ClusterControl is a unified console ('single pane of glass') to manage the full database lifecycle of the most popular open-source databases on-premise or in the cloud.
Provision, monitor and manage highly available database clusters in minutes with dashboards, backups, notifications, reports and automated recovery.
Supported databases: MySQL, MariaDB Server, MariaDB Galera, Percona Server, Percona XtraDB, MySQL Cluster (NDB), PostgreSQL, Redis, Elasticsearch, MS SQL Server 2019, TimescaleDB and MongoDB ReplicaSet and Shards
ClusterControl requires passwordless SSH access to the database nodes. A private and public SSH key is generated after the instance creation and you will need to first
ssh root@your_vultr_public_ipv4 to copy the public SSH key which you will then provide when you create your instances for the database nodes.
Note: All instances should be on the same network and have a private IP address (enable private networking) for optimal security and isolation.
See https://www.vultr.com/docs/configure-ubuntu-with-multiple-ip-addresses for further details on how to assign a private IP to your database hosts.
See example file below.
$ cat /etc/netplan/11-ens7.yaml
macaddress and the
addresses fields to match your private network and then apply the changes with
netplan apply for each instance.
The first step is to get access to the public SSH key:
Note: The initial mysql root user and cmon db user passwords for the ClusterControl application's MySQL server is stored in
Now that we have the public SSH key added we can go ahead and launch a few more Vultr instances on OS Ubuntu 20.04 that will be used to host our database nodes.
clustercontrol SSH key when launching the instances. It must be included otherwise ClusterControl will not be able to access the nodes.
Finally open the ClusterControl web application by going to
http://your_vultr_public_ipv4/clustercontrol and deploy your first database:
For further documentation and help see ClusterControl documentation