April 9, 2018 By DJ Walker-Morgan 2 min read

ScyllaDB 2.0.3 with TLS now available on the IBM Cloud

ScyllaDB 2.0.3 is now available, in beta, through IBM Cloud Compose. The new release brings even more Cassandra-compatible features to Scylla, the high-performance, C++ based, in-place replacement for Cassandra. The Scylla 2.0.3 release also sees TLS encryption for clients switched on.

We introduced ScyllaDB at the end of 2016. It already stood out as a plug-compatible version of Cassandra at the time. The developers had taken Cassandra’s wide-column database design and built from the ground up a whole C++ framework and database on top of that. This meant the ideas behind Cassandra were freed from the performance limitations of the Java Virtual Machine. The ScyllaDB developers have since been regularly iterating their database while keeping it Cassandra compatible. They’ve also been carefully matching current Cassandra features, while advanced tuning of the internal mechanisms of ScyllaDB also lets them boost reliability and performance even more.

Scylla 2.0.3 features

Counters, one of the more requested features for current Cassandra compatibility. Counters deliver safely increment-able tables in a distributed system like Scylla. In 2.0.3, they become a production ready feature after being an experimental option in previous releases. Read more about Counters in the Scylla documentation.

As one feature enters production, a new experimental one arrives. In this case, it’s Materialized View support on Scylla. This allows tables to be created which are derived from the fields of another table while being indexed on fields that aren’t the primary key. That’s important in a database like Scylla; typically data is indexed and partitioned over nodes on the primary key and nothing else. These Materialized Views are real persisted stored tables, not queries run in the background. They provide a different way to slice your data models for efficient access. You can read more about it on the Scylla blog’s Materialized View preview and with an IBM Cloud Compose Scylla deployment, begin experimenting today.

Other Scylla 2.0 enhancements happen behind the scenes, as it were. An improved row cache means better use of memory, especially with large partitions. Heat Weighted Load Balancing is a new technique to direct traffic to hot busy caches while other nodes are coming up to speed; the idea is that if there’s a busy cache it’s likely to have the data needed anyway and it lets restarting nodes come online more quickly.

 ScyllaDB and TLS

New instances of Compose for ScyllaDB require that users connect with TLS encryption enabled. This ensures that the client’s data exchange with the database is protected in flight. To verify connections the service uses Let’s Encrypt certificates which, generally, means no local certificate to store. For full details of how to use this, consult the documentation which has been updated to go with the new release.

More from

How to build a successful risk mitigation strategy

4 min read - As Benjamin Franklin once said, “If you fail to plan, you are planning to fail.” This same sentiment can be true when it comes to a successful risk mitigation plan. The only way for effective risk reduction is for an organization to use a step-by-step risk mitigation strategy to sort and manage risk, ensuring the organization has a business continuity plan in place for unexpected events. Building a strong risk mitigation strategy can set up an organization to have a…

The software-defined vehicle: The architecture behind the next evolution of the automotive industry

4 min read - More and more consumers now expect their vehicles to offer an experience no different from that offered by other smart devices. They seek full integration into their digital lives, desiring a vehicle that can manage their operations, add functionality and enable new features primarily or entirely through software. According to a GMI report, the global software-defined vehicle (SDV) market is expected to achieve a CAGR of 22.1% between 2023 and 2032. This growth is driven by increasing demand for advanced…

Leveraging CISA Known Exploited Vulnerabilities: Why attack surface vulnerability validation is your strongest defense 

5 min read - With over 20,000 Common Vulnerabilities and Exposures (CVEs) being published each year1, the challenge of finding and fixing software with known vulnerabilities continues to stretch vulnerability management teams thin. These teams are given the impossible task of driving down risk by patching software across their organization, with the hope that their efforts will help to prevent a cybersecurity breach. Because it is impossible to patch all systems, most teams focus on remediating vulnerabilities that score highly in the Common Vulnerability…

Get ready for change with IBM Cloud Training

2 min read - As generative AI creates new opportunities and transforms cloud operations, it is crucial to learn how to maximize the value of these tools. A recent report from the IBM Institute for Business Value found that 68% of hybrid cloud users already have a formal, organization-wide policy or approach for the use of generative AI. That same report also noted that 58% of global decision makers say that cloud skills remain a considerable challenge. Being proactive in your learning can significantly…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters