Get a Lindorm instance up and running by selecting configurations, creating the instance, configuring access control, and connecting to it.
Select engines and configurations
Before you create a Lindorm instance, select the required configurations based on your business scenarios, access loads, access mode, and capacity. For more information, see Select configurations for a Lindorm instance.
Getting started workflow
The following figure and table describe how to get started with a Lindorm instance.
|
Step |
Description |
|
Specify instance information such as specifications and storage based on your business requirements. |
|
|
Configure an IP address whitelist to control access to the Lindorm instance. Only whitelisted IP addresses can connect, which prevents unauthorized access and improves database security. |
|
|
Connect to the Lindorm instance by using methods such as APIs, Cassandra Query Language (CQL), and shells. |