Cluster Installation & Uninstallation #
Prerequisite
Before creating a cluster, the creation or registration of related resources (host, database) and components (governance centre, monitoring centre, log centre) need to be completed.
Driver Description
When SphereEx-Boot installs the cluster, the user needs to download the database driver and put it in the proxy directory.
When SphereEx-Console installs the cluster, it comes with MySQL 8.0 driver.
SphereEx-Boot Cluster Installation #
Description: Installing and uninstalling a cluster is actually installing and uninstalling computing nodes. Creating a cluster with SphereEx-Boot will create a management centre simultaneously.
Link to [Create a cluster with SphereEx-Boot] in the Quick Start section
SphereEx-Boot Cluster Uninstallation #
Uninstalling the cluster using SphereEx-Boot will uninstall the Management Center synchronously.
Use the command spex cluster uninstall --name <cluster-name>
to uninstall the cluster, which will delete the deployment directory.
SphereEx-Console Cluster Installation #
Applicable Scenario
Installing computing nodes and registering storage nodes the governance centre has created or registered is necessary for creating a cluster.
Precautions
The host has been registered, and the account of the registered host user has read and write permissions to the directory.
Database instance has been registered.
When installing and starting the compute node, Engine-Agent will be started at the same time by default.
Operation Steps
- Login SphereEx-Console
- Click Cluster management->Cluster enter cluster list.
- Click the New button in the upper right corner.
- Fill in the information, see the table below for specific parameters.
Cluster Information
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Cluster name | User input | Required | 50 | Check uniqueness |
Description | User input | Optional | 500 | |
Management center address | Management center name list | Required | ||
Name space | User input | Required | 50 | Alphanumeric underscores, existing namespaces cannot be added |
Monitoring center | Monitoring center IP: Port | Optional | ||
Log center | Log center name | Optional |
Compute Node
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Compute node software | User selection | Required | The latest version of the engine supported by the console is populated by default | |
filebeat softer | User selection | Depends on [log center] | The built-in filebeat of the console is filled by default The log center has been filled, this item is required The log center is not filled, this item cannot be filled | |
Node name | User input | Required | The default is IP: port, the uniqueness check in the cluster | |
Node IP | Host list | Required | Verify the uniqueness of the IP and port of the computing node on the page | |
Node port | User input | Required | 1024-5000 | |
Monitoring plugins port | Has default values, user can customize | Required | Default filling 9090, can be specify | |
installation directory | User input | Required | The default is /opt, created when there is no such directory on the host | |
logstsh | Pull down and select logstash in the log center | Depends on [log center] | The log center has been filled, this item is required The log center is not filled, this item cannot be filled | |
Operation result | Return the result of installation or uninstallation or report an error |
Storage Node(Optional)
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Node name | User input | Required | 50 | One or a combination of uppercase and lowercase letters, numbers, and underscores |
Database instance | drop down selection | Required | ||
Port | Autofill | Required | Autofill depends on database instance | |
User name | Autofill, can be modified | Required | 32 | Autofill depends on database instance |
Password | Autofill, can be modified | Required | Autofill depends on database instance | |
Database | drop down selection | Required | ||
Extended parameters (& split) | User input | Optional | Unlimit |
- Click OK to complete the cluster installation.
SphereEx-Console Register Cluster #
Applicable Scenario
Register the installed cluster to SphereEx-Console.
Precautions
The cluster has been installed and can provide services normally. If there is an Oracle storage unit in the registered cluster, the proxy_frontend_database_protocol_type parameter needs to adjust to MySQL, put the Oracle driver into the lib directory of the proxy, and restart the operation in the Console
Operation Steps
- Login SphereEx-Console。
- Click Cluster Management->Cluster to enter the cluster list.
- Click the Register button in the upper right corner to enter the registration page.
- Fill in the information, see the table below for specific parameters.
Basic Information
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Cluster name | User input | Required | 50 | Uniqueness check The name of the cluster in the console |
Description | User input | Optional | 500 | The cluster description information customized by the user in the console |
Compute Node Information
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Compute node address | User input | Required | The address of any proxy, currently only supports IPv4 addresses | |
Compute node port | User input | Required | The port corresponding to the proxy | |
Compute node user name | User input | Required | 32 | The user name corresponding to the proxy |
User password | User input | Required | The password corresponding to the proxy |
Click Register Host to complete the host registration, and fill in the information in the registration section of the reference host.
Click OK to complete the cluster registration.
SphereEx-Console Cluster Uninstallation #
Applicable Scenario
Delete the cluster, uninstall the compute node software from SphereEx-Console.
Precautions
If the cluster is stopped, check Uninstall the software synchronously to uninstall the computing node software synchronously, and uninstall the monitoring and log configuration, delete the namespace information, and SphereEx-Console releases the management of the cluster.
Operation Steps
- Login SphereEx-Console.
- Select Cluster Management > Cluster in the upper left corner of the console to enter the cluster list.
- Click the Delete button in the Action column of the list.
- Click OK in the prompt box, and check Uninstall Software Synchronously to complete the uninstallation of the cluster.
SphereEx-Console Unregister Cluster #
Applicable Scenario
Unmanage the cluster from SphereEx-Console.
Precautions
It’s not required to stop the cluster, only to unmanage the cluster.
Operation Steps
- Login SphereEx-Console.
- Select Cluster Management > Cluster in the upper left corner of the console.
- Click the Delete button in the Action column of the list.
- Click Confirm in the prompt box, do not check Synchronous Uninstall Software to complete the logout of the cluster.
Cluster Operation And Maintenance Management #
Description Of Cluster Management Functions #
Function | Description |
---|---|
Refresh | Refresh data to database and read to page |
Modify | Modify cluster information |
Parameter management | Manage cluster parameters |
License management | Manage cluster licenses |
Config log | To configure cluster compute node log, the host needs to be config first |
Config monitoring | To configure cluster compute node monitoring, the host needs to be config first |
Start | Start Cluster |
Stop | Stop Cluster |
Specify Cluster Refresh #
Applicable Scenario
Specify cluster refresh
Prerequisite
The cluster has already been registered or installed.
Operation Steps
- Login SphereEx-Console.
- Select Cluster Management > Cluster in the upper left corner of the console to enter the cluster list.
- Click the Refresh button in the List Actions column to complete the cluster refresh.
All Cluster Refresh #
Applicable Scenario
Refresh all clusters in the list
Prerequisite
The cluster has already been registered or installed.
Operation Steps
- Login SphereEx-Console.
- Select Cluster Management > Cluster in the upper left corner of the console to enter the cluster list.
- Click the Refresh button in the upper right corner to complete the refresh.
Parameter Management #
Applicable Scenario
Manage cluster parameters, modify parameters within the value range, and reset parameters to default values.
Precautions
The cluster can access
Operation Steps
- Login SphereEx-Console.
- In the upper left corner of the console, select Cluster Management > Cluster to enter the cluster list.
- Click the parameter management button in the list operation column to enter the parameter management page.
- Click the reset button to pop up the parameter reset page. The lower left corner will prompt whether the modification will take effect immediately. Click OK to reset the parameter to the default value.
- Click the Modify button to pop up the parameter modification page. The lower left corner prompts whether the modification will take effect immediately. Click OK to complete the parameter modification.
License #
Applicable Scenario
Manage cluster license and update license
Precautions
The cluster can access
Operation Steps
- Log in to SphereEx-Console.
- In the upper left corner of the console, select Cluster Management > Cluster to enter the cluster list.
- Click the License button in the list operation column to enter the management page.
When there is a license, the basic information of the license is visible.
When there is no license, no license will prompt.
- Click the back button in the upper left corner to return to the cluster list.
- Click Update License in the upper right corner. Add a License key, click Preview to preview the License information.
- Click OK to complete the license update
Modify #
Applicable Scenario
You can modify the cluster description and SphereEx-Console login computing node information.
Prerequisite
The cluster has already been registered or installed.
Operation Steps
- Log in to SphereEx-Console.
- In the upper left corner of the console, select Cluster Management > Cluster to enter the cluster list.
- Click the Modify button in the list operation column to enter the modification page.
- Fill in the following information:
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Cluster name | User input | Required | 50 | The name of the cluster in the console, cannot be modified |
Description | User input | Optional | 500 | The cluster description information customized by the user in the console can be modified |
Compute node address | User input | Required | The address of any proxy, can be modified | |
Compute node port | User input | Required | The port corresponding to the proxy, can be modified | |
Compute node user name | User input | Required | 32 | Corresponding to the username of the proxy, can be modified |
User password | User input | Required | Corresponding proxy password, can be modified |
- Click Confirm in the prompt box to complete the modification.
Start #
Applicable Scenario
Start specified cluster
Precautions
It cannot be restarted repeatedly. If it has already been started, it will prompt that it has been started.
Cluster startup sequence:
a. Governance Center: It is a necessary condition for the cluster to start, and monitors whether it is started; if it is not started, the user is prompted to start it manually, and the cluster will fail to start.
b. Log Center: It is an optional condition for cluster startup to monitor whether it is started; if there is an exception, an error will be prompted, and if it is not started, the user will be prompted to start it manually, which will not affect the startup of the cluster.
c. Monitoring Center: It is an optional condition for cluster startup to monitor whether it is started; if there is an exception, an error will be prompted, and if it is not started, the user will be prompted to start it manually, which will not affect the startup of the cluster.
d. Computing node: It is a mandatory condition for cluster startup to monitor whether it is started; if there is an exception, an error will be prompted, and if it is not started, the user will be prompted to start it manually; if some nodes are available, they can be started, at least one.
e. Storage node: If there is a storage node, it is required. If there is an exception, the cluster will fail to start. If there is no storage node, the cluster startup will not be affected.
Operation Steps
- Log in to SphereEx-Console.
- In the upper left corner of the console, select Cluster Management > Cluster to enter the cluster list.
- Click the Launch button in the Action column of the list to complete the launch.
Stop #
Applicable Scenario
Stop the specified cluster
Precautions
- Stopping the cluster actually only stops the computing nodes. After the cluster is stopped, it will be unusable. Please operate with caution.
- After the cluster is stopped, the button in the operation column can be clicked, but there is no data.
Operation Steps
- Log in to SphereEx-Console.
- In the upper left corner of the console, select Cluster Management > Cluster to enter the cluster list.
- Click the Stop button in the list action column to finish stopping.
Config Logs #
Applicable Scenario
Centrally manage the logs of cluster computing nodes on the SphereEx-Console platform.
Configure the logs of the cluster, that is, configure the logs of the computing nodes, and aggregate the running logs and slow logs to the log center. You can filter, view, and export logs through the slow log and log functions in the SQL management of the Console. Among them, you can directly view the execution plan of SQL in the slow log.
Precautions
- the cluster has been installed or registered
- The host where the cluster computing node is located has been registered, and the account of the registered host user has read and write permissions for the directory
- Log Center has been installed
Operation Steps
- Log in to SphereEx-Console.
- In the upper left corner of the console, select Cluster Management > Cluster to enter the cluster list.
- Click the Configure Log button in the list operation column to enter the configure log page.
- Fill in the following information:
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Compute node IP | previous page input | Required | Not editable | |
Logstash | Logstash in log center | Required | filebeat and proxy have a one-to-one relationship filebeat and logstash have a many-to-one relationship a logstash can only belong to one cluster | |
Filebeat installation directory | User inpute | Required | Fill the Filebeat default installation directory by default |
- Click Register Host to complete the host registration, and fill in the information in the registration part of the reference host.
- Click OK in the prompt box to complete the configuration.
Config Monitoring #
Please refer [cluster monitoring](/docs/operation-maintenance/9-monitor-alarm/#Cluster Monitoring)
Compute node management function description #
Function | Description |
---|---|
Add Node | Expand Cluster |
Probe | Probe node |
Refresh | Refresh node information |
enable | enable compute node |
Disable | Disable the computing node, the disabled computing node will not be able to receive traffic |
start | start compute node |
stop | stop compute node |
Delete | Uninstall compute nodes, shrink cluster |
Add Node #
Applicable Scenario
Expand computing resources for the cluster
Precautions
The host has been registered, and the account of the registered host user has read and write permissions to the directory.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click Add Node in the upper right corner to enter the Add Node page.
- Fill in the information, the specific parameters are shown in the table below:
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Node IP | User choice | Mandatory | Registered host list | |
Port | User Input | Required | 1024-5000 | |
Installation directory | User input | Mandatory | The default is /opt, created when there is no such directory on the host | |
Software | User Choice | Mandatory | The latest version of the engine supported by the console is filled by default | |
Node name | User input | Mandatory | Default is IP: port, unique check within the cluster | |
filebeat software | user choice | depends on [log center] | the built-in filebeat in the console is filled by default log center has been filled, this item is required log center is not filled, this item cannot be filled | |
Monitoring plug-in port | There is a default value, user can customize | Mandatory | The default value is 9090, you can specify | |
Installation directory | User input | Mandatory | The default is /opt, created when there is no such directory on the host | |
Logstsh | drop-down selection logstash of the log center | depends on [log center] | log center has been filled, this item is required log center is not filled, this item cannot be filled |
- Click OK to complete adding compute nodes.
Probe #
Applicable Scenario
Probe Compute Node
Precautions
The cluster has already been registered or installed
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click the Detection button in the list operation column to complete the node detection.
Refresh #
Applicable Scenario
Refresh compute node
Precautions
The cluster has already been registered or installed.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click the Refresh button in the list operation column to complete the node refresh.
Enable #
Applicable Scenario
Enable disabled nodes
Precautions
Node is disabled
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click the Enable button in the list operation column to complete the node activation.
Disable #
Applicable Scenario
Disable the node, the disabled node will not have new traffic, and the process being executed will not be affected.
Precautions
Node is enabled.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click the Disable button in the list operation column to complete the node disabling.
Use SphereEx-Console to start computing nodes #
Applicable Scenario
Start a stopped node
Precautions
the node is stopped
When the cluster is stopped, you can click the management node to start the computing nodes one by one. As long as one computing node is available, the cluster will be available.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click the Start button in the list operation column to complete the node startup.
Start the compute nodes individually #
- startup steps
a. Download the latest release of DBPlusEngine-Proxy.
b. After decompression, modify conf/server.yaml and files starting with config- prefix, such as: conf/config-xxx.yaml file, and configure sharding rules and read-write separation rules.
c. Please run bin/start.sh for Linux operating system, and bin/start.bat for Windows operating system to start ShardingSphere-Proxy.
- Choose a database protocol
Using PostgreSQL
a. Use any PostgreSQL client connection. Such as: psql -U root -h 127.0.0.1 -p 3307
Using MySQL
b. Copy the JDBC driver for MySQL to the directory ext-lib/.
c. Use any MySQL client connection. Such as: mysql -u root -h 127.0.0.1 -P 3307
Using openGauss
a. Copy the openGauss JDBC driver prefixed with the org.opengauss package name to the directory ext-lib/.
b. Use any openGauss client connection. Such as: gsql -U root -h 127.0.0.1 -p 3307
- Select metadata persistence repository
Using ZooKeeper
The ZooKeeper Curator client is integrated by default.
Using Etcd
Copy Etcd’s client driver to the directory ext-lib/.
- Use distributed transactions
For details, please refer to Distributed Transactions.
- Use a custom algorithm
When users need to use a custom algorithm class, they can configure and use the custom algorithm in the following ways, taking sharding as an example:
a. Implement the algorithm implementation class defined by the ShardingAlgorithm interface.
b. Create a META-INF/services directory under the project resources directory.
c. Create a new file org.apache.shardingsphere.sharding.spi.ShardingAlgorithm in the META-INF/services directory
d. Write the absolute path of the implementation class to the file org.apache.shardingsphere.sharding.spi.ShardingAlgorithm
e. Pack the above Java files into a jar package.
f. Copy the above jar package to the ext-lib/ directory decompressed by DBPlusEngine-Proxy.
g. Configure the Java file reference of the above-mentioned custom algorithm implementation class in the YAML file. For details, please refer to the configuration rules.
- Precautions
a. DBPlusEngine-Proxy uses port 3307 by default, and you can add parameters as the startup port number through the startup script. Such as: bin/start.sh 3308
b. DBPlusEngine-Proxy uses conf/server.yaml to configure registry, authentication information and public properties.
c. DBPlusEngine-Proxy supports multiple logical data sources, and each YAML configuration file named with the config- prefix is a logical data source.
d. The default listening address of DBPlusEngine-Proxy is 0.0.0.0, and the listening address can be specified through the startup script, which can be obtained through bin/start.sh –help.
Use SpehreEx-Console to stop computing nodes #
Applicable Scenario
Stop the node in the starting state
Precautions
- the node is started
- The cluster will stop after the last computing node is stopped
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click the Stop button in the list operation column to complete the node stop.
Stop compute nodes individually #
For Linux operating system, please run bin/stop.sh, and for Windows operating system, please run bin/stop.bat to start ShardingSphere-Proxy.
Delete #
Applicable Scenario
compute nodes from the cluster
Precautions
Checking the Synchronous Uninstall Software will synchronously uninstall the software of the computing nodes, and uninstall the monitoring and log configuration
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column to enter the calculation point list by default.
- Click the Delete button in the Action column of the list.
- Click Confirm in the prompt box to delete the node.
Storage node management function description #
Function | Description |
---|---|
Register | Select the registered database to add storage nodes to the cluster |
refresh | refresh node |
Probe | Probe node |
modify | modify storage node |
Delete | Deleted from the Console list, the storage node being referenced by the logic database cannot be deleted. Deletion does not affect its owning instance |
Register #
Applicable Scenario
Cluster expansion storage nodes
Precautions
- The database instance has already been registered.
- The newly added storage node belongs to the cluster and is not used.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column, click Storage Node to enter the list of storage points.
- Click the Add Node button in the upper right corner to enter the Add Node page.
- Fill in the information, see the table below for the specific parameters.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Belonging instance | List of database instances | Mandatory | Instance IP, instance port, and database uniqueness check, cannot be added repeatedly. | |
Instance IP | Autofill | Mandatory | Uneditable | |
Instance Port | Auto Fill | Required | Not Editable | |
Instance Type | Auto-Fill | Required | Non-Editable | |
Username | Autofill | Required | 32 | Can be changed |
password | Autofill | Required | can be changed | |
Database | Internal to the database instance | Required | Can be changed | |
Node Name | User Input | Required | ||
Extended parameters | User input | Optional | Can be changed | |
URL connection string | Autofill, non-editable | Gray non-editable |
- Click OK to complete the node addition.
Probe #
Applicable Scenario
Probe Storage Node
Precautions
The cluster has already been registered or installed
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column, click Storage Node to enter the list of storage points.
- Click the Detection button in the list operation column to complete the node detection.
Refresh #
Applicable Scenario
Refresh storage node
Precautions
The cluster has already been registered or installed
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column, click Storage Node to enter the list of storage points.
- Click the Refresh button in the list operation column to complete the node refresh.
Modify #
Applicable Scenario
Modify storage node information
Precautions
Only the user name and password of the storage node can be modified, which is applicable to the scenario where the user name and password of the user storage node are changed. Modifying the user name and password of the storage node will not affect the instance to which it belongs.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column, click Storage Node to enter the list of storage points.
- Click the Modify button in the list operation column to enter the page for modifying storage nodes.
- Fill in the information, see the table below for the specific parameters.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Username | Autofill | Required | 32 | Can be changed |
Password | Autofill | Required | Can be changed | |
Extended parameters | User input | Optional | Can be changed |
Delete #
Applicable Scenario
Delete unused storage nodes
Precautions
storage node is not used by logical database
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Cluster to enter the cluster list.
- Click Manage Node in the operation column, click Storage Node to enter the list of storage points.
- Click the Delete button in the list operation column to complete the deletion of the storage node.
Logical Database Management #
List of logical database management functions
Function | Description |
---|---|
New | Create new logical database |
Refresh | Refresh logical database |
slow log | View the slow log of the logical database |
Storage node | Add available storage nodes for logical database |
Delete | Deleting a logical database from a cluster does not delete storage nodes in the cluster |
New #
Applicable Scenario
Create new logical database
Precautions
- The cluster can be accessed normally, and there are storage nodes available in the cluster
- A storage node that is not used by any logic database is an available storage node
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Logical Database to enter the list of logical databases.
- Click the New button in the upper right corner to enter the page for creating a new logic database.
- Fill in the information, see the table below for specific parameters.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Logic database | User input | Mandatory | 30 | Check the uniqueness, the name of the logic database in a set of clusters is guaranteed to be unique |
Storage Node | Optional | The optional column is the storage node available in the cluster; The selected column is the storage node available for the logic database; |
- Click OK to complete the creation of the logic database.
Refresh #
Applicable Scenario
Refresh logical database
Precautions
The cluster can be accessed normally
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Logical database to enter the list of logical databases.
- Click the Refresh button in the upper right corner to complete the logic database refresh.
Slow log #
Applicable Scenario
View the slow log generated by the logic database
Precautions
- The cluster can be accessed normally
- slow log is turned on
- Slow logs can be filtered by SQL statement, DistSQL user, computing node, fuzzy query; time, SQL type, execution time and equivalent query
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Logical database to enter the list of logical databases.
- Click the Slow Log button in the operation column to jump to the slow log page.
The content of the slow log includes: time, user, computing node, logic database, SQL type, execution time, and SQL statement.
Hover to View Execution Plan to jump to the execution plan page and view the execution path of the slow log.
- Click Export to export all logs that meet the criteria.
Storage Node #
Applicable Scenario
Manage Storage Nodes for logical databases
Precautions
- The cluster can be accessed normally
- Storage nodes not used by logical tables can be removed
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Logical Database to enter the list of logical databases.
- Click the Storage Node button in the operation column to jump to the storage node management page.
- Complete the adjustment of the database storage node by adjusting the storage node in the Optional column and Selected column.
UDF #
Applicable Scenario
Use udf to encrypt stored procedures of oracle database
Precautions
- The cluster can be accessed normally.
- There is only one logical database, and one storage unit is registered in the logical database. The storage unit type is oracle.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Logical Database to enter the list of logical databases.
- Click operation column UDF button,jump to the UDF configuration page.
- Turn UDF on or off by adjusting the click switch.
For a detailed introduction to the stored procedure function of Oracle database, please refer to Oracle Stored Procedure Encryption
Delete #
Applicable Scenario
Delete logical database
Precautions
- The cluster can be accessed normally.
- Deleting a database from a cluster does not delete the cluster’s storage nodes.
- Deleting the logic database will delete the plug-in configuration in the logic database synchronously, and it cannot be restored. Please operate with caution.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Logical Database to enter the list of logical databases.
- Click the Delete button in the action column.
- Click the Confirm button in the prompt to complete the deletion of the logic database.
Table #
Function | Description |
---|---|
New | New Logical Table |
Batch Encryption and Masking | Encrypt or desensitize fields in batch configuration tables based on sensitive data identification reports |
Masking Configuration | Masking policies built-in Console, and users can add them as requirements. |
Encryption Configuration | Encryption policies built-in Console, and users can add them as requirements. |
Remove Masking | Delete the masking configuration of the selected table |
Table Group Management | Table Group Management |
Sharding | Add shards and modify shards |
Encryption | Add a column of encryption configuration, configure encryption, shuffle data, view encryption configuration, delete encryption configuration, turn on and off plaintext storage, turn on and off plaintext query, turn on and off fuzzy query, modify encryption configuration, delete the encryption configuration of the current column |
Masking | Add masking configuration, delete masking configuration, modify masking configuration |
View table structure | View create table statement |
View Table Distribution | View Physical Distribution of Tables |
modify table | modify table structure |
drop table | drop table |
Create New Table #
Applicable Scenario
Create a new table in the logic database
Precautions
- The cluster can be accessed normally, and there is a logical database
- When the logical database is registered in the Oracle storage unit, the semicolon “;” cannot be included in the table creation statement.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the New Table button in the upper right corner to enter the page for creating a new table. When creating a new table, the sharding plug-in and encryption plug-in are optional; the sharding plug-in and encryption plug-in can be created in conventional and custom ways respectively.
- Fill in the information, see the table below for specific parameters.
table configuration
Field | Data Source | Optional/Required | Length Limit | Description |
---|---|---|---|---|
Table Type | Select | Required | Storage nodes and the following information appear when you select a sharding table. Storage nodes and the following information do not appear when you select a broadcast table |
Add sharding configuration General configuration
Sharding configuration: regular means formatted definition rules; custom means use DistSQL to define rules, and the regular way does not need to define storage nodes; choose one of the regular and custom configurations, and the corresponding configuration item will appear in whichever way you choose.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Storage Node | Check the storage node of the logic database | Required | ||
Storage Nodes | Auto Fill | Required | Multiple storage node names separated by commas, not editable | |
Sharding key | Field parsed from the table structure | Required | Combined with sharding algorithm verification | |
Sharding Algorithm | Built-in Algorithm | Required | ||
Algorithm parameters | User input | Required | Unlimited | Verify parameters according to the sharding algorithm, provide parameter examples according to different algorithms |
Distributed sequence | Analyzed fields in the table structure | Optional | Columns that need to use the primary key generation strategy | |
Distributed Sequence Generation Strategy | Built-in Algorithm | Combines the type and length check of the key-value column [Distributed Sequence] When there is data [Distributed Sequence Generation Strategy] is required [Distributed Sequence] When there is no data [Distribution] formula sequence generation strategy] this line is not displayed | ||
Strategy parameters | User input | Unlimited | Verify parameters according to the key-value generation strategy method, and provide parameter examples according to different strategies [Distributed sequence generation strategy] When there is data [Strategy parameter] is required [Distributed sequence generation strategy] When there is no data [Strategy parameters, this line is not displayed] |
Add sharding configuration Custom configuration
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User inpute | Required | Unlimit | DistSQL, check during execute |
Add encryption configuration General configuration
Encryption plug-in configuration: regular means formatted definition rules; custom means use DistSQL to define rules, choose one of the regular and custom configurations, and the corresponding configuration items will appear in whichever way you choose.
[Use Encrypted Column Query] Check it, use the encrypted data column when querying; uncheck, use the unencrypted data column when querying.
Checked by default.
When the plaintext storage is unchecked, [Use Encrypted Column Query] must be checked and cannot be changed.
When all plaintext storage is checked, [Use Encrypted Column Query] is allowed to be changed to unchecked.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Encryption Algorithm | Built-in Algorithm | Required | Combined logical column length of logical column type, ciphertext column data type length check | |
Encryption Algorithm Parameters | User Input | Required | Unlimited | Verify parameters according to encryption algorithms, and provide parameter examples according to different algorithms |
Column to be encrypted | Drop-down selection | Required | The column to be encrypted is a logical column, and the plaintext column and ciphertext column are automatically created. The data type and length of the plaintext column are taken from the data type and length of the column to be encrypted in the user table Length; the data type and length of the ciphertext column are defined according to the algorithm. When adding two encrypted columns at the same time, the first encrypted field cannot appear when filtering when adding the second encrypted column | |
Store plaintext | Checked by the user | checked, store plaintext in the database; unchecked, not store plaintext in the database |
Add encryption configuration Custom configuration
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User input | Required | Unlimited | Distsql, check during execute |
Add masking configuration General configuration
Masking configuration:regular means formatted definition rules; custom means use DistSQL to define rules, and the regular way does not need to define storage nodes; choose one of the regular and custom configurations, and the corresponding configuration item will appear in whichever way you choose.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Masking fields | User selection | Required | Fields parsed from the table structure | |
Masking configuration | User selection | Optional | Unlimited | The configuration of the masking configuration will be echoed to the algorithm type and algorithm parameters |
Algorithm type | User selection | Required | Unlimited | Built-in mask algorithm in engine |
Algorithm parameter | User Input | Required | Combined algorithm algorithm verification | |
Effective user | User selection | Required | Valid for all users by default |
Add Masking configuration Custom configuration
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User Input | Required | Unlimited | Distsql, check during execute |
- Click OK to finish creating the table.
Batch Encryption and Masking #
Applicable Scenario
Configure encryption, masking, or encryption and masking in batches based on reports generated by the Sensitive Data Identification feature.
Precautions
The cluster can be accessed normally, there is a logical database, and a report corresponding to the storage unit of the logical database has been generated in the sensitive data identification function.
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Table to enter the table list.
- Click the Batch Encryption and Masking button in the upper right corner to enter the table group management page.
- Select report
- Adjust matching (optional)
- Add masking or encryption configurations for columns not included in reports
- Delete the masking or encryption configuration of the selected column
- Click the edit button in the encryption or masking configuration column to modify the corresponding encryption and masking configuration.
- When configuring encryption, the shuffle data and configure the shuffling resources can be chosen immediately.
- Click Batch Encryption Batch Masking Batch Encryption Masking to complete the batch encryption and masking. If selected immediate shuffle data, the data shuffling background task will be started. Click View Shuffle data Progress to view the shuffling progress. In the operation of the encrypted column in the table list, the ID of the shuffling and the progress of the shuffling also can be seen.
Masking Configuration #
Applicable Scenario
The user has sorted out the configurations that need to be masking. After adding the masking configuration, it can be used like a template.
Precautions
Console has started normally
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Table to enter the table list.
- Click the Masking Configuration button in the upper right corner to enter the masking configuration page.
- Edit the following content and click Confirm to complete the addition and editing of the masking configuration.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Masking configuration | User Input | Required | 30 | Support Chinese |
Algorithm type | User Selection | Required | unlimited | Masking algorithm built-in Engine |
Algorithm parameter | User Input | Required | Combined with algorithm verification |
Encryption configuration #
Applicable Scenario
The user has sorted out the configurations that need to be encryption. After adding the encryption configuration, it can be used like a template.
Precautions
Console has started normally
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Table to enter the table list.
- Click the Encryption Configuration button in the upper right corner to enter the masking configuration page.
- Edit the following content and click Confirm to complete the addition and editing of the encryption configuration.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Encryption configuration | User Input | Required | 30 | Support Chinese |
Algorithm type | User Selection | Required | Unlimited | Encryption algorithm built-in Engine |
Algorithm parameter | User Input | Required | Combined with algorithm verification |
Delete Masking #
Applicable Scenario
The user needs to delete the masking configuration in the table
Precautions
The cluster can be accessed normally, there are existing logical database and tables, and the columns in the tables have been configured masking
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Table to enter the table list.
- Select table
- Click the Delete Masking button in the upper right corner to complete the deletion of the column configuration in the table
Sharding #
Add Sharding #
Applicable Scenario
Add sharding configuration to existing table.
Precautions
The cluster can be accessed normally. There is a logical database and a table. There is no data in the table and there is no sharding configuration in the table.
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the Add Shard button in the plug-in column to enter the page for adding shards.
- Fill in the information, see the table below for specific parameters.
Sharding configuration: regular means formatting definition rules; custom means using DistSQL definition rules, and there is no need to define storage nodes in the regular way; choose between regular and custom configurations, and the corresponding configuration items will appear in whichever way you choose.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Storage node | Check the storage node of the logical database | Required | Multiple selections are allowed. The node name of the storage node is filled in the text box of the storage node. | |
Storage node | Auto fill | Required | The names of multiple storage nodes are separated by commas and cannot be edited. | |
Sharding key | Fields parsed from the table structure | Required | Combined with sharding algorithm verification | |
Sharding algorithm | Built-in algorithm | Required | Combined with type of sharding key verification | |
Algorithm parameter | User Input | Required | Unlimited | Verify parameters according to the sharding algorithm and provide parameter examples according to different algorithms |
Distributed sequence | Fields parsed from the table structure | Optional | Columns that require primary key generation strategy | |
Distributed sequence generation strategy | Built-in algorithm | Combined with the type and length verification of the key value column, when [Distributed Sequence] has data, [Distributed Sequence Generation Strategy] is required; when [Distributed Sequence] has no data, [Distributed Sequence Generation Strategy] is not required to show | ||
Strategy parameter | User Input | Unlimited | Verify parameters according to the key value generation strategy method, and provide parameter examples according to different strategies When [Distributed sequence generation strategy] has data, [Strategy parameter] is required. When [Distributed sequence generation strategy] has no data, [Strategy parameter] This line is not required to show |
Customize
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User Input | Required | Unlimited | DistSQL, verification during execution |
- Click Confirm to complete adding the sharding plug-in configuration.
Modify shards #
Applicable Scenario
Add sharding plug-in configuration to existing table.
Precautions
The cluster can be accessed normally, there is a logical database, there are tables, there is no data in the tables, and there are sharding plug-in configurations in the tables.
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the Modify Sharding button in the plug-in column to enter the page for modifying sharding. Enter the page to modify the sharding plug-in, the configuration of the sharding plug-in can be seen. If it is a sharding plug-in added regularly, it will be displayed regularly; if it is a sharding plug-in added in a custom way, it will be displayed in a custom way.
- Fill in the information, see the table below for specific parameters. Sharding plug-in configuration: regular means formatting definition rules; custom means using DIStSQL definition rules, and there is no need to define storage nodes in the regular way; choose between regular and custom configurations, and the corresponding configuration items will appear in whichever way you choose.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Storage node | Check the storage node of the logical database | Required | Multiple selections are allowed. The node name of the storage node is filled in the text box of the storage node. | |
Storage node | Auto fill | Required | The names of multiple storage nodes are separated by commas and cannot be edited. | |
Sharding key | Fields parsed from the table structure | Required | Combined with sharding algorithm verification | |
Sharding algorithm | Built-in algorithm | Required | Combined with type of sharding key verification | |
Algorithm parameter | User Input | Required | Unlimited | Verify parameters according to the sharding algorithm and provide parameter examples according to different algorithms |
Distributed sequence | Fields parsed from the table structure | Optional | Columns that require primary key generation strategy | |
Distributed sequence generation strategy | Built-in algorithm | Combined with the type and length verification of the key value column, when [Distributed Sequence] has data, [Distributed Sequence Generation Strategy] is required; when [Distributed Sequence] has no data, [Distributed Sequence Generation Strategy] is not required to show | ||
Strategy parameter | User Input | Unlimited | Verify parameters according to the key value generation strategy method, and provide parameter examples according to different strategies When [Distributed sequence generation strategy] has data, [Strategy parameter] is required. When [Distributed sequence generation strategy] has no data, [Strategy parameter] This line is not required to show |
Customize
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User Input | Required | Unlimited | DistSQL, verification during execution |
- Click Confirm to complete the modification of the sharding plug-in configuration.
Encryption #
Add Encryption Configuration General Configuration #
Applicable Scenario
Add encryption plug-in configuration to the existing table.
Precautions
The cluster can be accessed normally. There are existing logical databases and tables. There are no encryption plug-in configurations in the tables, and no data shuffling is involved.
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the Configure Encryption button to enter the page for configuring encryption.
- Click the New button to enter the page to create new encryption.
- Fill in the information, see the table below for specific parameters.
Encryption plug-in configuration: Regular means formatting definition rules; Custom means using DIStSQL definition rules. Choose between regular and custom configurations. Whichever method is chosen, the corresponding configuration items will appear. [Use encrypted column query] Check, use the encrypted data column when querying; uncheck, use the data column before encryption when querying;
The default is checked;
When plaintext storage is unchecked, [Use encrypted column query] must be checked and cannot be changed;
When plain text storage is all checked, [Use encrypted column query] can be changed to unchecked.
Conventional
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Encryption algorithm | Built-in algorithm | Required | Verification based on logical column logical column type length and ciphertext column data type length | |
Encryption algorithm parameter | User Input | Required | Unlimited | Verify parameters according to encryption algorithm and provide parameter examples according to different algorithms |
Column need to be encrypt | drop down selection | Required | The columns that need to be encrypted are logical columns. The plaintext column and the ciphertext column will be automatically created. The data type and length of the plaintext column are taken from the data type and length of the column that required to be encrypted in the user table; the data type and length of the ciphertext column are defined based on the algorithm.When adding two encrypted columns simultaneously, the first encrypted field cannot appear when filtering when adding the second encrypted column. | |
Store plaintext | User ticks | If checked, plaintext will be stored in the database; if unchecked, plaintext will not be stored in the database. |
Customize
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User Input | Required | Unlimited | DistSQL, verification during execution |
- Click Confirm to complete adding the encryption plug-in configuration.
Configure encryption #
Applicable Scenario
Used for users to configure encryption for columns in tables
- Enable and disable storage of plain text
Enable and disable the storage of plain text will increase or decrease fields in the database, so please operate with caution.
- Enable and disable the use of plain text queries
Enable the use of plain text query: the plain text column query will be used
Disable using plain text query: cipher text column query will be used
- Enable and disable fuzzy query
After enabling fuzzy query, the Like syntax can be used to query data on encrypted columns.
After disabling the fuzzy query, an error will be reported when querying data using Like syntax.
- Modify encryption configuration
The encryption algorithm and key can be modified by modifying the encryption configuration. The ciphertext will be shuffled into plaintext first, and then the plaintext will be shuffled into ciphertext using the new key. Therefore, the prerequisite for using this function is to turn on storing plaintext and turn off using plaintext query.
- Delete the encryption configuration of the current column
Precautions
No operations can be performed while the table is being configured for encryption. Click the yellow hourglass to see the progress of configuring encryption. Generally, the progress will be very fast. When using Oracle stored procedure encryption, the time to configure encryption will be relatively long.
Shuffle data #
Applicable Scenario
Check the shuffle progress
Precautions
No operations can be performed on the table being shuffled. The encryption configuration can be checked.
Operation Steps
- Login to SphereEx-Console.
- Click Cluster Management->Table to enter the table list.
- Click Batch Encryption Masking and click Shuffle Data or directly click Shuffle Data Progress of the encrypted column of the table to query the shuffle progress. For tables with shuffle tasks, a yellow hourglass will appear next to the shuffle button.
View encryption configuration, delete encryption configuration, turn on and off plain text storage, turn on and off plain text query, turn on and off fuzzy query, modify encryption configuration, delete the encryption configuration of the current column
Masking #
Function | Description |
---|---|
Masking | Add masking configuration, delete masking configuration, modify masking configuration |
Add masking configuration General configuration #
Masking configuration: Regular means formatting definition rules; Custom means using DistSQL to define rules, and there is no need to define storage nodes regularly; choose between regular and custom configurations, and the corresponding configuration items will appear in whichever way you choose.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Field need to be masked | User Selection | Required | Fields parsed from the table structure | |
Masking configuration | User Selection | Optional | Unlimited | The configuration of the masking configuration will be echoed to the algorithm type and algorithm parameters. |
Algorithm type | User Selection | Required | Unlimited | Algorithm built-in Engine |
Algorithm parameter | User Input | Required | Combined with algorithm verification | |
Effective user | User Selection | Required | Valid for all users by default |
Add masking configuration Custom configuration #
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User Input | Required | Unlimited | DistSQL, verification during execution |
Modify the masking configuration of columns in the table #
- Login to SphereEx-Console.
- Click Cluster Management->Table to enter the table list.
- Click the Modify button of the masking column in the table list to enter the masking modification page.。
- Edit the following content and click Confirm to complete the modification of the masking configuration.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Field need to be masked | User Selection | Required | Fields parsed from the table structure | |
Masking configuration | User Selection | Optional | Unlimited | The configuration of the masking configuration will be echoed to the algorithm type and algorithm parameters. |
Algorithm type | User Selection | Required | Unlimited | Algorithm built-in Engine |
Algorithm parameter | User Input | Required | Combined with algorithm verification | |
Effective user | User Selection | Required | Valid for all users by default |
Delete the masking configuration in the table #
- Login to SphereEx-Console.
- Click Cluster Management->Table to enter the table list.
- Click the Delete button of the masking column in the table list to complete the deletion of the masking configuration.
Table Group Management #
Applicable Scenario
Bind sharding plugins deployed with the same algorithm into a group for query optimization.
Precautions
The cluster can be accessed normally, there is an existing logical database, and the configuration of the table sharding plug-in is consistent
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the Table Group Management button in the upper right corner to enter the table group management page.
- Fill in the information, see the table below for specific parameters.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
The first member | Select from the drop-down list sharding table in the current logic database | Required | Choose one of the tables of the user’s expected binding rules, no primary or secondary | |
Other members | Select from the drop-down list the sharding tables in the current logic database, other tables that meet the rules of binding tables with the first member | Required | Multiple choices |
- Click OK to complete the table group management.
View table structure #
Applicable Scenario
Check the table structure in the form of create table, but you cannot see the plug-in configuration.
Precautions
The cluster can be accessed normally, and there are logic databases and tables.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the View Table Structure button in the operation column to enter the page for viewing the table structure.
- Click Back to return to the list of table objects.
View Table Distribution #
Applicable Scenario
View the storage node where the table is located
Precautions
The cluster can be accessed normally, and there are logic databases and tables.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the View Table Distribution button in the operation column to enter the page for viewing table distribution.
- Click Back to return to the list of table objects.
Modify Table #
Applicable Scenario
Modify table structure
Precautions
The cluster can be accessed normally, and there are logic databases and tables.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the Modify Table button in the operation column to enter the page for modifying the table.
- Fill in the SQL for modifying the table structure, and you can click Example to view the statement example.
- Click OK to complete the table modification.
Delete #
Applicable Scenario
Delete tables, delete plugin configurations, delete table structures and data.
Precautions
The cluster can be accessed normally, and there are existing logical databases and tables. The deletion is a physical deletion and cannot be recovered. Please operate with caution.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->Object to enter the table object list.
- Click the Delete button in the operation column to enter the page for modifying the table.
- Click OK to complete the table deletion.
User Privilege #
User
Function | Description |
---|---|
Create new user | Create new user |
Modify password | Modify user password |
View privilege | View user privilege |
Manage privilege | Manage user privilege |
Delete | Delete user |
Add role | Add role for user |
Create new user #
Applicable Scenario
Using DBPlusEngine’s Unified Privilege Management Function
Precautions
The cluster can be accessed normally, there is a logic database
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->User Privilege to enter the user list.
- Click the Create New User button at upper right corner to enter the create new user page.
- Fill in the information, see the table below for specific parameters.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
User | User Input | Required | Currently there are no restrictions on Engine | |
HOST | User Input | Required | Text box | IP or %, or a combination of both. The text box prompts “Please enter”; front-end verification: only numbers, % and dots can be entered. | |
Password | User Input | Required | Currently there are no restrictions on Engine | |
Confirm password | User Input | Required | Currently there are no restrictions on Engine | Need to verify consistency with password |
Role | User Selection | Optional | Created role | |
Authorize | User Input | Optional | Switch to fill in different sheets |
Modify password #
Applicable Scenario
Change DBPlusEngine Dist user password
Precautions
The cluster can be accessed normally, there is a logic database.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->User Privilege to enter the user list.
- Click the Change Password button in the action column Enter the new password and click Confirm to complete the password change
View Privilege #
Applicable Scenario
View DBPlusEngine Dist user privilege
Precautions
The cluster can be accessed normally, there is a logic database.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->User Privilege to enter the user list.
- Click the View Privilege button in the action column to view user permissions
Manage Authorization #
Applicable Scenario
Adjust the privileges of DBPlusEngine Dist user
Precautions
The cluster can be accessed normally, there is a logic database.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->User Privilege to enter the user list.
- Click the Manage Authorization button in the operation column to enter the authorization management page.
Delete #
Applicable Scenario
Delete DBPlusEngine Dist user.
Precautions
The cluster can be accessed normally, and there are existing logic databases and tables.
Operation Steps
- Log in to SphereEx-Console.
- Click Cluster Management->User Privilege to enter the user list.
- Click the Delete button in the operation column to complete the deletion of the user
Role
Function | Description |
---|---|
Create new role | Create new role |
View privilege | View role’s privilege |
Manage privilege | Manage role’s privilege |
Delete | Delete role |
Create new role #
Applicable Scenario
Use the unified privilege management function of DBPlusEngine to manage user privilege by roles
Precautions
The cluster can be accessed normally, there is a logic database.
Operation Steps
- Log in to SphereEx-Console.
- Log in to SphereEx-Console. Click Cluster Management->User Privilege->Role to enter the role list.
- Click the New Role button in the upper right corner to enter the page for creating a new role.
- Fill in the information, see the table below for specific parameters.
Fields | Data from | Optional/Required | Length limit | Description |
---|---|---|---|---|
Role | User Input | Required | Currently there are no restrictions on Engine | |
User | User Selection | Optional | Currently there are no restrictions on Engine | |
Authorize | User Input | Optional | Switch to fill in different sheets |
View Privilege #
Applicable Scenario
View Role’s Privilege
Precautions
The cluster can be accessed normally, there is a logic database.
Operation Steps
- Log in to SphereEx-Console.
- Log in to SphereEx-Console. Click Cluster Management->User Privilege->Role to enter the role list.
- Click the View Privilege button in the action column to view the role privilege
Manage Authorization #
Applicable Scenario
Adjust role privilege
Precautions
The cluster can be accessed normally, there is a logic database.
Operation Steps
- Log in to SphereEx-Console.
- Log in to SphereEx-Console. Click Cluster Management->User Privilege->Role to enter the role list.
- Click the Manage Authorization button in the operation column to enter the authorization management page.
Delete #
Applicable Scenario
Delete Role
Precautions
The cluster can be accessed normally, there is a logic database.
Operation Steps
- Log in to SphereEx-Console.
- Log in to SphereEx-Console. Click Cluster Management->User Privilege->Role to enter the role list.
- Click the Delete button in the operation column to complete the role deletion
SQL Management #
Function | Description |
---|---|
Slow log | New logical table |
Execution Plan | Table Group Management |
SQL audit | View create table statement |
Slow Log #
Applicable Scenario
Check the slow logs generated by the cluster
Precautions
- The cluster can be accessed normally
- slow log is turned on
- Slow logs can be filtered by SQL statement, DistSQL user, computing node, fuzzy query; time, logic database, SQL type, execution time, and equivalent query.
Operation Steps
- Log in to SphereEx-Console.
- Click SQL Management->Slow Log to enter the Slow Log page. The content of the slow log includes: time, user, computing node, logic database, SQL type, execution time, and SQL statement.
Hover to View SQL Routing to jump to the SQL Routing page to view slow SQL.
- Click Export to export all logs that meet the conditions
SQL Routing #
Applicable Scenario
View the execution path of SQL
Precautions
The cluster can be accessed normally
Operation Steps
- Log in to SphereEx-Console.
- Click SQL Management->SQL Routing to enter the SQL Routing page.
- Select the cluster, select the logic database, enter the SQL statement, and click the View SQL Routing button to view the execution routing.
SQL Audit #
Applicable Scenario
Audit after the event by viewing all SQL executed by the cluster.
Precautions
- The cluster can be accessed normally
- audit logging is turned on
- Audit logs can be filtered by SQL statement, DistSQL user, computing node, fuzzy query; time range, SQL type, equivalent query.
Operation Steps
- Log in to SphereEx-Console.
- Click SQL Management->SQL Audit to enter the SQL Audit Log page. The content of the audit log includes: time, DistSQL user, computing node, logic database, SQL type, and SQL statement.
- Click Export to export all logs that meet the criteria.
Log Management #
View logs through SphereEx-Console #
Applicable Scenario
By viewing the running logs of the cluster computing nodes.
Precautions
- The cluster can be accessed normally
- You can use keyword fuzzy query; time range equivalent query to filter running logs.
Operation Steps
- Log in to SphereEx-Console.
- Click Log Management to enter the log management page.
- Click Export to export all logs that meet the criteria.
Log Management Related Parameters #
system-log-level System log level, non-built-in loggers use this configuration system-log-pattern system log format, global common
DistSQL variable modification example
SET DIST VARIABLE system_log_level = DEBUG
SET DIST VARIABLE system_log_pattern = '[%-8level] %d{yyyy-MM-dd HH:mm:ss.SSS} [%thread] %logger{39} - %msg%n'
To adjust the running log parameters through SphereEx-Console, please refer to [Cluster parameter management](/docs/operation-maintenance/2-non-containerized/cluster-management/#Parameter Management)
Adjust the running log through DistSQL, please refer to[Log management](/docs/operation-maintenance/7-log-management/#Cluster Log)
For parameter details, please refer to [Cluster Parameter List](/docs/reference/parameter/#Cluster Parameter List)
Sensitive data identification #
Introduction #
The figure below shows the entire data life cycle and sensitive data identification. SphereEx-SDD (SDD for short)It solves the first phase of the problem, helping users quickly identify sensitive data risks, giving security specifications and feasible implementation suggestions, and accelerating the implementation of user security transformation work.
Install under Linux x86 enviroment #
download: curl -O -u download_1fNAVPTXxm:gyKxRvFkBEKkTYCT https://artifacts.sphere-ex.cn/tar/repository/download/sphereex_sdd/cn/sphere-ex/xxx/1.x.x/sphereex-sdd-1.x.x.tar.gz
Please contact sales for download link 400-900-2818
Unzip the package
Enter the directory: cd sdd
Start: ./start.sh
The default port is 3000, which can be modified by editing start.sh
sdd oracle client dependency library installation:
Method 1: Log in to Oracle’s official website to download client dependencies and use rpm to install them offline.
URL: https://www.oracle.com/database/technologies/instant-client/linux-x86-64-downloads.html
rpm -ivh oracle-instantclient-sqlplus-21.10.0.0.0-1.x86_64.rpm
rpm -ivh oracle-instantclient-basic-21.10.0.0.0-1.el8.x86_64.rpm
rpm -ivh oracle-instantclient-devel-21.10.0.0.0-1.x86_64.rpm
Method 2: Install online using yum
yum install oracle-instantclient-sqlplus
yum install oracle-instantclient-devel
yum install oracle-instantclient-basic
Docker Installation #
docker run -it -d -v /xxx:/work/data -p3000:3000 artifacts.sphere-ex.com/xxx/sphereex-sdd:.x.x.x web
Please contact sales for download link 400-900-2818
Using #
Login #
Tool URL: http://xxx.xxx.xxx.xxx:3000/ Built-in user:admin Built-in password:admin
Rule management #
Built-in Rule
There are currently 30 built-in rules, covering most personal information and some sensitive information.
Customized rules
Users can customize the rules according to their own data scenarios.
Operation Steps:
- Click Add Rule
- Fill in the rule name, select the data classification, support field name list and field name regular expression to configure field mapping, and fill in the rule description.
- Optional description according to the situation
- Click OK
Built-in rule group
Currently, two standard rule groups, GDPR and GB/T 35273, are built-in, each containing built-in rules for users to use directly.
Custom rule group
Users can create a customized rule group and select one or more rules for targeted identification.
Operation Steps:
- Click Add Rule Group
- Fill in the rule group name and select the rule
- Click Confirm
Create a copy of built-in rules to facilitate users to add or delete rules in existing rule groups
Operation Steps:
- Click Create Copy in the built-in rule group operation
- Fill in the rule group name and adjust the rules
- Click Confirm
Set up rules in a rule group
The built-in field mapping, custom field mapping, data classification, and security recommendations of rules can be configured in the rule group.
Data Source Management #
Add corresponding data sources for data identification. Currently, it supports MySQL, Oracle, SQLServer, PostgreSQL, Presto, and Hive. After adding a data source, click “New Identification Task” directly in the operation column to create a task directly.
Operation Steps
- Click Add
- Fill in the information
- Click Confirm
Optional/Required | Description | |
---|---|---|
Name | Required | User names the data source |
Database type | Required | Select database type |
Source type | Required | Schema level identification, table level identification |
IP or Domain name | Required | Database IP or domain name |
Port | Required | Database port |
User name | Required | The user name used to connect to the database for data identification tasks, which requires select data and system view permissions |
Password | Required | Password used to connect to the database for data identification tasks |
Database type | Required | The dbname of the database that needs to be identified. When the source type is schema, multiple database names can be filled in |
Table name | Required | The name of the table that needs to be recognized can be filled in multiple times. Fill in when the source type is TABLE SET |
Remarks | Optional | Remarks about the current data source |
System Configuration #
- License Configuration
Paste the License-Key authorized by SphereEx into the text field and click Confirm to complete the license registration.
- Backup and restore
Custom rules, rule groups, and data sources can be chosen to back up. Suitable for daily backup and system upgrades
Task Management #
Configure execution recognition tasks
Operation Steps:
- Click Add
- Select data source and rule group
- Select execution mode
- Fill in the remark information as needed
- Choose whether to execute immediately
- Click OK
- Task mode description
Extremely fast mode: fetch 50,000 pieces of data from each table, 5 concurrent executions
Full mode: fetch full data from each table, fetch 5W pieces of data each time, and execute serially
Custom mode: user-defined concurrency and sampling
- Custom mode parallelism configuration
Default value | Value range | Description | |
---|---|---|---|
Number of parallel schemas | 5 | 1~100 | Schema-level parallel control, the number of schemas that can be executed in parallel |
Number of parallel tables | 10 | 1~100 | Table-level parallel control, the number of tables that can be executed in parallel in the same schema |
Number of parallel entries | 10 | 1~100 | Table slice level parallel control, the number of shards that can be executed in parallel in the same table, if there is partition_task_num in the table configuration, partition_task_num has a higher priority |
- Custom mode parallelism configuration sampling configuration
Sampling for configuring identification tools
Random sampling: Specify the sampling ratio and randomly sample according to the specified sampling ratio.
Specify the number of sampling items: Specify the number of rows to scan, and take the specified number of items according to the paging algorithm of the database.
Full sampling: full scan
After the task execution is completed, an identified report will be generated, which can be viewed on the report management page. Executing a task multiple times will generate multiple reports.
Report management #
Click View Report in the operation column to view the corresponding report.
In the report, users can adjust the four configurations of matching threshold, interpretation standard, and recognition result display to obtain the corresponding report results.
- Matching degree: After the recognition task is completed, the rule matching degree of each field is obtained.
- Match threshold: User-defined recognition results that can be displayed in the report
- After modifying the above configuration, click “View Report” to view the report.
- Full-text fuzzy search is possible, and field names, matching degrees, recognition results, data classification, and security recommendations can be sorted.
- Click “Download Report” to download the report locally. Currently, two report types, excel and html, are supported.
Connect Cluster #
Users can log in to the cluster in several ways:
- SphereEx-Console: Users can use SphereEx-Console to complete management actions through the GUI interface after login (built-in restricted DistSQL, SQL terminal is not yet available).
- Database Command: For example, MySQL Client, PG PSQL, log in to any computing node in the cluster. Use USE to locate the logical database and execute SQL.
Example usage:
mysql -uroot -p -P3307 -h127.0.0.1
- Third Database Tools: Tools such as navicate, some functions are limited, Todo to be tested.