Call : (+91) 99 8080 3767
Mail :

Using Oracle NoSQL Database

( Duration: 5 Days )

In Using Oracle NoSQL Database training course, you will learn how Oracle NoSQL Database is used by administrators as well as developers. Learn about the features and benefits of the Oracle NoSQL Database, how to optimize the KVStore's performance, how to manage backup and recovery and how to develop applications for Oracle NoSQL Database. Learn why and how Oracle NoSQL Database is used to store data, generally Big Data. Understand the key concepts of the NoSQL technology and when to use the Oracle NoSQL Database versus an RDBMS.

Learn to design the schema for a Java application using a table based approach as well as a key value pair approach. Learn to create the code for storing, manipulating, and deleting data stored in a KVStore. You will also learn to handle exceptions and implement security, consistency, and durability policies for the KVStore and an application.

By attending Using Oracle NoSQL Database workshop, delegates will learn to:

  • Encrypt data and create consistency and durability policies according to application requirements
  • Plan installation of Oracle NoSQL Database
  • Install and configure Oracle NoSQL Database
  • Deploy Oracle NoSQL Database KVStore
  • Secure the configuration
  • Extend a KVStore by increasing the replication factor or capacity of the KVStore
  • Troubleshoot installation and hardware failures
  • Monitor and optimize Oracle NoSQL Database performance
  • Perform backup, recovery, and upgrades
  • Use Oracle NoSQL Database APIs in an application to create, retrieve, and update data in a KVStore
  • Design a schema for Oracle NoSQL Database

The Using Oracle NoSQL Database class is ideal for:

  • Database Administrators
  • Developers



Oracle NoSQL Database: Overview

  • Key Features
  • Benefits of Using Oracle NoSQL Database
  • Supported Data Types
  • How Does the Oracle NoSQL Database Work?
  • Oracle NoSQL Database Components
  • Partitions and Key Value Pairs
  • Performance and Throughput

Planning An Installation

  • KVStore Analysis: Tasks
  • Understanding Storage Capacity and Throughput Capacity
  • Using InitialCapacityPlanning Spreadsheet
  • Application Requirements
  • Hardware Requirements
  • Performance Requirements: Estimating Workload
  • Performance Requirements: Estimating Throughput
  • Configuration Requirements

Deploying a KVStore

  • Creating Directories
  • Extracting Software
  • Verifying the Installation
  • Configuring the Replication Nodes
  • Using the makebootconfig Utility
  • Starting the Admin CLI
  • Configuring KVStore
  • Creating a Data Center/Zone

Modifying a KVStore

  • Reasons to modify a cluster
  • Increasing a clusters capacity
  • Increasing a clusters replication factor
  • Steps to modify a cluster

Securing the Configuration

  • Security Overview
  • Performing a secure installation using makebootconfig
  • Secure an existing installation using securityconfig
  • Security.xml Parameters
  • Encrypting Data
  • Configuring Authentication
  • Default Security Policies
  • Security Guidelines

Disaster Recovery

  • Fixing Hardware Failures
  • Verifying a KVStore
  • Verify Command
  • Hardware Failures: Overview
  • Network Failure
  • Recovering from Network Failure
  • Detecting Storage Device Failures
  • Replacing a Failed Storage Device

Monitoring a KVStore

  • Introducing KVStore Parameters
  • Changing Parameters Using CLI
  • Changing Parameters Using Admin Console
  • Setting Replication Node Policy
  • Best Practice: Set Optimal JE Cache Size
  • Best Practice: JVM
  • Best Practice: Set Optimal Java Heap Size
  • General Monitoring

Managing a KVStore

  • Backup Process
  • Using Snapshots
  • Recovery Process
  • Using a Load Program
  • Upgrading the Software

Schema Design

  • Importance of Schema Design
  • Schema Design Options in ONDB
  • Key-Value Data Model
  • Table Data Model: Overview
  • Designing Parent Tables
  • Table Field Data Types
  • Keys and Indexes for Table Data Model
  • Defining Child Tables

Application Specific Requirements

  • Understanding the Write and Read Process
  • Consistency Policy: Definition
  • Applying Consistency
  • Default Consistency
  • Types of Consistency Polices
  • Predefined Consistency Policies
  • Time-based Consistency Policy
  • Version-based Consistency Policy

Creating Tables

  • Creating Tables: Overview
  • Data Definition Language Commands
  • Using Create Table
  • Using Check Constraint
  • Creating a Table from Java Application
  • Introducing TableAPI
  • Executing a DDL Command
  • Creating a Table from CLI

Writing Data To Tables


Retrieving Table Data


Manipulating Data Stored in Key-Value Model


Configuring Consistency


Configuring Durability


Creating Transactions


Handling Large Objects


Accessing a Secure Store


Handling Exceptions

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.