Skip to content

Latest commit

 

History

History
 
 

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

README.md

Production Cluster Profiles

This directory contains cluster configuration profiles optimized for production environments with high availability, performance, and reliability.

Available Profiles

High-Memory Analysis Cluster

  • Profile: high-memory.yaml
  • Use Case: Large-scale data analysis, memory-intensive workloads
  • Resources: High memory allocation, optimized for analytics
  • Features: Enhanced monitoring, backup, and recovery

High-Performance Computing Cluster

  • Profile: high-performance.yaml
  • Use Case: CPU-intensive processing, real-time analytics
  • Resources: High-performance CPUs, optimized networking
  • Features: Low-latency configuration, performance monitoring

Enterprise Analytics Cluster

  • Profile: enterprise-analytics.yaml
  • Use Case: Business-critical data analytics and reporting
  • Resources: Balanced compute and memory for enterprise workloads
  • Features: High availability, automated backup, SLA monitoring

Usage

# Create a high-memory production cluster
dataproc-mcp create_cluster_from_profile \
  --profile production/high-memory \
  --cluster-name prod-analytics-cluster

# Create an enterprise analytics cluster
dataproc-mcp create_cluster_from_profile \
  --profile production/enterprise-analytics \
  --cluster-name analytics-prod-cluster

Production Features

  • High Availability: Multi-zone deployment for fault tolerance
  • Security: Enhanced security configurations and encryption
  • Monitoring: Comprehensive logging and alerting
  • Backup: Automated data backup and recovery
  • Performance: Optimized for production workloads
  • Compliance: Meets enterprise security and compliance requirements

Best Practices

  1. Use dedicated instances for consistent performance
  2. Enable monitoring and alerting for all clusters
  3. Configure automated backups for critical data
  4. Implement proper security controls and access management
  5. Monitor costs and usage for optimization opportunities
  6. Plan for disaster recovery and business continuity

Security Considerations

  • Network isolation: Private subnets and VPC configuration
  • Access controls: IAM roles and service account management
  • Encryption: Data encryption at rest and in transit
  • Audit logging: Comprehensive audit trail for compliance
  • Vulnerability management: Regular security updates and patches

For development and testing, see the development profiles.