You can use the cluster management system to view the resource usage of a Lindorm cluster and manage the data stored in the cluster in a centralized manner. This topic describes how to log on to the cluster management system in the Lindorm console.
Prerequisites
A Lindorm instance is created. For more information, see Create an instance.
The public IP address that is used to access the cluster management system is added to the whitelist of the Lindorm instance. For more information, see Configure whitelists.
Procedure
Log on to the Lindorm console.
On the Instances page, find the Lindorm instance that you want to access and click the ID of the instance.
In the left-side navigation pane, click Wide Table Engine.
In the Cluster Management section on the right side of the page, click ClusterManagerInternet.
On the logon dialog box, enter the username and password.
NoteIf you log on to the cluster management system for the first time, click Reset UI Access Password in the Cluster Management section on the right side of the page and configure a password. Take note of the following rules before you set the password:
The password must be 2 to 30 characters in length.
The password can contain letters, special characters, and digits.
The supported special characters are underscores (_) and hyphens (-).
Click Log On. The Lindorm Insight page appears.
Overview of the cluster management system
The cluster management system consists of the dashboard, data management, data query modules. The following table describes the pages in each module.
Module | Page | Description | Reference |
Overview | None |
| |
Data Manager | Namespace Manager |
| |
User Manager |
| ||
Table Alter Manager | Changes the attributes of tables. | ||
Data Query | SQL Executor | Executes SQL statements to query the data that is stored in LindormTable. | |
Cluster Manager | Server Manager |
| |
Security Management | Views and manages whitelists and blacklists. | ||
Inspection | None | Views the basic information about the current cluster group. | |
Diagnose Tools | Slow Request Detection | Detects the slow requests, request with low transmission speed, requests that contains large amounts of data, and requests for which large amounts of data is returned. | |
Big Call Request Detection | Detects queries that involve large amounts of data, such as SCAN queries. | ||
topRegion Analysis | Sorts and displays regions based on different metrics. | ||
topKey Analysis | Identifies hot keys. | ||
Real-time Request Trace | Traces real-time requests. | ||
Client Trace | Views the information about the clients that access the clusters. | ||
Request Distribution | Displays the distribution of requests in pie charts. |