创建主动-主动异地复制数据库
如何创建 Active-Active 数据库以及设置数据库时要考虑的事项。
Redis 企业软件 |
---|
主动-主动异地复制数据库(以前称为 CRDB)为应用程序提供写入访问权限 添加到不同地理位置的数据集副本中。
托管实例的参与 Redis Enterprise Software 集群可以分布在不同的地理位置。 Active-Active 数据库的每个实例都可以接收写入作,并且所有作都同步到所有实例,而不会发生冲突。
创建 Active-Active 数据库的步骤
- 创建服务账户 - 在每个参与集群上,创建一个具有 Admin 角色的专用用户账户。
- 确认连接 - 确认参与集群之间的网络连接。
- 创建主动-主动数据库 – 连接到您的一个集群并创建新的主动-主动数据库。
- 添加参与集群 - 使用服务账户的用户凭证将参与集群添加到主动-主动数据库。
- 验证创建 - 登录到每个参与的集群,并验证是否已在这些集群上创建主动-主动数据库。
- 确认主动-主动数据库同步 – 测试写入一个集群和从另一个集群读取。
先决条件
- 两台或多台安装了相同版本的 Redis Enterprise Software 的计算机
- 所有参与集群之间的网络连接和集群 FQDN 名称解析
- 在所有集群中的每个节点上配置并运行网络时间服务侦听器 (ntpd)
创建主动-主动数据库
-
在每个参与的集群上创建服务账户:
-
要验证参与集群之间的网络连接, 运行以下
telnet
命令发送到所有其他参与集群:telnet <target FQDN> 9443
-
In a browser, open the Cluster Manager UI of the cluster where you want to create the Active-Active database.
The default address is:
https://<RS_address>:8443
-
Open the Create database menu with one of the following methods:
-
Select Active-Active database.
-
Enter the cluster's local admin credentials, then click Save:
-
Add participating clusters that will host instances of the Active-Active database:
-
In the Participating clusters section, go to Other participating clusters and click + Add cluster.
-
In the Add cluster configuration panel, enter the new cluster's URL, port number, and the admin username and password for the new participating cluster:
Note:If an Active-Active database runs on flash memory, you cannot add participating clusters that run on RAM only. -
Click Join cluster to add the cluster to the list of participating clusters.
-
-
Enter a Database name.
-
If your cluster supports Auto Tiering, in Runs on you can select Flash so that your database uses Flash memory. We recommend that you use AOF every 1 sec for the best performance during the initial Active-Active database sync of a new replica.
-
To configure additional database settings, expand each relevant section to make changes.
See Configuration settings for more information about each setting.
-
Click Create.
Configuration settings
-
Database version - The Redis version used by your database.
-
Database name - The database name requirements are:
-
Maximum of 63 characters
-
Only letters, numbers, or hyphens (-) are valid characters
-
Must start and end with a letter or digit
-
Case-sensitive
-
Port - You can define the port number that clients use to connect to the database. Otherwise, a port is randomly selected.
Note:
You cannot change the port number
after the database is created.
-
Memory limit - Database memory limits include all database replicas and shards, including replica shards in database replication and database shards in database clustering.
If the total size of the database in the cluster reaches the memory limit, the data eviction policy for the database is enforced.
Note:
If you create a database with Auto Tiering enabled, you also need to set the RAM-to-Flash ratio
for this database. Minimum RAM is 10%. Maximum RAM is 50%.
-
Memory eviction - The default eviction policy for Active-Active databases is noeviction
. Redis Enterprise versions 6.0.20 and later support all eviction policies for Active-Active databases, unless Auto Tiering is enabled.
-
Capabilities (previously Modules) - When you create a new in-memory database, you can enable multiple Redis Stack capabilities in the database. For Auto Tiering databases, you can enable capabilities that support Auto Tiering. See Redis Enterprise and Redis Stack feature compatibility
for compatibility details.
Note:
To use Redis Stack capabilities, enable them when you create a new database.
You cannot enable them after database creation.
To add capabilities to the database:
-
In the Capabilities section, select one or more capabilities.
-
To customize capabilities, select Parameters and enter the optional custom configuration.
-
Select Done.
TLS
If you enable TLS when you create the Active-Active database, the nodes use the TLS mode Require TLS for CRDB communication only to require TLS authentication and encryption for communications between participating clusters.
After you create the Active-Active database, you can set the TLS mode to Require TLS for all communications so client communication from applications are also authenticated and encryption.
High availability
-
Replication - We recommend that all Active-Active database use replication for best intercluster synchronization performance.
When replication is enabled, every Active-Active database master shard is replicated to a corresponding replica shard. The replica shards are then used to synchronize data between the instances, and the master shards are dedicated to handling client requests.
-
Replica high availability - We also recommend that you enable replica high availability to ensure replica shards are highly-available for this synchronization.
Clustering
-
In the Clustering section, you can either:
-
Enable sharding and select the number of shards you want to have in the database. When database clustering is enabled, databases have limitations for multi-key operations.
You can increase the number of shards in the database at any time.
-
Clear the Enable sharding option to use only one shard, which allows you to use multi-key operations without the limitations.
Note:
You cannot enable or turn off database clustering after the Active-Active database is created.
-
OSS Cluster API - The OSS Cluster API configuration allows access to multiple endpoints for increased throughput. The OSS Cluster API setting applies to all instances of the Active-Active database across participating clusters.
This configuration requires clients to connect to the primary node to retrieve the cluster topology before they can connect directly to proxies on each node.
When you enable the OSS Cluster API, shard placement changes to Sparse, and the database proxy policy changes to All primary shards automatically.
Durability
To protect against loss of data stored in RAM, you can enable Persistence to store a copy of the data on disk.
Active-Active databases support append-only file (AOF) persistence only. Snapshot persistence is not supported for Active-Active databases.
Access control
-
Unauthenticated access - You can access the database as the default user without providing credentials.
-
Password-only authentication - When you configure a password for your database's default user, all connections to the database must authenticate with the [AUTH command](/commands/auth/.
If you also configure an access control list, connections can specify other users for authentication, and requests are allowed according to the Redis ACLs specified for that user.
Creating a database without ACLs enables a default user with full access to the database. You can secure default user access by requiring a password.
-
Access Control List - You can specify the user roles that have access to the database and the Redis ACLs that apply to those connections.
You can only configure access control after the Active-Active database is created. In each participating cluster, add ACLs after database creation.
To define an access control list for a database:
Causal consistency
Causal consistency in an Active-Active database guarantees that the order of operations on a specific key is maintained across all instances of an Active-Active database.
To enable causal consistency for an existing Active-Active database, use the REST API.
Test Active-Active database connections
With the Redis database created, you are ready to connect to your database. See Connect to Active-Active databases for tutorials and examples of multiple connection methods.
On this page