Scalability and Performance

Scales Horizontally

Automatically distributes
your data for performance
and durability

Manage and prioritize
your workload
to meet tight SLAs
Any SQL Workload
Operational Workloads
- Full ACID support with high performance at scale
- Multi-row transactions
- Low latency, auto-sharded row storage with primary keys
- Secondary indexes, triggers, and stored procedures

Analytical Workloads
- Distributed joins
- High throughput column storage
- In database analytic and window functions
- Flexible distribution options

Automatic, Efficient Query Execution
Under the covers, Splice Machine implements two separately scalable SQL execution engines tailored to efficiently process workloads that previously required two completely different databases.
Queries are evaluated by a sophisticated cost-based optimizer that chooses the optimal execution option based on statistical properties of the database and query structure.
This process is completely automatic and requires no special syntax or user knowledge.
EASY MIGRATION
Splice Machine supports a comprehensive set of standard SQL functionality from the SQL-86, SQL-89, SQL-92, SQL-99, SQL-2003, and SQL-2008 standards. Many proprietary SQL syntax extensions from legacy databases like DB2 and Oracle are also supported.
Additionally, Splice Machine provides utilities that can extract data and schemas and translate currently unsupported syntax.
Flexible workload capabilities, extensive syntax support, and migration tools work together to minimize the time, effort, and cost of database migration.
FLEXIBLE INGEST CAPABILITIES

Fully Parallel Batch Loading
Data can be loaded in batches using the full parallelism of the cluster.

Stream Ingestion
Integration with message brokers like Kafka and support for Spark Structured Streaming enable powerful streaming architectures.

Real Time De-duplication and Updates
Updates to records and elimination of duplicate records can be processed as data is ingested.
SECURITY AND MANAGEMENT
Role Based Access Control
User and group access control at the database, table, column level.
Auditing
All database activities are logged to support information access security requirements.
Authentication
Native, LDAP, and Kerberos authentication.
Encryption
Data can be encrypted at rest and in-transit.
Monitoring
Performance and activity monitoring.
TRY SPLICE MACHINE
Focus on Building Your Intelligent Application, Not Cloud Infrastructure