Keyspace is a container for application data, which corresponds to a schema in a relational database. It is used to group column family. Each application in a cluster has only one keyspace.
When you create a keyspace, you can specify a replication_factor to indicate several replicas:
To create a method:
(Method 1: Use the "DATA Modeling" in Opscenter)
You can also use the command line CASSANDRA-CLI:
CREATE keyspace Charles_learn_cassandra with
Cassandra supports multiple data types at the CQL language level.
CQL type
corresponding Java type
Describe
Ascii
String
ASCII string
bigint
Long
64-bit integer
Blob
Bytebuffer/byte[]
Binary arrays
Boolean
Boolean
Boolean
Counter
Long
Counter, support the increase or decrease of atomicity, do not suppo
Source: comparison of various nosql databases in http://hi.baidu.com/eastdoor/blog/item/758d0e3eedb5d92471cf6c14.html Cassandra, MongoDB, CouchDB, Redis, Riak, HBaseCouchDBDevelopment language: ErlangMain advantages: data consistency and ease of useLicense: ApacheProtocol: HTTP/RESTApplicable: accumulated, less changed data. Or a large number of versions are required.Example: CRM, CMS systems. multi-site deployment is allowed.RedisDevelopment language
Use the Nodetool tool that under the Cassandra/bin directoryNodetool statusThere is and nodes has been off line.Nodetool Removenode 199553f1-f310-41e1-b4a4-f5a1fef7d1b8Wait for a momentAnd on Cassandra Server terminal you'll see:INFO 10:50:36 Removing Host:199553f1-f310-41e1-b4a4-f5a1fef7d1b8INFO 10:50:36 sleeping for 30000ms to ensure/192.168.1.201 does no changeINFO 10:51:06 Advertising Removal for/192.16
All nodes in the Cassandra cluster are peers, so read/write operations can occur on any node in the cluster, and perhaps this node does not require read/write data, so the node that interacts with the user becomes the coordinator node.
Write request for single data center:
When the client is sent to the coordinator node, the coordinator node sends the write request to all nodes in the cluster that have a replica of the target row (target node), such
The column family in the Cassandra corresponds to a table in the relational database that is used to store rows and fields.
Column number in column family is not fixed
In a relational database, each row contains the same number of fields. However, in Cassandra, although column family can define the metadata for column (metadata), the actual number of fields per line is determined by the client program, so
)
-local
--in-local-dc
Use to only repair nodes in the same datacenter.
-pr
--partitioner-range
Run a repair the partition ranges that is primary on a replica.
-seq Start_token
--sequentialstart_token
Run a sequential repair.
-st Start_token
--start-tokenstart_token
Specify the token (Start_token) at which the repair range starts.
-tr
--trace
Trace the repair. Traces is logged tosystem_traces.even
In mid-May 2016, the cassandra3.4 version was used without a lot of tests due to the urgency of the project's launch, when it was deployed on 3 16G Windows system servers. A few months of use, most of the problems are the downtime caused by oom. In particular, there was an outage, and after restarting the database, it was discovered that memory was rising, and that was the case with multiple reboots. The possible reason for this observation is that the default compact policy taken by the databas
You need to import the jar:Cassandra-driver-core-3.0.0-beta1-bb1bce4-snapshot-shaded.jarGuava-18.0.jarLog4j-1.2.17.jarMetrics-core-3.1.0.jarSlf4j-api-1.7.7.jarSlf4j-log4j12-1.7.5.jarCode:Cluster Cluster = Cluster.builder (). Addcontactpoint ("192.168.1.103"). Build (); Session session = Cluster.connect (); String CQL = "SELECT * from Demodb.afttre;"; ResultSet ResultSet = Session.execute (CQL);iteratorJava implementation of Cassandra additions and del
Token is a very important concept in the Cassandra cluster because it affects the range of data that each node governs: We use the program to generate the token and then allocate it to each node:
We use the following code to generate the token:
#! /usr/bin/python
Import sys
if (len (SYS.ARGV) > 1):
num=int (sys.argv[1])
else:
num=int (raw_ Input ("How many nodes are in your cluster?"))
For I in range (0, num):
print ' token%d:%d '% (I, (i* (
Label:11g new Features-automatic SQL tuning (Automatic SQL Tuning) In Oracle 10g, an automatic SQL Tuning feature was introduced. In addition, ADDM monitors SQL statements that capture high loads. In Oracle 11g, the automatic SQL Tuning feature is enhanced by running SQL Tuning
Label:Original: SQL Server Tuning series advanced (How to index tuning)ObjectiveIn the previous article we analyzed the role of statistical information in the database, and we have learned how the database uses statistics to control the distribution of the contents of tables in the database. Children's shoes are not clear and can be clicked for reference.As a tuning
11g new Features-automatic SQL tuning (Automatic SQL Tuning)In Oracle 10g, an automatic SQL Tuning feature was introduced. In addition, ADDM monitors SQL statements that capture high loads.In Oracle 11g, the automatic SQL Tuning feature is enhanced by running SQL Tuning Advi
in 10g, Oracle launched its own SQL optimization aids : SQL Optimizer (SQL Tuning Advisor :STA) , it is the new Dbms_sqltune package. Use the STA to make sure that the optimizer is in CBO mode. but I think that using this tool is only suitable for people who don't understand SQL at all, and don't think that tools can solve problems. SQL is ultimately an expression of a business, how the tool might understand the business. SQL
I will share 11 practical tips on Java performance tuning and java Tuning
Most developers think that performance optimization is a complicated problem and requires a lot of experience and knowledge. Yes, it is not wrong. It is not easy to optimize the application to achieve the best performance, but it does not mean that you cannot do anything before getting the experience and knowledge. Below are a few sug
SQL Server Performance Tuning methodology and common tools, SQL Server Tuning
In earlier articles, we mentioned the DETECT methodology in Performance Tuning. Here we will briefly review the DETECT methodology.
Discover the problem: found the problem
Lead e the conditions: Explore causes
Track down possible approaches: provides possible solutions
Execute the most
Today, developers continue to develop and deploy applications that use lamp (linux®, Apache, MySQL, and Php/perl) architectures. However, server administrators often have little control over the application itself, because the application is written by someone else. This article focuses on tuning the database layer to achieve maximum efficiency.
About MySQL Tuning
There are 3 ways to speed up the running
A basic knowledge
1.1 What is the performance
Before performance tuning, let's first look at what performance is. As for performance, I think everyone who has studied Java can list a few points or even talk about it. In the book "Java TM Platform Performance", the following five aspects are defined as criteria for evaluating performance:
1 performance of the operation-which algorithm is the best performing performance?
2 memory allocation-How much
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.