Skip to main content

Chapter IX Deka DBaaS

Deka DBaaS is used to manage database relationships (database) from storage in a virtual machine deployment. DBaaS is a utility to organize and access the database (database) using relationships between data items expressed by means of a table.

9.1 Create Data Store

This menu explains how to create a data store. By creating the data store user can organize and access their database easily.

  • Go to the RDBMS page
  • And then click Create Data Store button

Image 9.1 RDBMS Page

  • Select Databases, to specify the database vendor of the data store to be created. Available database vendors are as follows MariaDB, MySQL, PostgreSQL, and Redis

Image 9.2 Create Data Store Form - Select a database

  • Fill in the Form Creating configuration datastore

Image 9.3 Create Data Store Form

Table 9.1 Form Create Datastore

Column Description
Name Data Store Name
Tags Tags make it easier for users to find the related data store they want to search for. Tags are optional to fill so users can leave the field blank.
Configuration To define the configuration for the data store. In Master, users are allowed to read and write including deleting database contents, while Replicas users are only allowed to read database contents. The configurations that can be selected are as follows:
- Multi-Master
- Master/Replicas
Number of Nodes Select nodes for the data store, the selected nodes can be one or three nodes.
If the user select Multi Master in Configuration then there are two options in the Number of Nodes that is
- 1 master node
- 3 multi-masters node.
If the user select Master/Replicas in Configuration then there are two options in the Number of Nodes that is
- 1 master node
- 1 master, 2 replicas

  • Fill in Name your Database

Image 9.4 Create Data Store Form - Name your database

  • Fill in Tags that are related to the data store separated by a comma. For example, tags that related to the College data store are subject, lecture, and student.

Image 9.5 Create Data Store Form - Tags

  • Choose the Configuration Multi Master

Image 9.6 Create Data Store Form- Configuration Multi-Master

  • Select Number of nodes 1 master node

Table 9.2 Configuration - Multi-Master

Number of Nodes Multi-Master Description
1 master node There is only one node that has read and write permissions on the database
3 multi-masters will be deployed Three nodes have permissions to read and write to the database

If in Configuration section the user selects Master/Replicas then in Number of nodes section there are options that can be seen in Image 9.7

Image 9.7 Create Data Store Form - Configuration - Master/Replicas

Table 9.3 Configuration - Master / Replicas

Number of Nodes Master / Replicas Description
1 master node There is only one node that has read and write permissions on the database
1 master, 2 replicas There is one node that has read and write permissions on the database and two nodes only have read permissions on the database

  • Then, click Continue button to go to the next form page

Image 9.8 Create Data Store Form - Number of Nodes

  • Then, click Continue button to go to the next form page

Image 9.9 Create Data Store Form - Cloud Service

  • Fill in the form Instances datastore, if the database is filled with more than 90% or more of the database storage space then you can only view the contents of the database without being able to change or add data to the database

Image 9.10 Create Data Store Form - Instances

Table 9.4 Form Instances

Instances Select the instance size for the data store. The instance sizes that can be selected according to user requirements are as follows:
- 16VCPU, 32GB RAM
- 32VCPU, 128GB RAM
Storage Select the volume type, the type that can be selected is Standard or Premium
Storage Size Select the volume size (GiB), the default volume size is 80 GiB

  • Select Instances

Image 9.11 Create Data Store Form - Select Instance Size

  • Select Storage

Image 9.12 Create Data Store Form - Select Storage

Table 9.5 Instances - Storage Detail

Storage Description
Standard Offers standard SSD storage types offered with input/output performance of 750 to 2500 IOPS
Premium Offers premium SSD storage types offered with input/output performance of 2250 up to 4500 IOPS

  • Enter Storage Size
  • Then, click Continue button to go to the next form page

Image 9.13 Form Create Data Store - Input Storage Size

  • Select the Network Rype Public, the selected network type cannot be changed by the user
  • Then, click Continue button to go to the next page

Image 9.14 Form Create Data Store - Select Network

Table 9.6 Network Type

Network Type Description
Private A type of network that can only be accessed by certain people because it has restrictions and rules that limit access
Public The type of network that anyone can access the network

  • On the Preview page there will be summary information of all forms that filled in before
  • Then, click Finish button

Image 9.15 Form Create Data Store - Preview Page (a)

Image 9.16 Form Create Data Store - Preview Page (b)

  • If the status column is worth deploying.. it means the data store is being processed

Image 9.17 Form Create Data Store - Deploy Data Store

  • Data store successfully created if the status column changes to Available

Image 9.18 Form Create Data Store - Data Store Successfully Created

9.2 Data Store Details

  • On the Data Stores page, click the Details button

Image 9.16 Data Stores Page - Details

9.2.1 Overview Tab

  • On this Overview tab, user can view detailed informations from the data store. All informations are include of state of services, cloud, general information, network, and instance information

Image 9.17 Overview Tab - Data Store Informations

9.2.2 Services Tab

  • On this Services tab, user can view detailed of database connection information. All information including public IP to access database from external network, status, type/role/permissions, and connection informations. The user needs to click on the link to display the username and password for access to database

Image 9.18 Services Tab

9.2.3 Monitoring Tab

  • On this Monitoring tab, users can see detailed data store usage information. The Monitoring tab displays the usage of (1) Chart set from the System or from the Database node, (2) IP Host used, (3) Present ranges users can choose the time range to be displayed, and (4) Slide On/Off button to Auto Refresh every 30 seconds

Image 9.22 Monitoring Tab

  • When clicked System displays the usage of load average, CPU, RAM, network, disk space, disk IO utilization, disk IOPS, and disk throughout. Users can categorize the monitoring view of the metric graph by clicking on the available filter buttons

Image 9.23 Tab Monitoring - System

  • When clicked On Database Nodes displays the use of handler stats, handler transaction stats, database connections, queries, scan operations, table locking, temporary tables, sorting, and aborted connections. Users can categorize the graph view monitoring the metric graph by clicking on the available filter button

Image 9.24 Tab Monitoring - Database Nodes

9.2.4 Query Stats Tab

  • On this Query Stats tab, user can see the information of the current database connections and the latest running query of database

Image 9.25 Query Stats Tab

9.2.5 Users and Databases Tab

  • On this Users and Databases tab, user can add the connection assistant, user, and database in the data store manually by fill in the form

Image 9.26 Users and Databases Tab

  • Click on Connection Assistant button to add the connection assistant for database

Image 9.27 Connection Assistant

  • Fill in the Connection Assistant form

Image 9.28 Form Create Connection Assistant

Table 9.7 Form Create Connection Assistant

Column Description
Account Choose the database user account.
Database Name Choose the database name.
Host Choose the database host.
Technology Choose the technology of database connectivity. The technology can be selected by one of these following vendors:
Connection String Connection string is a string that specifies information about a data source and the means of connecting to it.
  • Click on Create New User button to add a new user to the database

Image 9.29 Create New User

  • Fill in the New User form

Image 9.30 Form Create New User

Table 9.8 Form Create New User

Column Description
Username Add the username for new user.
Password Add the password for new user.
Allowed Host Enter IP Address for database access.
Database Name Choose the database for new user.
Admin User Toggle User can enable or disable the toggle based on their needs. If the toggle is enable, the database privileges will set automatically for admin user.
Database Privileges The limitation of user capability to manage databases as follows:
- Update

Image 9.31 List of Users

  • Click on Create New Database button to add new database

Image 9.32 Create New Database

  • Fill in the New Database form

Image 9.33 Create New Database Form

Table 9.9 Form Create New Database

Column Description
Database Name Add name for new database.

Image 9.34 Database List

9.2.6 Backups Tab

  • Backups tab is purpose to create a copy of data store that can be Restore in the event of a primary data updated

Image 9.35 Backups Tab

  • Restore is purpose to copying the backup data from secondary storage and restore it to it’s original version before data updated

Image 9.36 Restore

  • If the user surely to restore their data store, confirm it by click on OK button, then click on Restore button

Image 9.37 Restore Backup Confirmation

Image 9.38 Backup Information

Image 9.39 Restore Confirmation

  • If restoring backup is about to running there will be a notification dialog appears

Image 9.40 Restore Backup Notification

Image 9.41 Running Restore Backup

Image 9.42 Restore Backup Finished

9.2.7 Firewall Tab

  • Firewall is a tools use for database security access, by setting or add the trusted IP source to their device, user can get access to the database without any warning.

Image 9.43 Firewall Tab

Image 9.44 Create Trusted Source

  • Fill in the Create Trusted Client Source Address form, and then click the Create button

Image 9.45 Add a Trusted IP Address

Table 9.10 Form Create Trusted Source

Column Description
Source IP Address of trusted source device.
Description Description of the trusted source device. It’s optional for user to fill in the description field. The description can contain up to 255 characters. The allowed characters are a - z , A - Z , 0-9 spaces , and ._ : / ( ) # , @ [ ] + = ; ! $*
  • If IP Address succesfully added there will be a notification dialog appears

Image 9.46 Successful Notification

  • If user want to delete the trusted source, click on Trash icon

Image 9.47 Delete Trusted Source

  • Click on OK button to delete confirmation

Image 9.48 Delete Confirmation

  • There will be notifications appear if the trusted source succesfully deleted

Image 9.49 Successful Notification

9.2.8 Settings Tab

  • On this Settings tab, user can set up the data store informations like data store name, maintainance, and backup schedule

Image 9.50 Settings Tab

  • Edit the field to update settings, and then click the Save button. For Example, the data store name will change from College to University and the schedule backup is enable as the incremental

Image 9.51 Settings - Update Data Store Name

Image 9.52 Settings - Enable Incremental Backup Schedule

  • There will be a notification if the settings of data store is succesfully updated

Image 9.53 Settings - Successful Notification

Image 9.54 Data Store List

9.3 Delete Data Store

  • On the Data Store page, click the Delete button

Image 9.55 Data Store Page

  • Type delete into the field to confirm delete, then click OK

Image 9.56 Delete Confirmation

  • There will be a notification appear if the data store is about to delete soon

Image 9.57 Delete Notification

Image 9.58 Data Store List

9.4 Database Access Using Other Apps

  • The IP address used by the user’s computer can be found by typing the link in the browser or via Command Prompt (CMD) by typing curl

Image 9.59 IP check display -

Image 9.60 IP check display - CMD

  • Go to RDBMS page
  • On the Data Stores page, click the Details button

Image 9.61 Data Stores Page - Details

  • Click the Firewall tab, click the Create trusted source button

Image 9.62 Data Stores Page - Details

  • Type the IP obtained from or from Command Prompt (CMD) then click the Create button

Image 9.63 Input IP Address

Image 9.64 Success Notification

  • Click the Services tab, click the Copy to Clipboard button

Image 9.65 Services Tab

Image 9.66 Services Tab - Connection Information

Table 9.11 Detailed Connection Information

mysql Type of database connection used
ccxadmin The username used to log in to the database
0iBd3yG1NxkxKKHm Password used to enter the database Host servers
3306 Server ports
ccxdb Database name

  • Open the database processing application installed on the user’s computer, for example DBeaver
  • Click File then click New

Image 9.67 DBeaver - New Connection

  • Click Database Connection then click Next

Image 9.68 DBeaver - Database Connection

  • Click MySQL then click Next

Image 9.69 DBeaver - Select Database

  • In Connection Setting, fill in the Server Host, Port, Database, Username, Password sections according to Table 9.11 Connection Information Details

Image 9.70 DBeaver - Connection Settings

  • Then press the Test Connection button, if successful appears Connection Test

Image 9.71 DBeaver - Connection Test Results

  • In DBeaver section Database Navigator can be seen Database ccxdb

Image 9.72 DBeaver - Database ccxdb