检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
IoTDB JDBC Sample Program Description Run the IoTDB SQL statement in JDBC connection mode. Sample Code The following code snippet is used as an example. For complete code, see the com.huawei.bigdata.iotdb.JDBCExample class. jdbc url includes the IP address, RPC port number, username
IoTDB Flink Sample Program FlinkIoTDBSink Sample Program FlinkIoTDBSource Sample Program Parent topic: Application IoTDB Development
IoTDB Application Development Rules Set a Proper Number of Storage Groups A proper number of storage groups can improve performance. The system processes I/O requests first in the memory cache and then switch to the stored files or folders if no result is found. In this regard, a
IoTDB Application Development Suggestions Use Write APIs with High Performance Based on Service Requirements The write APIs are ranked as follows in descending order of their performance: insertTablets (inserts multiple tablets, from multiple rows of the same column on multiple devices
Ingesting IoTDA Logs to LTS LTS can collect logs from IoTDA. For details, see Viewing Run Logs. Parent topic: Ingesting Cloud Service Logs to LTS
Manually Importing IoTDB Data Scenario This section describes how to use import-csv.sh to import data in CSV format to IoTDB. Prerequisites The client has been installed. For details, see . For example, the installation directory is /opt/client. The client directory in the following
Adding an IoTDB Data Source This section applies to MRS 3.2.0 or later only. Add an IoTDB JDBC data source on HSConsole of a cluster in security mode. Prerequisites for Adding an IoTDB Data Source The domain name of the cluster where the data source is located must be different from
IoTDB User Permission Management IoTDB User Permission Description Creating an IoTDB Permission Role Parent topic: Using IoTDB
IoTDB User Permission Description MRS supports users, user groups, and roles. Permissions must be assigned to roles and then roles are bound to users or user groups. Users can obtain permissions only by binding a role or joining a group that is bound with a role. In security mode,
Creating an IoTDB Permission Role Create and configure an IoTDB role on Manager as an MRS cluster administrator. An IoTDB role can be configured with IoTDB administrator permissions or a common user's permissions to read, write, or delete data. Prerequisites The MRS cluster administrator
IoTDB Common Configuration Parameters Scenario IoTDB uses the multi-replica deployment architecture to implement cluster high availability. Each region (DataRegion and SchemaRegion) has three replicas by default. You can also configure more replicas. If a node is faulty, replicas
Manually Exporting IoTDB Data Scenario This section describes how to use export-csv.sh to export data from IoTDB to a CSV file. Exporting data to CSV files may cause injection risks. Exercise caution when performing this operation. Prerequisites The client has been installed. For
ALM-45585 IoTDB Service Unavailable Alarm Description The system checks the IoTDB service status every 300 seconds. This alarm is generated when the IoTDB service is unavailable. This alarm is cleared when the IoTDB service recovers. Alarm Attributes Alarm ID Alarm Severity Auto Cleared
Backing Up IoTDB Metadata Scenario To ensure IoTDB metadata security and prevent the IoTDB service from being unavailable due to IoTDB metadata file damages, you need to back up IoTDB metadata. The backup data can be used to recover the system if an exception occurs or the operation
Restoring IoTDB Service Data Scenario IoTDB service data needs to be restored in the following scenarios: Data is modified or deleted unexpectedly and needs to be restored. After an administrator performs major operations (such as upgrade and data adjustment) on IoTDB, an exception
Configuring IoTDB Application Security Authentication Using the keytab File for JDBC Authentication Using the Keytab File for Session Authentication Parent topic: IoTDB Environment Preparations
IoTDB Enhanced Open Source Features Visualization Visualized O&M covers installation, uninstallation, one-click start and stop, configurations, clients, monitoring, alarms, health checks, and logs. Visualized permission management does not require background command line operations
Creating a User and Granting IoTDA Permissions You can use Identity and Access Management (IAM) for fine-grained permissions control for your IoTDA resources. With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their
Converting Device Coordinate Data in IoTDA Introduction Preparation Building a Program Parent topic: Data Processing Practices
Basic Metrics: IoTDA Metrics This section describes the types, names, and meanings of IoTDA metrics reported to AOM. Table 1 IoTDA metrics Category Metric Metric Name Description Value Range Unit Total devices iotda_device_status_onlineCount Online Devices Number of online devices