• Cloud Search Service

css
  1. Help Center
  2. Cloud Search Service
  3. User Guide
  4. Creating and Accessing a Cluster
  5. Creating a Cluster

Creating a Cluster

To use CSS, create a cluster first.

Procedure

  1. Log in to the CSS management console.
  2. On the Dashboard or Cluster Management page, click Create Cluster to switch to the Create Cluster page.
  3. Specify Region and AZ.

    Region: Select the region for the cluster from drop-down menu to the right of Region. Currently, only region eu-de is supported.

    AZ: indicates a physical region where resources use independent power supply and networks. AZs are physically isolated but interconnected through the internal network, improving program availability. You are advised to create clusters in different AZs. Select an AZ associated with the cluster region.

  4. Set basic information about the cluster. Specifically, specify Version and Name.
    • Version: Only version 6.2.3 is supported.
    • Name: Enter 4 to 32 characters. Only letters, digits, hyphens (-), and underscores (_) are allowed. The value must start with a letter.
    Figure 1 Configuring basic information
  5. Set host specifications of the cluster.
    Table 1 Parameter description

    Parameter

    Description

    Nodes

    Number of nodes in a cluster.

    Node Specifications

    Node specifications in a cluster. The following five specifications are supported: css.medium.8, css.large.8, css.xlarge.8, css.2xlarge.8, and css.4xlarge.8.

    After you select a node specification, the CPU and memory corresponding to the current specification are displayed below the parameter. For example, if you select css.medium.8, then 1 vCPUs | 8 GB will be displayed in the lower part, indicating that your selected node specification contains one core and 8 GB memory.

    Node Storage Type

    In the current version, the following options are available: Common I/O, High I/O, and Ultra-high I/O.

    Node Storage Capacity

    Storage space. Its value is related to node specifications and varies with node specifications.

    • Value range of flavor css.medium.8: 40 GB to 640 GB
    • Value range of flavor css.large.8: 40 GB to 1280 GB
    • Value range of flavor css.xlarge.8: 40 GB to 2560 GB
    • Value range of flavor css.2xlarge.8: 80 GB to 5120 GB
    • Value range of flavor css.4xlarge.8: 160 GB to 10240 GB

    Disk Encryption

    If you select this option, the nodes you selected for the created cluster use encrypted EVS disks to enhance data security in the cluster. By default, this option is not selected. After the cluster is created, you cannot modify the setting of this option. Therefore, exercise caution when performing the setting.

    After you select this option, you need to select an available key from the Key Name drop-down list box. If no key is available, click Create/View Key to go to the KMS management console and create or modify a key. For details, see Creating a CMK.

    Enabling disk encryption has no impact on your operations on a cluster (such as accessing the cluster, importing data to the cluster, and much more). However, after you enable disk encryption, operation performance deteriorates by about 10%.

    NOTE:
    • If the cluster is in the Available state and the key used for disk encryption is in the Pending deletion or disable state or has been deleted after a cluster is created, cluster capacity expansion is not allowed, while other operations on the cluster, such as restarting the cluster, creating snapshots, restoring the cluster, and importing data to the cluster are not affected. In addition, this key cannot be used for cluster creation in future.
    • After a cluster is created, do not delete the key used by the cluster. Otherwise, the cluster will become unavailable.
    • The Default Master Keys cannot be used to create grants. Specifically, you cannot use Default Master Keys whose aliases end with /default in KMS to create clusters.
    Figure 2 Configuring host specifications
  6. Set network specifications of the cluster. Specifically, specify VPC, Subnet, and Security Group.
    • VPC: A VPC is a secure, isolated, logical network environment.

      Select the target VPC. Click View VPC to enter the VPC management console to view the created VPC names and IDs. If no VPC is available, create a VPC.

      NOTE:

      The selected VPC must contain CIDRs. Otherwise, cluster creation will fail. By default, a created VPC contains CIDRs.

    • Subnet: A subnet provides dedicated network resources that are isolated from other networks, improving network security.

      Select the target subnet. You can access the VPC management console to view the names and IDs of the existing subnets in the target VPC.

    • Security Group: A security group is a collection of access control rules for ECSs that have the same security protection requirements and are mutually trusted in a VPC. To view more details about the security group, click View Security Group.
      NOTE:

      Ensure that Port/Range is All or a port range including port 9200 for the selected security group.

    • Communication Encryption: If you enable the communication encryption function, you will access the cluster using HTTPS to secure your data. After the cluster is created, you cannot modify the setting of this option. Therefore, exercise caution when performing the setting. By default, the communication encryption function is enabled.

      indicates to enable the communication encryption function, and indicates to disable the communication encryption function.

      If the communication encryption function is enabled, the CSS server processes the SSL requests from the client and the security certificate of the CSS server has been configured by default. Please be aware that the certificate is shared between all CSS instances.

      Enabling this function in a cluster will affect the procedure of accessing the cluster or importing data to the cluster. For details, see Accessing a Cluster, Using Logstash to Import Data to Elasticsearch, and Using Kibana or APIs to Import Data to Elasticsearch.

    Figure 3 Configuring network specifications
      •  
       
     
  7. Click Create Now to switch to the Confirm page.
  8. After the specifications are confirmed, click Submit.
  9. Click Back to Cluster List. The system switches to the Cluster Management page, on which the cluster you created is listed and its status is Creating. If the cluster is successfully created, its status will change to Available.

    If the cluster fails to be created, create the cluster again as prompted.