed MRS Tasks.
Table 5 lists the error codes of MRS cluster creation failures.
Error Code |
Description |
---|---|
MRS.101 |
Insufficient quota to meet your request. Contact customer service to increase the quota. |
MRS.102 |
The token cannot be null or invalid. Try again later or contact customer service. |
MRS.103 |
Invalid request. Try again later or contact customer service. |
MRS.104 |
Insufficient resources. Try again later or contact customer service. |
MRS.105 |
Insufficient IP addresses in the existing subnet. Try again later or contact customer service. |
MRS.201 |
Failed due to an ECS error. Try again later or contact customer service. |
MRS.202 |
Failed due to an IAM error. Try again later or contact customer service. |
MRS.203 |
Failed due to a VPC error. Try again later or contact customer service. |
MRS.400 |
MRS system error. Try again later or contact customer service. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot