PandaDB
A distributed property graph database built on Neo4j, extending it with CypherPlus for managing both structured and unstructured data with AI model inference.
Details
Links
Feature Scores
Community & Business
Active development Updated 3-6 months ago
Commercial support No commercial support
Live community No community activity data
Open Source Open source license
Pricing No pricing information
Trendiness Declining trend
Deployment
Containerization Docker image available
Work as dedicated instance Can run as standalone server
Work as embedded Can embed in application
Testing in-memory version No in-memory option
Platform
Operating on Linux Not supported
Operating on Windows Windows officially supported
SaaS offering Self-hosted only
Operations
Automatic updates Manual updates only
Client side caching Client-side cache available
Data versioning support No versioning
Live backups Hot backup supported
Distribution
Cluster Re-balancing No auto-rebalancing
Data Distribution No sharding
High-Availability HA mechanisms available
Query Distribution
Replication support Replication available
Developer Experience
Data types defined Composite data types
Logging/Auditing Event logging supported
Object-Graph Mapper OGM/ORM available
Reactive programming Reactive streams supported
Documentation up-to-date Docs current with latest version
Binary protocol Binary protocol available
CLI Command-line interface
GUI Visual interface available
Data Model
Multi-database Multi-model database
Graph-native data Native graph storage
REST API REST endpoint available
Query Language Standard query language (Cypher/Gremlin)
Transactions
Granular locking Object-level locking
Multiple isolation levels Read uncommitted only
Read committed transaction Read committed available
Transaction support ACID transactions
Schema & Security
Constraints Full constraint support
Schema support Schema definition tools
Secondary indexes Secondary indexes supported
Server side procedures Stored procedures supported
Triggers Event triggers supported
Authentication Authentication supported
Authorization Role-based access control
Data encryption No encryption