Scalability and Performance
your data for performance
Manage and prioritize
to meet tight SLAs
Any SQL Workload
- Full ACID support with high performance at scale
- Multi-row transactions
- Low latency, auto-sharded row storage with primary keys
- Secondary indexes, triggers, and stored procedures
- Distributed joins
- High throughput column storage
- In database analytic and window functions
- Flexible distribution options
Automatic, Efficient Query Execution
Under the covers, Splice Machine implements two separately scalable SQL execution engines tailored to efficiently process workloads that previously required two completely different databases.
Queries are evaluated by a sophisticated cost-based optimizer that chooses the optimal execution option based on statistical properties of the database and query structure.
This process is completely automatic and requires no special syntax or user knowledge.
Splice Machine supports a comprehensive set of standard SQL functionality from the SQL-86, SQL-89, SQL-92, SQL-99, SQL-2003, and SQL-2008 standards. Many proprietary SQL syntax extensions from legacy databases like DB2 and Oracle are also supported.
Additionally, Splice Machine provides utilities that can extract data and schemas and translate currently unsupported syntax.
Flexible workload capabilities, extensive syntax support, and migration tools work together to minimize the time, effort, and cost of database migration.
FLEXIBLE INGEST CAPABILITIES
Fully Parallel Batch Loading
Data can be loaded in batches using the full parallelism of the cluster.
Integration with message brokers like Kafka and support for Spark Structured Streaming enable powerful streaming architectures.
Real Time De-duplication and Updates
Updates to records and elimination of duplicate records can be processed as data is ingested.
SECURITY AND MANAGEMENT
Role Based Access Control
User and group access control at the database, table, column level.
All database activities are logged to support information access security requirements.
Native, LDAP, and Kerberos authentication.
Data can be encrypted at rest and in-transit.
Performance and activity monitoring.