Configuring Persistence
You can configure clusters to persist data structures, job snapshots, and SQL metadata on disk. You can also implement configuration options to fine-tune backups, encryption, and auto-recovery.
For information on configuring persistence in Kubernetes environments, see Running Hazelcast Enterprise with Persistence under Kubernetes. |
Glossary
Term | Definition |
---|---|
master member |
The oldest member in a cluster. |
partition table |
Table that stores members' partition replica assignments and the partition table version. |
persistence store |
The files that contain persisted data. |
Quickstart Configuration
Use this quickstart to test Persistence in development.
Before going into production, make sure to read the Production Checklist section. |
By default, Persistence is disabled on all clusters. To start persisting data on disk, you must first enable Persistence on the member.
<hazelcast>
<persistence enabled="true">
<!-- configuration options here -->
</persistence>
</hazelcast>
hazelcast:
persistence:
enabled: true
# configuration options here
Config config = new Config();
PersistenceConfig PersistenceConfig = new PersistenceConfig()
.setEnabled(true);
config.setPersistenceConfig(PersistenceConfig);
Even after enabling Persistence, your members won’t start persisting any data until you configure data structures, job snapshots, or SQL metadata to be persisted.
The persistence feature should either be enabled or disabled on all cluster members. If enabled, all members must have the same persistence configuration values. |
This example configures a member to persist entries on disk for a map called test-map
.
<hazelcast>
<persistence enabled="true">
</persistence>
<map name="test-map">
<data-persistence enabled="true">
<!-- configuration options here -->
</data-persistence>
</map>
</hazelcast>
hazelcast:
persistence:
enabled: true
map:
test-map:
data-persistence:
enabled: true
# configuration options here
Config config = new Config();
PersistenceConfig PersistenceConfig = new PersistenceConfig()
.setEnabled(true);
config.setPersistenceConfig(PersistenceConfig);
MapConfig mapConfig = config.getMapConfig("test-map");
mapConfig.getDataPersistenceConfig().setEnabled(true);
config.addMapConfig(mapConfig);
Production Checklist
Before you start configuring members, consider the following checklist:
-
Does your cluster have enough available disk space, especially if you want to back up the persistence store?
-
How do you want your cluster to behave when a single member leaves?
-
How do you want your cluster to recover from failed restarts?
-
Are you persisting sensitive data?
Running clusters must be restarted before any configuration changes take effect. |
Defining What Happens When a Single Member Leaves the Cluster
By default, if a cluster detects that a missing member is restarting and attempting to rejoin, the cluster’s master member will ask the rejoining member to send its partition table for validation.
The rejoining member loads its persisted data from disk and rejoins the cluster only if the following conditions are met:
-
The master member receives the partition table within 120 seconds (the validation timeout).
-
The master member validates that the partition table was correct at the time that the rejoining member left the cluster.
-
The rejoining member loads its persisted data from disk within 900 seconds (the data load timeout).
If these conditions are not met, the rejoining member deletes its persistence store, generates a new UUID, and rejoins the cluster. The rest of the cluster then tries to recover the missing member’s data from backups and repartitions it.
If you do not want rejoining members to automatically delete their persistence stores when their partition tables are invalid, set the auto-remove-stale-data
option to false
.
Only in exceptional circumstances will the master member consider a rejoining member’s data stale. Instead, the member will reload its data from disk and then synchronize it with other cluster members as needed. |
If you have lots of persisted data and you are concerned about how long it may take for your cluster to repartition after a member fails to rejoin, you can delay repartitioning.
Defining What Happens When the Whole Cluster Restarts
By default, a restarting cluster waits until the following conditions are met:
-
The master member receives all members' partition tables within the validation timeout.
-
The master member validates that all members' partition tables are correct.
-
All members load their persisted data from disk within the data load timeout.
Under the default configuration, the cluster fails to start if any of these conditions are not met. Behavior during cluster restart can be tuned by configuring an appropriate Cluster Recovery Policy.
If you have lots of persisted data and you are concerned about how long it may take for your cluster to repartition after a member fails to rejoin, you can delay repartitioning.
Choosing a Cluster Recovery Policy
To decide how a cluster should behave when one or more members cannot rejoin after a cluster-wide restart, you can define a strategy in the cluster-data-recovery-policy
option.
The default FULL_RECOVERY_ONLY
strategy forces the cluster to wait until all members have restarted after a cluster-wide restart. If one or more members are unable to recover from the failure, the cluster cannot start until all running members have deleted their persistence stores and a generated new UUIDs.
To force members to delete their persistence stores, you must trigger a force-start manually. See Triggering a Force-Start.
If you choose a PARTIAL
strategy, Hazelcast triggers a
partial-start automatically on the members that have either the most recent or most complete partition table when validation timeout expires. To trigger a partial-start manually, see Triggering a Partial-Start.
Delaying Repartitioning
You can make a cluster wait for a period of time before repartitioning after one or more members fail to rejoin. When a cluster stores lots of persisted data, it may take a long time to repartition the data after a member leaves the cluster. But, you may expect members to shut down and restart quickly, in which case the cluster doesn’t need to repartition the data as soon as a member leaves. You can delay repartitioning for as long as you expect members to rejoin the cluster.
For example, you may want to delay repartitioning when you’re running a cluster on Kubernetes and expect members to be restarted quickly.
If you’re planning a cluster-wide shutdown, you also can stop members from repartitioning by putting the cluster in a FROZEN state. See Cluster and Member States.
|
To delay repartitioning during a single member failure, configure a rebalance delay, using the rebalance-delay-seconds
option.
If your cluster also stores in-memory data that is not persisted, do not configure a rebalance delay. Clusters do not repartition in-memory data if a member rejoins within the delay. As a result, any data that is not persisted will be lost if the member restarts within the delay, including backups. |
Consider the following scenario:
-
A cluster consists of members A, B, and C with Persistence enabled.
-
Member B is killed.
-
Member B restarts.
If member B restarts within the rebalance delay, all its persisted data will be restored from disk, and the cluster will not repartition its data. Any in-memory data in member B’s partitions will be lost, and member B will still be listed as the owner of those partitions. So, even if the cluster has backups of in-memory data in maps, requests for that data will go to member B (unless the members have backup reads enabled).
If members have backup reads enabled, some in-memory data may appear to have been kept. However, eventually the backups will be synchronized with the primary partition (member B). |
While the member is down, operations on partitions that are owned by that member will be retried until they either time out or the member restarts and executes the requested operation. As a result, this option is best when you prefer a latency spike rather than migrating data over the network.
If member B does not restart within the rebalance delay, the cluster recovers member B’s data from backups and repartitions the data among the remaining members (members A and C in this case). If member B is later restarted, it recovers its persisted data from disk and brings it up-to-date with data from members A and C. If Merkle trees are enabled on available data structures, members use those to request only missing persisted data. For details about how members use Merkle trees, see Synchronizing Persisted Data Faster.
Synchronizing Persisted Data Faster
When a failed member rejoins the cluster, it populates its in-memory stores with data from disk that may be stale. If you have lots of persisted data as well as in-memory data that you don’t want to lose, you can configure your data structures to generate a Merkle tree. The Merkle tree stores the state of persisted data in a way that other cluster members can quickly read, compare with their own, and check the delta for what is missing. This way, after a restart, the member can send its Merkle tree to the cluster and request only the missing data, reducing the amount of data sent over the network.
Enabling Backups
To allow the cluster to back up the persistence store, set a directory in which to store the backups in the backup-dir
option.
Hazelcast does not trigger regular backups. You must trigger backups manually. See Backing Up the Persistence Store.
Encrypting Persisted Data at Rest
Persisted data on disk such as map entries may contain sensitive information. To protect your data, you can configure members to encrypt all persisted files in your persistence store.
To encrypt data on disk, you’ll need one of the following stores in which to keep master encryption keys:
-
Java KeyStore: A Java class for storing cryptographic keys and certificates.
-
HashiCorp Vault: A tool for securely accessing secrets.
How Encryption at Rest Works
Data in the persistence store is encrypted using symmetric encryption. The encryption scheme uses two levels of encryption keys: auto-generated persistence store encryption keys (one for each configured parallelism) that are used to encrypt the chunk files and a master encryption key that is used to encrypt the store-specific encryption keys. The master encryption key is sourced from an external system called the secure store and, in contrast to the persistence-store encryption keys, it is not persisted anywhere within the persistence store.
When encryption at rest is first enabled on a member, the member contacts the secure store during startup and retrieves the master encryption key. Then, the member generates the persistence-store encryption keys, encrypts them with the master key, and stores them in the persistence store’s directory. The subsequent writes to any chunk files will be encrypted using this persistence-store encryption key. During Persistence, the member gets the master encryption key from the secure store, decrypts the persistence-store encryption keys and uses those to decrypt the chunk files.
Global Persistence Options
Use these configuration options to configure general Persistence options.
Option | Description | Default | Example |
---|---|---|---|
The parent directory in which to store persisted data. This directory is created automatically if it does not exist. |
|
|
|
The directory in which to store backups. The backup process creates sequenced subdirectories
named |
' ' (empty) |
Backups must be triggered manually, see Backing Up the Persistence Store. |
|
Number of I/O threads that are started concurrently for reading from and writing to files in the persistence store. Before changing the default, you should measure the raw I/O throughput of your infrastructure and test with different values of parallelism. In some cases, such as dedicated hardware, higher parallelism can yield more throughput. In other cases, such as running on EC2, a higher parallelism can yield diminishing returns with more thread scheduling, more contention on I/O, and less efficient garbage collection. |
|
|
|
Number of seconds that the cluster allows for members to rejoin and send their partition table to the master member. |
|
|
|
Number of seconds that the cluster allows for members to finish restoring data from their local persistence store. |
|
|
|
The data recovery policy that is respected when the whole cluster restarts. Valid values are:
|
|
|
|
Enables a joining member to automatically remove its persistence store if the cluster’s master member considers the persisted data to be stale. This option applies only to single-member failures. |
|
|
|
Enables encryption of data in the persistence store. |
|
||
Number of seconds a cluster waits before repartitioning after a member leaves by means other than a graceful shutdown. |
|
Encryption Options
Use the following options to configure encryption for persisted data at rest:
<hazelcast>
<persistence enabled="true">
<encryption-at-rest>
<!-- insert configuration options here -->
</encryption-at-rest>
</persistence>
</hazelcast>
hazelcast:
persistence:
enabled: true
encryption-at-rest:
enabled: true
# insert configuration options here
Add configuration options to the EncryptionAtRestConfig
object.
Config config = new Config();
PersistenceConfig PersistenceConfig = new PersistenceConfig()
.setEnabled(true);
EncryptionAtRestConfig encryptionAtRestConfig = PersistenceConfig.getEncryptionAtRestConfig();
encryptionAtRestConfig.setEnabled(true);
config.setPersistenceConfig(PersistenceConfig);
Option | Description | Default | Example |
---|---|---|---|
The symmetric cipher to use for encrypting persisted data. Valid values are:
|
|
|
|
|
The encryption salt. |
|
|
|
The size (in bits) of the auto-generated persistence store encryption key. |
A value of |
|
|
The secure store to use for the storing master encryption keys. |
'' (empty) |
Configuring a Secure Store
A secure store represents a secure place outside of the persistence store in which Hazelcast can keep its master encryption keys.
Hazelcast provides secure store implementations for storing master encryption keys in the following places:
-
Java KeyStore: A Java class for storing cryptographic keys and certificates.
-
HashiCorp Vault: A tool for securely accessing secrets.
Java KeyStore
You can configure members to store your master encryption keys in a Java KeyStore by specifying the following options:
-
path
: The path to the KeyStore file. -
type
: The type of KeyStore (PKCS12
,JCEKS
, etc.). -
password
: The KeyStore password. -
current-key-alias
: The alias for the current encryption key entry (optional). -
polling-interval
: The polling interval (in seconds) for checking for changes in the KeyStore. Disabled by default.
Sensitive configuration values such as passwords should be protected using variable replacers. |
The Java KeyStore treats all KeyStore.SecretKeyEntry
entries stored in the KeyStore as
encryption keys. It expects that these entries use the same protection password as the KeyStore. Entries of other types (private key entries, certificate entries) are ignored. If the
current-key-alias
option is configured, the corresponding entry will be treated as the current encryption key,
otherwise the highest entry in the alphabetical order will be used. The remaining entries will
represent historical versions of the encryption key.
<hazelcast>
<persistence enabled="true">
<encryption-at-rest enabled="true">
<key-size>
0
</key-size>
<secure-store>
<keystore>
<path>/path/to/keystore.file</path>
<type>PKCS12</type>
<password>password</password>
<current-key-alias>current</current-key-alias>
<polling-interval>60</polling-interval>
</keystore>
</secure-store>
</encryption-at-rest>
</persistence>
</hazelcast>
hazelcast:
persistence:
enabled: true
encryption-at-rest:
enabled: true
key-size: 0
secure-store:
keystore:
path: /path/to/keystore.file
type: PKCS12
password: password
current-key-alias: current
polling-interval: 60
JavaKeyStoreSecureStoreConfig keyStoreConfig =
new JavaKeyStoreSecureStoreConfig(new File("/path/to/keystore.file"))
.setType("PKCS12")
.setPassword("password")
.setCurrentKeyAlias("current")
.setPollingInterval(60);
HashiCorp Vault
You can configure members to store your master encryption key in a Hashicorp Vault store by specifying the following options:
-
address
: The address of the Vault server. -
secret-path
: The secret path under which the encryption keys are stored. -
token
: The Vault authentication token. -
polling-interval
: The polling interval (in seconds) for checking for changes in Vault. Disabled by default. -
ssl
: The TLS/SSL configuration for HTTPS support. See the TLS/SSL section for more information about how to use thessl
element.
Sensitive configuration properties such as token should be protected using variable replacers.
|
The HashiCorp Vault secure store implementation uses the official REST API to integrate with HashiCorp Vault. Only for the KV secrets engine, both KV V1 and KV V2 can be used, but since only V2 provides secrets versioning, this is the recommended option. With KV V1 (no versioning support), only one version of the encryption key can be kept, whereas with KV V2, the HashiCorp Vault secure store is able to retrieve also the historical encryption keys. (Note that the size of the version history is configurable on the Vault side.) Having access to the previous encryption keys may be critical to avoid scenarios where the data becomes undecryptable because the master encryption key is no longer usable (for instance, when the original master encryption key got rotated out in the secure store while the cluster was down).
The encryption key is expected to be stored at the specified secret path and represented as a single key/value pair in the following format:
name=Base64-encoded-data
where name can be an arbitrary string. Multiple key/value pairs under the same secret path are not
supported. Here is an example of how such a key/value pair can be stored using the HashiCorp
Vault command-line client (under the secret path hz/cluster
):
vault kv put hz/cluster value=HEzO124Vz...
With KV V2, a second put
to the same secret path creates a new version of the encryption key.
With KV V1, it simply overwrites the current encryption key, discarding the old value.
<hazelcast>
<persistence enabled="true">
<encryption-at-rest enabled="true">
<key-size>
0
</key-size>
<secure-store>
<vault>
<address>http://localhost:1234</address>
<secret-path>secret/path</secret-path>
<token>token</token>
<polling-interval>60</polling-interval>
<ssl>...</ssl>
</vault>
</secure-store>
</encryption-at-rest>
</persistence>
</hazelcast>
hazelcast:
persistence:
enabled: true
encryption-at-rest:
enabled: true
key-size: 0
secure-store:
vault:
address: http://localhost:1234
secret-path: secret/path
token: token
polling-interval: 60
ssl:
...
VaultSecureStoreConfig vaultConfig =
new VaultSecureStoreConfig("http://localhost:1234", "secret/path", "token")
.setPollingInterval(60);
configureSSL(vaultConfig.getSSLConfig());
Data Structure Options
Once persistence of map and JCache data structures is enabled on a cluster, it is permanently enabled. You cannot disable it. |
You cannot persist a map if its name contains either of the following. Otherwise, Hazelcast throws an exception.
|
<hazelcast>
<map name="test-map">
<data-persistence enabled="true">
<!-- insert configuration options here -->
</data-persistence>
</map>
</hazelcast>
hazelcast:
map:
test-map:
data-persistence:
enabled: true
# insert configuration options here
Add configuration options to the MapConfig
object.
Config config = new Config();
MapConfig mapConfig = config.getMapConfig("test-map");
mapConfig.getDataPersistenceConfig().setEnabled(true);
config.addMapConfig(mapConfig);
Option | Description | Default | Example |
---|---|---|---|
Guarantees that data is persisted to disk when a write operation returns a successful response to the caller. By default, data is eventually persisted to disk instead of on every disk write. This generally provides a better performance. |
|
|
|
Allows restarting members to synchronize their persisted map or JCache data faster with the rest of the cluster. |
|
See Synchronizing Data Faster for more information. |
Option | Description | Default | Example |
---|---|---|---|
|
Whether a Merkle tree is generated for the data structure. |
|
|
|
The depth of the Merkle tree. The deeper the tree, the more accurate the difference detection but the more space is needed to store the Merkle tree in memory. |
|
|
SQL Metadata Options
Use the following configuration to enable the cluster-wide persistence of SQL metadata to disk. With persistence enabled, SQL mappings, data connections, and views are retained after cluster restarts.
Once persistence of SQL metadata is enabled on a cluster it is permanently enabled. You cannot disable it. |
<hazelcast>
<sql>
<catalog-persistence-enabled>
true
</catalog-persistence-enabled>
</sql>
</hazelcast>
hazelcast:
sql:
catalog-persistence-enabled: true
Config config = new Config();
config.getSqlConfig().setCatalogPersistenceEnabled(true);
For clusters with over six members, it may take some time for metadata stored in the SQL catalog to become available to all members after a restart. This may impact the hot restart of jobs that are dependent on entities in the SQL catalog, such as jobs that use data connections. |
Job Snapshots Options
Use the following option to configure persistence for job snapshots.
<hazelcast>
<jet>
<instance>
<lossless-restart-enabled>
true
</lossless-restart-enabled>
</instance>
</jet>
</hazelcast>
hazelcast:
jet:
instance:
lossless-restart-enabled: true
Use the JetConfig
object.
Config config = new Config();
config.getJetConfig().setLosslessRestartEnabled(true);
For lossless restart to work, the cluster must be shut down gracefully. When members are shut down in a rapid succession, Hazelcast triggers an automatic rebalancing process where backup partitions are promoted and new backups are created for each member. This may result in out-of-memory errors or data loss.
Because job data is saved locally on each member, all members must be present after a restart for Hazelcast to be able to reload the data.
Full Example of Persistence Configuration
The following are example configuration settings for a map instance, a JCache instance, SQL metadata persistence, and job snapshots.
<hazelcast>
...
<persistence enabled="true">
<base-dir>/mnt/persistence</base-dir>
<backup-dir>/mnt/hot-backup</backup-dir>
<validation-timeout-seconds>120</validation-timeout-seconds>
<data-load-timeout-seconds>900</data-load-timeout-seconds>
<cluster-data-recovery-policy>FULL_RECOVERY_ONLY</cluster-data-recovery-policy>
<rebalance-delay-seconds>0</rebalance-delay-seconds>
</persistence>
...
<map name="test-map">
<merkle-tree enabled="true" >
<depth>12</depth>
</merkle-tree>
<data-persistence enabled="true">
<fsync>false</fsync>
</data-persistence>
</map>
...
<cache name="test-cache">
<merkle-tree enabled="true" >
<depth>12</depth>
</merkle-tree>
<data-persistence enabled="true">
<fsync>false</fsync>
</data-persistence>
</cache>
...
<sql>
<catalog-persistence-enabled>true</catalog-persistence-enabled>
</sql>
...
<jet>
<instance>
<lossless-restart-enabled>true</lossless-restart-enabled>
</instance>
</jet>
...
</hazelcast>
hazelcast:
persistence:
enabled: true
base-dir: /mnt/persistence
backup-dir: /mnt/hot-backup
validation-timeout-seconds: 120
data-load-timeout-seconds: 900
cluster-data-recovery-policy: FULL_RECOVERY_ONLY
rebalance-delay-seconds: 0
map:
test-map:
merkle-tree:
enabled: true
depth: 12
data-persistence:
enabled: true
fsync: false
cache:
test-cache:
merkle-tree:
enabled: true
depth: 12
data-persistence:
enabled: true
fsync: false
sql:
catalog-persistence-enabled: true
jet:
instance:
lossless-restart-enabled: true
Config config = new Config();
PersistenceConfig PersistenceConfig = new PersistenceConfig()
.setEnabled(true)
.setBaseDir(new File("/mnt/persistence"))
.setParallelism(1)
.setValidationTimeoutSeconds(120)
.setDataLoadTimeoutSeconds(900)
.setClusterDataRecoveryPolicy(PersistenceClusterDataRecoveryPolicy.FULL_RECOVERY_ONLY)
.setAutoRemoveStaleData(true);
.setRebalanceDelaySeconds(0)
config.setPersistenceConfig(PersistenceConfig);
MapConfig mapConfig = config.getMapConfig("test-map");
mapConfig.getDataPersistenceConfig().setEnabled(true);
mapConfig.getMerkleTreeConfig().setEnabled(true);
mapConfig.getMerkleTreeConfig().setDepth(12);
config.addMapConfig(mapConfig);
CacheSimpleConfig cacheConfig = config.getCacheConfig("test-cache");
cacheConfig.getDataPersistenceConfig().setEnabled(true);
cacheConfig.getMerkleTreeConfig().setEnabled(true);
cacheConfig.getMerkleTreeConfig().setDepth(12);
config.addCacheConfig(cacheConfig);
config.getSqlConfig().setCatalogPersistenceEnabled(true);
config.getJetConfig().setLosslessRestartEnabled(true);