hazelcast.mc.allowMultipleLogin
ALLOW_MULTIPLE_LOGIN
|
Whether a user can log into an account in Management Center on multiple devices in different locations at the same time. Default: false . See Securing User Sessions.
|
java -Dhazelcast.mc.allowMultipleLogin=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.auditlog.enabled
AUDIT_LOG_ENABLED
|
Whether Management Center logs auditable events. See Audit Logging. Default: false .
|
java -Dhazelcast.mc.auditlog.enabled=true \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.configReplacer.class
|
|
java -Dhazelcast.mc.configReplacer.class=com.hazelcast.webmonitor.configreplacer.EncryptionReplacer \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.configReplacer.failIfValueMissing
|
Whether the
configuration loading process stops when a replacement value is missing. Default: true .
|
java -Dhazelcast.mc.configReplacer.failIfValueMissing=true \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.contextPath
CONTEXT_PATH
|
Prefix of all URL paths in Management Center. Default: ' ' (empty).
|
java -Dhazelcast.mc.contextPath=hazelcast-mc \
-jar hazelcast-management-center-5.0.4.jar
In this example, the URL for Management Center would be \http:localhost:8080/hazelcast-mc .
|
hazelcast.mc.disableHostnameVerification
|
Whether Management Center does not verify the hostname of signed TLS/SSL certificates. Default: false .
|
java -Dhazelcast.mc.disableHostnameVerification=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.disableLoginPeriodMultiplier
DISABLE_LOGIN_PERIOD_MULTIPLIER
|
Multiplier used for extending
the disabled login period in case the failed login attempts continue after the disabled login
period expires. Default: 10 . See Securing User Sessions.
|
java -Dhazelcast.mc.disableLoginPeriodMultiplier=20 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.exclude.cipher.suites
EXCLUDE_CIPHER_SUITES
|
A comma separated list of cipher suites to be excluded from the list of supported ciphers in Management Center. Wildcards are supported.
|
java -Dhazelcast.mc.exclude.cipher.suites=^.*_(MD5|SHA|SHA1)$,^TLS_RSA_.*$,^.*_NULL_.*$ -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.existingKeyStore.path
EXISTING_KEYSTORE_PATH
|
Path to an existing keystore. You do not have to set this property if you use a Hardware Security Module (HSM).
Default: ' ' (empty).
|
java -Dhazelcast.mc.existingKeyStore.path=/path/to/existing/keyStore.jceks -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.existingKeyStore.pass
EXISTING_KEYSTORE_PASS
|
Password for the keystore. You do not have to set this property if you use a Hardware Security Module (HSM) that provides another means to access the keystore.
Default: ' ' (empty).
|
java -Dhazelcast.mc.existingKeyStore.pass=somepass -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.existingKeyStore.type
EXISTING_KEYSTORE_TYPE
|
Type of the keystore.
Default: JCEKS .
|
java -Dhazelcast.mc.existingKeyStore.type=JCEKS -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.existingKeyStore.provider
EXISTING_KEYSTORE_PROVIDER
|
Provider of the keystore. If you use a Hardware Security Module (HSM), specify the class name of your HSM’s java.security.Provider` implementation.
Default: System provider.
|
java -Dhazelcast.mc.existingKeyStore.provider=com.yourprovider.MyProvider -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.failedAttemptsBeforeDisableLogin
FAILED_ATTEMPTS_BEFORE_DISABLE_LOGIN
|
Number of failed
login attempts that Management Center allows before disabling logins. Default: 3 . See Securing User Sessions.
|
java -Dhazelcast.mc.failedAttemptsBeforeDisableLogin=1 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.forceLogoutOnMultipleLogin
FORCE_LOGOUT_ON_MULTIPLE_LOGIN
|
Whether Management Center forces users to log out when other users try to log into the same account. Default: false . See Securing User Sessions.
|
java -Dhazelcast.mc.forceLogoutOnMultipleLogin=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.forwarded.requests.enabled
FORWARDED_REQUESTS_ENABLED
|
Whether Management Center reads X-Forwarded-*
headers from reverse proxies. Default: true .
|
java -Dhazelcast.mc.forwarded.requests.enabled=false -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.healthCheck.enable
HEALTH_CHECK_ENABLED
|
Whether the /health endpoint is enabled on port hazelcast.mc.http.port + 1. Default: false . This endpoint is always served over HTTP, regardless of any TLS/SSL settings. This endpoint responds with 200 OK HTTP
status code if Management Center is running.
|
java -Dhazelcast.mc.healthCheck.enable=true -jar hazelcast-management-center-5.0.4.jar
In this example, the health check would be available at http://localhost:8081/health .
|
hazelcast.mc.healthCheck.port
HEALTH_CHECK_PORT
|
|
java -Dhazelcast.mc.healthCheck.port=2000 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.home
HOME_PROP
|
|
java -Dhazelcast.mc.home=/home/management-center -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.hostAddress
HOST_ADDRESS
|
Network address that Management Center is reachable on. Default: 0.0.0.0 (all network interfaces).
|
java -Dhazelcast.mc.hostAddress=127.0.1.1 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.http.port
HTTP_PORT
|
HTTP port for Management Center. Default: 8080 .
|
java hazelcast.mc.http.port=80 -jar hazelcast-management-center-5.0.4.jar
In this example, the URL for Management Center would be \http:localhost:80 .
|
hazelcast.mc.include.cipher.suites
INCLUDE_CIPHER_SUITES
|
A comma separated list of cipher suits to be included in the list of supported ciphers in Management Center. Wildcards are supported.
|
java -Dhazelcast.mc.include.cipher.suites=^SSL_.*$ -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.initialDisableLoginPeriod
INITIAL_DISABLE_LOGIN_PERIOD
|
|
java -Dhazelcast.mc.initialDisableLoginPeriod=50 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.enabled
JMX_ENABLED
|
Whether the clustered JMX service is enabled. Default: false . See Clustered JMX.
|
java -Dhazelcast.mc.jmx.enabled=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.host
JMX_HOST_NAME
|
Hostname/IP address of the JMX host machine. This is used by the JMX client to connect back into JMX, so the given host must be accessible from the host machine that runs the JMX client. Default: Server’s hostname.
|
java -Dhazelcast.mc.jmx.host=127.0.0.1 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.mutualAuthentication
JMX_SSL_MUTUAL_AUTH_ENABLED
|
Whether mutual authentication is enabled for the JMX interface. Default: false .
|
java -Dhazelcast.mc.jmx.mutualAuthentication=false -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.port
JMX_PORT
|
Port on which the clustered JMX service is exposed. Default: 9999 .
|
java -Dhazelcast.mc.jmx.port=9000 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.rmi.port
JMX_RMI_PORT
|
Port on which the Java process that you want to monitor listens for incoming connections from the client (Remote management applications) such as JConsole . For monitoring a local Java process, there is no need to specify the JMX RMI port number. Default: 9998 .
|
java -Dhazelcast.mc.jmx.rmi.port=9001 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.ssl
JMX_SSL_ENABLED
|
Whether TLS/SSL is enabled for communication between the JMX interface and JMX clients. Default: false .
|
java -Dhazelcast.mc.jmx.ssl=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.ssl.keyStore
|
Path to a keystore. Default: ' ' (empty).
|
java -Dhazelcast.mc.jmx.ssl.keyStore=/some/dir/selfsigned.jks -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.ssl.keyStorePassword
|
Password for the keystore. Default: ' ' (empty).
|
java -Dhazelcast.mc.jmx.ssl.keyStorePassword=myPassword -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.ssl.trustStore
|
Path to a truststore. Default: ' ' (empty).
|
java -Dhazelcast.mc.jmx.ssl.trustStore=/some/dir/truststore -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.ssl.trustStorePassword
|
Password for the truststore. Default: ' ' (empty).
|
java -Dhazelcast.mc.jmx.ssl.trustStorePassword=myPassword -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.ssl.keyStoreType
|
Type of the keystore. Default: JKS .
|
java -Dhazelcast.mc.jmx.ssl.keyStoreType=JKS -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.jmx.ssl.keyManagerAlgorithm
TLS_KEY_MANAGER_ALGORITHM
|
Name of the algorithm based
on which the authentication keys are provided. You can find out the default by calling
the javax.net.ssl.KeyManagerFactory#getDefaultAlgorithm method. Default: System default.
|
java -Dhazelcast.mc.jmx.ssl.keyManagerAlgorithm=JKS -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.ldap.timeout
LDAP_CONN_TIMEOUT_MILLIS
|
Timeout in milliseconds for Active Directory and LDAP search queries. Default: 3000 .
|
java -Dhazelcast.mc.ldap.timeout=4000 \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.license
LICENSE
|
Enterprise license. When this property is set, the license takes precedence
over one that is set in the user interface, and you cannot update the license in the UI. For more details about licenses, see See Enterprise Licenses.
|
java -Dhazelcast.mc.license={license key} -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.lock.skip
SKIP_MC_LOCK_CHECK
|
|
java -Dhazelcast.mc.lock.skip=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.maxDisableLoginPeriod
MAX_DISABLE_LOGIN_PERIOD
|
Maximum amount of time for the disable
login period. By default, the
disabled login period is unlimited.
|
java -Dhazelcast.mc.maxDisableLoginPeriod= \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.metrics.disk.ttl.duration
PERSISTENT_STORE_TTL_DURATION
|
Time-to-Live (TTL) in ISO-8601-based durations format for each record in the metrics persistence. Default: P1D (one day). This value must be positive. See Historical Metrics.
|
java -Dhazelcast.mc.metrics.disk.ttl.duration=P2D -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.periodic.healthcheck.enabled
PERIODIC_HEALTHCHECK_ENABLED
|
|
java -Dhazelcast.mc.periodic.healthcheck.enabled=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.phone.home.enabled
PHONE_HOME_ENABLED
|
Whether Management Center sends usage data to the Hazelcast phone home server. Default: true . See Phone Home.
|
java -Dhazelcast.mc.phone.home.enabled=false \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.prometheusExporter.enabled
PROMETHEUS_EXPORTER_ENABLED
|
Whether to expose all metrics to the /metrics endpoint to be consumed by Prometheus. All metrics at the endpoint include the hz_ prefix. Default: false .
|
java -Dhazelcast.mc.prometheusExporter.enabled=true \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.prometheusExporter.filter.metrics.included
PROMETHEUS_EXPORTER_ALLOWLIST
|
Metrics to include in the /metrics endpoint. Default: ' ' (empty).
|
java -Dhazelcast.mc.prometheusExporter.filter.metrics.included=hz_topic_totalReceivedMessages,hz_map_totalPutLatency \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.prometheusExporter.filter.metrics.excluded
PROMETHEUS_EXPORTER_DENYLIST
|
Metrics to exclude from the /metrics endpoint. Default: ' ' (empty).
|
java -Dhazelcast.mc.prometheusExporter.filter.metrics.excluded=hz_os_systemLoadAverage,hz_memory_freeHeap \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.prometheusExporter.port
PROMETHEUS_EXPORTER_PORT_NUMBER
|
Port on which the /metrics endpoint is exposed.
|
java -jar -Dhazelcast.mc.prometheusExporter.enabled=true \
-Dhazelcast.mc.prometheusExporter.port=2222 \
-jar hazelcast-management-center-5.0.4.jar
In this example, the /metrics endpoint would be available on port 2222: http://localhost:2222/metrics .
|
hazelcast.mc.rest.enabled
MC_REST_ENABLED
|
|
java -Dhazelcast.mc.rest.enabled=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.security.dictionary.minWordLength
PASSWORD_DICTIONARY_MIN_WORD_LENGTH
|
Minimum length that words in the dictionary must contain. Default: 3 .
|
java -Dhazelcast.mc.security.dictionary.path=/usr/MCtext/pwd.txt \
-Dhazelcast.mc.security.dictionary.minWordLength=3 \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.security.dictionary.path
PASSWORD_DICTIONARY_PATH
|
Path to a text file that contains words that cannot be included in user passwords.
|
java -Dhazelcast.mc.security.dictionary.path=/usr/MCtext/pwd.txt \
-jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.session.timeout.seconds
SESSION_TIMEOUT_SECONDS
|
Number of seconds that a session can remain inactive before it is invalid and the user must log in again. Default 1800 .
|
java -Dhazelcast.mc.session.timeout.seconds=60 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.state.reschedule.delay.millis
TMS_RESCHEDULE_DELAY_MILLIS
|
Duration in milliseconds that Management Center waits before requesting metadata from a Hazelcast cluster. Metadata includes a
list of all data structures and their configurations. Default: 1000.
|
java -Dhazelcast.mc.state.reschedule.delay.millis=2000 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.excludeProtocols
TLS_EXCLUDE_PROTOCOLS
|
A comma separated list of TLS/SSL protocols to be excluded from the list of supported protocols in Management Center.
|
java -Dhazelcast.mc.tls.excludeProtocols=SSLv3 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.openSsl
TLS_OPEN_SSL
|
Allow Management Center to use Google’s Conscrypt SSL that is built on their fork of OpenSSL, BoringSSL. Default: false .
|
java -Dhazelcast.mc.tls.openSsl=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.enabled
TLS_ENABLED
|
Whether TLS/SSL is enabled. Default: false .
|
java -Dhazelcast.mc.tls.enabled=true -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.keyStore
TLS_KEYSTORE_PATH
|
|
java -Dhazelcast.mc.tls.keyStore=/keys/mc.keystore -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.keyStorePassword
TLS_KEYSTORE_PASS
|
|
java -Dhazelcast.mc.tls.keyStorePassword=mypassword123 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.trustStore
TLS_TRUSTSTORE_PATH
|
Path to a truststore. If the hazelcast.mc.tls.enabled system property is true and this value is empty, Management Center uses the system JVM’s own truststore.
|
java -Dhazelcast.mc.tls.trustStore=/truststores/mc.truststore -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.trustStorePassword
TLS_TRUSTSTORE_PASS
|
Password of the truststore.
|
java -Dhazelcast.mc.tls.trustStorePassword=mypassword123 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.enableHttpPort
TLS_ENABLE_HTTP_PORT
|
|
java -Dhazelcast.mc.tls.trustStorePassword=mypassword123 -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.tls.mutualAuthentication
TLS_MUTUAL_AUTH
|
Whether clients connected to Management Center are authenticated:
-
REQUIRED : If the client does not provide a keystore or the provided keys are not included in the Management Center’s truststore, the client will not be authenticated.
-
OPTIONAL : If the client does not provide a keystore, it will be authenticated. But, if the client provides keys that are not included in the Management Center’s truststore, the client will not be authenticated.
|
java -Dhazelcast.mc.tls.mutualAuthentication=REQUIRED -jar hazelcast-management-center-5.0.4.jar
|
hazelcast.mc.useExistingKeyStore
USE_EXISTING_KEYSTORE
|
Enables use of an existing keystore.
Default: false .
|
java -Dhazelcast.mc.useExistingKeyStore=true -jar hazelcast-management-center-5.0.4.jar
|