Skip to main content

Chapter IX: 9.2 Data Store Detail

  • On the Data Stores page, click the Details button


Image 9.16 Data Stores Page - Details


9.2.1 Overview Tab

  • On this Overview tab, user can view detailed informations from the data store. All informations are include of state of services, cloud, general information, network, and instance information


Image 9.17 Overview Tab - Data Store Informations



9.2.2 Services Tab

  • On this Services tab, user can view detailed of database connection information. All information including public IP to access database from external network, status, type/role/permissions, and connection informations. The user needs to click on the link to display the username and password for access to database


Image 9.18 Services Tab



You can add datastore, here are the steps to add a datastore:

  • On the Services tab page, click Add Service.


Image 9.19 Add Datastore (a)



  • Select Instance, Storage, Storage Size automatically according to your needs, then click the Add Service button.


Image 9.20 Add Datastore (b)



  • Your new service is deploying notification appears and wait for the deploy process to finish.


Image 9.21 Add Datastore (c)



  • The datastore has been deployed, so it’s ready to use.


Image 9.20 Add Datastore (d)



9.2.3 Monitoring Tab

  • On this Monitoring tab, users can see detailed data store usage information. The Monitoring tab displays the usage of (1) Chart set from the System or from the Database node, (2) IP Host used, (3) Present ranges users can choose the time range to be displayed, and (4) Slide On/Off button to Auto Refresh every 30 seconds


Image 9.22 Monitoring Tab



  • When clicked System displays the usage of load average, CPU, RAM, network, disk space, disk IO utilization, disk IOPS, and disk throughout. Users can categorize the monitoring view of the metric graph by clicking on the available filter buttons


Image 9.23 Tab Monitoring - System



  • When clicked On Database Nodes displays the use of handler stats, handler transaction stats, database connections, queries, scan operations, table locking, temporary tables, sorting, and aborted connections. Users can categorize the graph view monitoring the metric graph by clicking on the available filter button


Image 9.24 Tab Monitoring - Database Nodes



9.2.4 Query Stats Tab

  • On this Query Stats tab, user can see the information of the current database connections and the latest running query of database


Image 9.25 Query Stats Tab



9.2.5 Users and Databases Tab

  • On this Users and Databases tab, user can add the connection assistant, user, and database in the data store manually by fill in the form


Image 9.26 Users and Databases Tab



  • Click on Connection Assistant button to add the connection assistant for database


Image 9.27 Connection Assistant



  • Fill in the Connection Assistant form


Image 9.28 Form Create Connection Assistant



Table 9.7 Form Create Connection Assistant

Column Description
Account Choose the database user account.
Database Name Choose the database name.
Host Choose the database host.
Technology Choose the technology of database connectivity. The technology can be selected by one of these following vendors:
- DSN
- ADO.NET
- JDBC
- NODE.JS
- ODBC
- PHP
- PHP.PDO
- PHP.PEAR.DB
Connection String Connection string is a string that specifies information about a data source and the means of connecting to it.
  • Click on Create New User button to add a new user to the database


Image 9.29 Create New User



  • Fill in the New User form


Image 9.30 Form Create New User



Table 9.8 Form Create New User

Column Description
Username Add the username for new user.
Password Add the password for new user.
Allowed Host Enter IP Address for database access.
Database Name Choose the database for new user.
Admin User Toggle User can enable or disable the toggle based on their needs. If the toggle is enable, the database privileges will set automatically for admin user.
Database Privileges The limitation of user capability to manage databases as follows:
- SELECT
- INSERT
- DELETE
- Update
- DROP
- CREATE


Image 9.31 List of Users



  • Click on Create New Database button to add new database


Image 9.32 Create New Database



  • Fill in the New Database form


Image 9.33 Create New Database Form



Table 9.9 Form Create New Database


Column Description
Database Name Add name for new database.


Image 9.34 Database List



9.2.6 Backups Tab

  • Backups tab is purpose to create a copy of data store that can be Restore in the event of a primary data updated


Image 9.35 Backups Tab



  • Restore is purpose to copying the backup data from secondary storage and restore it to it’s original version before data updated


Image 9.36 Restore



  • If the user surely to restore their data store, confirm it by click on OK button, then click on Restore button


Image 9.37 Restore Backup Confirmation




Image 9.38 Backup Information




Image 9.39 Restore Confirmation



  • If restoring backup is about to running there will be a notification dialog appears


Image 9.40 Restore Backup Notification




Image 9.41 Running Restore Backup




Image 9.42 Restore Backup Finished



9.2.7 Firewall Tab

  • Firewall is a tools use for database security access, by setting or add the trusted IP source to their device, user can get access to the database without any warning.


Image 9.43 Firewall Tab




Image 9.44 Create Trusted Source



  • Fill in the Create Trusted Client Source Address form, and then click the Create button


Image 9.45 Add a Trusted IP Address



Table 9.10 Form Create Trusted Source

Column Description
Source IP Address of trusted source device.
Description Description of the trusted source device. It’s optional for user to fill in the description field. The description can contain up to 255 characters. The allowed characters are a - z , A - Z , 0-9 spaces , and ._ : / ( ) # , @ [ ] + = ; ! $*
  • If IP Address succesfully added there will be a notification dialog appears


Image 9.46 Successful Notification



  • If user want to delete the trusted source, click on Trash icon


Image 9.47 Delete Trusted Source



  • Click on OK button to delete confirmation


Image 9.48 Delete Confirmation



  • There will be notifications appear if the trusted source succesfully deleted


Image 9.49 Successful Notification



9.2.8 Settings Tab

  • On this Settings tab, user can set up the data store informations like data store name, maintainance, and backup schedule


Image 9.50 Settings Tab



  • Edit the field to update settings, and then click the Save button. For Example, the data store name will change from College to University and the schedule backup is enable as the incremental


Image 9.51 Settings - Update Data Store Name




Image 9.52 Settings - Enable Incremental Backup Schedule



  • There will be a notification if the settings of data store is succesfully updated


Image 9.53 Settings - Successful Notification




Image 9.54 Data Store List



×