These instructions detail the deployment of MariaDB ColumnStore 6 with MariaDB Community Server 10.6 in a Single-node ColumnStore Deployment configuration on a range of supported Operating Systems.
These instructions detail how to deploy a single-node columnar database, which is suited for an analytical or OLAP workload that does not require high availability (HA). This deployment type is generally for non-production use cases, such as for development and testing.
These instructions detail the deployment of the following MariaDB Community Server components:
Single-node ColumnStore 6 does not support high availability.
For high availability and scalability, instead see "" or "".
Systems hosting a ColumnStore deployment requires some additional configuration prior to installation:
MariaDB ColumnStore performs best when certain Linux kernel parameters are optimized.
Set the relevant kernel parameters in a sysctl configuration file. For proper change management, we recommend setting them in a ColumnStore-specific configuration file.
For example, create a /etc/sysctl.d/90-mariadb-columnstore.conf file with the following contents:
Set the same kernel parameters at runtime using the sysctl command:
To avoid confusion and potential problems, we recommend configuring the system's Linux Security Module (LSM) during installation. The specific steps to configure the security module will depend on the platform.
In the section, we will configure the security module and restart it.
SELinux must be set to permissive mode before installing MariaDB ColumnStore.
Set SELinux to permissive mode by setting SELINUX=permissive in /etc/selinux/config.
For example, the file will usually look like this after the change:
Reboot the system.
Confirm that SELinux is in permissive mode using getenforce
AppArmor must be disabled before installing MariaDB ColumnStore.
Disable AppArmor:
Reboot the system.
Confirm that no AppArmor profiles are loaded using aa-status:
Example output:
When using MariaDB ColumnStore, it is recommended to set the system's locale to UTF-8.
On RHEL 8, install additional dependencies.
Set the system's locale to en_US.UTF-8 by executing localedef:
MariaDB ColumnStore supports S3-compatible object storage.
S3-compatible object storage is optional, but highly recommended.
S3-compatible object storage is:
Compatible: Many object storage services are compatible with the Amazon S3 API.
Economical: S3-compatible object storage is often very low cost.
Flexible: S3-compatible object storage is available for both cloud and on-premises deployments.
Limitless: S3-compatible object storage is often virtually limitless.
Many S3-compatible object storage services exist. MariaDB Corporation cannot make guarantees about all S3-compatible object storage services, because different services provide different functionality.
If you have any questions about using specific S3-compatible object storage with MariaDB ColumnStore, .
If you want to use S3-compatible storage, it is important to create the S3 bucket before you start ColumnStore.
If you already have an S3 bucket, confirm that the bucket is empty.
We will configure ColumnStore to use the S3 bucket later in the section.
MariaDB Corporation provides package repositories for YUM (RHEL, CentOS) and APT (Debian, Ubuntu).
MariaDB ColumnStore ships as a storage engine plugin for MariaDB Community Server and a platform engine to handle back-end storage processes. MariaDB Community Server 10.6 does not require any additional software to operate as a single-node analytics database.
Configure the YUM package repository.
MariaDB ColumnStore 6 is available on MariaDB Community Server 10.6.
To configure YUM package repositories:
Checksums of the various releases of the mariadb_repo_setup script can be found in the section at the bottom of the page. Substitute
Configure the APT package repository.
MariaDB ColumnStore 6 is available on MariaDB Community Server 10.6.
To configure APT package repositories:
Checksums of the various releases of the mariadb_repo_setup script can be found in the section at the bottom of the page. Substitute
MariaDB ColumnStore requires configuration after it is installed. The configuration file location depends on your operating system.
MariaDB Community Server can be configured in the following ways:
and can be set in a configuration file (such as /etc/my.cnf). MariaDB Community Server must be restarted to apply changes made to the configuration file.
and can be set on the command-line.
If a system variable supports dynamic changes, then it can be set on-the-fly using the statement.
MariaDB's packages include several bundled configuration files. It is also possible to create custom configuration files.
On RHEL and CentOS, MariaDB's packages bundle the following configuration files:
/etc/my.cnf
/etc/my.cnf.d/client.cnf
/etc/my.cnf.d/mysql-clients.cnf
And on RHEL and CentOS, custom configuration files from the following directories are read by default:
/etc/my.cnf.d/
On Debian and Ubuntu, MariaDB's packages bundle the following configuration files:
/etc/mysql/my.cnf
/etc/mysql/mariadb.cnf
/etc/mysql/mariadb.conf.d/50-client.cnf
And on Debian and Ubuntu, custom configuration files from the following directories are read by default:
/etc/mysql/conf.d/
/etc/mysql/mariadb.conf.d/
Determine which and you need to configure.
Mandatory system variables and options for single-node MariaDB ColumnStore include:
Choose a configuration file in which to configure your system variables and options.
We recommend not making custom changes to one of the bundled configuration files. Instead, create a custom configuration file in one of the included directories. Configuration files in included directories are read in alphabetical order. If you want your custom configuration file to override the bundled configuration files, it is a good idea to prefix the custom configuration file's name with a string that will be sorted last, such as z-.
On RHEL and CentOS, a good custom configuration file would be: /etc/my.cnf.d/z-custom-my.cnf
On Debian and Ubuntu, a good custom configuration file would be: /etc/mysql/mariadb.conf.d/z-custom-my.cnf
Set your system variables and options in the configuration file.
They need to be set in a group that will be read by , such as [mariadb] or [server].
For example:
When a cross engine join is executed, the ExeMgr process connects to the server using the root user with no password by default. MariaDB Community Server 10.6 will reject this login attempt by default. If you plan to use Cross Engine Joins, you need to configure ColumnStore to use a different user account and password. These directions are for configuring the cross engine join user. Directions for creating the cross engine join user are in the section.
To configure cross engine joins, perform the following steps, use the mcsSetConfig command.
For example, to configure ColumnStore to use the cross_engine user account to connect to the server at 127.0.0.1:
MariaDB ColumnStore can use , but it is not required. S3-compatible storage must be configured before it can be used.
To configure ColumnStore to use S3-compatible storage, edit /etc/columnstore/storagemanager.cnf:
The default local cache size is 2 GB.
The default local cache path is /var/lib/columnstore/storagemanager/cache.
Ensure that the local cache path has sufficient store space to store the local cache.
The bucket
The Community Server and ColumnStore processes can be started using the systemctl command. In case the processes were started during the installation process, use the restart command to ensure that the processes pick up the new configuration. Perform the following procedure.
Start the MariaDB Community Server process and configure it to start automatically:
Start the MariaDB ColumnStore processes and configure them to start automatically:
For single-node ColumnStore deployments, only a single user account needs to be created.
The credentials for cross engine joins were previously configured in the section. The user account must also be created and granted the necessary privileges to access data.
Connect to the server using using the root@localhost user account:
Create the user account with the statement:
Grant the user account SELECT privileges on all databases with the statement:
Now that the ColumnStore system is running, you can bulk import your data.
Before data can be imported into the tables, the schema needs to be created.
Connect to the server using using the root@localhost user account:
For each database that you are importing, create the database with the statement:
For each table that you are importing, create the table with the statement:
MariaDB ColumnStore includes cpimport, which is a command-line utility that is designed to efficiently load data in bulk.
To import your data from a TSV (tab-separated values) file with cpimport:
When data is loaded with the statement, MariaDB ColumnStore loads the data using , which is a command-line utility that is designed to efficiently load data in bulk.
To import your data from a TSV (tab-separated values) file with statement:
MariaDB ColumnStore can also import data directly from a remote database. A simple method is to query the table using the statement, and then pipe the results into cpimport, which is a command-line utility that is designed to efficiently load data in bulk.
To import your data from a remote MariaDB database:
If you stopped the Linux Security Module (LSM) during installation, you can restart the module and configure.
The specific steps to configure the security module depend on the operating system.
We set SELinux to permissive mode in the section, but we have to create an SELinux policy for ColumnStore before re-enabling it. This will ensure that SELinux does not interfere with ColumnStore's functionality. A policy can be generated while SELinux is still in permissive mode using the audit2allow command.
To configure SELinux, you have to install the packages required for audit2allow.
On RHEL 7 and CentOS 7, install the following:
On RHEL 8, install the following:
Allow the system to run under load for a while to generate SELinux audit events.
After the system has taken some load, generate an SELinux policy from the audit events using audit2allow:
We disabled AppArmor in the section, but we have to create an AppArmor profile for ColumnStore before re-enabling it. This will ensure that AppArmor does not interfere with ColumnStore's functionality.
For information on how to create a profile, see on ubuntu.com.
ColumnStore has several components. Each of those components needs to be administered.
MariaDB Community Server uses systemctl to start and stop the server processes:
MariaDB ColumnStore uses systemctl to start and stop the ColumnStore processes:
When you have MariaDB ColumnStore up and running, you should test it to ensure that it is in working order and that there were not any issues during startup.
Connect to the server using using the root@localhost user account:
Resilient: S3-compatible object storage is often low maintenance and highly available, since many services use resilient cloud infrastructure.
Scalable: S3-compatible object storage is often highly optimized for read and write scaling.
Secure: S3-compatible object storage is often encrypted-at-rest.
Install the EPEL repository:
Install some additional dependencies for ColumnStore:
Install MariaDB ColumnStore and package dependencies:
Configure MariaDB ColumnStore.
Installation only loads MariaDB ColumnStore to the system. MariaDB ColumnStore requires configuration and additional post-installation steps before the database server is ready for use.
Install some additional dependencies for ColumnStore.
On Debian 10 and Ubuntu 20.04, install the following:
On Debian 9 and Ubuntu 18.04, install the following:
Install MariaDB ColumnStore and package dependencies:
Configure MariaDB ColumnStore.
Installation only loads MariaDB ColumnStore to the system. MariaDB ColumnStore requires configuration and additional post-installation steps before the database server is ready for use.
/etc/my.cnf.d/server.cnf/etc/mysql/mariadb.conf.d/50-mysql-clients.cnf/etc/mysql/mariadb.conf.d/50-mysqld_safe.cnf
/etc/mysql/mariadb.conf.d/50-server.cnf
/etc/mysql/mariadb.conf.d/60-galera.cnf
To use an IAM role, you must also uncomment and set iam_role_name, sts_region, and sts_endpoint.
If audit events were found, the new SELinux policy can be loaded using semodule:
Set SELinux to enforcing mode by setting SELINUX=enforcing in /etc/selinux/config:
Reboot the system.
Confirm that SELinux is in enforcing mode using getenforce:
MariaDB ColumnStore 6
It is a columnar storage engine that provides distributed, columnar storage for scalable analytical processing and smart transactions.
It is the analytical component of MariaDB's single stack Hybrid Transactional/Analytical Processing (HTAP) solution.
columnar database
A database where the columns of each row are stored separately.
Best suited for analytical and OLAP workloads.
Also known as a "column-oriented database".
row database
A database where all columns of each row are stored together.
Best suited for transactional and OLTP workloads.
Also known as a "row-oriented database".
Set this system variable to utf8
Set this system variable to utf8_general_ci
columnstore_use_import_for_batchinsert
Set this system variable to ALWAYS to always use cpimport for LOAD DATA INFILE and INSERT...SELECT statements.
Start
sudo systemctl start mariadb
Stop
sudo systemctl stop mariadb
Restart
sudo systemctl restart mariadb
Enable during startup
sudo systemctl enable mariadb
Disable during startup
sudo systemctl disable mariadb
Status
sudo systemctl status mariadb
Start
sudo systemctl start mariadb-columnstore
Stop
sudo systemctl stop mariadb-columnstore
Restart
sudo systemctl restart mariadb-columnstore
Enable during startup
sudo systemctl enable mariadb-columnstore
Disable during startup
sudo systemctl disable mariadb-columnstore
Status
sudo systemctl status mariadb-columnstore
$ sudo yum install epel-release$ sudo yum install jemalloc$ sudo yum install MariaDB-server MariaDB-backup \
MariaDB-shared MariaDB-client \
MariaDB-columnstore-engine$ sudo apt install libjemalloc2$ sudo apt install libjemalloc1$ sudo apt install mariadb-server mariadb-backup \
libmariadb3 mariadb-client \
mariadb-plugin-columnstore$ sudo semodule -i mariadb_local.pp# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
# enforcing - SELinux security policy is enforced.
# permissive - SELinux prints warnings instead of enforcing.
# disabled - No SELinux policy is loaded.
SELINUX=enforcing
# SELINUXTYPE= can take one of three values:
# targeted - Targeted processes are protected,
# minimum - Modification of targeted policy. Only selected processes are protected.
# mls - Multi Level Security protection.
SELINUXTYPE=targeted$ sudo getenforce# minimize swapping
vm.swappiness = 1
# Increase the TCP max buffer size
net.core.rmem_max = 16777216
net.core.wmem_max = 16777216
# Increase the TCP buffer limits
# min, default, and max number of bytes to use
net.ipv4.tcp_rmem = 4096 87380 16777216
net.ipv4.tcp_wmem = 4096 65536 16777216
# don't cache ssthresh from previous connection
net.ipv4.tcp_no_metrics_save = 1
# for 1 GigE, increase this to 2500
# for 10 GigE, increase this to 30000
net.core.netdev_max_backlog = 2500$ sudo sysctl --load=/etc/sysctl.d/90-mariadb-columnstore.conf# This file controls the state of SELinux on the system.
# SELINUX= can take one of these three values:
# enforcing - SELinux security policy is enforced.
# permissive - SELinux prints warnings instead of enforcing.
# disabled - No SELinux policy is loaded.
SELINUX=permissive
# SELINUXTYPE= can take one of three values:
# targeted - Targeted processes are protected,
# minimum - Modification of targeted policy. Only selected processes are protected.
# mls - Multi Level Security protection.
SELINUXTYPE=targeted$ sudo systemctl disable apparmor$ sudo aa-statusapparmor module is loaded.
0 profiles are loaded.
0 profiles are in enforce mode.
0 profiles are in complain mode.
0 processes have profiles defined.
0 processes are in enforce mode.
0 processes are in complain mode.
0 processes are unconfined but have a profile defined.$ sudo yum install glibc-locale-source glibc-langpack-en$ sudo localedef -i en_US -f UTF-8 en_US.UTF-8$ sudo yum install curl$ curl -LsSO https://r.mariadb.com/downloads/mariadb_repo_setup$ echo "${checksum} mariadb_repo_setup" \
| sha256sum -c -$ chmod +x mariadb_repo_setup$ sudo ./mariadb_repo_setup \
--mariadb-server-version="mariadb-10.6"$ sudo apt install curl$ curl -LsSO https://r.mariadb.com/downloads/mariadb_repo_setup$ echo "${checksum} mariadb_repo_setup" \
| sha256sum -c -$ chmod +x mariadb_repo_setup$ sudo ./mariadb_repo_setup \
--mariadb-server-version="mariadb-10.6"$ sudo apt update[mariadb]
log_error = mariadbd.err
character_set_server = utf8
collation_server = utf8_general_ci$ sudo mcsSetConfig CrossEngineSupport Host 127.0.0.1
$ sudo mcsSetConfig CrossEngineSupport Port 3306
$ sudo mcsSetConfig CrossEngineSupport User cross_engine
$ sudo mcsSetConfig CrossEngineSupport Password cross_engine_passwd[ObjectStorage]
…
service = S3
…
[S3]
bucket = your_columnstore_bucket_name
endpoint = your_s3_endpoint
aws_access_key_id = your_s3_access_key_id
aws_secret_access_key = your_s3_secret_key
# iam_role_name = your_iam_role
# sts_region = your_sts_region
# sts_endpoint = your_sts_endpoint
[Cache]
cache_size = your_local_cache_size
path = your_local_cache_path$ sudo systemctl restart mariadb$ sudo systemctl enable mariadb$ sudo systemctl restart mariadb-columnstore$ sudo systemctl enable mariadb-columnstore$ sudo mariadbCREATE USER 'cross_engine'@'127.0.0.1'
IDENTIFIED BY "cross_engine_passwd";CREATE USER 'cross_engine'@'localhost'
IDENTIFIED BY "cross_engine_passwd";GRANT SELECT, PROCESS ON *.*
TO 'cross_engine'@'127.0.0.1';GRANT SELECT, PROCESS ON *.*
TO 'cross_engine'@'localhost';$ sudo mariadbCREATE DATABASE inventory;CREATE TABLE inventory.products (
product_name VARCHAR(11) NOT NULL DEFAULT '',
supplier VARCHAR(128) NOT NULL DEFAULT '',
quantity VARCHAR(128) NOT NULL DEFAULT '',
unit_cost VARCHAR(128) NOT NULL DEFAULT ''
) ENGINE=Columnstore DEFAULT CHARSET=utf8;$ sudo cpimport -s '\t' inventory products /tmp/inventory-products.tsvLOAD DATA INFILE '/tmp/inventory-products.tsv'
INTO TABLE inventory.products;$ mariadb --quick \
--skip-column-names \
--execute="SELECT * FROM inventory.products" \
| cpimport -s '\t' inventory products$ sudo yum install policycoreutils policycoreutils-python$ sudo yum install policycoreutils python3-policycoreutils policycoreutils-python-utils$ sudo grep mysqld /var/log/audit/audit.log | audit2allow -M mariadb_local$ sudo mariadbWelcome to the MariaDB monitor. Commands end with ; or \g.
Your MariaDB connection id is 38
Server version: 10.6.21-MariaDB MariaDB Server
Copyright (c) 2000, 2018, Oracle, MariaDB Corporation Ab and others.
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
MariaDB [(none)]>$ sudo getenforcePermissive$ sudo grep mysqld /var/log/audit/audit.log | audit2allow -M mariadb_localNothing to doThis page is: Copyright © 2025 MariaDB. All rights reserved.