Accumulo: Application Development, Table Design, and Best by Aaron Cordova, Billie Rinaldi, Michael Wall

By Aaron Cordova, Billie Rinaldi, Michael Wall

Wake up to hurry on Apache Accumulo, the versatile, high-performance key/value shop created by way of the nationwide protection organisation (NSA) and in response to Google’s BigTable facts garage process. Written by means of former NSA workforce contributors, this accomplished instructional and reference covers Accumulo structure, program improvement, desk layout, and cell-level security.

With transparent details on approach management, functionality tuning, and top practices, this booklet is perfect for builders trying to write Accumulo purposes, directors charged with fitting and keeping Accumulo, and different pros drawn to what Accumulo has to provide. you can find every thing you should utilize the program fully.

Get a high-level advent to Accumulo’s structure and information model
Take a fast travel via unmarried- and multiple-node installations, information ingest, and query
the way to write Accumulo functions for numerous use situations, in accordance with examples
Dive into Accumulo internals, together with info now not on hand within the documentation
Get exact details for fitting, administering, tuning, and measuring performance
research top practices in accordance with profitable implementations within the field
locate solutions to universal questions that each new Accumulo consumer asks

Show description

Read Online or Download Accumulo: Application Development, Table Design, and Best Practices PDF

Similar design books

Dwell (November 2015)

Stay is the original glossy structure and layout journal for those that think that strong layout is an essential component of actual lifestyles.

Computer-Aided Design of User Interfaces VI

This publication gathers the most recent event of specialists, study groups and leadning enterprises all in favour of computer-aided layout of person interactive purposes. This region investigates the way it is fascinating and attainable to aid, to facilitate and to hurry up the necessities engineering lifestyles cycle of any interactive system:requirements engineering, early-stage layout, exact layout, improvement, deployment, assessment and upkeep.

Additional info for Accumulo: Application Development, Table Design, and Best Practices

Example text

Looking at data retrieved in the Accumulo shell, which we touch on first in “Demo of the Shell” on page 60, a row will actually be many lines on the screen. Figure 1-8 may be a more familiar representation of the data, and you can see how it might translate into Accumulo in Figure 1-9. In this example, a row, defined as a set of key-value pairs, is analogous to a record in a relational data‐ base. Everything with the same row ID contains information about a given record. 16 | Chapter 1: Architecture and Data Model Figure 1-9.

Introduction to the Client API | 29 Figure 1-21. Writing mutations Scanner Key-value pairs are read out of a table using a Scanner object. A scanner can start at the beginning of a table or at a particular key, and can stop at the end of the table or a given key. After seeking to the initial key, scanners proceed to read out key-value pairs sequentially in key order until reaching the end of the table or the specified ending key. Scanners can be configured to read only certain columns. Additional configuration for a scanner can be made to apply additional logic classes called iterators, and specific options to iterators, to alter the set of keyvalue pairs returned from a particular scanner.

Introduction to the Client API | 29 Figure 1-21. Writing mutations Scanner Key-value pairs are read out of a table using a Scanner object. A scanner can start at the beginning of a table or at a particular key, and can stop at the end of the table or a given key. After seeking to the initial key, scanners proceed to read out key-value pairs sequentially in key order until reaching the end of the table or the specified ending key. Scanners can be configured to read only certain columns. Additional configuration for a scanner can be made to apply additional logic classes called iterators, and specific options to iterators, to alter the set of keyvalue pairs returned from a particular scanner.

Download PDF sample

Rated 4.97 of 5 – based on 4 votes