SlideShare una empresa de Scribd logo
1 de 120
Descargar para leer sin conexión
Introduction to
   Cassandra
Wellington Python User Group
Aaron Morton @aaronmorton
          1/12/2010
Disclaimer.
This is an introduction not
        a reference.
I may, from time to time
and for the best possible
  reasons, bullshit you.
What do you already know
   about Cassandra?
Get ready.
The next slide has a lot on
            it.
Cassandra is a distributed,
 fault tolerant, scalable,
 column oriented data
          store.
A word about “column
     oriented”.
Relax.
It’s different to a row
oriented DB like MySQL.
             So...
For now, think about keys
 and values. Where each
  value is a hash / dict.
{‘foo’ : {‘bar’ : ‘baz’,},}

  {key : {col_name :
     col_value,},}
Cassandra’s data model and
 on disk storage are based
  on the Google Bigtable
     paper from 2006.
The distributed cluster
 design is based on the
Amazon Dynamo paper
      from 2007.
Easy.
Lets store ‘foo’ somewhere.
'foo'
But I want to be able to
read it back if one machine
            fails.
Lets distribute it on 3 of
  the 5 nodes I have.
This is the Replication
         Factor.
   Called RF or N.
Each node has a token that
identifies the upper value of
     the key range it is
       responsible for.
#1
       <= E




 #5            #2
<= Z          <= J




 #4            #3
<= T          <= O
Client connects to a
random node and asks it to
coordinate storing the ‘foo’
           key.
Each node knows about all
other nodes in the cluster,
  including their tokens.
This is achieved using a
  Gossip protocol. Every
 second each node shares
it’s full view of the cluster
 with 1 to 3 other nodes.
Our coordinator is node 5.
    It knows node 2 is
 responsible for the ‘foo’
           key.
#1
Client
         <= E




 #5              #2
<= Z            'foo'




 #4              #3
<= T            <= O
But there is a problem...
What if we have lots of
values between F and J?
We end up with a “hot”
 section in our ring of
        nodes.
That’s bad mmmkay?
You shouldn't have a hot
  section in your ring.
       mmmkay?
A Partitioner is used to
 apply a transform to the
key. The transformed values
are also used to define the
      range for a node.
The Random Partitioner
 applies a MD5 transform.
 The range of all possible
keys values is changed to a
      128 bit number.
There are other
 Partitioners, such as the
    Order Preserving
Partitioner. But start with
 the Random Partitioner.
Let’s pretend all keys are
 now transformed to an
integer between 0 and 9.
Our 5 node cluster now
      looks like.
#1
       <= 2




 #5            #2
<= 0          <= 4




 #4            #3
<= 8          <= 6
Pretend our ‘foo’ key
  transforms to 3.
#1
Client
         <= 2




 #5             #2
<= 0            "3"




 #4              #3
<= 8            <= 6
Good start.
But where are the replicas?
 We want to replicate the
     ‘foo’ key 3 times.
A Replication Strategy is
 used to determine which
nodes should store replicas.
It’s also used to work out
which nodes should have a
    value when reading.
Simple Strategy orders the
 nodes by their token and
    places the replicas
clockwise around the ring.
Network Topology Strategy
 is aware of the racks and
Data Centres your servers
  are in. Can split replicas
       between DC’s.
Simple Strategy will do in
       most cases.
Our coordinator will send
the write to all 3 nodes at
          once.
#1
Client
         <= 2




 #5             #2
<= 0            "3"




 #4             #3
 "3"            "3"
Once the 3 replicas tell the
   coordinator they have
finished, it will tell the client
   the write completed.
Done.
Let’s go home.
Hang on.
What about fault tolerant?
What if node #4 is down?
#1
Client
         <= 2




 #5             #2
<= 0            "3"




 #4             #3
 "3"            "3"
After all, two out of three
          ain’t bad.
The client must specify a
Consistency Level for each
        operation.
Consistency Level specifies
  how many nodes must
agree before the operation
       is a success.
For reads is known as R.
For writes is known as W.
Here are the simple ones
(there are a few more)...
One.
The coordinator will only
  wait for one node to
 acknowledge the write.
Quorum.
N/2 + 1
All.
The cluster will work to
eventually make all copies
  of the data consistent.
To get consistent behaviour
make sure that R + W > N.
    You can do this by...
Always using Quorum for
    read and writes.
          Or...
Use All for writes and One
         for reads.
            Or...
Use All for reads and One
        for writes.
Try our write again, using
Quorum consistency level.
Coordinator will wait for 2
 nodes to complete the
 write before telling the
 client it has completed.
#1
Client
         <= 2




 #5             #2
<= 0            "3"




 #4             #3
 "3"            "3"
What about when node 4
    comes online?
It will not have our “foo”
            key.
Won’t somebody please
think of the “foo” key!?
During our write the
 coordinator will send a
Hinted Handoff to one of
   the online replicas.
Hinted Handoff tells the
  node that one of the
 replicas was down and
needs to be updated later.
#1
Client
         <= 2




 #5               #2
<= 0              "3"




 #4               #3
 "3"              "3"
                send "3"
                 to #4
When node 4 comes back
up, node 3 will eventually
   process the Hinted
 Handoffs and send the
     “foo” key to it.
#1
Client
         <= 2




 #5             #2
<= 0            "3"




 #4             #3
 "3"            "3"
What if the “foo” key is
read before the Hinted
 Handoff is processed?
#1
Client
         <= 2




 #5               #2
<= 0              "3"




 #4               #3
 ""               "3"
                send "3"
                 to #4
At our Quorum CL the
 coordinator asks all nodes
that should have replicas to
     perform the read.
The Replication Strategy is
used by the coordinator to
   find out which nodes
   should have replicas.
Once CL nodes have
returned, their values are
       compared.
If the do not match a Read
Repair process is kicked off.
A timestamp provided by
the client during the write
 is used to determine the
       “latest” value.
The “foo” key is written to
 node 4, and consistency
   achieved, before the
coordinator returns to the
          client.
At lower CL’s the Read
Repair happens in the
  background and is
     probabilistic.
We can force Cassandra to
repair everything using the
   Anti Entropy feature.
Anti Entropy is the main
   feature for achieving
consistency. RR and HH are
       optimisations.
Anti Entropy is started
manually via command line
      or Java JMX.
Great so far.
But ratemylolcats.com is
    going to be huge.
How do I store 100 Million
     pictures of cats?
Add more nodes.
More disk capacity, disk IO,
memory, CPU, network IO.
    More everything.
Except.
Less “work” per node.
Linear scaling.
Clusters of 100+ TB.
And now for the data
      model.
From the outside in.
A Keyspace is the container
  for everything in your
       application.
Keyspaces can be thought
    of as Databases.
A Column Family is a
container for ordered and
   indexed Columns.
Columns have a name,
 value, and timestamp
provided by the client.
The CF indexes the
  columns by name and
supports get operations by
          name.
CF’s do not define which
columns can be stored in
         them.
Column Families have a
large memory overhead.
You typically have few (<10)
 CF’s in your Keyspace. But
      there is no limit.
We have Rows.
Rows have a key.
Rows store columns in one
or more Column Families.
Different rows can store
different columns in the
 same Column Family.
User CF




               username => fred
key => fred
                d_o_b => 04/03



               username => bob
key => bob
               city => wellington
A key can store different
  columns in different
   Column Families.
User CF




                 username => fred
key => fred
                  d_o_b => 04/03



              Timeline CF



                 09:01 => tweet_60
key => fred
                 09:02 => tweet_70
Here comes the Super
Column Family to ruin it all.
Arrgggghhhhh.
A Super Column Family is a
container for ordered and
 indexes Super Columns.
A Super Column has a
name and an ordered and
 indexed list of Columns.
So the Super Column
Family just gives another
   level to our hash.
Social Super CF




key => fred
                     following => {
                  bob => 01/01/2010,
                  tom => 01/02/2010}
                     followers => {
                  bob => 01/01/2010}
How about some code?

Más contenido relacionado

La actualidad más candente

Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Othersnathanurag
 
MPI_Mprobe is good for you
MPI_Mprobe is good for youMPI_Mprobe is good for you
MPI_Mprobe is good for youJeff Squyres
 
Big Data & NoSQL - EFS'11 (Pavlo Baron)
Big Data & NoSQL - EFS'11 (Pavlo Baron)Big Data & NoSQL - EFS'11 (Pavlo Baron)
Big Data & NoSQL - EFS'11 (Pavlo Baron)Pavlo Baron
 
Wireshark tcp - 2110165028
Wireshark tcp - 2110165028Wireshark tcp - 2110165028
Wireshark tcp - 2110165028Nanda Afif
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18jemtallon
 
Remote Procedure Call
Remote Procedure CallRemote Procedure Call
Remote Procedure CallNadia Nahar
 
Huffman's Alforithm
Huffman's AlforithmHuffman's Alforithm
Huffman's AlforithmRoohaali
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:Asad Ali
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesramya marichamy
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2AfiqEfendy Zaen
 

La actualidad más candente (20)

Ch02
Ch02Ch02
Ch02
 
Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Others
 
MPI_Mprobe is good for you
MPI_Mprobe is good for youMPI_Mprobe is good for you
MPI_Mprobe is good for you
 
Big Data & NoSQL - EFS'11 (Pavlo Baron)
Big Data & NoSQL - EFS'11 (Pavlo Baron)Big Data & NoSQL - EFS'11 (Pavlo Baron)
Big Data & NoSQL - EFS'11 (Pavlo Baron)
 
Wireshark tcp - 2110165028
Wireshark tcp - 2110165028Wireshark tcp - 2110165028
Wireshark tcp - 2110165028
 
Wireshark tcp
Wireshark tcpWireshark tcp
Wireshark tcp
 
Huffman Codes
Huffman CodesHuffman Codes
Huffman Codes
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
CISSP Week 18
CISSP Week 18CISSP Week 18
CISSP Week 18
 
Remote Procedure Call
Remote Procedure CallRemote Procedure Call
Remote Procedure Call
 
Huffman's Alforithm
Huffman's AlforithmHuffman's Alforithm
Huffman's Alforithm
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Huffman
HuffmanHuffman
Huffman
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
 

Similar a Nzpug welly-cassandra-02-12-2010

Introduction to Cassandra
Introduction to CassandraIntroduction to Cassandra
Introduction to Cassandraaaronmorton
 
Cassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User GroupCassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User GroupAdam Hutson
 
Ruby thread safety first
Ruby thread safety firstRuby thread safety first
Ruby thread safety firstEmily Stolfo
 
Kafka & Storm - FifthElephant 2015 by @bhaskerkode, Helpshift
Kafka & Storm - FifthElephant 2015 by @bhaskerkode, HelpshiftKafka & Storm - FifthElephant 2015 by @bhaskerkode, Helpshift
Kafka & Storm - FifthElephant 2015 by @bhaskerkode, HelpshiftBhasker Kode
 
Cassandra Architecture
Cassandra ArchitectureCassandra Architecture
Cassandra ArchitecturePrasad Wali
 
Webinar Back to Basics 3 - Introduzione ai Replica Set
Webinar Back to Basics 3 - Introduzione ai Replica SetWebinar Back to Basics 3 - Introduzione ai Replica Set
Webinar Back to Basics 3 - Introduzione ai Replica SetMongoDB
 
Pharo, an innovative and open-source Smalltalk
Pharo, an innovative and open-source SmalltalkPharo, an innovative and open-source Smalltalk
Pharo, an innovative and open-source SmalltalkSerge Stinckwich
 
running stable diffusion on android
running stable diffusion on androidrunning stable diffusion on android
running stable diffusion on androidKoan-Sin Tan
 
Notes on assignment in r
Notes on assignment in rNotes on assignment in r
Notes on assignment in rTJ Mahr
 
Redis cluster
Redis clusterRedis cluster
Redis clusteriammutex
 
The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.Jonathan Oliver
 
Coding in Disaster Relief - Worksheet (Advanced)
Coding in Disaster Relief - Worksheet (Advanced)Coding in Disaster Relief - Worksheet (Advanced)
Coding in Disaster Relief - Worksheet (Advanced)Charling Li
 
Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Alec Muffett
 
Cassandra introduction apache con 2014 budapest
Cassandra introduction apache con 2014 budapestCassandra introduction apache con 2014 budapest
Cassandra introduction apache con 2014 budapestDuyhai Doan
 
Ruby -the wheel Technology
Ruby -the wheel TechnologyRuby -the wheel Technology
Ruby -the wheel Technologyppparthpatel123
 
When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...
When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...
When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...confluent
 
DIY: A distributed database cluster, or: MySQL Cluster
DIY: A distributed database cluster, or: MySQL ClusterDIY: A distributed database cluster, or: MySQL Cluster
DIY: A distributed database cluster, or: MySQL ClusterUlf Wendel
 

Similar a Nzpug welly-cassandra-02-12-2010 (20)

Introduction to Cassandra
Introduction to CassandraIntroduction to Cassandra
Introduction to Cassandra
 
Cassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User GroupCassandra & Python - Springfield MO User Group
Cassandra & Python - Springfield MO User Group
 
Cassandra 101
Cassandra 101Cassandra 101
Cassandra 101
 
Ruby thread safety first
Ruby thread safety firstRuby thread safety first
Ruby thread safety first
 
Kafka & Storm - FifthElephant 2015 by @bhaskerkode, Helpshift
Kafka & Storm - FifthElephant 2015 by @bhaskerkode, HelpshiftKafka & Storm - FifthElephant 2015 by @bhaskerkode, Helpshift
Kafka & Storm - FifthElephant 2015 by @bhaskerkode, Helpshift
 
Kafka 101
Kafka 101Kafka 101
Kafka 101
 
Cassandra Architecture
Cassandra ArchitectureCassandra Architecture
Cassandra Architecture
 
Webinar Back to Basics 3 - Introduzione ai Replica Set
Webinar Back to Basics 3 - Introduzione ai Replica SetWebinar Back to Basics 3 - Introduzione ai Replica Set
Webinar Back to Basics 3 - Introduzione ai Replica Set
 
Pharo, an innovative and open-source Smalltalk
Pharo, an innovative and open-source SmalltalkPharo, an innovative and open-source Smalltalk
Pharo, an innovative and open-source Smalltalk
 
running stable diffusion on android
running stable diffusion on androidrunning stable diffusion on android
running stable diffusion on android
 
Notes on assignment in r
Notes on assignment in rNotes on assignment in r
Notes on assignment in r
 
Redis cluster
Redis clusterRedis cluster
Redis cluster
 
The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.The 1990s Called. They Want Their Code Back.
The 1990s Called. They Want Their Code Back.
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Coding in Disaster Relief - Worksheet (Advanced)
Coding in Disaster Relief - Worksheet (Advanced)Coding in Disaster Relief - Worksheet (Advanced)
Coding in Disaster Relief - Worksheet (Advanced)
 
Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018
 
Cassandra introduction apache con 2014 budapest
Cassandra introduction apache con 2014 budapestCassandra introduction apache con 2014 budapest
Cassandra introduction apache con 2014 budapest
 
Ruby -the wheel Technology
Ruby -the wheel TechnologyRuby -the wheel Technology
Ruby -the wheel Technology
 
When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...
When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...
When it Absolutely, Positively, Has to be There: Reliability Guarantees in Ka...
 
DIY: A distributed database cluster, or: MySQL Cluster
DIY: A distributed database cluster, or: MySQL ClusterDIY: A distributed database cluster, or: MySQL Cluster
DIY: A distributed database cluster, or: MySQL Cluster
 

Más de aaronmorton

Cassandra South Bay Meetup - Backup And Restore For Apache Cassandra
Cassandra South Bay Meetup - Backup And Restore For Apache CassandraCassandra South Bay Meetup - Backup And Restore For Apache Cassandra
Cassandra South Bay Meetup - Backup And Restore For Apache Cassandraaaronmorton
 
Cassandra SF Meetup - CQL Performance With Apache Cassandra 3.X
Cassandra SF Meetup - CQL Performance With Apache Cassandra 3.XCassandra SF Meetup - CQL Performance With Apache Cassandra 3.X
Cassandra SF Meetup - CQL Performance With Apache Cassandra 3.Xaaronmorton
 
Cassandra Day Atlanta 2016 - Monitoring Cassandra
Cassandra Day Atlanta 2016  - Monitoring CassandraCassandra Day Atlanta 2016  - Monitoring Cassandra
Cassandra Day Atlanta 2016 - Monitoring Cassandraaaronmorton
 
Cassandra London March 2016 - Lightening talk - introduction to incremental ...
Cassandra London March 2016  - Lightening talk - introduction to incremental ...Cassandra London March 2016  - Lightening talk - introduction to incremental ...
Cassandra London March 2016 - Lightening talk - introduction to incremental ...aaronmorton
 
Cassandra SF 2015 - Repeatable, Scalable, Reliable, Observable Cassandra
Cassandra SF 2015 - Repeatable, Scalable, Reliable, Observable CassandraCassandra SF 2015 - Repeatable, Scalable, Reliable, Observable Cassandra
Cassandra SF 2015 - Repeatable, Scalable, Reliable, Observable Cassandraaaronmorton
 
Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL
Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL
Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL aaronmorton
 
Cassandra TK 2014 - Large Nodes
Cassandra TK 2014 - Large NodesCassandra TK 2014 - Large Nodes
Cassandra TK 2014 - Large Nodesaaronmorton
 
Cassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break Glass
Cassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break GlassCassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break Glass
Cassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break Glassaaronmorton
 
Cassandra Community Webinar - August 22 2013 - Cassandra Internals
Cassandra Community Webinar - August 22 2013 - Cassandra InternalsCassandra Community Webinar - August 22 2013 - Cassandra Internals
Cassandra Community Webinar - August 22 2013 - Cassandra Internalsaaronmorton
 
Cassandra SF 2013 - In Case Of Emergency Break Glass
Cassandra SF 2013 - In Case Of Emergency Break GlassCassandra SF 2013 - In Case Of Emergency Break Glass
Cassandra SF 2013 - In Case Of Emergency Break Glassaaronmorton
 
Cassandra SF 2013 - Cassandra Internals
Cassandra SF 2013 - Cassandra InternalsCassandra SF 2013 - Cassandra Internals
Cassandra SF 2013 - Cassandra Internalsaaronmorton
 
Cassandra Community Webinar - Introduction To Apache Cassandra 1.2
Cassandra Community Webinar  - Introduction To Apache Cassandra 1.2Cassandra Community Webinar  - Introduction To Apache Cassandra 1.2
Cassandra Community Webinar - Introduction To Apache Cassandra 1.2aaronmorton
 
Apache Cassandra in Bangalore - Cassandra Internals and Performance
Apache Cassandra in Bangalore - Cassandra Internals and PerformanceApache Cassandra in Bangalore - Cassandra Internals and Performance
Apache Cassandra in Bangalore - Cassandra Internals and Performanceaaronmorton
 
Apache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra InternalsApache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra Internalsaaronmorton
 
Cassandra SF 2012 - Technical Deep Dive: query performance
Cassandra SF 2012 - Technical Deep Dive: query performance Cassandra SF 2012 - Technical Deep Dive: query performance
Cassandra SF 2012 - Technical Deep Dive: query performance aaronmorton
 
Hello @world #cassandra
Hello @world #cassandraHello @world #cassandra
Hello @world #cassandraaaronmorton
 
Cassandra does what ? Code Mania 2012
Cassandra does what ? Code Mania 2012Cassandra does what ? Code Mania 2012
Cassandra does what ? Code Mania 2012aaronmorton
 
Building a distributed Key-Value store with Cassandra
Building a distributed Key-Value store with CassandraBuilding a distributed Key-Value store with Cassandra
Building a distributed Key-Value store with Cassandraaaronmorton
 
Cassandra - Wellington No Sql
Cassandra - Wellington No SqlCassandra - Wellington No Sql
Cassandra - Wellington No Sqlaaronmorton
 

Más de aaronmorton (19)

Cassandra South Bay Meetup - Backup And Restore For Apache Cassandra
Cassandra South Bay Meetup - Backup And Restore For Apache CassandraCassandra South Bay Meetup - Backup And Restore For Apache Cassandra
Cassandra South Bay Meetup - Backup And Restore For Apache Cassandra
 
Cassandra SF Meetup - CQL Performance With Apache Cassandra 3.X
Cassandra SF Meetup - CQL Performance With Apache Cassandra 3.XCassandra SF Meetup - CQL Performance With Apache Cassandra 3.X
Cassandra SF Meetup - CQL Performance With Apache Cassandra 3.X
 
Cassandra Day Atlanta 2016 - Monitoring Cassandra
Cassandra Day Atlanta 2016  - Monitoring CassandraCassandra Day Atlanta 2016  - Monitoring Cassandra
Cassandra Day Atlanta 2016 - Monitoring Cassandra
 
Cassandra London March 2016 - Lightening talk - introduction to incremental ...
Cassandra London March 2016  - Lightening talk - introduction to incremental ...Cassandra London March 2016  - Lightening talk - introduction to incremental ...
Cassandra London March 2016 - Lightening talk - introduction to incremental ...
 
Cassandra SF 2015 - Repeatable, Scalable, Reliable, Observable Cassandra
Cassandra SF 2015 - Repeatable, Scalable, Reliable, Observable CassandraCassandra SF 2015 - Repeatable, Scalable, Reliable, Observable Cassandra
Cassandra SF 2015 - Repeatable, Scalable, Reliable, Observable Cassandra
 
Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL
Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL
Cassandra sf 2015 - Steady State Data Size With Compaction, Tombstones, and TTL
 
Cassandra TK 2014 - Large Nodes
Cassandra TK 2014 - Large NodesCassandra TK 2014 - Large Nodes
Cassandra TK 2014 - Large Nodes
 
Cassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break Glass
Cassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break GlassCassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break Glass
Cassandra Community Webinar August 29th 2013 - In Case Of Emergency, Break Glass
 
Cassandra Community Webinar - August 22 2013 - Cassandra Internals
Cassandra Community Webinar - August 22 2013 - Cassandra InternalsCassandra Community Webinar - August 22 2013 - Cassandra Internals
Cassandra Community Webinar - August 22 2013 - Cassandra Internals
 
Cassandra SF 2013 - In Case Of Emergency Break Glass
Cassandra SF 2013 - In Case Of Emergency Break GlassCassandra SF 2013 - In Case Of Emergency Break Glass
Cassandra SF 2013 - In Case Of Emergency Break Glass
 
Cassandra SF 2013 - Cassandra Internals
Cassandra SF 2013 - Cassandra InternalsCassandra SF 2013 - Cassandra Internals
Cassandra SF 2013 - Cassandra Internals
 
Cassandra Community Webinar - Introduction To Apache Cassandra 1.2
Cassandra Community Webinar  - Introduction To Apache Cassandra 1.2Cassandra Community Webinar  - Introduction To Apache Cassandra 1.2
Cassandra Community Webinar - Introduction To Apache Cassandra 1.2
 
Apache Cassandra in Bangalore - Cassandra Internals and Performance
Apache Cassandra in Bangalore - Cassandra Internals and PerformanceApache Cassandra in Bangalore - Cassandra Internals and Performance
Apache Cassandra in Bangalore - Cassandra Internals and Performance
 
Apache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra InternalsApache Con NA 2013 - Cassandra Internals
Apache Con NA 2013 - Cassandra Internals
 
Cassandra SF 2012 - Technical Deep Dive: query performance
Cassandra SF 2012 - Technical Deep Dive: query performance Cassandra SF 2012 - Technical Deep Dive: query performance
Cassandra SF 2012 - Technical Deep Dive: query performance
 
Hello @world #cassandra
Hello @world #cassandraHello @world #cassandra
Hello @world #cassandra
 
Cassandra does what ? Code Mania 2012
Cassandra does what ? Code Mania 2012Cassandra does what ? Code Mania 2012
Cassandra does what ? Code Mania 2012
 
Building a distributed Key-Value store with Cassandra
Building a distributed Key-Value store with CassandraBuilding a distributed Key-Value store with Cassandra
Building a distributed Key-Value store with Cassandra
 
Cassandra - Wellington No Sql
Cassandra - Wellington No SqlCassandra - Wellington No Sql
Cassandra - Wellington No Sql
 

Nzpug welly-cassandra-02-12-2010