SlideShare a Scribd company logo
1 of 86
Download to read offline
DataStax Enterprise & Apache Cassandra
Essentials for Financial Services
Daniel Cohen
Solutions Engineer
Company Confidential© 2015 DataStax, All Rights Reserved. 2
1 Introduction to DataStax Enterprise
2 Technology Overview
3 Architecture in Enterprise
4 Use Cases in Finance
5 Questions?
Company Confidential© 2015 DataStax, All Rights Reserved.
DataStax Enterprise
3
A Purpose-Built
Platform on
Apache Cassandra
Company Confidential© 2015 DataStax, All Rights Reserved.
Certified Apache Cassandra
4
• Certified for production environments
• Rigorous certification process:
– Extensive quality assurance testing
– Performance and scale tests with
1,000 node clusters
– 3rd party software validation
– Defect resolution
• Pass internal certifications and audits
Company Confidential© 2015 DataStax, All Rights Reserved.
Visual Admin
5Confidential
Company Confidential© 2015 DataStax, All Rights Reserved.
Visual Admin
6
• Visual, browser-based user interface
• Installation, configuration, and
administration tasks carried out in
point-and-click fashion
• REST API allows scripting of any
OpsCenter function
• Works on any device (tablet, etc.)
Company Confidential© 2015 DataStax, All Rights Reserved.
Management Services
7
• Repair service – automatically keeps data
consistent across a cluster.

• Capacity service – historical trend analysis
and forecasts future resource needs.

• Performance service – provides insight
into the performance of a cluster with
queryable CQL-based diagnostic objects

• Best Practice service – enforces best
practice rules across many areas (e.g.
security, configuration, etc.) to ensure
proper setup and optimization.

• Proactive alerts and external notifications
Company Confidential© 2015 DataStax, All Rights Reserved.
Enterprise Security
8
Company Confidential© 2015 DataStax, All Rights Reserved.
Enterprise Security
8
Inherited from Open Source Cassandra
Internal authentication (IDs, passwords)
Permission management via GRANT/REVOKE
Client-to-node, node-to-node encryption
Company Confidential© 2015 DataStax, All Rights Reserved.
Enterprise Security
8
Inherited from Open Source Cassandra
Internal authentication (IDs, passwords)
Permission management via GRANT/REVOKE
Client-to-node, node-to-node encryption
DataStax Enterprise Only
External authentication

(eg Kerberos, LDAP/Active Directory)
Transparent data encryption
Data auditing
Company Confidential© 2015 DataStax, All Rights Reserved.
Enterprise Security
8
Inherited from Open Source Cassandra
Internal authentication (IDs, passwords)
Permission management via GRANT/REVOKE
Client-to-node, node-to-node encryption
DataStax Enterprise Only
External authentication

(eg Kerberos, LDAP/Active Directory)
Transparent data encryption
Data auditing
Company Confidential© 2015 DataStax, All Rights Reserved.
Enterprise Support
9
• 24x7x365 Technical Support
• Covers both production and
non-production environments
• Scheduled health checks for
assistance on architecture,
design, and tuning
• Hot-fix support for emergency
maintenance situations
Company Confidential© 2015 DataStax, All Rights Reserved.
DSE Analytics
10
• Integrated Real-Time Analytics
• Integrated Batch Analytics
• External Batch Analytics
– external Hadoop connectivity,
certified to Cloudera, HortonWorks
– link hot transactional data with cold
data from data warehouse / lake
ETL
Company Confidential© 2015 DataStax, All Rights Reserved.
DSE Search
11
• DSE Search inherits all the power and
capabilities of Solr and builds on top of it
• Built-in scale out and continuous
availability for search operations
• Enabled across multiple data centers and
cloud providers
• Search via native API or through CQL
ETL
Company Confidential© 2015 DataStax, All Rights Reserved.
DSE In-Memory
12
• Brings all the goodness of Cassandra
to an in-memory database
• In-Memory tables look and act like
any Cassandra table
• Great for use cases requiring low
latency reads
• Combine with in-memory analytics for
full in-memory transactional /
analytical processing
Company Confidential© 2015 DataStax, All Rights Reserved.
DataStax Enterprise
13
A Purpose-Built
Platform on
Apache Cassandra
Company Confidential© 2015 DataStax, All Rights Reserved. 14
1 Introduction to DataStax Enterprise
2 Technology Overview
3 Architecture in Enterprise
4 Use Cases in Finance
5 Questions?
Company Confidential© 2015 DataStax, All Rights Reserved.
• A Distributed NoSQL Database
• Google BigTable ✖ Amazon Dynamo
• Continuously Available
• Disaster avoidance, not disaster recovery
• Scale Out with Linear Performance
• Just add nodes
• Run on Commodity Hardware
• In the cloud, on premise, or hybrid
What is Apache Cassandra?
15
Company Confidential© 2015 DataStax, All Rights Reserved.
• Fully Distributed
• Data spread over multiple nodes
• All nodes participate in a cluster
• Configurable data replication
• Masterless
• All nodes are equal
• Read from or write to any node
• No Single Point of Failure
Distributed Architecture
16
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Node 3

3rd copy
Company Confidential© 2015 DataStax, All Rights Reserved.
A Quick Vocabulary Lesson
17
Company Confidential© 2015 DataStax, All Rights Reserved.
A Quick Vocabulary Lesson
Replication Factor – RF
• Specifies how many copies of a row of data C* distributes across nodes
• Highly configurable for SLA and network topology (racks, data centers)
CREATE KEYSPACE "Excalibur" WITH REPLICATION =
{'class' : 'NetworkTopologyStrategy', 'NY1' : 3, 'NY2' : 3};
17
Company Confidential© 2015 DataStax, All Rights Reserved.
A Quick Vocabulary Lesson
Replication Factor – RF
• Specifies how many copies of a row of data C* distributes across nodes
• Highly configurable for SLA and network topology (racks, data centers)
CREATE KEYSPACE "Excalibur" WITH REPLICATION =
{'class' : 'NetworkTopologyStrategy', 'NY1' : 3, 'NY2' : 3};
17
Consistency Level – CL
• Specifies how synchronized a row of data must be across C* nodes
• Tunable consistency: client application decides CL for each operation
ANY … ONE … QUORUM … EACH_QUORUM … ALL
Company Confidential© 2015 DataStax, All Rights Reserved.
A Quick Vocabulary Lesson
Replication Factor – RF
• Specifies how many copies of a row of data C* distributes across nodes
• Highly configurable for SLA and network topology (racks, data centers)
CREATE KEYSPACE "Excalibur" WITH REPLICATION =
{'class' : 'NetworkTopologyStrategy', 'NY1' : 3, 'NY2' : 3};
17
Consistency Level – CL
• Specifies how synchronized a row of data must be across C* nodes
• Tunable consistency: client application decides CL for each operation
ANY … ONE … QUORUM … EACH_QUORUM … ALL
Company Confidential© 2015 DataStax, All Rights Reserved.
Multiple Data Centers
18
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Node 3

3rd copy
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Node 3
London DCNew York DC
Company Confidential© 2015 DataStax, All Rights Reserved.
• Need more storage?
Add more nodes.
• Need greater throughput?
Add more nodes.
• Predictable, linear performance gains
Scale Out Linearly
19
Company Confidential© 2015 DataStax, All Rights Reserved.
• Need more storage?
Add more nodes.
• Need greater throughput?
Add more nodes.
• Predictable, linear performance gains
Scale Out Linearly
19
Company Confidential© 2015 DataStax, All Rights Reserved.
• Need more storage?
Add more nodes.
• Need greater throughput?
Add more nodes.
• Predictable, linear performance gains
Scale Out Linearly
19
Company Confidential© 2015 DataStax, All Rights Reserved.
Linear Scale Out at Netflix
20
Source:
The Netflix Tech Blog
http://techblog.netflix.com/
2011/11/benchmarking-
cassandra-scalability-on.html
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Write
Consistency Level = QUORUM
Replication Factor = 3
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Parallel
Write
Write
Consistency Level = QUORUM
Replication Factor = 3
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Parallel
Write
Write
Consistency Level = QUORUM
Replication Factor = 3
5 μs ack
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Parallel
Write
Write
Consistency Level = QUORUM
Replication Factor = 3
5 μs ack
12 μs ack
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Parallel
Write
Write
Consistency Level = QUORUM
Replication Factor = 3
5 μs ack
12 μs ack
12 μs ack
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Parallel
Write
Write
Consistency Level = QUORUM
Replication Factor = 3
5 μs ack
12 μs ack
500 μs ack
12 μs ack
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Node 1
1st copy
Tunable Consistency
21
Parallel
Write
Write
Consistency Level = QUORUM
Replication Factor = 3
5 μs ack
12 μs ack
500 μs ack
12 μs ack
Node 2
2nd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 3

3rd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 3

3rd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Read
Consistency Level = QUORUM
Replication Factor = 3
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 3

3rd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Read
Consistency Level = QUORUM
Replication Factor = 3
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Parallel
Read
Read
Consistency Level = QUORUM
Replication Factor = 3
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Parallel
Read
Read
Consistency Level = QUORUM
Replication Factor = 3
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Parallel
Read
Read
Consistency Level = QUORUM
Replication Factor = 3
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Parallel
Read
Read
Consistency Level = QUORUM
Replication Factor = 3
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Parallel
Read
Read
Consistency Level = QUORUM
Replication Factor = 3
Node 4
Node 2
2nd copy
Node 1
1st copy
Node 3

3rd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Parallel
Read
Read
Consistency Level = QUORUM
Replication Factor = 3
HintsNode 4
Node 2
2nd copy
Node 1
1st copy
Node 3

3rd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Continuous Availability
22
Node 1

1st copy
Node 4
Node 5
Node 2

2nd copy
Parallel
Read
Read
Consistency Level = QUORUM
Replication Factor = 3
HintsNode 4
Node 2
2nd copy
Node 1
1st copy
Node 3

3rd copy
Node 3
3rd copy
Node 4
Node 5
Company Confidential© 2015 DataStax, All Rights Reserved.
Disaster Avoidance
23
Singapore
New York
London
Company Confidential© 2015 DataStax, All Rights Reserved.
Disaster Avoidance
23
Singapore
New York
London
Company Confidential© 2015 DataStax, All Rights Reserved.
Disaster Avoidance
23
Singapore
New York
London
Company Confidential© 2015 DataStax, All Rights Reserved.
Disaster Avoidance
23
Singapore
New York
London
Company Confidential© 2015 DataStax, All Rights Reserved.
Mixed Workload DSE Cluster
Cassandra
Only DC
Transactions
Workload Isolation with DataStax Enterprise
24
Cassandra
+ Spark DC
Analytics
Analytical
Application
Online
Application
Company Confidential© 2015 DataStax, All Rights Reserved.
CQL Example
CREATE TABLE market_prices ( 

	 symbol TEXT,

	 date TIMESTAMP,

	 price DECIMAL,
	 side INT,

	 PRIMARY KEY (symbol, date)

) WITH CLUSTERING ORDER BY
	 (date DESC);
CQL: Cassandra Query Language
• Syntax similar to RDBMS SQL
• Create objects via DDL
• e.g. CREATE…
• INSERT, UPDATE, DELETE
• GRANT, REVOKE
• SELECT…WHERE
• Command line and GUI tools
25
Company Confidential© 2015 DataStax, All Rights Reserved.
• Certified by DataStax:
• Java
• C / C# / C++
• Python
• Node.js
• Ruby
• PHP
• ODBC
• Connector for Apache Spark
• Many community drivers
Drivers & Connectors
26
Company Confidential© 2015 DataStax, All Rights Reserved. 27
1 Introduction to DataStax Enterprise
2 Technology Overview
3 Architecture in Enterprise
4 Use Cases in Finance
5 Questions?
Company Confidential© 2015 DataStax, All Rights Reserved.
DataStax in the Enterprise Ecosystem
28
Offline
Application
External Hadoop Distribution
(e.g. Cloudera, Hortonworks)
OpsCenter
Services
Monitoring
Operations
Operational
Application
Real Time
Search
Real Time
Analytics
Batch
Analytics
RDBMS
Analytics
Transformations
Certified Apache Cassandra – No single point of failure –
Linear Scalability – Disaster Avoidance
Security
In-Memory
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
App
Server
Cache
C* C*
App
Server
Cache
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
App
Server
Cache
C* C*
App
Server
Cache
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
App
Server
Cache
C* C*
App
Server
Cache
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
App
Server
Cache
C* C*
App
Server
Cache
session
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
C* C*
App
Server
Cache
session
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
C* C*
App
Server
Cache
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
C* C*
App
Server
Cache
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
C* C*
App
Server
Cache
session
Company Confidential© 2015 DataStax, All Rights Reserved.
Application Tier Resilience
Example: A Single Session
DC NY1 DC NY2
• Stateless ➜ fault tolerant
• Horizontally scalable
• Store sessions in Cassandra
• Sessions replicate naturally
• Recover on disaster / failure
29
C* C*
App
Server
Cache
session
Company Confidential© 2015 DataStax, All Rights Reserved.
A Resilient Enterprise Architecture
30
DC NY1
C*
DC NY2
C*
DC LDN1
C*
DC LDN2
C*
…DC NY1
App App
App App
DC LDN2
App App
App App
Company Confidential© 2015 DataStax, All Rights Reserved.
A Resilient Enterprise Architecture
30
DC NY1
C*
DC NY2
C*
DC LDN1
C*
DC LDN2
C*
…DC NY1
App App
App App
DC LDN2
App App
App App
Company Confidential© 2015 DataStax, All Rights Reserved.
A Resilient Enterprise Architecture
30
DC NY1
C*
DC NY2
C*
DC LDN1
C*
DC LDN2
C*
…DC NY1
App App
App App
DC LDN2
App App
App App
Company Confidential© 2015 DataStax, All Rights Reserved.
A Resilient Enterprise Architecture
30
DC NY1
C*
DC NY2
C*
DC LDN1
C*
DC LDN2
C*
…DC NY1
App App
App App
DC LDN2
App App
App App
Company Confidential© 2015 DataStax, All Rights Reserved.
A Resilient Enterprise Architecture
30
DC NY1
C*
DC NY2
C*
DC LDN1
C*
DC LDN2
C*
…DC NY1
App App
App App
DC LDN2
App App
App App
Company Confidential© 2015 DataStax, All Rights Reserved.
A Resilient Enterprise Architecture
30
DC NY1
C*
DC NY2
C*
DC LDN1
C*
DC LDN2
C*
…DC NY1
App App
App App
DC LDN2
App App
App App
Company Confidential© 2015 DataStax, All Rights Reserved.
A Resilient Enterprise Architecture
30
DC NY1
C*
DC NY2
C*
DC LDN1
C*
DC LDN2
C*
…DC NY1
App App
App App
DC LDN2
App App
App App
Company Confidential© 2015 DataStax, All Rights Reserved. 31
1 Introduction to DataStax Enterprise
2 Technology Overview
3 Architecture in Enterprise
4 Use Cases in Finance
5 Questions?
Company Confidential© 2015 DataStax, All Rights Reserved.
A Few Use Cases in Financial Services
32
• Payments & Transactions
• Fraud Prevention & Detection
• Real-time Market Risk
• Regulatory Compliance & Reporting
• Authentication & Authorization
• Customer 360° & Portfolio Analysis
• Recommendations & Personalization
• Global Document Search
• Geospatial Search
$ £
€ ¥
🔐 📈
Company Confidential© 2015 DataStax, All Rights Reserved.
• Cassandra dominates time series data
• Extremely high ingest rates
• Low latency retrievals
• Efficient storage
• Capture every tick and trade
• Also important metadata, eg volume
• Real-time risk analysis
Capture Financial Market Data
33
• Example: Blue Mountain Capital Management
• http://www.planetcassandra.org/blog/5-minute-c-
interview-bluemountain-capital-management/
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
session?
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
session?
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
session
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
session
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
quote?
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
session
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
quote?
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
session
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
quote
Company Confidential© 2015 DataStax, All Rights Reserved. 34
Authentication & Authorization
session
DC LDN1
C*
DC LDN2
C*
DC AMS1
C*
DC ZUR1
C*
DSE
Cluster
Web
User
App
Service
DC LDN2
App App
App App
DC AMS1
App App
App App ……
quote
Company Confidential© 2015 DataStax, All Rights Reserved.
Unify & Scale Legacy Infrastructure
35
…USA
Equities
UK
FX
UK
Bonds
Global
Users
Legacy
Systems
USA
FX
DataStax Enterprise ClusterC*
User Interface / Application Services
Thank you!
Questions?

More Related Content

What's hot

Tailoring Redis Modules For Your Users’ Needs
Tailoring Redis Modules For Your Users’ NeedsTailoring Redis Modules For Your Users’ Needs
Tailoring Redis Modules For Your Users’ Needs
Redis Labs
 
Scaling Hadoop at LinkedIn
Scaling Hadoop at LinkedInScaling Hadoop at LinkedIn
Scaling Hadoop at LinkedIn
DataWorks Summit
 
RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...
RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...
RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...
Redis Labs
 
RedisConf18 - Serving Automated Home Valuation with Redis & Kafka
RedisConf18 - Serving Automated Home Valuation with Redis & KafkaRedisConf18 - Serving Automated Home Valuation with Redis & Kafka
RedisConf18 - Serving Automated Home Valuation with Redis & Kafka
Redis Labs
 
RedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in Redis
RedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in RedisRedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in Redis
RedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in Redis
Redis Labs
 
RedisConf18 - Application of Redis in IOT Edge Devices
RedisConf18 - Application of Redis in IOT Edge DevicesRedisConf18 - Application of Redis in IOT Edge Devices
RedisConf18 - Application of Redis in IOT Edge Devices
Redis Labs
 
The Future of Apache Ambari
The Future of Apache AmbariThe Future of Apache Ambari
The Future of Apache Ambari
DataWorks Summit
 

What's hot (20)

Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
Future Architecture of Streaming Analytics: Capitalizing on the Analytics of ...
 
Tailoring Redis Modules For Your Users’ Needs
Tailoring Redis Modules For Your Users’ NeedsTailoring Redis Modules For Your Users’ Needs
Tailoring Redis Modules For Your Users’ Needs
 
Scaling Hadoop at LinkedIn
Scaling Hadoop at LinkedInScaling Hadoop at LinkedIn
Scaling Hadoop at LinkedIn
 
Building A Diverse Geo-Architecture For Cloud Native Applications In One Day
Building A Diverse Geo-Architecture For Cloud Native Applications In One DayBuilding A Diverse Geo-Architecture For Cloud Native Applications In One Day
Building A Diverse Geo-Architecture For Cloud Native Applications In One Day
 
How T-Mobile Tamed Metron
How T-Mobile Tamed MetronHow T-Mobile Tamed Metron
How T-Mobile Tamed Metron
 
RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...
RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...
RedisConf18 - Active-Active Geo-Distributed Apps with Redis CRDTs (conflict f...
 
Hive2.0 sql speed-scale--hadoop-summit-dublin-apr-2016
Hive2.0 sql speed-scale--hadoop-summit-dublin-apr-2016Hive2.0 sql speed-scale--hadoop-summit-dublin-apr-2016
Hive2.0 sql speed-scale--hadoop-summit-dublin-apr-2016
 
RedisConf18 - Serving Automated Home Valuation with Redis & Kafka
RedisConf18 - Serving Automated Home Valuation with Redis & KafkaRedisConf18 - Serving Automated Home Valuation with Redis & Kafka
RedisConf18 - Serving Automated Home Valuation with Redis & Kafka
 
RedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in Redis
RedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in RedisRedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in Redis
RedisConf18 - Fail-Safe Starvation-Free Durable Priority Queues in Redis
 
MySQL Cluster (NDB) - Best Practices Percona Live 2017
MySQL Cluster (NDB) - Best Practices Percona Live 2017MySQL Cluster (NDB) - Best Practices Percona Live 2017
MySQL Cluster (NDB) - Best Practices Percona Live 2017
 
RedisConf18 - Ultra Scaling with Redis Enterprise
RedisConf18 - Ultra Scaling with Redis EnterpriseRedisConf18 - Ultra Scaling with Redis Enterprise
RedisConf18 - Ultra Scaling with Redis Enterprise
 
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
Disaster Recovery Experience at CACIB: Hardening Hadoop for Critical Financia...
 
RedisConf18 - Application of Redis in IOT Edge Devices
RedisConf18 - Application of Redis in IOT Edge DevicesRedisConf18 - Application of Redis in IOT Edge Devices
RedisConf18 - Application of Redis in IOT Edge Devices
 
Unlock cassandra data for application developers using graphQL
Unlock cassandra data for application developers using graphQLUnlock cassandra data for application developers using graphQL
Unlock cassandra data for application developers using graphQL
 
Episode 3: Kubernetes and Big Data Services
Episode 3: Kubernetes and Big Data ServicesEpisode 3: Kubernetes and Big Data Services
Episode 3: Kubernetes and Big Data Services
 
The Future of Apache Ambari
The Future of Apache AmbariThe Future of Apache Ambari
The Future of Apache Ambari
 
Bootcamp 2017 - SQL Server on Linux
Bootcamp 2017 - SQL Server on LinuxBootcamp 2017 - SQL Server on Linux
Bootcamp 2017 - SQL Server on Linux
 
RedisConf18 - 2,000 Instances and Beyond
RedisConf18 - 2,000 Instances and BeyondRedisConf18 - 2,000 Instances and Beyond
RedisConf18 - 2,000 Instances and Beyond
 
Real-Time Data Replication to Hadoop using GoldenGate 12c Adaptors
Real-Time Data Replication to Hadoop using GoldenGate 12c AdaptorsReal-Time Data Replication to Hadoop using GoldenGate 12c Adaptors
Real-Time Data Replication to Hadoop using GoldenGate 12c Adaptors
 
How to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla DeploymentHow to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla Deployment
 

Similar to DataStax Enterprise & Apache Cassandra – Essentials for Financial Services – 20151006

RapidScale CloudServer
RapidScale CloudServerRapidScale CloudServer
RapidScale CloudServer
RapidScale
 
Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...
Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...
Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...
DataStax
 

Similar to DataStax Enterprise & Apache Cassandra – Essentials for Financial Services – 20151006 (20)

Webinar: Dyn + DataStax - helping companies deliver exceptional end-user expe...
Webinar: Dyn + DataStax - helping companies deliver exceptional end-user expe...Webinar: Dyn + DataStax - helping companies deliver exceptional end-user expe...
Webinar: Dyn + DataStax - helping companies deliver exceptional end-user expe...
 
Geek Nights Hong Kong
Geek Nights Hong KongGeek Nights Hong Kong
Geek Nights Hong Kong
 
Using Databases and Containers From Development to Deployment
Using Databases and Containers  From Development to DeploymentUsing Databases and Containers  From Development to Deployment
Using Databases and Containers From Development to Deployment
 
Calum McCrea, Software Engineer at Kx Systems, "Kx: How Wall Street Tech can ...
Calum McCrea, Software Engineer at Kx Systems, "Kx: How Wall Street Tech can ...Calum McCrea, Software Engineer at Kx Systems, "Kx: How Wall Street Tech can ...
Calum McCrea, Software Engineer at Kx Systems, "Kx: How Wall Street Tech can ...
 
The role of NoSQL in the Next Generation of Financial Informatics
The role of NoSQL in the Next Generation of Financial InformaticsThe role of NoSQL in the Next Generation of Financial Informatics
The role of NoSQL in the Next Generation of Financial Informatics
 
Top 10 present and future innovations in the NoSQL Cassandra ecosystem (2022)
Top 10 present and future innovations in the NoSQL Cassandra ecosystem (2022)Top 10 present and future innovations in the NoSQL Cassandra ecosystem (2022)
Top 10 present and future innovations in the NoSQL Cassandra ecosystem (2022)
 
Capital One: Using Cassandra In Building A Reporting Platform
Capital One: Using Cassandra In Building A Reporting PlatformCapital One: Using Cassandra In Building A Reporting Platform
Capital One: Using Cassandra In Building A Reporting Platform
 
SD Times - Docker v2
SD Times - Docker v2SD Times - Docker v2
SD Times - Docker v2
 
Building a Pluggable Analytics Stack with Cassandra (Jim Peregord, Element Co...
Building a Pluggable Analytics Stack with Cassandra (Jim Peregord, Element Co...Building a Pluggable Analytics Stack with Cassandra (Jim Peregord, Element Co...
Building a Pluggable Analytics Stack with Cassandra (Jim Peregord, Element Co...
 
InfluxEnterprise Architecture Patterns by Tim Hall & Sam Dillard
InfluxEnterprise Architecture Patterns by Tim Hall & Sam DillardInfluxEnterprise Architecture Patterns by Tim Hall & Sam Dillard
InfluxEnterprise Architecture Patterns by Tim Hall & Sam Dillard
 
451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps451 Research: Data Is the Key to Friction in DevOps
451 Research: Data Is the Key to Friction in DevOps
 
Mastering the move
Mastering the moveMastering the move
Mastering the move
 
RapidScale CloudServer
RapidScale CloudServerRapidScale CloudServer
RapidScale CloudServer
 
Big Data LDN 2018: DEUTSCHE BANK: THE PATH TO AUTOMATION IN A HIGHLY REGULATE...
Big Data LDN 2018: DEUTSCHE BANK: THE PATH TO AUTOMATION IN A HIGHLY REGULATE...Big Data LDN 2018: DEUTSCHE BANK: THE PATH TO AUTOMATION IN A HIGHLY REGULATE...
Big Data LDN 2018: DEUTSCHE BANK: THE PATH TO AUTOMATION IN A HIGHLY REGULATE...
 
Webinar - Delivering Enhanced Message Processing at Scale With an Always-on D...
Webinar - Delivering Enhanced Message Processing at Scale With an Always-on D...Webinar - Delivering Enhanced Message Processing at Scale With an Always-on D...
Webinar - Delivering Enhanced Message Processing at Scale With an Always-on D...
 
Accelerate Your OpenStack Deployment Presented by SolidFire and Red Hat
Accelerate Your OpenStack Deployment Presented by SolidFire and Red HatAccelerate Your OpenStack Deployment Presented by SolidFire and Red Hat
Accelerate Your OpenStack Deployment Presented by SolidFire and Red Hat
 
Scylla Summit 2022: Building Zeotap's Privacy Compliant Customer Data Platfor...
Scylla Summit 2022: Building Zeotap's Privacy Compliant Customer Data Platfor...Scylla Summit 2022: Building Zeotap's Privacy Compliant Customer Data Platfor...
Scylla Summit 2022: Building Zeotap's Privacy Compliant Customer Data Platfor...
 
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
002 Introducing Neo4j 5 for Administrators - NODES2022 AMERICAS Beginner 2 - ...
 
MaxScale - The Pluggable Router
MaxScale - The Pluggable RouterMaxScale - The Pluggable Router
MaxScale - The Pluggable Router
 
Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...
Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...
Cassandra Tools and Distributed Administration (Jeffrey Berger, Knewton) | C*...
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

DataStax Enterprise & Apache Cassandra – Essentials for Financial Services – 20151006

  • 1. DataStax Enterprise & Apache Cassandra Essentials for Financial Services Daniel Cohen Solutions Engineer
  • 2. Company Confidential© 2015 DataStax, All Rights Reserved. 2 1 Introduction to DataStax Enterprise 2 Technology Overview 3 Architecture in Enterprise 4 Use Cases in Finance 5 Questions?
  • 3. Company Confidential© 2015 DataStax, All Rights Reserved. DataStax Enterprise 3 A Purpose-Built Platform on Apache Cassandra
  • 4. Company Confidential© 2015 DataStax, All Rights Reserved. Certified Apache Cassandra 4 • Certified for production environments • Rigorous certification process: – Extensive quality assurance testing – Performance and scale tests with 1,000 node clusters – 3rd party software validation – Defect resolution • Pass internal certifications and audits
  • 5. Company Confidential© 2015 DataStax, All Rights Reserved. Visual Admin 5Confidential
  • 6. Company Confidential© 2015 DataStax, All Rights Reserved. Visual Admin 6 • Visual, browser-based user interface • Installation, configuration, and administration tasks carried out in point-and-click fashion • REST API allows scripting of any OpsCenter function • Works on any device (tablet, etc.)
  • 7. Company Confidential© 2015 DataStax, All Rights Reserved. Management Services 7 • Repair service – automatically keeps data consistent across a cluster. • Capacity service – historical trend analysis and forecasts future resource needs. • Performance service – provides insight into the performance of a cluster with queryable CQL-based diagnostic objects • Best Practice service – enforces best practice rules across many areas (e.g. security, configuration, etc.) to ensure proper setup and optimization. • Proactive alerts and external notifications
  • 8. Company Confidential© 2015 DataStax, All Rights Reserved. Enterprise Security 8
  • 9. Company Confidential© 2015 DataStax, All Rights Reserved. Enterprise Security 8 Inherited from Open Source Cassandra Internal authentication (IDs, passwords) Permission management via GRANT/REVOKE Client-to-node, node-to-node encryption
  • 10. Company Confidential© 2015 DataStax, All Rights Reserved. Enterprise Security 8 Inherited from Open Source Cassandra Internal authentication (IDs, passwords) Permission management via GRANT/REVOKE Client-to-node, node-to-node encryption DataStax Enterprise Only External authentication (eg Kerberos, LDAP/Active Directory) Transparent data encryption Data auditing
  • 11. Company Confidential© 2015 DataStax, All Rights Reserved. Enterprise Security 8 Inherited from Open Source Cassandra Internal authentication (IDs, passwords) Permission management via GRANT/REVOKE Client-to-node, node-to-node encryption DataStax Enterprise Only External authentication (eg Kerberos, LDAP/Active Directory) Transparent data encryption Data auditing
  • 12. Company Confidential© 2015 DataStax, All Rights Reserved. Enterprise Support 9 • 24x7x365 Technical Support • Covers both production and non-production environments • Scheduled health checks for assistance on architecture, design, and tuning • Hot-fix support for emergency maintenance situations
  • 13. Company Confidential© 2015 DataStax, All Rights Reserved. DSE Analytics 10 • Integrated Real-Time Analytics • Integrated Batch Analytics • External Batch Analytics – external Hadoop connectivity, certified to Cloudera, HortonWorks – link hot transactional data with cold data from data warehouse / lake ETL
  • 14. Company Confidential© 2015 DataStax, All Rights Reserved. DSE Search 11 • DSE Search inherits all the power and capabilities of Solr and builds on top of it • Built-in scale out and continuous availability for search operations • Enabled across multiple data centers and cloud providers • Search via native API or through CQL ETL
  • 15. Company Confidential© 2015 DataStax, All Rights Reserved. DSE In-Memory 12 • Brings all the goodness of Cassandra to an in-memory database • In-Memory tables look and act like any Cassandra table • Great for use cases requiring low latency reads • Combine with in-memory analytics for full in-memory transactional / analytical processing
  • 16. Company Confidential© 2015 DataStax, All Rights Reserved. DataStax Enterprise 13 A Purpose-Built Platform on Apache Cassandra
  • 17. Company Confidential© 2015 DataStax, All Rights Reserved. 14 1 Introduction to DataStax Enterprise 2 Technology Overview 3 Architecture in Enterprise 4 Use Cases in Finance 5 Questions?
  • 18. Company Confidential© 2015 DataStax, All Rights Reserved. • A Distributed NoSQL Database • Google BigTable ✖ Amazon Dynamo • Continuously Available • Disaster avoidance, not disaster recovery • Scale Out with Linear Performance • Just add nodes • Run on Commodity Hardware • In the cloud, on premise, or hybrid What is Apache Cassandra? 15
  • 19. Company Confidential© 2015 DataStax, All Rights Reserved. • Fully Distributed • Data spread over multiple nodes • All nodes participate in a cluster • Configurable data replication • Masterless • All nodes are equal • Read from or write to any node • No Single Point of Failure Distributed Architecture 16 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Node 3
 3rd copy
  • 20. Company Confidential© 2015 DataStax, All Rights Reserved. A Quick Vocabulary Lesson 17
  • 21. Company Confidential© 2015 DataStax, All Rights Reserved. A Quick Vocabulary Lesson Replication Factor – RF • Specifies how many copies of a row of data C* distributes across nodes • Highly configurable for SLA and network topology (racks, data centers) CREATE KEYSPACE "Excalibur" WITH REPLICATION = {'class' : 'NetworkTopologyStrategy', 'NY1' : 3, 'NY2' : 3}; 17
  • 22. Company Confidential© 2015 DataStax, All Rights Reserved. A Quick Vocabulary Lesson Replication Factor – RF • Specifies how many copies of a row of data C* distributes across nodes • Highly configurable for SLA and network topology (racks, data centers) CREATE KEYSPACE "Excalibur" WITH REPLICATION = {'class' : 'NetworkTopologyStrategy', 'NY1' : 3, 'NY2' : 3}; 17 Consistency Level – CL • Specifies how synchronized a row of data must be across C* nodes • Tunable consistency: client application decides CL for each operation ANY … ONE … QUORUM … EACH_QUORUM … ALL
  • 23. Company Confidential© 2015 DataStax, All Rights Reserved. A Quick Vocabulary Lesson Replication Factor – RF • Specifies how many copies of a row of data C* distributes across nodes • Highly configurable for SLA and network topology (racks, data centers) CREATE KEYSPACE "Excalibur" WITH REPLICATION = {'class' : 'NetworkTopologyStrategy', 'NY1' : 3, 'NY2' : 3}; 17 Consistency Level – CL • Specifies how synchronized a row of data must be across C* nodes • Tunable consistency: client application decides CL for each operation ANY … ONE … QUORUM … EACH_QUORUM … ALL
  • 24. Company Confidential© 2015 DataStax, All Rights Reserved. Multiple Data Centers 18 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Node 3
 3rd copy Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Node 3 London DCNew York DC
  • 25. Company Confidential© 2015 DataStax, All Rights Reserved. • Need more storage? Add more nodes. • Need greater throughput? Add more nodes. • Predictable, linear performance gains Scale Out Linearly 19
  • 26. Company Confidential© 2015 DataStax, All Rights Reserved. • Need more storage? Add more nodes. • Need greater throughput? Add more nodes. • Predictable, linear performance gains Scale Out Linearly 19
  • 27. Company Confidential© 2015 DataStax, All Rights Reserved. • Need more storage? Add more nodes. • Need greater throughput? Add more nodes. • Predictable, linear performance gains Scale Out Linearly 19
  • 28. Company Confidential© 2015 DataStax, All Rights Reserved. Linear Scale Out at Netflix 20 Source: The Netflix Tech Blog http://techblog.netflix.com/ 2011/11/benchmarking- cassandra-scalability-on.html
  • 29. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 30. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 31. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Write Consistency Level = QUORUM Replication Factor = 3 Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 32. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Parallel Write Write Consistency Level = QUORUM Replication Factor = 3 Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 33. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Parallel Write Write Consistency Level = QUORUM Replication Factor = 3 5 μs ack Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 34. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Parallel Write Write Consistency Level = QUORUM Replication Factor = 3 5 μs ack 12 μs ack Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 35. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Parallel Write Write Consistency Level = QUORUM Replication Factor = 3 5 μs ack 12 μs ack 12 μs ack Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 36. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Parallel Write Write Consistency Level = QUORUM Replication Factor = 3 5 μs ack 12 μs ack 500 μs ack 12 μs ack Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 37. Company Confidential© 2015 DataStax, All Rights Reserved. Node 1 1st copy Tunable Consistency 21 Parallel Write Write Consistency Level = QUORUM Replication Factor = 3 5 μs ack 12 μs ack 500 μs ack 12 μs ack Node 2 2nd copy Node 3 3rd copy Node 4 Node 5
  • 38. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Node 4 Node 2 2nd copy Node 1 1st copy Node 3
 3rd copy Node 3 3rd copy Node 4 Node 5
  • 39. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Node 4 Node 2 2nd copy Node 1 1st copy Node 3
 3rd copy Node 3 3rd copy Node 4 Node 5
  • 40. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Read Consistency Level = QUORUM Replication Factor = 3 Node 4 Node 2 2nd copy Node 1 1st copy Node 3
 3rd copy Node 3 3rd copy Node 4 Node 5
  • 41. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Read Consistency Level = QUORUM Replication Factor = 3 Node 4 Node 2 2nd copy Node 1 1st copy Node 4 Node 5
  • 42. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Parallel Read Read Consistency Level = QUORUM Replication Factor = 3 Node 4 Node 2 2nd copy Node 1 1st copy Node 4 Node 5
  • 43. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Parallel Read Read Consistency Level = QUORUM Replication Factor = 3 Node 4 Node 2 2nd copy Node 1 1st copy Node 4 Node 5
  • 44. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Parallel Read Read Consistency Level = QUORUM Replication Factor = 3 Node 4 Node 2 2nd copy Node 1 1st copy Node 4 Node 5
  • 45. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Parallel Read Read Consistency Level = QUORUM Replication Factor = 3 Node 4 Node 2 2nd copy Node 1 1st copy Node 4 Node 5
  • 46. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Parallel Read Read Consistency Level = QUORUM Replication Factor = 3 Node 4 Node 2 2nd copy Node 1 1st copy Node 3
 3rd copy Node 3 3rd copy Node 4 Node 5
  • 47. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Parallel Read Read Consistency Level = QUORUM Replication Factor = 3 HintsNode 4 Node 2 2nd copy Node 1 1st copy Node 3
 3rd copy Node 3 3rd copy Node 4 Node 5
  • 48. Company Confidential© 2015 DataStax, All Rights Reserved. Continuous Availability 22 Node 1
 1st copy Node 4 Node 5 Node 2
 2nd copy Parallel Read Read Consistency Level = QUORUM Replication Factor = 3 HintsNode 4 Node 2 2nd copy Node 1 1st copy Node 3
 3rd copy Node 3 3rd copy Node 4 Node 5
  • 49. Company Confidential© 2015 DataStax, All Rights Reserved. Disaster Avoidance 23 Singapore New York London
  • 50. Company Confidential© 2015 DataStax, All Rights Reserved. Disaster Avoidance 23 Singapore New York London
  • 51. Company Confidential© 2015 DataStax, All Rights Reserved. Disaster Avoidance 23 Singapore New York London
  • 52. Company Confidential© 2015 DataStax, All Rights Reserved. Disaster Avoidance 23 Singapore New York London
  • 53. Company Confidential© 2015 DataStax, All Rights Reserved. Mixed Workload DSE Cluster Cassandra Only DC Transactions Workload Isolation with DataStax Enterprise 24 Cassandra + Spark DC Analytics Analytical Application Online Application
  • 54. Company Confidential© 2015 DataStax, All Rights Reserved. CQL Example CREATE TABLE market_prices ( 
 symbol TEXT,
 date TIMESTAMP,
 price DECIMAL, side INT,
 PRIMARY KEY (symbol, date)
 ) WITH CLUSTERING ORDER BY (date DESC); CQL: Cassandra Query Language • Syntax similar to RDBMS SQL • Create objects via DDL • e.g. CREATE… • INSERT, UPDATE, DELETE • GRANT, REVOKE • SELECT…WHERE • Command line and GUI tools 25
  • 55. Company Confidential© 2015 DataStax, All Rights Reserved. • Certified by DataStax: • Java • C / C# / C++ • Python • Node.js • Ruby • PHP • ODBC • Connector for Apache Spark • Many community drivers Drivers & Connectors 26
  • 56. Company Confidential© 2015 DataStax, All Rights Reserved. 27 1 Introduction to DataStax Enterprise 2 Technology Overview 3 Architecture in Enterprise 4 Use Cases in Finance 5 Questions?
  • 57. Company Confidential© 2015 DataStax, All Rights Reserved. DataStax in the Enterprise Ecosystem 28 Offline Application External Hadoop Distribution (e.g. Cloudera, Hortonworks) OpsCenter Services Monitoring Operations Operational Application Real Time Search Real Time Analytics Batch Analytics RDBMS Analytics Transformations Certified Apache Cassandra – No single point of failure – Linear Scalability – Disaster Avoidance Security In-Memory
  • 58. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 App Server Cache C* C* App Server Cache
  • 59. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 App Server Cache C* C* App Server Cache
  • 60. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 App Server Cache C* C* App Server Cache
  • 61. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 App Server Cache C* C* App Server Cache session
  • 62. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 C* C* App Server Cache session
  • 63. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 C* C* App Server Cache
  • 64. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 C* C* App Server Cache
  • 65. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 C* C* App Server Cache session
  • 66. Company Confidential© 2015 DataStax, All Rights Reserved. Application Tier Resilience Example: A Single Session DC NY1 DC NY2 • Stateless ➜ fault tolerant • Horizontally scalable • Store sessions in Cassandra • Sessions replicate naturally • Recover on disaster / failure 29 C* C* App Server Cache session
  • 67. Company Confidential© 2015 DataStax, All Rights Reserved. A Resilient Enterprise Architecture 30 DC NY1 C* DC NY2 C* DC LDN1 C* DC LDN2 C* …DC NY1 App App App App DC LDN2 App App App App
  • 68. Company Confidential© 2015 DataStax, All Rights Reserved. A Resilient Enterprise Architecture 30 DC NY1 C* DC NY2 C* DC LDN1 C* DC LDN2 C* …DC NY1 App App App App DC LDN2 App App App App
  • 69. Company Confidential© 2015 DataStax, All Rights Reserved. A Resilient Enterprise Architecture 30 DC NY1 C* DC NY2 C* DC LDN1 C* DC LDN2 C* …DC NY1 App App App App DC LDN2 App App App App
  • 70. Company Confidential© 2015 DataStax, All Rights Reserved. A Resilient Enterprise Architecture 30 DC NY1 C* DC NY2 C* DC LDN1 C* DC LDN2 C* …DC NY1 App App App App DC LDN2 App App App App
  • 71. Company Confidential© 2015 DataStax, All Rights Reserved. A Resilient Enterprise Architecture 30 DC NY1 C* DC NY2 C* DC LDN1 C* DC LDN2 C* …DC NY1 App App App App DC LDN2 App App App App
  • 72. Company Confidential© 2015 DataStax, All Rights Reserved. A Resilient Enterprise Architecture 30 DC NY1 C* DC NY2 C* DC LDN1 C* DC LDN2 C* …DC NY1 App App App App DC LDN2 App App App App
  • 73. Company Confidential© 2015 DataStax, All Rights Reserved. A Resilient Enterprise Architecture 30 DC NY1 C* DC NY2 C* DC LDN1 C* DC LDN2 C* …DC NY1 App App App App DC LDN2 App App App App
  • 74. Company Confidential© 2015 DataStax, All Rights Reserved. 31 1 Introduction to DataStax Enterprise 2 Technology Overview 3 Architecture in Enterprise 4 Use Cases in Finance 5 Questions?
  • 75. Company Confidential© 2015 DataStax, All Rights Reserved. A Few Use Cases in Financial Services 32 • Payments & Transactions • Fraud Prevention & Detection • Real-time Market Risk • Regulatory Compliance & Reporting • Authentication & Authorization • Customer 360° & Portfolio Analysis • Recommendations & Personalization • Global Document Search • Geospatial Search $ £ € ¥ 🔐 📈
  • 76. Company Confidential© 2015 DataStax, All Rights Reserved. • Cassandra dominates time series data • Extremely high ingest rates • Low latency retrievals • Efficient storage • Capture every tick and trade • Also important metadata, eg volume • Real-time risk analysis Capture Financial Market Data 33 • Example: Blue Mountain Capital Management • http://www.planetcassandra.org/blog/5-minute-c- interview-bluemountain-capital-management/
  • 77. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App ……
  • 78. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App …… session?
  • 79. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App …… session?
  • 80. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization session DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App ……
  • 81. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization session DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App …… quote?
  • 82. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization session DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App …… quote?
  • 83. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization session DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App …… quote
  • 84. Company Confidential© 2015 DataStax, All Rights Reserved. 34 Authentication & Authorization session DC LDN1 C* DC LDN2 C* DC AMS1 C* DC ZUR1 C* DSE Cluster Web User App Service DC LDN2 App App App App DC AMS1 App App App App …… quote
  • 85. Company Confidential© 2015 DataStax, All Rights Reserved. Unify & Scale Legacy Infrastructure 35 …USA Equities UK FX UK Bonds Global Users Legacy Systems USA FX DataStax Enterprise ClusterC* User Interface / Application Services