Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Learning Neo4j 3.x - Second Edition

You're reading from  Learning Neo4j 3.x - Second Edition

Product type Book
Published in Oct 2017
Publisher Packt
ISBN-13 9781786466143
Pages 316 pages
Edition 2nd Edition
Languages
Concepts
Author (1):
Jerome Baton Jerome Baton
Profile icon Jerome Baton

Table of Contents (24) Chapters

Title Page
Credits
About the Authors
Acknowledgement
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface
1. Graph Theory and Databases 2. Getting Started with Neo4j 3. Modeling Data for Neo4j 4. Getting Started with Cypher 5. Awesome Procedures on Cypher - APOC 6. Extending Cypher 7. Query Performance Tuning 8. Importing Data into Neo4j 9. Going Spatial 10. Security 11. Visualizations for Neo4j 12. Data Refactoring with Neo4j 13. Clustering 14. Use Case Example - Recommendations 15. Use Case Example - Impact Analysis and Simulation 16. Tips and Tricks

Building a cluster


The hardware elements that we will use are as follows:

  • Two laptops as core servers, running Linux, connected to a home WiFi network
  • Two raspberry Pi, 2 and 3, running as core servers

Read replica servers will be running as Docker containers. There will be five replicas running on my main laptop.

In a typical deployment, there are more read replicas than core servers. Of course, you can use any machine you want as long as it can connect to a network and run Neo4j. This can be more PCs, Macs, or any brand of credit card-sized computer running Linux.

Here, in a home environment, all servers are on the same network, plugged on the same router, and mostly in the same room (or not because of wifi and long cables). However, it is still relevant as an example and probably one of the cheapest options to do a cluster with hardware.

In a business environment, you may have to talk to your IT service, declare the machines, list which ports they use, and ask for safe passage of the network...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}