Mastering Hazelcast 3.9
Mastering Hazelcast 3.9
Mastering
Hazelcast IMDG
The Ultimate Hazelcast IMDG Book
Current to Hazelcast IMDG 3.9
2017-02-22
Table of Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
What is Hazelcast? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Who should read this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
What is in this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Online Book Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Online Hazelcast Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1. Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1. Installing Hazelcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2. Hazelcast with Maven or Gradle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3. Download Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.4. Building Hazelcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.5. Rolling Member Upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.6. Hazelcast Plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2. Learning The Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1. Configuring Hazelcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1.1. Configuring Hazelcast using XML. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1.2. Configuring for Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1.3. Resolving Hazelcast Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.1.4. Loading Hazelcast XML Configuration from Java . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1.5. Loading Configuration Programmatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1.6. Dynamically Adding Data Structure Configuration on a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.1.7. Fluent Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.1.8. No Static Default HazelcastInstance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.1.9. Same Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.1.10. Wildcard Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.1.11. Avoiding Ambiguous Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.1.12. Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1.13. Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1.14. Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.1.15. Composing Declarative Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.2. Multiple Hazelcast Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.3. Loading a DistributedObject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.4. Unique Names for Distributed Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.5. Reloading a DistributedObject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.6. Destroying a DistributedObject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.7. Controlled Partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.7.1. DistributedObject Names and Partition Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.7.2. Accessing DistributedObject Partition Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.7.3. Obtaining DistributedObject Partition Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.7.4. Using @ in Partitioned DistributedObject Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.8. User Code Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.9. Lite Members. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.10. Cluster States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.10.1. Cluster Member States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.11. Good to Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.12. Failure Detectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.12.1. Deadline Failure Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.12.2. Phi Accrual Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.12.3. Ping Failure Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Requirements and Linux/Unix Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.13. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3. Distributed Primitives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.1. IAtomicLong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.1.1. Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.1.2. Good to know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.2. IdGenerator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.2.1. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.3. IAtomicReference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.3.1. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.4. ILock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.5. ICondition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.5.1. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.6. ISemaphore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.6.1. Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.7. ICountDownLatch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8. Cardinality Estimator Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.1. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3.9. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4. Distributed Collections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.1. IQueue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.1.1. Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.1.2. Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.1.3. QueueStore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.2. IList . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.3. ISet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.4. Collection ItemListener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.4.1. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.5. Ringbuffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.5.1. Ringbuffer with Persistent Datastore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.6. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
5. Distributed Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
5.1. Creating a Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
5.2. Reading/Writing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
5.3. In-Memory Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
5.3.1. Good To Know: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
5.3.2. What Happened to Cache-Value? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
5.4. Hashcode and Equals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
5.5. Partition Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
5.6. High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.7. Eviction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
5.8. Custom Eviction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
5.9. Near Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
5.10. Concurrency Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
5.10.1. Pessimistic Locking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.10.2. Optimistic Locking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.11. EntryProcessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.11.1. Process Return Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.11.2. Backup Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.11.3. Using Indexes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.11.4. Threading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.11.5. Good to know. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.12. MapListener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.12.1. Threading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.12.2. Good to know. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.13. Listener with Predicates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.13.1. Good to know. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.14. Distributed Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.14.1. Criteria API. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Equal Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
And, Or and Not Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Other Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
PredicateBuilder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.14.2. Distributed SQL Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
5.14.3. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
5.14.4. MapReduce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
5.14.5. Aggregators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Supplier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Property Extractor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Aggregation Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
An Aggregation Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
5.14.6. Fast-Aggregations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
5.14.7. Projections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.15. Indexes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
5.16. Persistence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
5.16.1. Pre-Populating the Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
5.16.2. Write Through vs Write Behind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
5.16.3. MapLoaderLifecycleSupport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
5.16.4. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
5.17. MultiMap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
5.17.1. Multimap Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
5.17.2. Good To Know: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
5.17.3. Replicated Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
5.17.4. Replicated Map Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
5.17.5. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
5.18. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
6. Distributed Executor Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
6.1. Scaling Up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
6.2. Scaling Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
6.3. Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
6.3.1. Executing on a Specific Member. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
6.3.2. Executing on Key Owner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
6.3.3. Executing on All or Subset of Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
6.3.4. Futures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
6.4. Execution Callback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
6.5. Durable Executor Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
6.5.1. Execute At Least Once . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
6.5.2. Guaranteeing Task Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
6.5.3. Durable Ringbuffer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
6.5.4. Configuring Durable Executor Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
6.6. Scheduled Executor Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
6.7. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
6.8. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
7. Distributed Topic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
7.1. ITopic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
7.1.1. Message Ordering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
7.2. Reliable Topic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
7.2.1. Message Ordering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
7.3. Scaling up the MessageListener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
7.4. Good to know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
7.5. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
8. Hazelcast Jet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
8.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
8.2. How You Can Use It . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
8.3. Where You Can Use It . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
8.4. Data Processing Styles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
8.5. Relationship with Hazelcast IMDG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
8.6. Hazelcast IMDG Computing vs. Hazelcast Jet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
8.7. Event Journal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
9. Hazelcast Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
9.1. Reusing the Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
9.2. Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
9.3. LoadBalancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
9.4. Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
9.5. Client Connection Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
9.6. Group Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
9.7. Sharing Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
9.8. SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
9.9. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
9.10. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
10. Serialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
10.1. Serializable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
10.2. Externalizable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
10.3. DataSerializable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
10.3.1. IdentifiedDataSerializable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
10.4. Portable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
10.4.1. DataSerializable vs. Portable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
10.4.2. Object Traversal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
10.4.3. Serialize DistributedObject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
10.4.4. Serializing Raw Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
10.4.5. Cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
10.4.6. Subtyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
10.4.7. Versioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
10.5. StreamSerializer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
10.5.1. Object Traversal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
10.5.2. Collections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
10.5.3. Kryo StreamSerializer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
10.6. ByteArraySerializer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
10.7. Global Serializer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
10.8. HazelcastInstanceAware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
10.8.1. UserContext . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
10.9. ManagedContext . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
10.10. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
10.11. What is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
11. Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
11.1. Configuring the TransactionalMap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
11.2. TransactionOptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
11.2.1. TransactionType . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
11.3. TransactionalTask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
11.4. Partial Commit Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11.5. Transaction Isolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11.5.1. No Dirty Reads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11.5.2. Non-repeatable Reads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
11.5.3. Read Your Writes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
11.5.4. No Serialized Isolation Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
11.5.5. Non-transactional Data Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
11.6. Locking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
11.7. Caching and Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.8. XA Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.9. J2EE Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
11.9.1. Resource Adapter Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
11.10. Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
11.11. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
11.12. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
12. Hazelcast JCache Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
12.1. Configuring Hazelcast for JCache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
12.2. Setting Up JCache Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
12.2.1. Configuring JCache Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
12.2.2. Configuring JCache with Client Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
12.2.3. Configuring JCache with Server Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
12.3. JCache API Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
12.3.1. Getting the Hazelcast JCache Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
12.3.2. Setting up the JCache Entry Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
12.3.3. Configuring the Cache Before Creating It . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
12.3.4. Creating the Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
12.3.5. get, put, and getAndPut . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
12.4. Other JCache Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
12.4.1. Factory and FactoryBuilder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
12.4.2. CacheLoader: Loading Cache Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
12.4.3. CacheWriter: Updating an External Backend Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
12.4.4. EntryProcessor: Apply an Atomic Function to a Cache Entry . . . . . . . . . . . . . . . . . . . . . . . . . . 219
12.4.5. CacheEntryListener: Listener Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
12.4.6. ExpirePolicy: Expire Cache Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
12.5. Integration between Hazelcast Instance and JCache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
12.6. Hazelcast JCache Extension - ICache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
12.6.1. ICache Async Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
12.6.2. Defining a Custom ExpiryPolicy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
13. Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
13.1. Introduction to High-Density Memory Store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
13.2. Configuring High-Density Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
13.3. JCache on High-Density Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
13.4. IMap on High-Density Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
13.5. Near Cache on High-Density Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
13.6. Eviction on High-Density Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
13.7. Monitoring High-Density Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
14. Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
14.1. Public Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
14.2. Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
14.3. Outbound Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
14.4. Reuse Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
14.5. Join Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
14.5.1. Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
14.5.2. Trusted Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
14.5.3. Debugging Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
14.5.4. TCP/IP Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Required Member. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
14.5.5. EC2 Auto Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
14.5.6. Partition Group Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
14.6. Cluster Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
14.7. SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
14.8. OpenSSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
14.8.1. Installing OpenSSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
14.8.2. Configuring Hazelcast to use OpenSSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
14.8.3. Configuring Cipher Suites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
14.9. Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
14.10. Strength Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
14.10.1. Using a Custom Secret Strength Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
14.10.2. Enforcing the Secret Strength Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
14.11. Specifying Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
14.12. Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
14.12.1. iptables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
14.13. Connectivity Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
14.14. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
14.15. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
15. Using Hazelcast as Hibernate 2nd Level Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
15.1. Configuring Hibernate for Hazelcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
15.2. Configuring Hazelcast for Hibernate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
15.3. Hazelcast Modes for Hibernate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
15.4. Configuring Cache Concurrency Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
15.5. Example Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
16. Integrating Hazelcast with Spring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
16.1. Declaring Beans by Spring beans Namespace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
16.2. Declaring Beans by Hazelcast Namespace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
16.3. Enabling SpringAware Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
16.4. SpringAware Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
16.5. Adding Caching to Spring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
16.6. Declarative Spring Cache Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
16.7. Configuring Hibernate Second Level Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
16.8. Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
17. Extending Hazelcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
17.1. Service Provider Interface (SPI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
17.1.1. Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
17.1.2. Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
17.1.3. Container . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
17.1.4. Partition Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
17.1.5. Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
17.1.6. Good To Know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
17.2. Discovery SPI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
17.2.1. Example Discovery Strategy Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
17.2.2. Configuring DiscoveryStrategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
17.3. What Is Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
18. Consistency and Replication Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
18.1. Hazelcast’s Replication Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
18.2. Best-Effort Consistency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
18.3. Invocation Lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
18.4. Exactly-once, At-least-once or At-most-once Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
18.5. IndeterminateOperationStateException . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
19. Threading Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
19.1. I/O Threading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
19.2. Event Threading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
19.3. IExecutor Threading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
19.4. Operation Threading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
19.4.1. Partition-aware Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
19.4.2. Non-Partition-Aware Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
19.4.3. Priority Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
19.5. Operation-response and Invocation-future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
19.6. Local Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
19.7. Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
19.8. Map Loader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
20. Performance Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
20.1. Cluster Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
20.2. Reference Reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
20.3. Split Brain Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
20.4. Partitioning Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
20.5. Map Performance Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
20.6. Local stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
20.7. JMX Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
20.8. Slow Operation Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
20.8.1. Logging of Slow Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
20.8.2. Purging of Slow Operation Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
20.9. Other . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
21. Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
21.1. Hazelcast on EC2 Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Mastering Hazelcast
Acknowledgments
Special thanks go to the Hazelcast guys: Talip Ozturk, Fuad Malikov, and Enes Akar who are technically
responsible for Hazelcast and helped to answer my questions. But I really want to thank Mehmet
Dogan, architect at Hazelcast, since he was my main source of information and put up with the zillion
questions I have asked.
Also thanks to all committers and mailing list members for contributing to making Hazelcast such a
great product.
Finally, I’m very grateful for my girlfriend, Ralitsa Spasova, for being a positive influence around me
and making me a better person.
Foreword
Peter Veentjer leads the QuSP (“Quality, Stability and Performance”) team at Hazelcast. In that role, he
roves over the whole code base with an eagle eye and has built up deep expertise on Hazelcast. Peter is
also a great communicator, wishing to spread his knowledge of and enthusiasm for Hazelcast to our
user base. So it was natural for Peter to create Mastering Hazelcast.
In Mastering Hazelcast, Peter takes an in-depth look at fundamental Hazelcast topics. This book should
be seen as a companion to the Hazelcast Reference Manual. The reference manual covers all Hazelcast
features. Mastering Hazelcast gives deeper coverage over the most important topics. Each chapter has
a Good to Know section, which highlights important concerns.
This book includes many code examples. These and more can be accessed from
https://github.com/hazelcast/hazelcast-code-samples. A great way to learn Hazelcast is to download the
examples and work with them as you read the chapters.
Like much of Hazelcast, this book is open source. Feel free to submit pull requests to add to and
improve it. It is a living document that gets updated as we update Hazelcast.
Greg Luck
CEO Hazelcast
Preface
Writing concurrent systems has long been a passion of mine, so it is a logical step to go from
concurrency control within a single JVM to concurrency control over multiple JVMs. A lot of the
knowledge that is applicable to concurrency control in a single JVM also applies to concurrency over
multiple JVMs. However, there is a whole new dimension of problems that make distributed systems
even more interesting to deal with.
What is Hazelcast?
When you professionally write applications for the JVM, you will likely write server-side applications.
Although Java has support for writing desktop applications, the server-side is where Java really shines.
Today, in the era of cloud computing, it is important that server-side systems are:
1. Scalable: just add and remove machines to match the required capacity.
2. Highly available: if one or more machines has failed, the system should continue as if nothing
happened.
1. highly available.
Hazelcast does not lose data after a JVM crash because it automatically replicates partition data to
other cluster members. In the case of a member going down, the system will automatically failover
by restoring the backup. Hazelcast has no master member that can form a single point of failure;
each member has equal responsibilities.
2. lightning-fast.
Hazelcast on its own is elastic, but not automatically elastic; it will not automatically spawn additional
JVMs to become members in the cluster when the load exceeds a certain upper threshold. Also,
Hazelcast will not shutdown JVMs when the load drops below a specific threshold. You can achieve this
by adding a glue code between Hazelcast and your cloud environment.
One of the things I like most about Hazelcast is that it is unobtrusive; as a developer/architect, you are
in control of how much Hazelcast you get in your system. You are not forced to mutilate objects so they
can be distributed, use specific application servers, complex APIs, or install software; just add the
hazelcast.jar to your classpath and you are done.
This freedom, combined with very well-thought-out APIs, make Hazelcast a joy to use. In many cases,
you simply use interfaces from java.util.concurrent, such as Executor, BlockingQueue or Map. In little
time and with simple and elegant code, you can write a highly available, scalable and high-performing
system.
If you are a developer that has no prior experience with Hazelcast, this book will help you learn the
basics and get up and running quickly. If you already have some experience, it will round out your
knowledge. If you are a heavy Hazelcast user, it will give you insights into advanced techniques and
things to consider.
In Chapter 1: Getting Started, you will learn how to download and set up Hazelcast and how to create
a basic project. You will also learn about some of the general Hazelcast concepts.
In Chapter 2: Learning the Basics, you will learn the basic steps to start Hazelcast instances, load and
configure DistributedObjects, configure logging, and the other fundamentals of Hazelcast.
In Chapter 3: Distributed Primitives, you will learn how to use basic concurrency primitives like
ILock, IAtomicLong, IdGenerator, ISemaphore and ICountDownLatch, and about their advanced
settings.
In Chapter 4: Distributed Collections, you will learn how to make use of distributed collections like
the IQueue, IList and ISet.
In Chapter 5: Distributed Map, you will learn about the IMap functionality. Since IMap functionality
is very extensive, there is a whole section that deals with its configuration options, such as high
availability, scalability, etc. You will also learn how to use Hazelcast as a cache and persist its values.
In Chapter 6: Distributed Executor, you will learn about executing tasks using the Distributed
Executor. By using the executor, you turn Hazelcast into a computing grid.
In Chapter 7: Distributed Topic, you will learn about creating a publish/subscribe solution using the
Distributed Topic and ReliableTopic functionality.
In Chapter 8: Hazelcast Clients, you will learn about setting up Hazelcast clients.
In Chapter 9: Serialization, you will learn more about the different serialization technologies that are
supported by Hazelcast. Java Serializable and Externalizable interfaces, and also the native Hazelcast
serialization techniques like DataSerializable and the new Portable functionality will be explained.
In Chapter 10: Transactions, you will learn about Hazelcast’s transaction support, which prevents
transactional data structures from being left in an inconsistent state.
In Chapter 11: Hazelcast JCache Implementation, you will learn about Hazelcast’s JCache
implementation.
In Chapter 12: Storage, you will learn about Hazelcast’s High-Density Memory Store feature.
In Chapter 13: Network Configuration, you will learn about Hazelcast’s network configuration.
Different member discovery mechanisms like multicast, Amazon EC2, and security will be explained.
In Chapter 14: Using Hazelcast as Hibernate 2nd Level Cache, you will learn how you can configure
your Hazelcast to use it as Hibernate 2nd Level Cache.
In Chapter 15: Integrating Hazelcast with Spring, you will learn how you can configure your
Hazelcast in the Spring context.
In Chapter 16: Extending Hazelcast, you will learn about using the Hazelcast SPI to make first class
distributed services and also our Discovery SPI.
In Chapter 17: Threading Model, you will learn about using the Hazelcast threading model. This
helps you write an efficient system without causing cluster stability issues.
In Chapter 18: Performance Tips, you will learn some tips to improve Hazelcast performance.
In the Appendix, you will learn how you can configure your Hazelcast cluster in Amazon EC2.
Code examples that are structured chapter by chapter in a convenient Maven project can be cloned
using GitHub at https://github.com/hazelcast/hazelcast-code-samples. I recommend you run the
examples as you read the book.
Please feel free to submit any errata as an issue to this repository, or send them directly to
[email protected].
Building distributed systems on Hazelcast is really a joy to do. I hope I can make you as enthusiastic
about it as I am. So let’s get started with building distributed applications that you can be proud of.
Chapter 1. Getting Started
In this chapter, you will learn the basic steps for getting started with Hazelcast, including
• downloading Hazelcast,
For this book, we rely on the community edition of Hazelcast 3.8 which you can download from
http://www.hazelcast.org/download/. If your project uses Maven, there is no need to install Hazelcast at
all, see http://www.hazelcast.org/download/#maven. Otherwise, you should make sure that the
Hazelcast JAR is added to your classpath. Apart from this JAR, there is no other installation process for
Hazelcast. These simple steps save quite a lot of time that can be used to solve real problems.
<dependencies>
<dependency>
<groupId>com.hazelcast</groupId>
<artifactId>hazelcast</artifactId>
<version>3.8</version>
</dependency>
</dependencies>
That is it. Make sure that you check the Hazelcast website to have <version> use the most recent
version number. After this dependency is added, Maven will automatically download the
dependencies needed.
To do same with Gradle, include the following to the dependencies section of your build.gradle:
dependencies {
compile "com.hazelcast:hazelcast:3.8”
}
The latest snapshot is even more recent because it is updated as soon as a change is merged in the Git
repository.
If you want to use the latest snapshot, you need to add the snapshot repository to your pom:
<repositories>
<repository>
<id>snapshot-repository</id>
<name>Maven2 Snapshot Repository</name>
<url>https://oss.sonatype.org/content/repositories/snapshots</url>
</repository>
</repositories>
repositories {
maven {
url 'https://oss.sonatype.org/content/repositories/snapshots'
}
}
Using a snapshot can be useful if you need to work with the latest and greatest.
However, the snapshot versions might contain some bugs.
If you want to clone the Git repository, just execute the following command:
The examples are very useful to get started and show how Hazelcast features work. These examples
are modules within a Maven project and you can build them using the following command:
mvn clean install
Each example has one or more bash scripts to run it. Some users prefer to run them in their IDE.
The above command builds all the JARs and runs all the tests. That can take some time. If you do not
want to execute all the tests, use the following command:
If you have a change that you want to offer to the Hazelcast team, you commit and push your change
to your own forked repository and you create a pull request that will be reviewed by the Hazelcast
team. Once your pull request is verified, it will be merged and a new snapshot will automatically
appear in the Hazelcast snapshot repository.
Assuming, as an example, that you want to perform a rolling upgrade on the members with Hazelcast
3.8 to be replaced with the ones with Hazelcast 3.9, here are the steps that should be followed on each
member of the cluster:
• Start the member and wait until it joins to the cluster. Note that the cluster is still on 3.8.
• Use the cluster.sh script or Management Center to change the cluster version to 3.9.
• Apache jclouds
• Grails
• Hibernate Integration
• OpenShift
• Cloud Foundry
1. XML configuration.
2. Programmatic configuration.
3. Spring configuration.
The programmatic configuration is the most important one; other mechanisms are built on top of it.
Throughout this book, we use the XML configuration file since that is the option most often used in
production.
When you are running a Maven project, create a folder named resources under src/main/ and create a
file called hazelcast.xml. The following shows an empty hazelcast.xml configuration file:
<hazelcast
xsi:schemaLocation="http://www.hazelcast.com/schema/config
http://www.hazelcast.com/schema/config/hazelcast-config-3.8.xsd"
xmlns="http://www.hazelcast.com/schema/config"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
</hazelcast>
This configuration file example imports an XML schema (XSD) for validation. If you are using a
modern IDE (like IntelliJ IDEA), you get code completion for XML tags. To reduce the size of the
examples in the book, only the elements inside the <hazelcast> tags are listed. In the example code for
this book, you can find the full XML configuration.
In most of our examples, we will rely on multicast for member discovery so that the members will join
the cluster:
Configuration of multicast joiner
<network>
<join><multicast enabled="true"/></join>
</network>
See Multicast if multicast does not work or you want to know more about it. If you are using the
programmatic configuration, then multicast is enabled by default.
In this book, the following approach is used to create a new Hazelcast instance:
Behind the scenes the following approaches are used to resolve the configuration, in the given order:
1. Hazelcast checks whether the hazelcast.config system property is set. If it is, then its value is used
as the path to the configuration file. This is useful if you want the application to choose the
Hazelcast configuration file at the time of startup. The config option can be set by adding the
following to the java command:
The value can be a normal file path, or it can be a classpath reference if it is prefixed with
classpath:.
4. If all of the above options fail to provide a Hazelcast config to the application, the default Hazelcast
configuration is loaded from the Hazelcast JAR.
One of the changes in place since Hazelcast 3.2 is that when a hazelcast.xml file contains errors, an
exception is thrown and no HazelcastInstance is created. Prior to the 3.2 release, no exception was
thrown and a Hazelcast instance with the hazelcast-default.xml configuration was created. The
problem with that approach was that you ended up with a HazelcastInstance with a different
configuration than you expected.
2.1.4. Loading Hazelcast XML Configuration from Java
If you need more flexibility to load a Hazelcast config object from XML, you should have a look at the
following:
• ClasspathXmlConfig class loads the config from a classpath resource containing the XML
configuration.
• InMemoryXmlConfig class loads the config from an in-memory string containing the XML
configuration.
String s = "<hazelcast>....</hazelcast>"
Config config = new InMemoryXmlConfig(s);
HazelcastInstance hz = Hazelcast.newHazelcastInstance(config);
• UrlXmlConfig class loads the config from a URL pointing to a XML file.
HazelcastInstance hz = Hazelcast.newHazelcastInstance(config); ②
}
}
It is possible to dynamically add configuration for certain data structures at runtime (starting with
Hazelcast 3.9); these can be added by invoking one of the Config.add*Config methods on the Config
object obtained from a running member’s HazelcastInstance.getConfig() method. For example:
// Instead do this. The added config will be propagated to all members of the cluster
instance.getConfig().addMapConfig(noBackupsMap);
Dynamic configuration elements must be fully configured before the invocation of add*Config method:
at that point, the configuration object will be delivered to every member of the cluster and added to
each member’s dynamic configuration, so mutating the configuration object after the add*Config
invocation will have no effect.
As dynamically added data structure configuration is propagated across all cluster members, failures
may occur due to conditions such as timeout and network partition. The configuration propagation
mechanism internally retries adding the configuration whenever a membership change is detected.
However if an exception is thrown from add*Config method, the configuration may have been partially
propagated to some cluster members and adding the configuration should be retried by the user.
Adding new dynamic configuration is supported for all add*Config methods except:
• QuorumConfig: new quorum configuration cannot be dynamically added but other configuration can
reference quorums configured in the existing static configuration
• ListenerConfig: listeners can be instead added at runtime via other API such as
HazelcastInstance.getCluster().addMembershipListener and
HazelcastInstance.getPartitionService().addMigrationListener.
The Hazelcast Config object has a fluent interface; the Config instance is returned when a config
method on this instance is called. This makes chaining method calls very easy. The programmatic
configuration is very useful for testing and it is a solution for the static nature of the XML
configuration. You can easily create content for the programmatic configuration on the fly. For
example, you could base it on the database content. You could even decide to move the static
configuration to the hazelcast.xml, load it and then modify the dynamic parts, such as the network
configuration.
In Hazelcast releases prior to 3.0, there was a functionality for a static default HazelcastInstance, so
you could say Queue q = Hazelcast.getQueue("foo"). This functionality has been removed because it led
to confusion when explicitly created Hazelcast instances were combined with calls to the implicit
default HazelcastInstance. You probably want to keep a handle to the Hazelcast instance somewhere
for later usage in the application.
Hazelcast does not copy configuration from one member to another. Therefore, whether they are XML
based or programmatic, the configurations except member-list inside network on all members in the
cluster should exactly be the same.
The Hazelcast XML configuration can contain configuration elements for all kinds of distributed data
structures, i.e. sets, executors, maps, etc. See the following example:
<map name="testmap">
<time-to-live-seconds>10</time-to-live-seconds>
</map>
What if we want to create multiple map instances using the same configuration? Do we need to
configure them individually? This is impossible to do if you have a dynamic number of distributed
data structures and you do not know up front how many need to be created. The solution to this
problem is wildcard configuration, which is available for all data structures. Wildcard configuration
makes it possible to use the same configuration for multiple instances. For example, we could
configure the previous testmap example with a value of 10 for time-to-live-seconds using a wildcard
configuration like this:
<map name="testmap*">
<time-to-live-seconds>10</time-to-live-seconds>
</map>
By using a single asterisk (*) character any place in the name, the same configuration can be shared by
different data structures. The wildcard configuration can be used like this:
The maps testmap1 and testmap2 both match testmap* so they will use the same configuration. If you
have a Spring background, you could consider the wildcard configuration to be a prototype bean
definition. The difference is that in Hazelcast, multiple gets of a data structure with the same ID will
still result in the same instance, whereas with prototype beans, new instances are returned.
It is important that you watch out for ambiguous configuration, as in the following example:
<map name="m*">
<time-to-live-seconds>10</time-to-live-seconds>
</map>
<map name="ma*">
<time-to-live-seconds>10</time-to-live-seconds>
</map>
If a map is loaded using hz.getMap("map") then Hazelcast will not throw an error or log a warning;
instead, Hazelcast selects one of the maps. The selection does not depend on the definition order in the
configuration file and it is not based on the best-fitting match. You should make sure that your
wildcard configurations are very specific. One of the ways to achieve this is to include the package
name as shown below.
<map name="com.foo.testmap*">
<time-to-live-seconds>10</time-to-live-seconds>
</map>
2.1.12. Properties
Hazelcast provides an option to configure certain properties which are not part of an explicit
configuration section, such as the Map. This can be done using the properties section.
<properties>
<property name="hazelcast.icmp.enabled">true</property>
</properties>
For a full listing of available properties, see the System Properties section in the Hazelcast Reference
Manual or have a look at the GroupProperties class.
Apart from properties in the hazelcast.xml, you can also pass properties using the command line java
-Dproperty-name=property-value. One thing to watch out for is that you cannot override properties in
the hazelcast.xml or the programmatic configuration from the command line because the command
line has a lower priority.
Properties are not shared between members, so you cannot put properties in one member and read
them from another. You need to use a distributed map for that.
2.1.13. Logging
Hazelcast supports various logging mechanisms; jdk, log4, sl4j or none if you do not want to have any
logging. The default is jdk, the logging library that is part of the JRE, so no additional dependencies are
needed. You can set logging by adding a property in the hazelcast.xml:
<properties>
<property name="hazelcast.logging.type">log4j</property>
</properties>
Or, you can set with the programmatic configuration as shown below.
Config cfg = new Config() ;
cfg.setProperty("hazelcast.logging.type", "log4j");
You can also configure it from the command line using java -Dhazelcast.logging.type=log4j. If you are
going to use log4j or slf4j, make sure that the correct dependencies are included in the classpath. See
the example sources for more information.
If you are not satisfied with the provided logging implementations, you can always implement your
own logging by using the LogListener interface. See the Logging Configuration section in the Hazelcast
Reference Manual for more information.
If you are not making use of configuring logging from the command line, be very
careful about touching Hazelcast classes. It could be that they default to the jdk
logging before the actual configured logging is read. Once the logging mechanism is
selected, it will not change. Some users make use of the command line version
instead of the properties section for logging to avoid confusion.
If you are making use of jdk logging and you are annoyed that your log entry is spread over two lines,
have a look at the SimpleLogFormatter as shown below.
java.util.logging.SimpleFormatter.format='%4$s: %5$s%6$s%n'
2.1.14. Variables
One of the new features of Hazelcast 3 is the ability to specify variables in the Hazelcast XML
configuration file. This makes it a lot easier to share the same Hazelcast configuration between
different environments and it also makes it easier to tune settings.
<executor-service name="exec">
<pool-size>${pool.size}</pool-size>
</executor-service>
In this example, the pool-size is configurable using the pool.size variable. In a production
environment, you might want to increase the pool size since you have beefier machines there. In a
development environment, you might want to set it to a low value.
By default, Hazelcast uses the system properties to replace variables with their actual value. To pass
this system property, you could add the following on the command line: -Dpool.size=1. If a variable is
not found, a log warning will be displayed but the value will not be replaced.
You can use a different mechanism than the system properties, such as a property file or a database.
You can do this by explicitly setting the Properties object on the XmlConfigBuilder as shown below.
Although variables will give you a lot more flexibility, they have limitations—you can parametrize but
you cannot add new XML sections. If your needs go beyond what the variables provide, you might
consider using some kind of template engine like Velocity to generate your hazelcast.xml file. Another
option is using programmatic configuration, either by creating a completely new Config instance or
loading a template from XML and enhancing where needed.
In Hazelcast 3.4 configuration import for member configuration was introduced. This feature enables
composition of the Hazelcast declarative configuration file out of smaller configuration snippets. In
Hazelcast 3.5, a similar feature was added to compose the Hazelcast client declarative configuration.
You can compose the declarative configuration of your Hazelcast or Hazelcast Client from multiple
declarative configuration snippets. In order to compose a declarative configuration, you can use the
<import/> element to load different declarative configuration files.
Let’s say you want to compose the declarative configuration for Hazelcast out of two configurations:
development-group-config.xml and development-network-config.xml.
development-group-config.xml
<hazelcast>
<group>
<name>dev</name>
<password>dev-pass</password>
</group>
</hazelcast>
development-network-config.xml
<hazelcast>
<network>
<port auto-increment="true" port-count="100">5701</port>
<join>
<multicast enabled="true">
<multicast-group>224.2.2.3</multicast-group>
<multicast-port>54327</multicast-port>
</multicast>
</join>
</network>
</hazelcast>
To get your example Hazelcast declarative configuration out of the above two, use the <import/>
element as shown below.
<hazelcast>
<import resource="development-group-config.xml"/>
<import resource="development-network-config.xml"/>
</hazelcast>
client-group-config.xml
<hazelcast-client>
<group>
<name>dev</name>
<password>dev-pass</password>
</group>
</hazelcast-client>
client-network-config.xml
<hazelcast-client>
<network>
<cluster-members>
<address>127.0.0.1:7000</address>
</cluster-members>
</network>
</hazelcast-client>
To get a Hazelcast Client declarative configuration from the above two examples, use the <import/>
element as shown below.
<hazelcast-client>
<import resource="client-group-config.xml"/>
<import resource="client-network-config.xml"/>
</hazelcast-client>
You need to use the <import/> element on the top level of the XML hierarchy.
<hazelcast>
<import resource="file:///etc/hazelcast/development-group-config.xml"/> <!-- loaded
from filesystem -->
<import resource="classpath:development-network-config.xml"/> <!-- loaded from
classpath -->
</hazelcast>
<hazelcast>
<import resource="${environment}-group-config.xml"/>
<import resource="${environment}-network-config.xml"/>
</hazelcast>
When you start the above MultipleMembers, you see an output similar to the following in one member.
Members [2] {
Member [192.168.1.100]:5701 this
Member [192.168.1.100]:5702
}
Members [2] {
Member [192.168.1.100]:5701
Member [192.168.1.100]:5702 this
}
As you can see in the above outputs, the created cluster has 2 members.
<queue name="q"/>
For most of the DistributedObjects, you can find a get method on the HazelcastInstance. In case you are
writing custom distributed objects using the SPI, you can use the
HazelcastInstance.getDistributedObject. One thing worth mentioning is that most of the distributed
objects defined in the configuration are created lazily. They are only created on the first operation that
accesses them.
If there is no explicit configuration available for a DistributedObject, Hazelcast will use the default
settings from the file hazelcast-default.xml. This means that you can safely load a DistributedObject
from the HazelcastInstance without it being explicitly configured.
To learn more about the queue and its configuration, see Distributed Collections: IQueue.
2.4. Unique Names for Distributed Objects
Some of the distributed objects will be static. They will be created and used through the application
and the IDs of these objects will be known up front. Other distributed objects are created on the fly,
and one of the problems is finding unique names when new data structures need to be created. One of
the solutions to this problem is to use the IdGenerator, which will generate cluster wide unique IDs.
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IdGenerator idGenerator = hz.getIdGenerator("idGenerator");
IMap someMap = hz.getMap("somemap-"+idGenerator.newId());
This technique can be used with wildcard configuration to create similar objects using a single
definition. See Wildcard Configuration.
A distributed object created with a unique name often needs to be shared between members. You can
do this by passing the ID to the other members and you can use one of the HazelcastInstance.get
methods to retrieve the DistributedObject. For more information, see Serialization: DistributedObject.
In Hazelcast, the name and type of the DistributedObject uniquely identifies that object:
In the above example, two different distributed objects are created with the same name but different
types. In normal applications, you want to prevent different types of distributed objects from sharing
the same name. You can add the type to the name, such as personMap or failureCounter, to make the
names self-explanatory.
A similar issue occurs with references. If a reference to a DistributedObject is used after the
DistributedObject is destroyed, new resources will be created. In the following case, we create a cluster
with two members and each member gets a reference to the queue q. First, we place an item in the
queue. When the queue is destroyed by the first member (q1) and q2 is accessed, a new queue will be
created.
When we start the above Member, the output will show the following:
q1.size: 1 q2.size:1
q1.size: 0 q2.size:0
The system will not report any error and will behave as if nothing has happened. The only difference is
the creation of the new queue resource. Again, a lot of care needs to be taken when destroying
distributed objects.
• One type is the truly partitioned data structure, like the IMap, where each partition will store a
section of the Map.
• The other type is a non-partitioned data structure, like the IAtomicLong or the ISemaphore, where
only a single partition is responsible for storing the main instance. For this type, you sometimes
want to control that partition.
Normally, Hazelcast will not only use the name of a DistributedObject for identification, but it will also
use the name to determine the partition. The problem is that you sometimes want to control the
partition without depending on the name. Assume that you have the following two semaphores.
ISemaphore s1 = hz.getSemaphore("s1");
ISemaphore s2 = hz.getSemaphore("s2");
They would end up in different partitions because they have different names. Luckily, Hazelcast
provides a solution for that using the @ symbol, as in the following example.
ISemaphore s1 = hz.getSemaphore("s1@foo");
ISemaphore s2 = hz.getSemaphore("s2@foo");
Now, s1 and s2 will end up in the same partition because they share the same partition key: foo. This
partition key can be used to control the partition of distributed objects and can also be used to send a
Runnable to the correct member using the IExecutor.executeOnKeyOwner method, as in Distributed
Executor Service: Executing on Key Owner, and to control in which partition a map entry is stored, as
in (see Map: Partition Control).
If a DistributedObject name includes a partition key, then Hazelcast will use the base-name without the
partition key to match with the configuration. For example, semaphore s1 could be configured as
shown below.
<semaphore name="s1">
<initial-permits>3</initial-permits>
</semaphore>
This means that you can safely combine explicit partition keys with normal configuration. It is
important to understand that the name of the DistributedObject will contain the @partition-key
section. Therefore, the following two semaphores are different.
ISemaphore s1 = hz.getSemaphore("s1@foo");
ISemaphore s2 = hz.getSemaphore("s1");
To access the partition key of a DistributedObject, you can call the DistributedObject.getPartitionKey
method.
String parKey = s1.getPartitionKey();
ISemaphore s3 = hz.getSemaphore("s3@"+parKey);
This method is useful if you need to create a DistributedObject in the same partition of an existing
DistributedObject, but you do not have the partition key available. If you only have the name of the
partition key available, you can have a look at the PartitionKeys class, which exposes methods to
retrieve the base-name or the partition key.
In the previous examples, the foo partition key was used. In many cases, you do not care what the
partition key is, as long as the same partition key is shared between structures. Hazelcast provides an
easy solution to obtain a random partition key.
You are completely free to come up with a partition key yourself. You can have a look at the UUID,
although due to its length, it will cause some overhead. Another option is to look at the Random class.
The only thing you need to watch out for is to have the partition keys evenly distributed among the
partitions.
If @ is used in the name of a partitioned DistributedObject, such as the IMap or IExecutorService, then
Hazelcast keeps using the full String as the name of the DistributedObject, but ignores the partition
key. This is because for these types, a partition key does not have any meaning.
For more information about why you want to control partitioning, see Performance Tips: Partitioning
Schema.
• control the local caching of the classes loaded from other members,
<distributed-classloading enabled="true">
<class-cache-mode>ETERNAL</class-cache-mode>
<provider-mode>LOCAL_CLASSES_ONLY</provider-mode>
<blacklist-prefixes>com.foo</blacklist-prefixes>
<whitelist-prefixes>com.bar.MyClass</whitelist-prefixes>
<provider-filter>HAS_ATTRIBUTE:lite<provider-filter>
</distributed-classloading>
The element <class-cache-mode> controls the local caching behavior for the classes loaded from the
remote class repository. When you set it as ETERNAL loaded classes will always be cached. When it is
set as OFF loaded classes will not be cached.
The element <provider-mode> controls how the classes will be served to the other members. It has
three self-explanatory values: LOCAL_AND_CACHED_CLASSES, LOCAL_CLASSES_ONLY, and OFF.
The element <whitelist-prefixes> specifies comma separated name prefixes of classes/packages only
from which the classes will be loaded. It allows to quickly configure remote loading only for classes
from selected packages. It can be used together with blacklisting. For example, you can whitelist the
prefix "com.foo" and blacklist the prefix "com.foo.secret".
The element <provider-filter> is a filter to constraint members to be used for a class loading request
when a class is not available locally. The value is in the format "HAS_ATTRIBUTE:foo". When it is set as
"HAS_ATTRIBUTE:foo", the class loading request will only be sent to the members which have "foo" as a
member attribute.
You can form your cluster to include the regular Hazelcast members to store data and Hazelcast lite
members to run heavy computations. The presence of the lite members do not affect the operations
performed on the other members in the cluster. You can directly submit your tasks to the lite
members, register listeners on them and invoke operations for the Hazelcast data structures on them
such as map.put() and map.get(). You can enable a lite member as shown below:
Config config = new Config();
config.setLiteMember(true);
And using the Cluster interface, a lite member can be promoted to a data member. When you make
this, cluster partitions are rebalanced and ownerships of some portion of the partitions are assigned to
the newly promoted data members. Here is how you can promote a lite member to a data member:
Note that a data member cannot be turned back into a lite member.
• ACTIVE: This is the default cluster state. Cluster continues to operate without restrictions.
• NO_MIGRATION:
◦ In this state, migrations (partition rebalancing) and backup replications are not allowed.
◦ You cannot change the state of a cluster to NO_MIGRATION when migration/replication tasks are
being performed.
◦ When you want to add multiple new members to the cluster, you can first change the cluster
state to NO_MIGRATION, then start the new members. Once all of them join to the cluster, you can
change the cluster state back to ACTIVE. Then, the cluster will rebalance partition replica
distribution at once. *FROZEN:
◦ In this state, the partition table is frozen and partition assignments are not performed.
◦ If a member leaves, it can join back. Its partition assignments (both primary and backup
replicas) remain the same until either it joins back or the cluster state is changed to ACTIVE.
When it joins back to the cluster, it will own all previous partition assignments as it was. On the
other hand, when the cluster state changes to ACTIVE, re-partitioning starts and unassigned
partition replicas are assigned to the active members.
◦ All other operations in the cluster, except migration, continue without restrictions.
◦ You cannot change the state of a cluster to FROZEN when migration/replication tasks are being
performed.
◦ You can make use of FROZEN state along with the [Hot Restart Persistence](#hot-restart-
persistence) feature. You can change the cluster state to FROZEN, then restart some of your
members using the Hot Restart feature. The data on the restarting members will not be
accessible but you will be able to access to the data that is stored in other members. Basically,
FROZEN cluster state allows you do perform maintenance on your members with degrading
availability partially. *PASSIVE:
◦ In this state, the partition table is frozen and partition assignments are not performed.
◦ If a member leaves while the cluster is in this state, the member will be removed from the
partition table if cluster state moves back to ACTIVE.
◦ This state rejects ALL operations immediately EXCEPT the read-only operations like map.get()
and cache.get(), replication and cluster heartbeat tasks.
◦ You cannot change the state of a cluster to PASSIVE when migration/replication tasks are being
performed.
◦ You can make use of PASSIVE state along with the [Hot Restart Persistence](#hot-restart-
persistence) feature. Please see <a
href="https://github.com/hazelcast/hazelcast/blob/master/hazelcast/src/main/java/com/hazelcast
/core/Cluster.java#L245" target="_blank">Cluster Shutdown API</a> for more info.
*IN_TRANSITION:
◦ During this state, your cluster does not accept new members and migration/replication tasks
are paused.
All in-cluster methods are fail-fast, i.e. when a method fails in the cluster, it throws
an exception immediately (it will not be retried).
The following snippet is from the Cluster interface showing the new methods used to manage your
cluster’s states.
public interface Cluster {
...
...
ClusterState getClusterState();
void changeClusterState(ClusterState newState);
void changeClusterState(ClusterState newState, TransactionOptions transactionOptions
);
void shutdown();
void shutdown(TransactionOptions transactionOptions);
ACTIVE: This is the initial member state. The member can execute and process all operations.
When the state of the cluster is ACTIVE or FROZEN, the members are in the ACTIVE state. *PASSIVE: In
this state, member rejects all operations EXCEPT the read-only ones, replication and migration
operations, heartbeat operations, and the join operations as explained in the above section. A
member can go into this state when either of the following happens: Until the member’s
shutdown process is completed after the method Node.shutdown(boolean) is called. Note that, when
the shutdown process is completed, member’s state changes to SHUT_DOWN. Cluster’s state is
changed to PASSIVE using the method changeClusterState(). *SHUT_DOWN: A member goes into this state
when the member’s shutdown process is completed. The member in this state rejects all operations
and invocations. A member in this state cannot be restarted.
Hazelcast.shutdownAll(): This method is very practical for testing purposes if you do not have control
over the creation of Hazelcast instances, but you want to make sure that all instances are being
destroyed.
What happened to the Hazelcast.getDefaultInstance: If you have been using Hazelcast 2.x, you might
wonder what happened to the static methods like Hazelcast.getDefaultInstance and
Hazelcast.getSomeStructure. These methods have been dropped because they relied on a singleton
HazelcastInstance and when that was combined with explicit HazelcastInstances, it caused confusion.
In Hazelcast 3, it is only possible to work with an explicit HazelcastInstance.
Hazelcast has the following built-in failure detectors; Deadline Failure Detector and Phi Accrual Failure
Detector and Ping Failure Detector (which if enabled works in parallel with the first two ones, but
identifies failures on OSI Layer 3 (Network Layer)). Ping Failure Detector is by default disabled.
Deadline Failure Detector uses an absolute timeout for missing/lost heartbeats. After timeout, a
member is considered as crashed/unavailable and marked as suspected. Deadline Failure Detector has
two configuration properties:
Phi Accrual Failure Detector keeps track of the intervals between heartbeats in a sliding window of
time and measures the mean and variance of these samples and calculates a value of suspicion level
(Phi). The value of phi will increase when the period since the last heartbeat gets longer. If the network
becomes slow or unreliable, the resulting mean and variance will increase, there will need to be a
longer period for which no heartbeat is received before the member is suspected.
Additional to above two properties, Phi Accrual Failure Detector has three more configuration
properties:
• hazelcast.heartbeat.phiaccrual.failuredetector.threshold: This is the phi threshold for suspicion.
After calculated phi exceeds this threshold, a member is considered as unreachable and marked as
suspected. A low threshold allows to detect member crashes/failures faster but can generate more
mistakes and cause wrong member suspicions. A high threshold generates fewer mistakes but is
slower to detect actual crashes/failures.
`phi = 1` means likeliness that we will make a mistake is about `10%`. The likeliness
is about `1%` with `phi = 2`, `0.1%` with `phi = 3`, and so on. Default phi threshold
is 10.
The Ping Failure Detector may be configured in addition to one of Deadline and Phi Accual Failure
Detectors. It operates at Layer 3 of the OSI protocol, and provides much quicker and more
deterministic detection of hardware and other lower level events. This detector may be configured to
perform an extra check after a member is suspected by one of the other detectors, or it can work in
parallel, which is the default. This way hardware and network level issues will be detected more
quickly.
This failure detector is based on InetAddress.isReachable(). When the JVM process has enough
permissions to create RAW sockets, the implementation will choose to rely on ICMP Echo requests. This
is preferred.
If there are not enough permissions, it can be configured to fallback on attempting a TCP Echo on port
7. In the latter case, both a successful connection or an explicit rejection will be treated as "Host is
Reachable". Or, it can be forced to use only RAW sockets. This is not preferred as each call creates a
heavy weight socket and moreover the Echo service is typically disabled.
For the Ping Failure Detector to rely only on ICMP Echo requests, there are some criteria that need to
be met.
• Supported OS: as of Java 1.8 only Linux/Unix environments are supported. This detector relies on
ICMP, i.e., the protocol behind the ping command. It tries to issue the ping attempts periodically,
and their responses are used to determine the reachability of the remote member. However, you
cannot simply create an ICMP Echo Request because these type of packets do not rely on any of the
preexisting transport protocols such as TCP. In order to create such a request, you must have the
privileges to create RAW sockets. Most operating systems allow this to the root users, however Unix
based ones are more flexible and allow the use of custom privileges per process instead of
requiring root access. Therefore, this detector is supported only on Linux.
• The Java executable must have the cap_net_raw capability. As described in the above requirement,
on Linux, you have the ability to define extra capabilities to a single process, which would allow
the process to interact with the RAW sockets. This interaction is achieved via the capability
cap_net_raw. To enable this capability run the following command:
If any of the above criteria isn’t met, then the isReachable will always fallback on TCP Echo attempts on
port 7.
To be able to use the Ping Failure Detector, please add the following properties in your Hazelcast
declarative configuration file:
<hazelcast>
[...]
<properties>
<property name="hazelcast.icmp.enabled">true</property>
<property name="hazelcast.icmp.parallel.mode">true</property>
<property name="hazelcast.icmp.timeout">1000</property>
<property name="hazelcast.icmp.max.attempts">3</property>
<property name="hazelcast.icmp.interval">1000</property>
<property name="hazelcast.icmp.ttl">0</property>
[...]
</properties>
[...]
</hazelcast>
• hazelcast.icmp.enabled (default false) - Enables legacy ICMP detection mode, works cooperatively
with the existing failure detector, and only kicks-in after a pre-defined period has passed with no
heartbeats from a member.
• hazelcast.icmp.parallel.mode (default true) - Enabling the parallel ping detector, works separately
from the other detectors.
• hazelcast.icmp.interval (default 1000) - The interval, in milliseconds, between each ping attempt.
1000ms (1 sec) is also the minimum interval allowed.
• hazelcast.icmp.ttl (default 0) - The maximum number of hops the packets should go through or 0
for the default.
In the above configuration, the Ping detector will attempt 3 pings, one every second and will wait up-to
1 second for each to complete. If after 3 seconds, there was no successful ping, the member will get
suspected.
This concurrency functionality is useful if you want to write a Java application that uses multiple
threads, but the focus here is to provide synchronization in a single JVM and not distributed
synchronization over multiple JVMs. Luckily, Hazelcast provides support for various distributed
synchronization primitives such as the ILock, IAtomicLong, etc. Apart from making synchronization
between different JVMs possible, these primitives also support high availability: if one machine fails,
the primitive remains usable for other JVMs.
3.1. IAtomicLong
The IAtomicLong, formally known as the AtomicNumber, is the distributed version of the
java.util.concurrent.atomic.AtomicLong, so if you have used that before, working with the IAtomicLong
should feel very similar. The IAtomicLong exposes most of the operations the AtomicLong provides, such
as get, set, getAndSet, compareAndSet and incrementAndGet. However, there is some difference in
performance as remote calls are involved.
This example demonstrates the IAtomicLong by creating an instance and incrementing it one million
times:
If you run multiple instances of this member, then the total count should be equal to one million times
the number of members you have started.
If the IAtomicLong becomes a contention point in your system, you can deal with it in a few ways,
depending on your requirements. You can create a stripe (essentially an array) of IAtomicLong instances
to reduce pressure, or you can keep changes local and only publish them to the IAtomicLong once in a
while. There are a few downsides, including that you could lose information if a member goes down
and the newest value is not always immediately visible to the outside world.
3.1.1. Functions
Since Hazelcast 3.2, it is possible to send a function to an IAtomicLong. The Function class is a single
method interface: it is a part of the Hazelcast codebase since we can’t yet have a dependency on Java 8.
An example of a function implementation is the following function which adds 2 to the original value:
The function can be executed on an IAtomicLong using one of the following methods:
• apply: Applies the function to the value in the IAtomicLong without changing the actual value and
returns the result.
• alterAndGet: Alters the value stored in the IAtomicLong by applying the function, storing the result in
the IAtomicLong and returning the result.
• getAndAlter: Alters the value stored in the IAtomicLong by applying the function and returning the
original value.
• alter: Alters the value stored in the IAtomicLong by applying the function. This method will not send
back a result.
In the following code example, you can see these methods in action:
public class Member {
public static void main(String[] args) {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IAtomicLong atomicLong = hz.getAtomicLong("counter");
atomicLong.set(1);
long result = atomicLong.apply(new Add2Function());
System.out.println("apply.result:" + result);
System.out.println("apply.value:" + atomicLong.get());
atomicLong.set(1);
atomicLong.alter(new Add2Function());
System.out.println("alter.value:"+atomicLong.get());
atomicLong.set(1);
result = atomicLong.alterAndGet(new Add2Function());
System.out.println("alterAndGet.result:" + result);
System.out.println("alterAndGet.value:"+atomicLong.get());
atomicLong.set(1);
result = atomicLong.getAndAlter(new Add2Function());
System.out.println("getAndAlter.result:"+result);
System.out.println("getAndAlter.value:"+atomicLong.get());
System.exit(0);
}
}
apply.result:3
apply.value:1
alter.value:3
alterAndGet.result:3
alterAndGet.value:3
getAndAlter.result:1
getAndAlter.value:3
You might ask yourself, why not do the following approach to double an IAtomicLong?
atomicLong.set(atomicLong.get()+2));
This requires a lot less code. The biggest problem here is that this code has a race problem; the read
and the write of the IAtomicLong are not atomic, so they could be interleaved with other operations. If
you have experience with the AtomicLong from Java, then you probably have some experience with the
compareAndSet method where you can create an atomic read and write:
for(;;){
long oldValue = atomicLong.get();
long newValue = oldValue+2;
if(atomicLong.compareAndSet(oldValue,newValue)){
break;
}
}
The problem here is that the AtomicLong could be on a remote machine and therefore get and
compareAndSet are remote operations. With the function approach, you send the code to the data
instead of pulling the data to the code, making this a lot more scalable.
Replication: the IAtomicLong has 1 synchronous backup and zero asynchronous backups and is not
configurable.
3.2. IdGenerator
In the previous section, the IAtomicLong was introduced. IAtomicLong can be used to generate unique
IDs within a cluster. Although that will work, it probably isn’t the most scalable solution since all
members will contend on incrementing the value. If you are only interested in unique IDs, you can
have a look at the com.hazelcast.core.IdGenerator.
The way the IdGenerator works is that each member claims a segment of 10,000 IDs to generate. This is
done behind the scenes by using an IAtomicLong. A segment is claimed by incrementing that
IAtomicLong by 10000. After claiming the segment, the IdGenerator can increment a local counter. Once
all IDs in the segment are used, it will claim a new segment. The result of this approach is that only 1 in
10000 times is network traffic needed; 9999 out of 10000, the ID generation can be done in memory
and therefore is extremely fast. Another advantage is that this approach scales a lot better than an
IAtomicLong because there is a lot less contention: 1 out of 10000 instead of 1 out of 1.
If you start this multiple times, you will see in the console that there will not be any duplicate IDs. If
you do see duplicates, it could be that the IdGeneratorMembers didn’t form a cluster; see Network
Configuration: Multicast.
• If a member goes down without fully using its segment, there might be gaps.
For ID generation, in most cases, this isn’t relevant. There are alternative solutions for creating cluster-
wide unique IDs like the java.util.UUID. Although it will take up more space than a long, it doesn’t rely
on access to a Hazelcast cluster.
Another important issue you need to know is that if the cluster restarts, then the IdGenerator is reset
and starts from 0 because the IdGenerator doesn’t persist its state using, for example, a database. If you
need this, you could create your own IdGenerator based on the same implementation mechanism the
IdGenerator uses, but you persist the updates to the IAtomicLong.
By default, the ID generation will start at 0, but in some cases you want to start with a higher value.
This can be changed using the IdGenerator.init(long value) method. It returns true if the initialization
was a success, so if no other thread called the init method, no IDs have been generated and the desired
starting value is bigger than 0.
Replication: the IdGenerator has 1 synchronous backup and zero asynchronous backups and is not
configurable.
3.3. IAtomicReference
In the first section of this chapter, the IAtomicLong was introduced. The IAtomicLong is very useful if you
need to deal with a long, but in some cases you need to deal with a reference. That is why Hazelcast
also supports the IAtomicReference, which is the distributed version of the
java.util.concurrent.atomic.AtomicReference.
Let’s see the IAtomicReference in action:
foo
Just like the IAtomicLong, the IAtomicReference has methods that accept a function as argument, such as
alter, alterAndGet, getAndAlter and apply. There are big advantages for using these methods.
• From a performance point of view, it is better to send the function to the data then the data to the
function. Often the function is a lot smaller than the value and therefore the function is cheaper to
send over the line. Also, the function only needs to be transferred once to the target machine, while
the value needs to be transferred twice.
• You don’t need to deal with concurrency control. If you do a load, transform, and store, you could
run into a data race since another thread might have updated the value you are about to overwrite.
• When a function is executed on the AtomicReference, make sure that the function doesn’t run too
long. As long as that function is running, the whole partition is not able to execute other requests.
Don’t hog the operation thread.
• The IAtomicReference works based on byte-content, not on object-reference. Therefore, if you are
using the compareAndSet method, it is important that you do not change to the original value
because its serialized content will then be different. It is also important to know that if you rely on
Java serialization, sometimes (especially with hashmaps) the same object can result in different
binary content.
• All methods returning an object will return a private copy. You can modify it, but the rest of the
world will be shielded from your changes. If you want these changes to be visible to the rest of the
world, you need to write the change back to the IAtomicReference; but be careful with introducing a
data race.
• The in-memory format of an IAtomicReference is binary. So the receiving side doesn’t need to have
the class definition available, unless it needs to be deserialized on the other side (for example,
because a method like alter is executed). This deserialization is done for every call that needs to
have the object instead of the binary content, so be careful with expensive object graphs that need
to be deserialized.
• If you have an object graph or an object with many fields, and you only need to calculate some
information or you only need a subset of fields, you can use the apply method. This way, the whole
object doesn’t need to be sent over the line, only the information that is relevant.
3.4. ILock
A lock is a synchronization primitive that makes it possible for only a single thread to access a critical
section of code; if multiple threads at the same moment were accessing that critical section, you would
get race problems.
Hazelcast provides a distributed lock implementation and makes it possible to create a critical section
within a cluster of JVMs, so only a single thread from one of the JVMs in the cluster is allowed to
acquire that lock. Other threads, no matter if they are on the same JVMs or not, will not be able to
acquire the lock; depending on the locking method they called, they either block or fail. The
com.hazelcast.core.ILock extends the java.util.concurrent.locks.Lock interface, so using the lock is
quite simple.
The following example shows how a lock can be used to solve a race problem:
public class RaceFreeMember {
public static void main(String[] args) throws Exception {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IAtomicLong number1 = hz.getAtomicLong("number1");
IAtomicLong number2 = hz.getAtomicLong("number2");
ILock lock = hz.getLock("lock");
System.out.println("Started");
for (int k = 0; k < 10000; k++) {
if (k % 100 == 0)
System.out.println("at: " + k);
lock.lock();
try {
if (k % 2 == 0) {
long n1 = number1.get();
Thread.sleep(10);
long n2 = number2.get();
if (n1 - n2 != 0)
System.out.println("Datarace detected!");
} else {
number1.incrementAndGet();
number2.incrementAndGet();
}
} finally {
lock.unlock();
}
}
System.out.println("Finished");
}
}
When this code is executed, you will not see "Data race detected!". This is because the lock provides a
critical section around writing and reading of the numbers. In the example code, you will also find the
version with a data race.
The following idiom is recommended when you use a lock (it doesn’t matter if it is a Hazelcast lock or a
lock provided by the JRE):
lock.lock();
try{
...do your stuff.
}finally{
lock.unlock();
}
It is important that the lock is acquired before the try/finally block is entered. So, the following
example is not good.
try{
lock.lock();
...do your stuff.
}finally{
lock.unlock();
}
In case of Hazelcast, it can happen that the lock is not granted because the lock method has a timeout
of 5 minutes. If this happens, an exception is thrown, the finally block is executed, and the lock.unlock
is called. Hazelcast will see that the lock is not acquired and an IllegalMonitorStateException with the
message "Current thread is not owner of the lock!" is thrown. In case of a tryLock with a timeout, the
following idiom is recommended:
if(!lock.tryLock(timeout, timeunit)){
throw new RuntimeException();
}
try{
...do your stuff.
}finally{
lock.unlock();
}
The tryLock is acquired outside of the try/finally block. In this case, an exception is thrown if the lock
can’t be acquired within the given timeout, but another flow that prevents entering the try/finally
block also is valid.
• Hazelcast lock is reentrant, so you can acquire it multiple times in a single thread without causing a
deadlock. Of course, you need to release it as many times as you have acquired it to make it
available to other threads.
• As with the other Lock implementations, Hazelcast lock should always be acquired outside of a
try/finally block. Otherwise, the lock acquire can fail, but an unlock is still executed.
• Keep locks as short as possible. If locks are kept too long, it can lead to performance problems, or
worse, deadlock.
• With locks it is easy to run into deadlocks. Having code you don’t control or understand running
inside your locks is asking for problems. Make sure you understand exactly the scope of the lock.
• To reduce the chance of a deadlock, you can use the Lock.tryLock method to control the waiting
period. The lock.lock() method will not block indefinitely, but will timeout with an
OperationTimeoutException after 300 seconds.
• Locks are automatically released when a member has acquired a lock and that member goes down.
This prevents threads that are waiting for a lock from waiting indefinitely. This is also needed for
failover to work in a distributed system. The downside is that if a member goes down that acquired
the lock and started to make changes, other members could start to see partial changes. In these
cases, either the system could do some self repair or a transaction might solve the problem.
• A lock must always be released by the same thread that acquired it, otherwise try ISemaphore.
• Locks are fair, so they will be granted in the order they are requested.
• A lock can be checked if it is locked using the ILock.isLocked method, although the value could be
stale as soon as it is returned.
• A lock can be forced to unlock using the ILock.forceUnlock() method. It should be used with
extreme care since it could break a critical section.
• The Hazelcast.getLock doesn’t work on a name of type String, but can be a key of any type. This key
will be serialized and the byte array content determines the actual lock to acquire. So, if you are
passing in an object as key, it isn’t the monitor lock of that object that is being acquired.
• Replication: the ILock has one synchronous backup and zero asynchronous backups and is not
configurable.
• A lock is not automatically garbage collected. So if you create new locks over time, make sure to
destroy them. If you don’t, you can run into an OutOfMemoryError.
3.5. ICondition
With a Condition, it is possible to wait for certain conditions to happen: for example, wait for an item
to be placed on a queue. Each lock can have multiple conditions, such as if an item is available in the
queue and if room is available in the queue. In Hazelcast 3, the ICondition, which extends the
java.util.concurrent.locks.Condition, has been added.
There is one difference: with the normal Java version, you create a condition using the
Lock.newCondition() method. Unfortunately, this doesn’t work in a distributed environment since
Hazelcast has no way of knowing if Conditions created on different members are the same Condition
or not. You don’t want to rely on the order of their creation, so in Hazelcast, a Condition needs to be
created using the ILock.newCondition(String name) method.
In the following example, we are going to create one member that waits for a counter to have a certain
value. Another member will set the value on that counter. Let’s get started with the waiting member:
public class WaitingMember {
public static void main(String[] args) throws InterruptedException {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IAtomicLong counter = hz.getAtomicLong("counter");
ILock lock = hz.getLock("lock");
ICondition isOneCondition = lock.newCondition("one");
lock.lock();
try {
while (counter.get() != 1) {
System.out.println("Waiting");
isOneCondition.await();
}
} finally {
lock.unlock();
}
System.out.println("Wait finished, counter: "+counter.get());
}
}
First, the lock is acquired (getLock). Then, the counter is checked within a loop. As long as the counter is
not 1, the waiter will wait on the isOneCondition. Once the isOneCondition.await() method is called,
Hazelcast will automatically release the lock so that a different thread can acquire it and the calling
thread will block. Once the isOneCondition is signaled, the thread will unblock and it will automatically
reacquire the lock. This is exactly the same behavior as the ReentrantLock/Condition, or with a normal
intrinsic lock and waitset. If the WaitingMember is started, it will output:
Waiting
The next part will be the NotifyMember. Here, the Lock is acquired, the value is set to 1, and the
isOneCondition will be signaled:
public class NotifyMember {
public static void main(String[] args) throws InterruptedException {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IAtomicLong counter = hz.getAtomicLong("counter");
ILock lock = hz.getLock("lock");
ICondition isOneCondition = lock.newCondition("isOne");
lock.lock();
try {
counter.set(1);
isOneCondition.signalAll();
} finally {
lock.unlock();
}
}
}
Waiting
Wait finished, counter: 1
• Just as with the normal Condition, the ICondition can suffer from spurious wakeups. That is why
the condition always needs to be checked inside a loop, instead of an if statement.
• You can choose to signal only a single thread instead of all threads by calling the
ICondition.signal() method instead of the ICondition.signalAll() method.
• In the example, the waiting thread waits indefinitely because it calls await(). In practice, this can
be undesirable since a member that is supposed to signal the condition can fail. When this
happens, the threads that are waiting for the signal wait indefinitely. That is why it is often a good
practice to wait with a timeout using the await(long time, TimeUnit unit) or awaitNanos(long
nanosTimeout) method.
• Replication: the ICondition has 1 synchronous backup and zero asynchronous backups and is not
configurable.
3.6. ISemaphore
The semaphore is a classic synchronization aid that can be used to control the number of threads
doing a certain activity concurrently, such as using a resource. Each semaphore has a number of
permits, where each permit represents a single thread allowed to execute that activity concurrently. As
soon as a thread wants to start with the activity, it takes a permit (or waits until one becomes available)
and once finished with the activity, the permit is returned.
If you initialize the semaphore with a single permit, it will look a lot like a lock. A big difference is that
the semaphore has no concept of ownership. With a lock, the thread that acquired the lock must
release it, but with a semaphore, any thread can release an acquired permit. Another difference is that
an exclusive lock only has 1 permit, while a semaphore can have more than 1.
• If a permit is available, the number of permits in the semaphore is decreased by one and the calling
thread can continue.
• If no permit is available, the calling thread will block until a permit becomes available, a timeout
happens, the thread is interrupted, or when the semaphore is destroyed and an
InstanceDestroyedException is thrown.
The following example explains the semaphore. To simulate a shared resource, we have an IAtomicLong
initialized with the value 0. This resource is going to be used 1000 times. When a thread starts to use
that resource, the resource will be incremented, and when finished it will be decremented.
We want to limit the concurrent access to the resource by allowing for at most 3 threads. We can do
this by configuring the initial-permits for the semaphore in the Hazelcast configuration file:
<semaphore name="semaphore">
<initial-permits>3</initial-permits>
</semaphore>
When you start the SemaphoreMember 5 times, you will see the output like this:
The maximum number of concurrent threads using that resource is always equal to or smaller than 3.
As an experiment, you can remove the semaphore acquire/release statements and see for yourself in
the output that there is no longer control on the number of concurrent usages of the resources.
3.6.1. Replication
Hazelcast provides replication support for the ISemaphore: if a member goes and replication is enabled
(by default it is), then another member takes over the semaphore without permit information getting
lost. This can be done by synchronous and asynchronous replication, which can be configured using
the backup-count and async-backup-count properties:
If high performance is more important than permit information getting lost, you might consider
setting backup-count to 0.
Good To Know
• Fairness. The ISemaphore acquire methods are fair and this is not configurable. So under contention,
the longest waiting thread for a permit will acquire it before all other threads. This is done to
prevent starvation, at the expense of reduced throughput.
• Automatic permit release. One of the features of the ISemaphore to make it more reliable in a
distributed environment is the automatic release of a permit when the member fails (similar to the
Hazelcast Lock). If the permit would not be released, the system could run in a deadlock.
• The acquire() method doesn’t timeout, unlike the Hazelcast Lock.lock() method. To prevent
running into a deadlock, you can use one of timed acquire methods, like ISemaphore.tryAcquire(int
permits, long timeout, TimeUnit unit).
• The initial-permits is allowed to be negative, indicating that there is a shortage of permits when
the semaphore is created.
3.7. ICountDownLatch
The java.util.concurrent.CountDownLatch was introduced in Java 1.5 and is a synchronization aid that
makes it possible for threads to wait until a set of operations that are being performed by one or more
threads are completed. A CountDownLatch can be seen as a gate containing a counter. Behind this gate,
threads can wait till the counter reaches 0. CountDownLatches often are used when you have some
kind of processing operation, and one or more threads need to wait till this operation completes so
they can execute their logic. Hazelcast also contains a CountDownLatch: the
com.hazelcast.core.ICountDownLatch.
To explain the ICountDownLatch, imagine that there is a leader process that is executing some action that
will eventually complete. Also imagine that there are one or more follower processes that need to do
something after the leader has completed. We can implement the behavior of the Leader:
The Leader retrieves the CountDownLatch, calls ICountDownLatch.trySetCount on it (which makes the
Leader owner of that latch), does some waiting, and then calls countdown which notifies the listeners
for that latch. In this example, we ignore the boolean return value of trySetCount since there will be
only a single Leader, but in practice you probably want to deal with the return value. Although there
will only be a single owner of the Latch, the countDown method can be called by other threads/processes.
We retrieve the ICountDownLatch and then call await on it so the thread listens for when the
ICountDownLatch reaches 0. In practice, a process that should have decremented the counter by calling
the ICountDownLatch.countDown method can fail, and therefore the ICountDownLatch will never reach 0.
To force you to deal with this situation, the await methods have timeouts to prevent waiting
indefinitely.
If we first start a leader and then start one or more followers, the followers will wait till the leader
completes. It is important that the leader is started first, else the followers will immediately complete
since the latch already is 0. The example shows an ICountDownLatch with only a single step. If a process
has n steps, you should initialize the ICountdownLatch with n instead of 1, and for each completed step,
you should call the countDown method.
One thing to watch out for is that an ICountDownLatch waiter can be notified prematurely. In a
distributed environment, the leader could go down before it reaches zero and this would result in the
waiters waiting till the end of time. Because this behavior is undesirable, Hazelcast will automatically
notify all listeners if the owner gets disconnected, and therefore listeners could be notified before all
steps of a certain process are completed. To deal with this situation, the current state of the process
needs to be verified and appropriate actions need to be taken: for example, restart all operations,
continue with the first failed operation, or throw an exception.
Although the ICountDownLatch is a very useful synchronization aid, it probably isn’t the one you will use
on a daily basis. Unlike Java’s implementation, Hazelcast’s ICountDownLatch count can be reset after a
countdown has finished, but it cannot be reset during an active count.
Replication: the ICountDownLatch has 1 synchronous backup and zero asynchronous backups and is not
configurable.
import com.hazelcast.core.DistributedObject;
import com.hazelcast.core.ICompletableFuture;
import com.hazelcast.spi.annotation.Beta;
@Beta
public interface CardinalityEstimator extends DistributedObject {
The method add() is used to feed objects into the estimator. Objects are considered to be identical if
they are serialized into the same binary blob.
The method estimate() estimates the cardinality of the aggregation so far. If it was previously
estimated and never invalidated, then a cached version is used.
The methods addAsync() and estimateAsync() are also used to feed objects into the estimator and
estimate cardinalities, but unlike the methods add() and estimate(), they will dispatch a request and
return immediately an ICompletableFuture.
Cluster Singleton Service: In some cases you need a thread that will only run on a limited number of
members. Often only a single thread is needed. But if the member running this thread fails, another
machine needs to take over. Hazelcast doesn’t have direct support for this, but it is very easy to
implement using an ILock (for a single thread) or using an ISemaphore (for multiple threads).
On each cluster member you start this service thread, the first thing this service needs to do is to
acquire the lock or a license and on success, the thread can start with its logic. All other threads will
block till the lock is released or a license is returned.
The nice thing about the ILock and the ISemaphore is when a member exits the cluster (due to a crash,
network disconnect, etc.), the lock is automatically released and the license is returned. Then, other
cluster members that are waiting to acquire the lock/license can now have their turn.
4.1. IQueue
A BlockingQueue is one of the work horses for concurrent system because it allows producers and
consumers of messages (which can be POJOs) to work at different speeds. The Hazelcast
com.hazelcast.core.IQueue, which extends the java.util.concurrent.BlockingQueue, allows threads from
the same JVM to interact with that queue. Since the queue is distributed, it also allows different JVMs to
interact with it. You can add items in one JVM and remove them in another.
To make sure that the consumers will terminate when the producer is finished, the producer will put a
-1 on the queue to indicate that it is finished.
The consumer will take the message from the queue, print it, and wait for 5 seconds. Then, it will
consume the next message and stop when it receives the -1. This behavior is called a poison pill.
public class ConsumerMember {
public static void main(String[] args) throws Exception {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IQueue<Integer> queue = hz.getQueue("queue");
while (true){
int item = queue.take();
System.out.println("Consumed: " + item);
if(item == -1){
queue.put(-1);
break;
}
Thread.sleep(5000);
}
System.out.println("Consumer Finished!");
}
}
If you take a closer look at the consumer, you see that when the consumer receives the poison pill, it
puts the poison pill back on the queue before it ends the loop. This is done to make sure that all
consumers will receive the poison pill, not just the one that received it first.
When you start a single producer, you will see the following output:
Produced 1
Produced 2
....
When you start a single consumer, you will see the following output:
Consumed 1
Consumed 2
....
As you can see, the items produced on the queue by the producer are being consumed from that same
queue by the consumer.
Because messages are produced 5 times faster than they are consumed, the queue will keep growing
with a single consumer. To improve throughput, you can start more consumers. If we start another
one, we’ll see each consumer takes care of half the messages.
Consumer 1:
Consumed 20
Consumed 22
....
Consumer 2:
Consumed 21
Consumed 23
....
When you kill one of the consumers, the remaining consumer will process all the elements again:
Consumed 40
Consumed 42
....
If there are many producers/consumers interacting with the queue, there will be a lot of contention
and eventually the queue will become a bottleneck. One way you can solve this is to introduce a stripe
(essentially a list) of queues. But if you do, the ordering of messages sent to different queues will no
longer be guaranteed. In many cases, a strict ordering isn’t required and a stripe can be a simple
solution to improve scalability.
Although the Hazelcast distributed queue preserves ordering of the messages (the
messages are taken from the queue in the same order they were put on the queue), if
there are multiple consumers, the processing order is not guaranteed because the
queue will not provide any ordering guarantees on the messages after they are taken
from the queue.
4.1.1. Capacity
In the previous example, we showed a basic producer/consumer solution based on a distributed queue.
Because the production of messages is separated from the consumption of messages, the speed of
production is not influenced by the speed of consumption. If producing messages goes quicker than the
consumption, then the queue will increase in size. If there is no bound on the capacity of the queue,
then machines can run out of memory and you will get an OutOfMemoryError.
With the traditional BlockingQueue implementation, such as the LinkedBlockingQueue, you can set a
capacity. When this is set and the maximum capacity is reached, placement of new items either fails or
blocks, depending on the type of the put operation. This prevents the queue from growing beyond a
healthy capacity and the JVM from failing. It is important to understand that the IQueue is not a
partitioned data structure like the IMap, so the content of the IQueue will not be spread over the
members in the cluster. A single member in the cluster will be responsible for keeping the complete
content of the IQueue in memory. Depending on the configuration, there will also be a backup which
keeps the whole queue in the memory.
The Hazelcast queue also provides capacity control, but instead of having a fixed capacity for the
whole cluster, Hazelcast provides a scalable capacity by setting the queue capacity using the queue
property max-size.
<network>
<join><multicast enabled="true"/></join>
</network>
<queue name="queue">
<max-size>10</max-size>
</queue>
When we start a single producer, we’ll see that 10 items are put on the queue and then the producer
blocks. If we then start a single consumer, we’ll see that the messages are being consumed and the
producer will produce again.
4.1.2. Backups
By default, Hazelcast will make sure that there is one synchronous backup for the queue. If the
member hosting that queue fails, the backups on another member will be used so no entries are lost.
If you want increased high availability, you can either increase the backup-count or the async-backup-
count. If you want to have improved performance, you can set the backup-count to 0, but at the cost of
potentially losing entries on failure.
4.1.3. QueueStore
By default, Hazelcast data structures like the IQueue are not persistent.
• Changes in the queue will not be made persistent, so if the cluster fails, then entries will be lost.
In some cases, this behavior is not desirable. Luckily, Hazelcast provides a mechanism for queue
durability using the QueueStore, which can connect to a more durable storage mechanism, such as a
database. In Hazelcast 2, the Queue was implemented on top of the Hazelcast Map, so in theory you
could make the queue persistent by configuring the MapStore of the backing map. In Hazelcast 3, the
Queue is not implemented on top of a map; instead, it exposes a QueueStore directly.
4.2. IList
A List is a collection where every element only occurs once and where the order of the elements does
matter. The Hazelcast com.hazelcast.core.IList implements the java.util.List.
While IMap and ICache are the recommended data structures to be used by
Hazelcast Jet, IList can also be used by it for unit testing or similar non-production
situations. Please see here in the Hazelcast Jet Reference Manual to learn how Jet can
use IList, e.g., how it can fill IList with data, consume it in a Jet job, and drain the
results to another IList. Please also see the Fast Batch Processing and Real-Time
Stream Processing use cases for Hazelcast Jet.
We’ll demonstrate the IList by adding items to a list on one member and printing the element of that
list on another member:
If you first run the WriteMember and after it has completed, you start the ReadMember, then the ReadMember
will output the following:
Tokyo
Paris
New York
Reading finished!
The data that the WriteMember writes to the List is visible in the ReadMember and the order is maintained.
The List interface has various methods (like the sublist) that returns collections, but it is important to
understand that the returned collections are snapshots and are not backed up by the list. See Iterator
Stability for a discussion of weak consistency.
4.3. ISet
A Set is a collection where every element only occurs once and where the order of the elements doesn’t
matter. The Hazelcast com.hazelcast.core.ISet implements the java.util.Set. We’ll demonstrate the
Set by adding items in a Set on one member, and printing all the elements from that Set on another
member:
If you first start the WriteMember and waiting for completion, you start the ReadMember. It will output the
following:
Paris
Tokyo
New York
Reading finished!
As you can see, the data added by the WriteMember is visible in the ReadMember. As you also can see, the
order is not maintained since order is not defined by the Set.
Just as with normal HashSet, the hashcode() and equals() methods of the object are used and not the
equals/hash of the byte array version of that object. This is a different behavior compared to the map;
see Map: Hashcode and Equals.
In Hazelcast, the ISet (and the IList) is implemented as a collection within the MultiMap, where the ID
of the Set is the key in the MultiMap and the value is the collection. This means that the ISet is not
partitioned, so you can’t scale beyond the capacity of a single machine and you cannot control the
partition where data from a Set is going to be stored. If you want to have a distributed Set that behaves
more like the distributed Map, you can implement a Set based on a Map where the value is some bogus
value. It is not possible to rely on the Map.keySet for returning a usable distributed Set, since it will
return a non-distributed snapshot of the keys.
The following example shows an ItemListener that listens to all changes made in an IQueue:
@Override
public void itemAdded(ItemEvent<E> e) {
System.out.println("Item added:" + e.getItem());
}
@Override
public void itemRemoved(ItemEvent<E> e) {
System.out.println("Item removed:" + e.getItem());
}
}
}
We registered the ItemListenerImpl with the addItemListener method using the value true. This is done
to make sure that our ItemListenerImpl will get the value that has been added/removed. The reason for
this configuration option is that in some cases you only want to be notified when a change is
happened-- you’re not interested in the actual change, and you do not want to pay for sending the
value over the line.
To see that the ItemListener is really working, we’ll create a member that makes a change in the queue:
If you start up the ItemListenerMember and wait till it displays "ItemListener started", and then you
start the CollectionChangeMember, you will see the following output in the ItemListenerMember:
item added:foo
item added:bar
item removed:foo
item removed:bar
ItemListeners are useful if you need to react upon changes in collections. But realize that listeners are
executed asynchronously, so it could be that at the time your listener runs, the collection has changed
again.
Ordering: All events are ordered: listeners will receive and process the events in the order they
actually occurred.
Iterator Stability: Iterators on collections are weakly consistent; when a collection changes while
creating the iterator, you could encounter duplicates or miss an element. Changes on that iterator will
not result in changes on the collection. An iterator does not need to reflect the actual state and will not
throw a ConcurrentModificationException.
Replication: The replication for IList and ISet can be configured for synchronous or asynchronous
along with backup count.
Destruction: IQueue/ISet/IList instances are immediately destroyed when they are empty and will not
take up space. Listeners will remain registered unless that collection is destroyed explicitly. Once an
item is added to the implicit destroyed collection, the collection will automatically be recreated.
No merge policy for the Queue: If a cluster containing a queue is split, then each subcluster will still able
to access their own view of that queue. If these subclusters merge, the queue cannot be merged and
one of them is deleted.
Not partitioned: The IList/ISet/IQueue are not partitioned, so the maximum size of the collection
doesn’t rely on the size of the cluster, but on the capacity of a single member since the whole collection
will be kept in the memory of a single JVM.
This is a big difference compared to Hazelcast 2.x, where they were partitioned. The Hazelcast team
decided to drop this behavior since the 2.x implementation was not truly partitioned due to reliance on
a single member where a lot of metadata for the collection was stored. This limitation needs to be
taken into consideration when you are designing a distributed system. You can solve this issue by using
a stripe of collections or by building your collection on top of the IMap. Another more flexible but
probably more time consuming alternative is to write the collection on top of the new SPI
functionality; see SPI.
A potential solution for the IQueue is to make a stripe of queues instead of a single queue. Since each
collection in that stripe is likely to be assigned to a different partition than its neighbors, the queues
will end up in different members. If ordering of items is not important, the item can be placed on an
arbitrary queue. Otherwise, the right queue could be selected based on some property of the item so
that all items having the same property end up in the same queue.
Uncontrollable partition: It is currently not possible to control the partition the collection is going to be
placed on, so more remoting is required than is strictly needed. In the future, it will be possible for you
to say:
4.5. Ringbuffer
Hazelcast Ringbuffer stores its data in a ring-like structure. You can think of it as a circular array with
a given capacity. This capacity will not grow beyond its limits and hence there will be no danger to the
stability of the system. If the capacity is to be exceeded, the oldest item in the Ringbuffer is
overwritten.
Each Ringbuffer has a tail and a head. The tail is where the items are added and the head is where the
items are overwritten or expired. You can reach each element in a Ringbuffer using a sequence ID,
which is mapped to the elements between the head and tail (inclusive) of the Ringbuffer.
Hazelcast Ringbuffer can sometimes be a better alternative than Hazelcast IQueue. Unlike IQueue,
Ringbuffer does not remove the items, it only reads items using a certain position. For instance, the
method queue.take() is destructive, meaning that only 1 thread is able to take an item. But, the method
ringbuffer.read() is not destructive; you can have multiple threads reading the same item multiple
times.
Reading from Ringbuffer is simple: get the Ringbuffer with the HazelcastInstance getRingbuffer
method, get its current head with the headSequence method, and start reading. Use the method readOne
to return the item at the given sequence; readOne blocks if no item is available. To read the next item,
increment the sequence by one. Please see the following example.
Ringbuffer<Long> rb = hz.getRingbuffer("rb");
// we start from the oldest item.
// if you want to start from the next item, call rb.tailSequence()+1
long sequence = rb.headSequence();
System.out.println("Start reading from: " + sequence);
while (true) {
long item = rb.readOne(sequence);
sequence++;
System.out.println("Read: " + item);
}
}
}
Adding an item to a Ringbuffer is also easy with the methods add, addAsync and addAllAsync. The
following example uses the method addAsync.
public class Writer {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
Ringbuffer<Long> rb = hz.getRingbuffer("rb");
long i = 100;
while (true) {
long sleepMs = 100;
for (; ; ) {
long result = rb.addAsync(i, OverflowPolicy.FAIL).get();
if (result != -1) {
break;
}
TimeUnit.MILLISECONDS.sleep(sleepMs);
sleepMs = min(5000, sleepMs * 2);
}
// add a bit of random delay to make it look a bit more realistic
Thread.sleep(random.nextInt(10));
Use the method add to return the sequence of the inserted item; the sequence value will always be
unique. You can use this as a very cheap way of generating unique IDs if you are already using
Ringbuffer.
Hazelcast allows you to load and store the Ringbuffer items from/to a persistent datastore using the
interface RingbufferStore. If a Ringbuffer store is enabled, each item added to the Ringbuffer will also
be stored at the configured Ringbuffer store.
The Ringbuffer store will store items in the same format as the Ringbuffer. If the BINARY in-memory
format is used, the Ringbuffer store must implement the interface RingbufferStore<byte[]> meaning
that the Ringbuffer will receive items in the binary format. If the OBJECT in-memory format is used,
the Ringbuffer store must implement the interface RingbufferStore<K>, where K is the type of item
being stored (meaning that the Ringbuffer store will receive the deserialized object).
When adding items to the Ringbuffer, the method storeAll allows you to store items in batches.
The following is a code sample for BINARY in-memory format:
import com.hazelcast.core.RingbufferStore;
@Override
public void store(long sequence, byte[] data) {
System.out.println("Binary store");
}
@Override
public void storeAll(long firstItemSequence, byte[][] items) {
System.out.println("Binary store all");
}
@Override
public byte[] load(long sequence) {
System.out.println("Binary load");
return null;
}
@Override
public long getLargestSequence() {
System.out.println("Binary get largest sequence");
return -1;
}
}
Internally, Hazelcast divides the map into partitions and it distributes the partitions evenly among the
members in the cluster. The partition of a map entry is based on the key of that entry; each key belongs
to a single partition. By default, Hazelcast uses 271 partitions for all partitioned data structures. This
value can be changed with the hazelcast.map.partition.count property.
When a new member is added, the oldest member in the cluster decides which partitions are going to
be moved to that new member. Once the partitions are moved, the new member will take its share in
the load. Thus, to scale up a cluster, just add new members to the cluster.
When a member is removed, all the partitions that member owned are moved to other members. So
scaling down a cluster is simple, just remove members from the cluster. Apart from a ’soft’ removal of
the member, there can be a ’hard’ removal, for example, if the member crashes or gets disconnected
from the cluster due to network issues. Luckily, Hazelcast provides various degrees of failover to deal
with this situation. By default there will be one synchronous backup, so the failure of a single member
will not lead to loss of data because a replica of that data is available on another member.
In this example, we create a basic cities map which we will use in the following sections.
You do not need to configure anything in the hazelcast.xml file; Hazelcast will use the default Map
configuration from the hazelcast-default.xml to configure that map. If you want to configure the map,
you can use the following example as a minimal map configuration in the hazelcast.xml:
<map name="cities"/>
Lazy creation: The Map is not created when the getMap method is called, but is created only when the
Map instance is accessed. This is useful to know if you use the DistributedObjectListener and fail to
receive creation events.
5.2. Reading/Writing
The Hazelcast Map implements the ConcurrentMap interface, so reading/writing key/values is simple
since you can use familiar methods like get and put.
To demonstrate this basic behavior, the following Member creates a Map and writes some entries into
that map:
As you can see, the Map is retrieved using the hzInstance.getMap(mapName) and after that some entries
are stored in that Map. Reading the entries from that Map is simple:
If we first run the FillMapMember and then run the PrintAllMember, we get the following output:
3 New York
1 Tokyo
2 Paris
The map updates from the FillMapMember are visible in the PrintAllMember.
Internally, Hazelcast serializes the key and value (see Serialization) to byte arrays and stores them in
the underlying storage area. This means changes made to a key/value after they are stored in the Map
will not be reflected on the stored state. Therefore, the following code is broken:
Employee e = employees.get(123);
e.setFired(true);
If you want this change to be stored in the Map, you need to put the updated value back:
Employee e = employees.get(123);
e.setFired(true);
employees.put(123,e);
IMap data structure can also be used by Hazelcast Jet for Real-Time Stream
Processing (by enabling the Event Journal on your map) and Fast Batch Processing.
Hazelcast Jet uses IMap as a source (reads data from IMap) and as a sink (writes data
to IMap). Please see the Fast Batch Processing and Real-Time Stream Processing use
cases for Hazelcast Jet. Please also see here in the Hazelcast Jet Reference Manual to
learn how Jet uses IMap, i.e., how it can read from and write to IMap.
Serializing and deserializing an object too frequently on one node can have a huge impact on
performance. A typical use case would be Queries (predicate) and Entry Processors reading the same
value multiple times. To eliminate this impact on performance, the objects can be stored in object
format, rather than in binary format; this means that Hazelcast stores the value in its object form and
not in the byte array.
Thus, the IMap provides control on the format of the stored value using the in-memory-format setting.
This option is only available for values; keys will always be stored in binary format. You should
understand the available in-memory formats:
• BINARY: The value is stored in binary format. Every time the value is needed, it will be deserialized.
• OBJECT: The value is stored in object format. If a value is needed in a query/entry-processor, the
value is used as is and no deserialization is needed.
• NATIVE: This option is used to enable the distributed map to use Hazelcast’s High-Density Memory
Store feature. Please see the Storage chapter.
The big question is which in-memory format to use. You should consider using the OBJECT in-memory
format if the majority of your Hazelcast usage is composed of queries/entry processors. In this case, no
deserialization is needed when a value is used in a query/entry processor because the object already is
available in object format. With the BINARY in-memory format, a deserialization is needed since the
object is only available in binary format.
If the majority of your operations are regular Map operations like put or get, you should consider the
BINARY in-memory format. This sounds counterintuitive because normal operations, such as get, rely on
the object instance, and with a binary format no instance is available. However, when the OBJECT in-
memory format is used, the Map never returns the stored instance, but instead creates a clone. This
involves a serialization on the owning node followed by a deserialization on the caller node. With the
BINARY format, only a deserialization is needed and therefore the process is faster. For similar reasons,
a put with the BINARY in-memory format will be faster than the OBJECT in-memory format. When the
OBJECT in-memory format is used, the Map will not store the actual instance, but will make a clone; this
involves a serialization followed by a deserialization. When the BINARY in-memory format is used, only
a deserialization is needed.
In the following example, you can see a Map configured with the OBJECT in-memory format.
<map name="cities">
<in-memory-format>OBJECT</in-memory-format>
</map>
If a value is stored in OBJECT in-memory format, a change on a returned value does not affect the stored
instance because a clone of the stored value is returned, not the actual instance. Therefore, changes
made on an object after it is returned will not be reflected on the actual stored data. Also, when a value
is written to a Map, if the value is stored in OBJECT format, it will be a copy of the put value, not the
original. Therefore, changes made on the object after it is stored will not be reflected on the actual
stored data.
Unsafe to use with EntryProcessor in combination with queries: If the OBJECT in-memory format is used,
then the actual object instance is stored. When the EntryProcessor is used in combination with OBJECT
in-memory format, then an EntryProcessor will have access to that object instance. A query also will
have access to the actual object instance. However, queries are not executed on partition threads.
Therefore, at any given moment, an EntryProcessor and an arbitrary number of query threads could
access the same object instance. This can lead to data races and Java memory model violation.
Unsafe to use with MapReduce: If the OBJECT in-memory format is used in combination with
MapReduce, you can run into the same data races and Java Memory Model violations as with the
EntryProcessor in combination with queries.
The cache-value property in Hazelcast 2.x has been dropped in Hazelcast 3. Just as with the in-memory-
format, the cache-value makes it possible to prevent unwanted deserialization. When the cache-value
was enabled, it was possible to get the same instance on subsequent calls like Map.get. This problem
does not happen with the in-memory-format. The reason to drop cache-value is that returning the same
instance leads to unexpected sharing of an object instance. With an immutable object like a String, this
won’t cause any problems, but with an mutable object this can lead to problems such as concurrency
control issues.
1. For keys, the hash/equals is determined based on the content of the byte array, so equal keys need
to result in equal byte arrays. See Serialization: Serializable.
2. For values, the hash/equals is determined based on the in-memory-format; for BINARY, the binary
format is used. For OBJECT the equals of the object is used.
@Override
public boolean equals(Object thatObj) {
if (this == thatObj) {
return true;
}
if (thatObj == null || getClass() != thatObj.getClass()) {
return false;
}
Pair that = (Pair) thatObj;
return this.significant.equals(that.significant);
}
@Override
public int hashCode() {
return significant.hashCode();
}
}
This Pair has 2 fields. The significant field is used in the hash/equals implementation and the
insignificant field is not. If we make 2 keys,
normalMap.put(key1, "foo");
hzMap.put(key1, "foo");
System.exit(0);
}
}
When this program is run, you will get the following output:
normalMap.get: foo
hzMap.get: null
The Pair works fine for a HashMap, but doesn’t work for a Hazelcast IMap.
For a key, it is very important that the binary format of equal objects are the same. For values, this
depends on the in-memory-format setting. If we configure the following three maps in the hazelcast.xml:
<hazelcast>
<map name="objectMap">
<in-memory-format>OBJECT</in-memory-format>
</map>
<map name="binaryMap">
<in-memory-format>BINARY</in-memory-format>
</map>
</hazelcast>
In the following code, we define two values, v1 and v2, where the resulting byte array is different. The
equals method will indicate that they are the same. We put v1 in each map and check for its existence
using map.contains(v2).
public class BrokenValueMember {
normalMap.put("key", v1);
binaryMap.put("key", v1);
objectMap.put("key", v1);
System.out.println("normalMap.contains:" +
normalMap.containsValue(v2));
System.out.println("binaryMap.contains:" +
binaryMap.containsValue(v2));
System.out.println("objectMap.contains:" +
objectMap.containsValue(v2));
System.exit(0);
}
}
normalMap.contains:true
binaryMap.contains:false
objectMap.contains:true
v1 is found using v2 in the normalMap and the objectMap because with these maps, the equals is done
based on the equals method of the object itself. With the binaryMap, the equals is done based on the
binary format. Since v1 and v2 have different binary formats, v1 will not be found using v2.
Even though the hashcode of a key/value is not used by Hazelcast to determine the partition the
key/value will be stored in, it will be used by methods like Map.values() and Map.keySet() and therefore
it is important that the hash and equals are implemented correctly. For more information, the book
"Effective Java" mentions that you should obey the general contract when overriding equals; always
override hashcode when you override equals.
5.5. Partition Control
Hazelcast makes it very easy to create distributed Maps and access data in these Maps. For example,
you could have a Map with customers where the customerId is the key, and you could have a Map with
orders for a customer where the orderId is the key. However, when you frequently use the customer in
combination with their orders, the orders will likely be stored in different partitions than the
customer, since the customer partition is determined with the customerId and the order partition is
determined with the orderId.
Luckily, Hazelcast provides a solution to control the partition schema of your data so that all data can
be stored in the same partition. If the data is partitioned correctly, your system will exhibit a strong
locality of reference and this will reduce latency, increase throughput and improve scalability since
fewer network hops and less traffic is required.
To demonstrate this behavior, the code below implements a custom partitioning schema for a
customer and his orders.
To control the partition of the order, the OrderKey implements PartitionAware. If a key implements this
interface, instead of using the binary format of the key to determine the correct partition, the binary
format of the result of getPartitionKey method call is used. Because we want the partition of the
customerId, the getPartitionKey method will use the customerId.
public final class OrderKey implements PartitionAware, Serializable {
@Override
public Object getPartitionKey() {
return customerId;
}
}
The equals and hashcode are not used in this example since Hazelcast will make use of the binary
format of the key. You should implement them in practice. For more information, see Hashcode and
Equals.
In the following example, an order is placed with an OrderKey. At the end of the example, the partition
IDs for a customer, the orderKey, and the orderId are printed.
public class DataLocalityMember {
The partition of the customer is the same as the partition of the order of that customer. Also, the
partition where an order would be stored using a naive orderId is different than that of the customer.
In this example, we created the OrderKey that does the partitioning, but Hazelcast also provides a
default implementation that can be used: the PartitionAwareKey.
Being able to control the partitioning schema of data is a very powerful feature and figuring out a good
partitioning schema is an architectural choice that you want to get right as soon as possible. Once this
is done correctly, it will be a lot easier to write a high performance and scalable system since the
number of remote calls is limited.
Collocating data in a single partition often needs to be combined with sending the functionality to the
partition that contains the collocated data. For example, if an invoice needs to be created for the orders
of a customer, a Callable that creates the Invoice could be sent using the
IExecutorService.executeOnKeyOwner(invoiceCallable, customerId) method. If you do not send the
function to the correct partition, collocating data is not useful since a remote call is done for every
piece of data. For more information about Executors and routing, see Distributed Executor Service and
Distributed Executor Service: Routing.
<map name="persons">
<backup-count>1</backup-count>
</map>
You can set backup-count to 0 if you favor performance over high availability. You can specify a higher
value than 1 if you require increased availability, but the maximum number of backups is 6. The
default is 1, so you may not need to specify it at all.
By default, the backup operations are synchronous; you are guaranteed that the backups are updated
before a method call like map.put completes. However, this guarantee comes at the cost of blocking and
therefore the latency increases. In some cases having a low latency is more important than having
perfect backup guarantees, as long as the window for failure is small. That is why Hazelcast also
supports asynchronous backups, where the backups are made at some point in time. This can be
configured through the async-backup-count property:
<map name="persons">
<backup-count>0</backup-count>
<async-backup-count>1<async-backup-count>
</map>
The async-backup-count defaults to 0; it doesn’t need to be configured unless you want to have
asynchronous backups.
Although backups can improve high availability, they increase memory usage because the backups are
also kept in memory. Therefore, for every backup, you double the original memory consumption.
By default, Hazelcast provides sequential consistency; when a Map entry is read, the most recent
written value is seen. This is accomplished by routing the get request to the member that owns the key.
Therefore, there will be no out-of-sync copies. But sequential consistency comes at a price: if the value
is read on an arbitrary cluster member, then Hazelcast needs to do a remote call to the member that
owns the partition for that key. Hazelcast provides the option to increase performance by reducing
consistency. This is done by allowing reads to potentially see stale data. This feature is available only
when there is at least 1 backup (synchronous or asynchronous). You can enable it by setting the read-
backup-data property:
<map name="persons">
<backup-count>0</backup-count>
<async-backup-count>1</async-backup-count>
<read-backup-data>true</read-backup-data>
</map>
In this example, you can see a person Map with a single asynchronous backup, and reading of backup
data enabled (the read-backup-data property defaults to false). Reading from the backup can improve
performance a bit; if you have a 10 node cluster and read-backup-data is false, there is a 1 in 10 chance
that the read will find the data locally. When there is a single backup and read-backup-data is true, that
adds another 1 in 10 chance that read will find the backup data locally. This totals to a 1 in 5 chance
that the data is found locally.
5.7. Eviction
By default, all the Map entries that are put in the Map will remain in that Map. You can delete them
manually, but you can also rely on an eviction policy that deletes items automatically. This feature
enables Hazelcast to be used as a distributed cache since hot data is kept in memory and cold data is
evicted.
• max-size: Maximum size of the map. When maximum size is reached, the Map is evicted based on
the policy defined. The value is an integer between 0 and Integer.MAX VALUE. 0 means
Integer.MAX_VALUE and the default is 0. A policy attribute (eviction-policy seen below)
determines how the max-size will be interpreted.
◦ PER_NODE: Maximum number of map entries in the JVM. This is the default policy.
◦ PER_PARTITION: Maximum number of map entries within a single partition. This is probably not
a policy you will use often, because the storage size depends on the number of partitions that a
member is hosting. If the cluster is small, it will host more partitions and therefore more map
entries than with a larger cluster.
◦ USED_HEAP_PERCENTAGE: Maximum used heap size as a percentage of the JVM heap size. If the JVM
is configured with 1000 MB and the max-size is 10, this policy allows the map to be 100 MB
before map entries are evicted.
◦ FREE_HEAP_PERCENTAGE: Minimum free heap size percentage for each JVM. If, for example, a JVM
is configured to have 1000 MB and this value is 10, then the map entries will be evicted when
free heap size is below 100 MB.
◦ USED_NATIVE_MEMORY_SIZE: Maximum used native memory size in megabytes for each JVM.
◦ USED_NATIVE_MEMORY_PERCENTAGE: Maximum used native memory size percentage for each JVM.
◦ FREE_NATIVE_MEMORY_SIZE: Maximum free native memory size in megabytes for each JVM.
◦ FREE_NATIVE_MEMORY_PERCENTAGE: Maximum free native memory size percentage for each JVM.
◦ NONE: No items will be evicted, so the max-size is ignored. This is the default policy. If you want
max-size to work, you need to set an eviction-policy other than NONE. Of course, you still can
combine it with time-to-live-seconds and max-idle-seconds.
• time-to-live-seconds: Maximum number of seconds for each entry to stay in the map. Entries that
are older than time-to-live-seconds and are not updated for this duration will get automatically
evicted from the map. The value can be any integer between 0 and Integer.MAX_VALUE. 0 means
infinite, and 0 is the default.
• max-idle-seconds: Maximum number of seconds for each entry to stay idle in the map. Entries that
are idle (not touched) for more than max-idle-seconds will get automatically evicted from the map.
Entry is touched if get, put, or containsKey method is called. The value can be any integer between 0
and Integer.MAX_VALUE. 0 means infinite, and 0 is the default.
• eviction-percentage: When the maximum size is reached, the specified percentage of the map will
be evicted. The default value is 25 percent. If the value is set to a value that is too small, then only
that small amount of map entries are evicted, which can lead to a lot of overhead if map entries are
frequently inserted.
This configures an articles map that will start to evict map entries from a member as soon as the map
size within that member exceeds 10000. It will then start to remove map entries that are least recently
used. When map entries are not used for more than 60 seconds, they will be evicted as well.
You can evict a key manually by calling the IMap.evict(key) method. You might wonder what the
difference is between this method and the IMap.delete(key). If no MapStore is defined, there is no
difference. If a MapStore is defined, an IMap.delete will call a delete on the MapStore and potentially
delete the map entry from the database. However, the evict method removes the map entry only from
the map.
MapStore.delete(Object key) is not called when a MapStore is used and a map entry is evicted. So if the
MapStore is connected to a database, no record entries are removed due to map entries being evicted.
package com.hazelcast.map.eviction;
@Override
public abstract int compare(EntryView<K, V> entryView1, EntryView<K, V> entryView2);
}
Let’s implement a custom eviction policy that uses LRU algorithm to select an evictable entry:
@Override
public int compare(EntryView entryView1, EntryView entryView2) {
long lastAccessTime1 = entryView1.getLastAccessTime();
long lastAccessTime2 = entryView2.getLastAccessTime();
return (lastAccessTime1 < lastAccessTime2) ? -1 : ((lastAccessTime1 ==
lastAccessTime2) ? 0 : 1);
}
}
Now, it is time to plug this custom policy by registering it programmatically or declaratively. Following
is an example declarative configuration:
<map name="mapName">
...
<custom-eviction-policy-class-name>
com.hazelcast.map.eviction.LRUEvictionPolicy
</custom-eviction-policy-class-name>
...
</map>
Hazelcast’s solution to this problem is the near cache. Near cache makes map entries locally available
by adding a local cache attached to the map. Imagine a web shop where articles can be ordered and
where these articles are stored in a Hazelcast map. To enable local caching of frequently used articles,
the near cache is configured like this:
<map name="articles">
<near-cache/>
</map>
• max-size: Maximum number of cache entries per local cache. As soon as the maximum size has
been reached, the cache will start to evict entries based on the eviction policy. max-size should be
between 0 and Integer.MAX_SIZE, where 0 will be interpreted as Integer.MAX_SIZE. The default is
Integer.MAX_SIZE, but it is better to either explicitly configure max-size in combination with an
eviction-policy, or set time-to-live-seconds/max-idle-seconds to prevent OutOfMemoryErrors. The
max-size of the near cache is independent of that of the map itself.
• eviction-policy: Policy used to evict members from the cache when the near cache is full. The
following options are available:
◦ NONE: No items will be evicted, so the max-size is ignored. If you want max-size to work, you need
to set an eviction-policy other than NONE. You can combine NONE with time-to-live-seconds
and max-idle-seconds.
• time-to-live-seconds: Number of seconds a map entry is allowed to remain in the cache. Valid
values are 0 to Integer.MAX_SIZE, and 0 will be interpreted as infinite. The default is 0.
• max-idle-seconds: Maximum number of seconds a map entry is allowed to stay in the cache without
being read. max-idle-seconds should be between 0 and Integer.MAX_SIZE, where 0 will be
interpreted as Integer.MAX_SIZE. The default is 0.
• invalidate-on-change: If true, all the members listen for change in their cached entries and evict the
entry when it is updated or deleted. Valid values are true/false and the default is true.
• in-memory-format: In-memory format of the cache. Defaults to BINARY. For more information, see
InMemoryFormat.
This configures an articles map with a near-cache. It will evict near-cache entries from a member as
soon as the near-cache size within that member exceeds 10000. It will then remove near-cache entries
that are least recently used. When near cache entries are not used for more than 60 seconds, they will
be evicted as well.
The previous Eviction section discussed evicting items from the map, but it is important to understand
that near cache and map eviction are two different things. The near cache is a local map that contains
frequently accessed map entries from any member, while the local map will only contain map entries
it owns. You can even combine the eviction and the near cache, although their settings are
independent.
• It increases memory usage since the near cache items need to be stored in the memory of the
member.
• It reduces consistency, especially when invalidate-on-change is false: it could be that a cache entry
is never refreshed.
• It is best used for read only data, especially when invalidate-on-change is enabled. There is a lot of
remoting involved to invalidate the cache entry when a map entry is updated.
The classic way to solve the race problem is to use a lock. In Hazelcast there are various ways to lock,
but for this example we’ll use the locking functionality provided by the map: the map.lock and
map.unlock methods.
public class PessimisticUpdateMember {
Another way to lock is to acquire some predictable Lock object from Hazelcast. You could give every
value its own lock, but you could also create a stripe of locks. Although doing this could increase
contention, it will reduce space.
Good To Know
• When the record is deleted, the lock associated with that record is deleted as well.
• When a map is deleted, all the locks associated with the records are deleted.
• A map lock doesn’t support fairness, just like the regular ILock.
• Although it has the same infrastructure as an ILock, a map lock can’t be explicitly retrieved using
HazelcastInstance.getLock.
• When you unlock the map entry of a non-existing key, the map entry will automatically be deleted.
5.10.2. Optimistic Locking
It is important to implement object equals on the value, because the value is used to determine if two
objects are equal. With the ConcurrentHashMap, it is based on object reference. On the keys, the byte
array equals is used, but on the replace(key,oldValue,newValue) the object equals is used. If you fail to
use the correct equals, your code will not work!
This code is broken on purpose. The problem can be solved by adding a version field; although all the
other fields will be equal, the version field will prevent objects from being seen as equal.
5.11. EntryProcessor
One of the new features of Hazelcast 3.0 is the EntryProcessor. It allows you to send a function, the
EntryProcessor, to a particular key or to all keys in an IMap. Once the EntryProcessor is completed, it is
discarded, so it is not a durable mechanism like the EntryListener or the MapInterceptor.
Imagine that you have a map of employees and you want to give every employee a bonus. In the
example below, you see a very naive implementation of this functionality:
public class Employee implements Serializable {
private int salary;
The first reason this example is naive is that this functionality isn’t very scalable; a single machine will
need to pull all the employees to itself, transform it, and write it back. If your number of employees
doubles, it will probably take twice as much time. Another problem is that the current implementation
is subject to race problems; imagine that a different process currently gives an employee a raise of 10.
The read and write of the employee is not atomic since there is no lock, so it could be that one of the
raises is overwritten and the employee only gets a single raise instead of a double raise.
The EntryProcessor was added to Hazelcast to address cases like this. The EntryProcessor captures the
logic that should be executed on a map entry. Hazelcast will send the EntryProcessor to each member
in the cluster, and then each member will, in parallel, apply the EntryProcessor to all map entries. This
means that the EntryProcessor is scalable; the more machines you add, the faster the processing will be
completed. Another important feature of the EntryProcessor is that it will deal with race problems by
acquiring exclusive access to the map entry when it is processing.
employees.executeOnEntries(new EmployeeRaiseEntryProcessor());
@Override
public Object process(Map.Entry< String, Employee> entry) {
Employee employee = entry.getValue();
employee.incSalary(10);
entry.setValue(employee);
return null;
}
}
}
In the previous example, the process method modifies the employee instance and returns null. The
EntryProcessor can also return a value for every map entry. If we wanted to calculate the sum of all
salaries, the following EntryProcessor will return the salary of an employee:
public GetSalaryEntryProcessor(){
super(false);
}
@Override
public Object process(Map.Entry< String, Employee> entry) {
return entry.getValue().getSalary();
}
}
You need to be careful when using this technique, as the salaries map will be kept in memory and this
can lead to an OutOfMemoryError. If you don’t care about a returned map, it is best to let the process
method return null. This will prevent the result for a single process invocation from being stored in the
map.
If you are wondering why the GetSalaryEntryProcessor constructor calls the super with false, check the
next section.
When the EntryProcessor is applied on a map, it will not only process all primary map entries, but will
also process all backups. These processes are needed to prevent the primary map entries from
containing different data than the backups. In the previous examples, we made use of the
AbstractEntryProcessor class instead of the EntryProcessor interface, which applies the same logic to
primary and backups. But if you want, you can apply different logic on the primary than on the
backup.
This can be useful if the value doesn’t need to be changed, but you want to do a certain action, such as
log or retrieve information. The previous example, where the total salary of all employees is
calculated, is such a situation. That is why the GetSalaryEntryProcessor constructor calls the super with
false; this signals the AbstractEntryProcessor not to apply any logic to the backup, only to the primary.
To fully understand how EntryProcessor works, let’s have a look at the implementation of the
AbstractEntryProcessor:
public AbstractEntryProcessor(){
this(true);
}
@Override
public abstract Object process(Map.Entry<K, V> entry);
@Override
public final EntryBackupProcessor<K, V> getBackupProcessor() {
return entryBackupProcessor;
}
@Override
public void processBackup(Map.Entry<K, V> entry) {
process(entry);
}
}
}
The important method here is the getBackupProcessor. If we don’t want to apply any logic in the
backups, we can return null. This signals to Hazelcast that only the primary map entries need to be
processed. If we want to apply logic on the backups, we need to return an EntryBackupProcessor
instance. In this case the EntryBackupProcessor.processBackup method will make use of the process
method, but if you provide a custom EntryProcessor implementation, you have complete freedom on
how it should be implemented.
Entry processors can be used with predicates. Predicates help to process a subset of data by selecting
eligible entries. This selection can happen either by doing a full-table scan or by using indexes. To
accelerate entry selection step, you can consider to add indexes. If indexes are there, entry processor
will automatically use them.
5.11.4. Threading
To understand how the EntryProcessor works, you need to understand how Hazelcast’s threading
works. Hazelcast will only allow a single thread —the partition thread— to be active in a partition. This
means that by design it isn’t possible for operations like IMap.put to be interleaved with other map
operations, or with system operations like migration of a partition. The EntryProcessor will also be
executed on the partition thread. Therefore, while the EntryProcessor is running, no other operations
on that map entry can happen.
It is important to understand that an EntryProcessor should run quickly because it is running on the
partition thread. This means that other operations on the same partition will be blocked, and that
other operations that use a different partition but are mapped to the same operation thread will also
be blocked. Also, system operations such as partition migration will be blocked by a long-running
EntryProcessor. The same applies when an EntryProcessor is executed on a large number of entries; all
entries are executed in a single run and will not be interleaved with other operations.
You need to take care to store mutable states in your EntryProcessor. For example, if a member
contains partitions 1 and 2 and they are mapped to partition threads 1 and 2, and if you are executing
the entry processor on map entries in partitions 1 and 2, then the same EntryProcessor will be used by
different threads in parallel. It isn’t a problem when you use IMap.executeOnKey, but it can be a problem
with the other IMap.execute methods.
InMemoryFormat: If you are often using the EntryProcessor or queries, it might be a good idea to use
the InMemoryFormat.OBJECT. The OBJECT in-memory format in Hazelcast will not serialize/deserialize the
entry, so you are able to apply the EntryProcessor without serialization cost. The value instance that is
stored is passed to the EntryProcessor, and that instance will also be stored in the map entry (unless
you create a new instance). For more information, see InMemoryFormat.
Process single key: If you want to execute the EntryProcessor on a single key, you can use the
IMap.executeOnKey method. You could do the same with an IExecutorService.executeOnKeyOwner, but you
would need to lock and potentially deal with more serialization.
Not Thread-safe: If state is stored in the EntryProcessor between process invocations, you need to
understand that this state can be touched by different threads. This is because the same EntryProcessor
instance can be used between different partitions that run on different threads. One potential solution
is to put the state in a thread local.
Process using predicate: Deletion: You can delete items with the EntryProcessor by setting the map entry
value to null. In the following example, you can see that all bad employees are being deleted using this
approach:
class DeleteBadEmployeeEntryProcessor
extends AbstractEntryProcessor<String, Employee> {
@Override
public Object process(Map.Entry< String, Employee> entry) {
if(entry.getValue().isBad()){
entry.setValue(null);
}
return null;
}
}
5.12. MapListener
Using one of the MapListener sub-interfaces, you can listen for map entry events providing a predicate,
and so the events will be fired for each entry validated by your query. Rather than have one large
interface to handle all callback types you can just implement specific interfaces for the callback you
are interested in.
For example, if you just wish to intercept events for IMap.put you could create a listener that
implements EntryAddedListener<K,V> and EntryUpdatedListener<K,V>
IMap has a single method for applying a listener, IMap.addEntryListener. If registering the callback
inside cluster members this will cause it to fire on every member for any event. If you wish a callback
to fire only when the event is local to that member you should register using
IMap.addLocalEntryListener.
public class ListeningMember {
@Override
public void entryRemoved( EntryEvent<String, String> event ) {
System.out.println( "entryRemoved:" + event );
}
@Override
public void entryUpdated( EntryEvent<String, String> event ) {
System.out.println( "entryUpdated:" + event );
}
}
}
When you start the ListeningMember and then start the ModifyMember, the ListeningMember will output
something like this:
entryAdded:EntryEvent {Address[192.168.1.100]:5702} key=251359212222282,
oldValue=null, value=1, event=ADDED, by Member [192.168.1.100]:5702
entryUpdated:EntryEvent {Address[192.168.1.100]:5702} key=251359212222282,
oldValue=1, value=2, event=UPDATED, by Member [192.168.1.100]:5702
entryRemoved:EntryEvent {Address[192.168.1.100]:5702} key=251359212222282,
oldValue=2, value=2, event=REMOVED, by Member [192.168.1.100]:5702
5.12.1. Threading
To correctly use the MapListener, you must understand the threading model. Unlike the EntryProcessor,
the MapListener doesn’t run on the partition threads. MapListener runs on event threads, the same
threads that are used by other collection listeners and by ITopic message listeners. The MapListener is
allowed to access other partitions. Just like other logic that runs on an event thread, you need to watch
out for long running tasks because it could lead to starvation of other event listeners since they don’t
get a thread. It can also lead to OOME because of events being queued quicker than they are being
processed.
No events: When no EntryListeners are registered, no events will be sent, so you will not pay the price
for something you don’t use.
EntryListener: Prior to 3.5 Hazelcast had one interface for all Map Event callbacks, called the
EntryListener. EntryListener has been retained for backward compatibility, for new code please use
the MapListener sub interfaces.
To demonstrate the listener with a predicate, we are going to listen to the changes made to a person
with a specific name. So let’s create the Person class first:
public class Person implements Serializable{
@Override
public String toString() {
return "Person{" +
"name='" + name + '\'' +
'}';
}
}
The following step is to register a EntryAddedListener using a predicate so that the query is created:
As you can see, the query is created using the SqlPredicate name=peter. The listener will be notified as
soon as a person with the name peter is modified. To demonstrate this, start the ContinuousQueryMember
and then start the following member:
public class ModifyMember {
When ModifyMember is done, the ContinuousQueryMember will show the following output:
As you can see, the listener is only notified for peter, and not for talip.
Filtered at the source: The predicate of the continuous query is registered at the source; it is registered
on each member that generates an event for a given partition. This means that if a predicate filters out
an event, the event will not be sent over the line to the listener.
This is what you probably would write if the map was an ordinary map, but when the map is a
distributed map, there are some performance and scalability problems with this approach.
• It is not parallelizable. One member will iterate over all persons instead of spreading the load over
multiple members. Because the search isn’t parallelizable, the system can’t scale; you can’t add
more members to the cluster to increase performance.
• It is inefficient because all persons need to be pulled over the line before being deserialized into
the memory of the executing member. So there is unnecessary network traffic.
Hazelcast solves these problems by supporting predicates that are executed on top of a fork/join
mechanism:
1. When the predicate is requested to be evaluated by the caller, it is forked to each member in the
cluster.
2. Each member will filter all local map entries using the predicate. Before a predicate evaluates a
map entry, the key/value of that entry are deserialized and passed to the predicate.
3. The caller joins on the completion of all members and merges the results into a single set.
The fork/join approach is highly scalable because it is parallelizable. By adding new cluster members,
the number of partitions per member is reduced. Therefore, the time a member needs to iterate over
all of its data is reduced as well. Also, the local filtering is parallelizable because a pool of partition
threads will evaluate segments of elements concurrently. And the amount of network traffic is reduced
drastically, since only filtered data is sent instead of all data.
1. Criteria API
To implement the Person search using the JPA-like criteria API, you could do the following:
...
The namePredicate verifies that the name field has a certain value using the equal operator. After we
have created the predicate, we apply it to the personMap by calling the IMap.values(Predicate) method,
which takes care of sending it to all members in the cluster, evaluating it, and merging the result.
Because the predicate is sent over the line, it needs to be serializable. See Serialization for more
information.
The Predicate is not limited to values only. It can also be applied to the keySet, the entrySet, and the
localKeySet of the IMap.
Equal Operator
In the previous example, we saw the equal operator in action, getting the name of the person object.
When it is evaluated, it first tries to look up an accessor method, so in case of name, the accessor
methods that it will try are isName() and getName(). If one is found, it is called and the comparison is
done. An accessor method doesn’t need to return a field, it could also be a synthetic accessor where
some value is created on the fly. If no accessor is found, a field with the given name is looked up. If that
exists, it is returned; otherwise, a RuntimeException is thrown. Hazelcast doesn’t care about the
accessibility of a field or an accessor method, so you are not forced to make them public.
In some cases you need to traverse over an object structure. For example, you want the street of the
address where the person lives. With the equal operator, you can do it like this: address.street. This
expression is evaluated from left to right and there is no limit on the number of steps involved.
Accessor methods can also be used here. Please also note how the equal operator deals with null,
especially with object traversal: as soon as null is found, it is used in the comparison.
...
Other Operators
In the Predicates class you can find a whole collection of useful operators.
• like: Checks if the result of an expression matches some string pattern. % (percentage sign) is a
placeholder for many characters, _ (underscore) is a placeholder for only one character.
• greaterEqual: Checks if the result of an expression is greater than or equal to a certain value.
• lessEqual: Checks if the result of an expression is less than or equal to a certain value.
• between: Checks if the result of an expression is between two values (this is inclusive).
If the predicates provided by Hazelcast are not enough, you can always write your own predicate by
implementing the Predicate interface:
The map entry not only contains the key/value, but also contains all kinds of metadata like the time it
was created/expires/last accessed, etc.
PredicateBuilder
The syntax we have used so far to create Predicates is clear. That syntax can be simplified more by
making use of the PredicateBuilder. PredicateBuilder provides a fluent interface that can make
building predicates simpler. But same functionality is used underneath. Here is an example where a
predicate is built that selects all persons with a certain name and age using PredicateBuilder:
public Set<Person> getWithNameAndAgeSimplified(String name, int age) {
EntryObject e = new PredicateBuilder().getEntryObject();
Predicate predicate = e.get("name").equal(name).and(e.get("age").equal(age));
return (Set<Person>) personMap.values(predicate);
}
As you can see, PredicateBuilder can simplify things, especially if you have complex predicates. It is a
matter of taste which approach you prefer.
With the PredicateBuilder, it is possible to access the key. Imagine there is a key with field x and a
value with field y. Then you could do the following to retrieve all entries with key.x = 10 and value.y =
20:
In the previous section, the Criteria API was explained for cases where expression/predicate objects
are manually created. This process can be simplified a bit by making use of the PredicateBuilder, but it
still isn’t perfect. That is why Hazelcast added a DSL (Distributed SQL Query) based on an SQL-like
language and using the Criteria API underneath.
The getWithName function that we already implemented using the Criteria API can also be implemented
using the Distributed SQL Query:
As you can see, the SqlPredicate is a Predicate and therefore it can be combined with the Criteria API.
The language isn’t case sensitive, but "columns" used in the query are. Below, you can see an overview
of the DSL:
• logical operators
age <= 30
name ="Joe"
age != 30
• between
• like
• in
Access to keys: You can use __key attribute to perform a predicated search for entry keys.
Object traversal: With the SQL predicate, an object traversal can be done using field.otherfield. For
example:
husband.mother.father.name=John
In this example, the name of the father of the mother of the husband should be John.
No arg methods: No arg methods can be called within a SQL predicate. In some cases this is useful if
you dynamically need to calculate a value based on some properties. The syntax is the same as for
accessing a field.
5.14.4. MapReduce
MapReduce is a software framework for processing large amounts of data in a distributed way.
Therefore, the processing is normally spread over several machines. The basic idea behind MapReduce
is to map your source data into a collection of key-value pairs and reducing those pairs, grouped by
key, in a second step towards the final result.
The main idea can be summarized as first reading the source data, then mapping the data to one or
multiple key-value pairs, and finally reducing all pairs with the same key.
The best known examples for MapReduce algorithms are text processing tools, such as counting the
word frequency in large texts or websites. Apart from that, there are more interesting examples of use
cases such as log analysis, data querying, aggregation and summing, distributed sort, and fraud
detection.
• The Mapping phase, which is managed by a mapper that iterates all key-value pairs of any kind of
legal input source.
• The Combine phase, which is managed by a combiner that collects and combines multiple key-
value pairs with the same key to an intermediate result. This phase is optional but recommended to
lower the traffic.
• The Grouping/Shuffling phase, which groups the emitted key-value pairs having the same key
together and sends them to the same reducer. This is a virtual phase within Hazelcast.
• The Reducing phase, which is managed by a reducer that builds the final results by reducing the
intermediate key-value pairs by their keys.
Please have a look at the following simple example which sums the numbers from 1 to 10000:
@Override
public void map(Integer key, Integer value, Context<String, Integer> context) {
context.emit("all_values", value);
}
}
@Override
public Reducer<Integer, Integer> newReducer(String key) {
return new MyReducer();
}
}
@Override
public void reduce(Integer value) {
sum.addAndGet(value);
}
@Override
public Integer finalizeReduce() {
return sum.get();
}
}
}
3. We created a KeyValueSource to wrap the map entries into a well-defined key-value pair input
source.
4. We then created a new Job with the input source from KeyValueSource.
You can set up the behavior of the Hazelcast MapReduce framework by configuring the JobTracker. The
following is an example declarative configuration snippet:
<jobtracker name=“myJobTracker”>
<max-thread-size>0</max-thread-size>
<queue-size>0</queue-size>
<chunk-size>1000</chunk-size>
<communicate-stats>true</communicate-stats>
<topology-changed-strategy>CANCEL_RUNNING_OPERATION</topology-changed-strategy>
</jobtracker>
You can configure the maximum thread pool size (max-thread-size) and maximum number of tasks to
be processed (queue-size).
Also, you can set the number of emitted values before a chunk is sent to the reducers (chunk-size). If
your emitted values are big or you want to balance your work better, you change this value. A value of
0 means immediate transmission, but remember that low values mean higher traffic costs. A very high
value might cause an OutOfMemoryError to occur if the emitted values do not fit into heap memory
before being sent to the reducers. To prevent this, you might want to use a combiner to pre-reduce
values on mapping members.
The element communicate-stats specifies whether the statistics are transmitted to the job emitter. This
can show progress to a user inside of an UI system, but it produces additional traffic. If not needed, you
might want to deactivate this by setting it to false.
To specify how the MapReduce framework will react on topology changes while executing a job, you
can configure the element topology-changed-strategy. Currently, only CANCEL_RUNNING_OPERATION
is fully supported, which throws an exception to the job emitter.
5.14.5. Aggregators
This feature has been deprecated. Please use the Fast-Aggregations instead.
Aggregators are ready-to-use data aggregations that are based on the Hazelcast MapReduce
framework. They can be used for typical operations like summing up values, finding minimum or
maximum values, calculating averages, and other operations that you would expect in the relational
database world.
All aggregation operations can be achieved using pure MapReduce calls. Using aggregators is more
convenient for a big set of standard operations. Aggregations are available on IMap and MultiMap`
distributed data structures with the aggregate methods.
To make Aggregations more convenient to use and future proof, the API is heavily optimized for Java 8
and future versions. The API is still fully compatible with any Java version Hazelcast supports (Java 6
and Java 7). The biggest difference is how you work with the Java generics; on Java 6 and 7, the process
to resolve generics is not as strong as on Java 8 and upcoming Java versions. For illustration of the
differences in Java 6 and 7 in comparison to Java 8, we will have a quick look at a code snippet for
both. The following is a code snippet for Java 6 or 7.
Note that Java 8 resolves the generic parameters automatically and that is why the 3 lines in the
snippet for Java 6 or 7 become a single line for Java 8.
When using the Aggregations API, we will mainly be dealing with the supplier, property extractor and
aggregation operations.
Supplier
Supplier provides filtering and data extraction to the aggregation operations. For filtering data sets,
you have the following options:
Let’s use the KeyPredicate interface to filter people with the last name “Jones.”
class JonesKeyPredicate implements KeyPredicate<String> {
public boolean evaluate( String key ) {
return "Jones".equalsIgnoreCase( key );
}
}
Let’s use the Predicate interface to select values which can be divided by 4 without a reminder.
Property Extractor
class Person {
private String firstName;
private String lastName;
private int age;
Person’s age attribute is used to extract the value in the above snippet. Note that the value type
changes from Person to Integer, which is reflected in the generics information. PropertyExtractors can
be used for any kind of data transformation.
Aggregation Operations
• DistinctValues
• Count
Those aggregations are similar to their counterparts on relational databases and can be equated to SQL
statements. For example, let’s look at the average operation:
An Aggregation Example
In this example, we have an employee database stored in an IMap, a MultiMap to assign employees to
certain offices, and an IMap storing the salaries for each employee.
If we want to learn the total count of the employees worldwide, see the below code snippet:
5.14.6. Fast-Aggregations
Being the successor of the Hazelcast Aggregators, Fast-Aggregations are equivalent to the MapReduce
Aggregators in most of the use cases and they run on the Query infrastructure.
• accumulate(): Each aggregator accumulates all entries passed to it by the query engine. It
accumulates only those pieces of information that are required to calculate the aggregation result
in the last phase - that’s implementation specific.
• combine(): The results need to be combined after the accumulation phase in order to be able to
calculate the final result.
• aggregate(): Calculates the final result from the results accumulated and combined in the preceding
phases.
—---
package com.hazelcast.aggregation;
public abstract class Aggregator<I, R> implements Serializable {
[source,java]
—---
public class DoubleAverageAggregator<I> extends AbstractAggregator<I, Double> {
public DoubleAverageAggregator() {
super();
}
@Override
public void accumulate(I entry) {
count++;
Double extractedValue = (Double) extract(entry);
sum += extractedValue;
}
@Override
public void combine(Aggregator aggregator) {
DoubleAverageAggregator doubleAverageAggregator = (DoubleAverageAggregator)
aggregator;
this.sum += doubleAverageAggregator.sum;
this.count += doubleAverageAggregator.count;
}
@Override
public Double aggregate() {
if (count == 0) {
return null;
}
return (sum / (double) count);
}
5.14.7. Projections
Instead of sending all the data returned by a query, you may want to transform each result object in
order to avoid redundant network traffic. For example, you select all employees based on some
criteria, but you just want to return their name instead of the whole Employee object. It is easily doable
with the Projection API which is given below:
package com.hazelcast.projection;
import java.io.Serializable;
The method transform() is called on each result object. Its result is then gathered as the final query
result entity.
Let’s create a domain object (Employee) stored in an IMap and return just the names of the employees:
public Employee() {
}
5.15. Indexes
The Hazelcast map supports indexes to speed up queries, just like in databases. Using an index
prevents iterating over all values. In database terms, this is called a full table scan, but it directly jumps
to the interesting ones. There are two types of indexes:
1. Ordered. For example, a numeric field where you want to do range searches like "bigger than."
In the previous chapter, we talked about a Person that has a name, age, etc. To speed up searching on
these fields, we can place an unordered index on name and an ordered index on age:
<map name="persons">
<indexes>
<index ordered="false">name</index>
<index ordered="true">age</index>
</indexes>
</map>
To retrieve the index field of an object, first an accessor method will be tried. If that doesn’t exist, a
direct field access is done. With the index accessor method, you are not limited to returning a field; you
can also create a synthetic accessor method where a value is calculated on the fly. The index field also
supports object traversal, so you could create an index on the street of the address of a person using
address.street. There is no limitation on the depth of the traversal. Hazelcast doesn’t care about the
accessibility of the index field or accessor method, so you are not forced to make them public. An index
field or an object containing a field (for the ’x.y’ notation) is allowed to be null.
Starting with Hazelcast 3, indexes can be created on the fly. Management Center even offers the option
of creating an index on an existing IMap. This is a big change from Hazelcast 2.
The performance impact of using one or more indexes depends on several factors; among them are the
size of the map and the chance of finding the element with a full table scan. Other factors are adding
one or more indexes, which make mutations to the map more expensive since the index needs to be
updated as well. If you have more mutations than searches, the performance with an index could be
lower than without an index. To see which configuration is best for you, you should test in a
production-like environment using a representative size/quality of the dataset. In the source code of
the book, you can find very rudimentary index benchmarks—one for updating, and one for searching.
In Hazelcast versions prior to 3.0, indexing for String fields was done only for the first 4 characters.
With Hazelcast version 3.0+, indexing is done on the entire String.
In the previous example, the indexes are placed as attributes of basic data types like int and String.
However, the IMap allows indexes to be placed on an attribute of any type, as long as it implements
Comparable. So you can create indexes on custom data types.
5.16. Persistence
In the previous section, we talked about backups that protect against member failure and how, with
Hazelcast, if one member goes down, another member takes over. This backup process, however, does
not protect you against cluster failure such as a crash of a cluster that is hosted in a single datacenter.
To prevent loss of data in this type of situation, Hazelcast provides a solution for loading and storing
data externally, such as in a database. This can be done using:
1. com.hazelcast.core.MapLoader: Useful for reading entries from an external datasource, but changes
don’t need to be written back.
2. com.hazelcast.core.MapStore: Useful for reading and writing map entries from and to an external
datasource. The MapStore interface extends the MapLoader interface.
The following example shows an extremely basic HSQLDB implementation of the MapStore where we
load/store a simple Person object with a name field:
public PersonMapStore() {
try {
con = DriverManager.getConnection("jdbc:hsqldb:mydatabase", "SA", "");
con.createStatement().executeUpdate(
"create table if not exists person (id bigint, name varchar(45))");
} catch (SQLException e) {throw new RuntimeException(e);}
}
@Override
public synchronized void delete(Long key) {
try {
con.createStatement().executeUpdate(
format("delete from person where id = %s", key));
} catch (SQLException e) {throw new RuntimeException(e);}
}
@Override
public synchronized void store(Long key, Person value) {
try {
con.createStatement().executeUpdate(
format("insert into person values(%s,'%s')", key, value.name));
} catch (SQLException e) {throw new RuntimeException(e);}
}
@Override
public synchronized void storeAll(Map<Long, Person> map) {
for (Map.Entry<Long, Person> entry : map.entrySet())
store(entry.getKey(), entry.getValue());
}
@Override
public synchronized void deleteAll(Collection<Long> keys) {
for(Long key: keys) delete(key);
}
@Override
public synchronized Person load(Long key) {
try {
ResultSet resultSet = con.createStatement().executeQuery(
format("select name from person where id =%s", key));
try {
if (!resultSet.next()) return null;
String name = resultSet.getString(1);
return new Person(name);
} finally {resultSet.close();}
} catch (SQLException e) {throw new RuntimeException(e);}
}
@Override
public synchronized Map<Long, Person> loadAll(Collection<Long> keys) {
Map<Long, Person> result = new HashMap<Long, Person>();
for (Long key : keys) result.put(key, load(key));
return result;
}
Override
public Iterator<Long> loadAllKeys() {
return null;
}
}
The implementation is simple and certainly can be improved, such as with transactions, prevention
against SQL injection, etc. Since the MapStore/MapLoader can be called by threads concurrently, this
implementation uses synchronization to deal with concurrency. Currently it relies on a coarse-grained
lock, but you could perhaps apply finer grained locking based on the key and a striped lock.
To connect the PersonMapStore to the persons map, we can configure it using the map-store setting:
<map name="persons">
<map-store enabled="true">
<class-name>PersonMapStore</class-name>
</map-store>
</map>
In the following code fragment, you can see a member that writes a person to the map and then exits
the JVM. Then, you can see a member that loads the person and prints it.
With the WriteMember, the System.exit(0) is called at the end. This is done to release the HSQLDB so that
it can be opened by the ReadMember. Calling System.exit is a safe way for Hazelcast to leave the cluster
due to a shutdown hook, and it waits for all backup operations to complete.
A word of caution: the MapLoader/MapStore should NOT call operations on Map, Queue, MultiMap, List,
Set, etc. because of the potential for deadlock.
5.16.1. Pre-Populating the Map
With the MapLoader, you can pre-populate the Map so that when it is created, the important entries are
loaded in memory. You can do this by letting the loadAllKeys method return the set of all "hot" keys that
need to be loaded for the partitions owned by the member. This also makes parallel loading possible,
since each member can load its own keys. If the loadAll method returns null, as it does in the example,
then the map will not be pre-populated. Map is created lazily by Hazelcast, so the map is actually
created and the MapLoader called only when one of the members calls the
HazelcastInstance.getMap(name). If your application returns the map up front without needing the
content, you could wrap the map in a lazy proxy that calls the getMap method only when it is really
needed.
Prior to Hazelcast 3.5 the loadAllKeys method would execute on every member of the cluster, which
could potentially overload the back-end stores that were being called. Starting with Hazelcast 3.5
loadAllKeys is now run just once—the member to execute the method is selected by hashing the map
name and deriving a partition id. The member owning the partition id is the one that runs
loadAllKeys.
Additionally the return type of loadAllKeys has changed; where it previously returned a Set<K> it now
returns an Iterator<K>. The iterator streams results back to the members that own the keys calling
loadAll in batches. The batch size is by default set to 1000, but can be changed using the property
hazelcast.map.load.chunk.size
You need to be aware that the map only knows about map entries that are in the memory; when a get
is done for an explicit key, then the map entry is loaded from the MapStore. This behavior is called "read
through". So if the loadAll returns a subset of the keys in the database, then the Map.size() will show
only the size of this subset, not the record count in the database. The same goes for queries; these will
only be executed on the entries in memory, not on the records in the database.
To make sure that you only keep hot entries in the memory, you can configure the time-to-live-
seconds property on the map. When a map entry isn’t used and the time to live expires, it will
automatically be removed from the map without having to call MapStore.delete.
Although the MapStore makes durability possible, it also comes at a cost—every time a change is made
in the map, a write through to your persistence store happens. Write through operations increase
latency since databases cause latency (for example, disk access). In Hazelcast you can use a write
behind instead of a write through. When a change happens, the change is synchronously written to the
backup partition (if that is configured), but the change to the database is done asynchronously. You can
enable write behind by configuring the write-delay-seconds in the map-store configuration section.
write-delay-seconds defaults to 0, which means a write through. A value higher than 0 indicates a write
behind. Using write behind is not completely without danger-- a cluster could fail before the write to
the database has completed, and information would be lost.
5.16.3. MapLoaderLifecycleSupport
In some cases, your MapLoader needs to be notified of lifecycle events. You can do this by having your
MapLoader implement the com.hazelcast.core.MapLoaderLifecycleSupport interface.
• init: Useful if you want to initialize resources, such as opening database connections. One of the
parameters the init method receives is a Properties object. This is useful if you want to pass
properties from the outside to the MapLoader implementation. If you make use of the XML
configuration, you can specify the properties that need to be passed to the init method in the map-
store XML configuration.
• destroy: Useful if you need to cleanup resources, such as closing database connections.
Serialize before store: The value is serialized before the MapStore.store is called. If you are retrieving
the ID or you are using optimistic locking in the database by adding a version field, this can cause
problems because changes that are made on the entity are done after the value has been serialized. So
the existing byte array will contain the old ID/version no matter what the store method updated.
5.17. MultiMap
In some cases you need to store multiple values for a single key. You could use a normal collection as
value and store the real values in this collection. This will work fine if everything is done in the
memory, but in a distributed and concurrent environment it isn’t that easy. One problem with this
approach is that the whole collection needs to be deserialized for an operation such as add. Imagine a
collection of 100 elements; then 100 elements need to be deserialized when the value is read, and 101
items are serialized when the value is written, for a total of 201 elements. This can cause a lot of
overhead, CPU, memory, network usage, etc. Another problem is that without additional concurrency
control, such as using a lock or a replace call, you could run into a lost update which can lead to issues
like items not being deleted or getting lost. To solve these problems, Hazelcast provides a MultiMap
where multiple values can be stored under a single key.
The MultiMap doesn’t implement the java.util.Map interface since the signatures of the methods are
different. The MultiMap does have support for most of the IMap functionality (locking, listeners, etc.), but
it doesn’t support indexing, predicates, EntryProcessor and the MapLoader/MapStore.
To demonstrate MultiMap, we are going to create two members. The PutMember will put data into the
MultiMap:
public class PutMember {
map.put("a", "1");
map.put("a", "2");
map.put("b", "3");
System.out.println("PutMember:Done");
}
}
If we first run PutMember and then run PrintMember, then PrintMember will show:
b -> [3]
a -> [2, 1]
As you can see, there is a single value for key b and 2 values for key a.
The MultiMap is configured with the MultiMapConfig using the following configuration options.
• valueCollectionType: The collection type of the value. There are 2 options: SET and LIST. With a set,
duplicate and null values are not allowed and ordering is irrelevant. With the list, duplicates and
null values are allowed and ordering is relevant. Defaults to SET.
• binary: If the value is stored in binary format (true) or in object format (false). Defaults to true.
• backupCount: The number of synchronous backups. Defaults to 1.
Value collection not partitioned: The collection used as value is not partitioned and is stored on a single
machine, so the maximum size of the value depends on the capacity of a single machine. You need to
be careful how much data is stored in the value collection.
Get returns copy: map.get(key) returns a copy of the values at some moment in time. Changes to this
collection will result in an UnsupportedOperationException. If you want to change the values, you need
to do it through the MultiMap interface.
Removing items: You can remove items from the MultiMap. If the collection for a specific key is empty,
this collection will not automatically be removed, so you may need to clean up the MultiMap to prevent
memory leaks.
Collection copying: If a value for key K is stored on member1 because K is owned by member1, and
member2 does a map.get(K), then the whole collection will be transported from member1 to member2.
If that value collection is big, it could lead to performance problems. A solution would be to send the
operation to member1, i.e., to send the logic to the data instead of sending the data to the logic.
Map of maps: The MultiMap can’t be used as a map of maps where there are 2 keys to find the value. We
have some plans to add this in the near future, but if you can’t wait, you could either create a
composite key, or use dynamically created maps where the name of map is determined by the first key,
and the second key is the key in that map.
There may be some cases where you have an application which has mostly read operations and you do
not need to read the latest up-to-date data. To have fast access to those data, you can use Hazelcast’s
Replicated Map, which is a distributed key-value data structure where the data is copied to all
members of your cluster.
Since the data is available on all members, you can have a faster read and write access. Please note
that having the data on all members means a higher memory consumption.
Writes could take place on local/remote members in order to provide write-order, eventually being
replicated to all other members.
Replicated map is suitable for objects, catalogue data, or idempotent calculable data (like HTML pages).
Replicated map nearly fully implements the java.util.Map interface, but it lacks the methods from
java.util.concurrent.ConcurrentMap since there are no atomic guarantees to writes or reads.
Here is an example of replicated map code. The HazelcastInstance’s getReplicatedMap method gets the
replicated map, and the replicated map put creates map entries.
import com.hazelcast.core.Hazelcast;
import com.hazelcast.core.HazelcastInstance;
import java.util.Collection;
import java.util.Map;
You can declare your Replicated Map configuration in the Hazelcast configuration file hazelcast.xml.
See the following example declarative configuration.
<replicatedmap name="default">
<in-memory-format>BINARY</in-memory-format>
<async-fillup>true</async-fillup>
<statistics-enabled>true</statistics-enabled>
<entry-listeners>
<entry-listener include-value="true">
com.hazelcast.examples.EntryListener
</entry-listener>
</entry-listeners>
</replicatedmap>
• in-memory-format: Internal storage format. The default value is OBJECT and the data will be stored in
deserialized form. You can also use BINARY: the data is stored in serialized binary format and has to
be deserialized on every request.
• async-fillup: Specifies if the replicated map is available for reads before the initial replication is
completed. The default value is true. If set to false (i.e. synchronous initial fill up), no exception
will be thrown when the replicated map is not yet ready, but null values can be seen until the
initial replication is completed.
• statistics-enabled: If set to true, the statistics such as cache hits and misses are collected. The
default value is false.
◦ entry-listener#include-value: Specifies whether the event includes the value or not. Sometimes
the key is enough to react on an event. In those situations, setting this value to false will save a
deserialization cycle. The default value is true.
◦ entry-listener#local: Not used for Replicated Map since listeners are always local.
Snapshot: When Map.entrySet(), Map.keySet() or Map.values() is called, a snapshot of the current state
of the map is returned. Changes that are made in the map do not reflect on changes in these sets and
vice versa. Also, when changes are made on these collections, an UnsupportedOperationException is
thrown.
Serialization: Although the IMap looks like an in-memory data structure, like a HashMap, there are
differences. For example, (de)serialization needs to take place for a lot of operations. Also remoting
could be involved. This means that the IMap will not have the same performance characteristics as an
in-memory map. To minimize serialization cost, make sure you correctly configure the in-memory-
format.
Size: size() method is a distributed operation; a request is sent to each member to return the number
of map entries they contain. This means that abusing the size method could lead to performance
problems.
Memory Usage: A completely empty IMap instance consumes >200 KBs of memory in the cluster with a
default configured number of partitions, so having a lot of small maps could lead to unexpected
memory problems. If you double the number of partitions, the memory usage will roughly double as
well.
This library contains a lot of goodies; some parts you probably won’t use on a regular basis, other parts
you probably will. One of the added features is the java.util.concurrent.Executor. The idea is that you
wrap functionality in a Runnable if you don’t need to return a value, or in a Callable if you need to
return a value, and then it is submitted to the Executor. Here is a very basic example of the executor.
class EchoService{
private final ExecutorService =
Executors.newSingleThreadExecutor();
So while a worker thread is processing the task, the thread that submitted the task is free to work
asynchronously. There is virtually no limit in what you can do in a task; you can perform complex
database operations, perform intensive CPU or I/O operations, render images, etc.
However, the problem in a distributed system is that the default implementation of the Executor,
which is the ThreadPoolExecutor, is designed to run within a single JVM. In a distributed system, you
want a JVM to be able to process a task submitted in another JVM. Therefore, Hazelcast 3.x provides
the IExecutorService, which extends the java.util.concurrent.ExecutorService and is designed to be
used in a distributed environment.
Let’s start with a simple example of IExecutorService, where a task is executed that does some waiting
and echoes a message.
public class EchoTask implements Runnable, Serializable {
private final String msg;
@Override
public void run() {
try {
Thread.sleep(5000);
} catch (InterruptedException e) {
}
System.out.println("echo:" + msg);
}
}
This EchoTask implements the Runnable interface so that it can be submitted to the Executor. It also
implements the Serializable interface because it could be sent to a different JVM to be processed.
Instead of making the class Serializable, you could also rely on other serialization mechanisms; see
Serialization.
The next part is the MasterMember that is responsible for submitting (and executing) 1000 echo
messages:
First, we retrieve the executor from the HazelcastInstance. Then we slowly submit 1000 echo tasks. One
of the differences between Hazelcast 2.x and Hazelcast 3.x is that the
HazelcastInstance.getExecutorService() method has disappeared; you now always need to provide a
name instead of relying on the default one. By default, Hazelcast configures the executor with 8
threads in the pool. For our example we only need one, so we configure it in the hazelcast.xml file like
this:
<executor-service name="exec">
<pool-size>1</pool-size>
</executor-service>
Another difference from Hazelcast 2.x is that the core-pool-size and keep-alive-seconds properties
have disappeared, so the pool will have a fixed size.
When the MasterMember is started, you will get output like this:
The production of messages is 1 per second and the processing is 0.2 per second (the echo task sleeps 5
seconds). This means that we produce work 5 times faster than we are able to process it. Apart from
making the EchoTask faster, there are 2 dimensions for scaling:
1. Scale up
2. Scale out
6.1. Scaling Up
Scaling up, also called vertical scaling, is done by increasing the processing capacity on a single JVM.
Since each thread in the example can process 0.2 messages/second and we produce 1 message/second,
if the Executor has 5 threads it can process messages as fast as they are produced.
When you scale up, you need to look carefully at the JVM to see if it can handle the additional load. If
not, you may need to increase its resources (CPU, memory, disk, etc.). If you fail to do so, the
performance could degrade instead of improving.
Scaling up the ExecutorService in Hazelcast is simple—just increment the maximum pool size. Since we
know that having five threads is going to give maximum performance, let’s set them to five.
<executor-service name="exec">
<pool-size>5</pool-size>
</executor-service>
When we run the MasterNode we’ll see something like this:
As you can see, the tasks are being processed as quickly as they are being produced.
Scaling out, also called horizontal scaling, is orthogonal to scaling up. Instead of increasing the capacity
of the system by increasing the capacity of a single machine, we just add more machines. In our case,
we can safely start multiple Hazelcast members on the same machine since processing the task doesn’t
consume resources while the task waits. But in real systems, you probably want to add more machines
(physical or virtualized) to the cluster.
To scale up our echo example, we can add the following very basic slave member:
import com.hazelcast.core.*;
public class SlaveMember {
public static void main(String[] args) {
Hazelcast.newHazelcastInstance();
}
}
We don’t need to do anything else. This member will automatically participate in the executor that was
started in the master node and start processing tasks.
If one master and slave are started, you will see that the slave member is processing tasks as well:
echo:31
echo:33
echo:35
So with only a few lines of code, we are now able to scale out! If you want, you can start more slave
members, but with tasks being created at 1 task per second, maximum performance is reached with 4
slaves.
6.3. Routing
Until now, we didn’t care which member did the actual processing of the task, as long as a member
picks it up. But in some cases you want to have that control. For this purpose, the IExecutorService
provides different ways to route tasks.
2. A specific member.
In the previous section, we already covered the first way: routing to any member. In the following
sections, we’ll explain the last 3 routing strategies. This is where a big difference is visible between
Hazelcast 2.x and 3.x: while 2.x relied on the DistributedTask, 3.x relies on explicit routing methods on
the IExecutorService.
In some cases, you may want to execute a task on a specific member. As an example, we will send an
echo task to each member in the cluster. This is done by retrieving all members using the Cluster
object, iterating over the cluster members, and sending each an echo message containing its own
address.
Members [2] {
Member [192.168.1.100]:5702 this
Member [192.168.1.100]:5703
}
...
echo/192.168.1.100:5702
As you can see, the EchoTasks are executed on the correct member.
When an operation is executed in a distributed system, that operation often needs to access distributed
resources. If these resources are hosted on a different member than where the task is running,
scalability and performance may suffer due to remoting overhead. This problem can be solved by
improving locality of reference.
In Hazelcast this can be done by placing the resources for a task in a partition and sending the task to
the member that owns that partition. When you design a distributed system, perhaps the most
fundamental step is designing the partitioning scheme.
As an example, we will create a distributed system where there is dummy data in a map. For every key
in that map, we will execute a verify task. This task will verify if it has been executed on the same
member as the one on which the partition for that key resides.
public class VerifyTask implements
Runnable, Serializable, HazelcastInstanceAware {
private final String key;
private transient HazelcastInstance hz;
@Override
public void setHazelcastInstance(HazelcastInstance hz) {
this.hz = hz;
}
@Override
public void run() {
IMap map = hz.getMap("map");
boolean localKey = map.localKeySet().contains(key);
System.out.println("Key is local:" + localKey);
}
}
If you look at the run method, you can see that it accesses the map, retrieves all the keys that are owned
by this member using the IMap.localKeySet() method, checks if the key is contained in that key set and
prints the result. This task implements HazelcastInstanceAware, signaling to Hazelcast that when this
class is deserialized for execution, it will inject the HazelcastInstance executing that task. For more
information, see Serialization: HazelcastInstanceAware.
The next step is the MasterMember. First, it creates a map with some entries; we only care about the key,
so the value is bogus. Then, it iterates over the keys in the map and sends a VerifyTask for each key.
We are now relying on the executeOnKeyOwner to execute a task on the member owning a specific key. To
verify the routing, we first start a few slaves and then we start a master. We’ll see output like this:
key is local:true
key is local:true
...
The tasks are executed on the same member as where the data resides.
Starting with Hazelcast 2.x, an alternate way to execute a request on a specific member has been to let
the task implement the HazelcastPartitionAware interface and use the execute or submit method on the
IExecutorService. The HazelcastPartitionAware exposes the getPartitionKey method that the executor
uses to figure out the key of the partition to route to. If a null value is returned, any partition will do.
In some cases, you may want to execute a task on multiple members, or even on all members. Use this
functionality wisely, since it will create a load on multiple members, potentially all members, and
therefore it can reduce scalability.
The following example has a set of members. On these members, there is a distributed map containing
some entries. Each entry has a UUID as key and 1 as value. To demonstrate executing a task on all
members, we will create a distributed sum operation that sums all values in the map.
@Override
public void setHazelcastInstance(HazelcastInstance hz) {
this.hz = hz;
}
@Override
public Integer call() throws Exception {
IMap<String, Integer> map = hz.getMap("map");
int result = 0;
for (String key : map.localKeySet()) {
System.out.println("Calculating for key: " + key);
result += map.get(key);
}
System.out.println("Local Result: " + result);
return result;
}
}
When this SumTask is called, it retrieves the map and then iterates over all local keys, sums the values,
and returns the result.
The MasterMember will first create the map with some entries. Then it will submit the SumTask to each
member. The result will be a map of Future instances. And finally we’ll join all the futures, sum the
result, and print it:
When we start one slave and then a master member, we’ll see something like this for the slave:
In this example, we execute a task on all members. If you only want to execute a task on a subset of
members, you can call the submitToMembers method and pass the subset of members.
Not possible to send Runnable to every partition: There is no direct support to send a runnable to every
partition. If this is an issue, the SPI could be a solution since Operations can be routed to specific
partitions. You could build such an executor on top of the SPI.
6.3.4. Futures
The Executor interface only exposes a single void execute(Runnable) method that can be called to have
a Runnable asynchronously executed. However, in some cases you need to synchronize on results, such
as when you use a Callable or you just want to wait till a task completes. You can do this by using the
java.util.concurrent.Future in combination with one of the submit methods of the IExecutorService.
To demonstrate the Future, we will calculate a Fibonacci number by wrapping the calculation in a
callable and synchronizing on the result.
@Override
public Long call() {
return calculate(input);
}
The next step is to submit the task and use a Future to synchronize on results.
public class MasterMember {
public static void main(String[] args) throws Exception {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IExecutorService executor = hz.getExecutorService("exec");
int n = Integer.parseInt(args[0]);
Future<Long> future =
executor.submit(new FibonacciCallable(n));
try {
long result = future.get(10, TimeUnit.SECONDS);
System.out.println("Result: "+result);
} catch (TimeoutException ex) {
System.out.println("A timeout happened");
}
}
}
When we call the executorService.submit(Callable) method, we get back a Future as result. This Future
allows us to synchronize on completion or cancel the computation.
When we run this application with 5 as the argument, the output will be:
Result: 5
When you run this application with 500 as argument, it will probably take more than 10 seconds to
complete and therefore the future.get will timeout. When the timeout happens, a TimeoutException is
thrown. If it doesn’t timeout on your machine, it could be that your machine is very quick and you
need to use a smaller timeout. Unlike Hazelcast 2.x, in Hazelcast 3.0 it isn’t possible to cancel a future.
One possible solution is to let the task periodically check if a certain key in a distributed map exists. A
task can then be cancelled by writing some value for that key. You need to take care removing keys to
prevent this map from growing; you can do this by using the time to live setting.
In the Futures section, an example was shown where a Fibonacci number is calculated. Waiting for the
completion of that operation is done using a Future. In the following example, we calculate a Fibonacci
number, but instead of waiting for that task to complete, we register an ExecutionCallback where we
print the result asynchronously.
public class MasterMember {
public static void main(String[] args){
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
IExecutorService executor = hz.getExecutorService("exec");
ExecutionCallback<Long> callback =
new ExecutionCallback<Long>() {
public void onFailure(Throwable t) {
t.printStackTrace();}
public void onResponse(Long response) {
System.out.println("Result: " + response);}
};
executor.submit(new FibonacciCallable(10), callback);
System.out.println("Fibonacci task submitted");
}
}
The ExecutionCallback has 2 methods. One method is called on a valid response and prints it. The other
method is called on failure and it prints the stacktrace.
If you run this example you will see the following output:
The thread that submitted the tasks to be executed was not blocked. Eventually, the result of the
Fibonacci calculation will be printed.
Durable executor service’s motto is "execute at least once", and it is able to track the result of a
submitted task with a unique ID. To execute at least once, this data structure uses a built-in operation
retry mechanism, and for durability it stores the task and response data on the partitions with the help
of Hazelcast’s Ringbuffer structure.
6.5.2. Guaranteeing Task Execution
1. Send the task to the primary and backup Hazelcast members and execute it.
With the first invocation, a DurableRingbuffer stores the task both on the primary and backup
Hazelcast members, and returns the ID of task’s sequence in the Ringbuffer to the submitter. The task
is also executed on the local executionService for the primary partition only. Then, the second
invocation is triggered to retrieve the task result. This retrieval operation is a BlockingOperation and it
waits in the waiting operations queue until the task result is available (the result is retrieved
immediately it is already available). Once the task is replaced by its result in the Ringbuffer, it means
the result is now available and the waiting operations queue is notified.
This two-invocations approach is to guarantee the task execution before the future is returned to the
task submitter. Please note that after the first invocation, the task becomes resilient to member failures
and the submitter can track the task with its ID.
When your submitter member or client restarts, you can track the submitted tasks with the task ID you
persisted (using the method retrieveResult). If the task result is still available in the Ringbuffer you
will immediately get that result. Otherwise, the exception StaleTaskId is thrown.
This Ringbuffer developed by Hazelcast stores the submitted tasks and task results. It is created per
partition for each executor. You can configure its capacity as explained in the following section. When
you reach its capacity, task execution is rejected. When a task execution is finished and its result is put
to the Ringbuffer, it means there is a slot available for a new task. Note that, only the partition thread
can access this Ringbuffer. Therefore, the implementation does not need to give any thread safety
guarantees.
In addition to the methods of Vanilla Scheduling API, the scheduled executor service offers the
following methods:
The other difference is this service does not offer an equivalent of the method
java.util.concurrent.ScheduledExecutorService#scheduleWithFixedDelay(Runnable, long, long,
TimeUnit).
package com.hazelcast.scheduledexecutor;
import com.hazelcast.core.DistributedObject;
import com.hazelcast.core.Member;
import com.hazelcast.spi.annotation.Beta;
import java.util.Collection;
import java.util.List;
import java.util.Map;
import java.util.concurrent.Callable;
import java.util.concurrent.RejectedExecutionException;
import java.util.concurrent.ScheduledExecutorService;
import java.util.concurrent.TimeUnit;
@Beta
public interface IScheduledExecutorService extends DistributedObject {
IScheduledFuture<?> schedule(Runnable command, long delay, TimeUnit unit);
<V> IScheduledFuture<V> schedule(Callable<V> command, long delay, TimeUnit unit);
IScheduledFuture<?> scheduleAtFixedRate(Runnable command, long initialDelay,
long period, TimeUnit unit);
IScheduledFuture<?> scheduleOnMember(Runnable command, Member member, long delay,
TimeUnit unit);
<V> IScheduledFuture<V> scheduleOnMember(Callable<V> command, Member member, long
delay, TimeUnit unit);
IScheduledFuture<?> scheduleOnMemberAtFixedRate(Runnable command, Member member,
long initialDelay, long period,
TimeUnit unit);
IScheduledFuture<?> scheduleOnMember(Runnable command, Object key, long delay,
TimeUnit unit);
<V> IScheduledFuture<V> scheduleOnKeyOwner(Callable<V> command, Object key, long
delay, TimeUnit unit);
IScheduledFuture<?> scheduleOnKeyOwnerAtFixedRate(Runnable command, Object key, long
initialDelay,
long period, TimeUnit unit);
Map<Member, IScheduledFuture<?>> scheduleOnAllMembers(Runnable command, long delay,
TimeUnit unit);
<V> Map<Member, IScheduledFuture<V>> scheduleOnAllMembers(Callable<V> command, long
delay, TimeUnit unit);
Map<Member, IScheduledFuture<?>> scheduleOnAllMembersAtFixedRate(Runnable command,
long initialDelay,
long period,
TimeUnit unit);
Map<Member, IScheduledFuture<?>> scheduleOnMembers(Runnable command, Collection
<Member> members,
long delay, TimeUnit unit);
<V> Map<Member, IScheduledFuture<V>> scheduleOnMembers(Callable<V> command,
Collection<Member> members,
long delay, TimeUnit unit);
Map<Member, IScheduledFuture<?>> scheduleOnMembersAtFixedRate(Runnable command,
Collection<Member> members,
long initialDelay, long
period, TimeUnit unit);
<V> IScheduledFuture<V> getScheduledFuture(ScheduledTaskHandler handler);
<V> Map<Member, List<IScheduledFuture<V>>> getAllScheduledFutures();
void shutdown();
To configure scheduled executor service, you can use the configuration element <scheduled-executor-
service>. Please see the below snippet:
—---
<scheduled-executor-service name="myScheduledExecSvc">
<pool-size>8</pool-size>
<durability>1</durability>
</scheduled-executor-service>
—---
The element <pool-size> is the number of executor threads per member for the executor. And,
<durability> is the durability of the executor.
1. Upon partition specific scheduling, the future task is stored both in the primary partition and also
in its N backups, N being the <durability> element in the configuration. More specifically, there are
always one or more backups to take ownership of the task in the event of a lost member. If a
member is lost, the task will be re-scheduled on the backup (new primary) member, which might
induce further delays on the subsequent executions of the task.
2. Upon member specific scheduling, the future task is only stored in the member itself, which means
that in the event of a lost member, the task will be lost as well.
The following is an example callable that computes the cluster size in 10 seconds from now:
static class DelayedClusterSizeTask implements Callable<Integer>, HazelcastInstanceAware,
Serializable {
@Override
public Integer call()
throws Exception {
return instance.getCluster().getMembers().size();
}
@Override
public void setHazelcastInstance(HazelcastInstance hazelcastInstance) {
this.instance = hazelcastInstance;
}
}
Work-queue is not partitioned: Each member specific executor will have its own private work
queue. Once an item is placed on that queue, it will not be taken by a different member. So it
could be that one member has a lot of unprocessed work, and another is idle.
Work-queue by default has unbound capacity: This can lead to OutOfMemoryErrors because the
number of queued tasks can grow without being limited. You can solve this by setting the <queue-
capacity> property on the executor service. If a new task is submitted while the queue is full, the
call will not block, but it immediately throws a RejectedExecutionException that needs to be dealt
with. Perhaps in the future, blocking with configurable timeout will be made available.
No Load Balancing: This is currently available for tasks that can run on any member. In the
future, there will probably be a customizable load balancer interface where load balancing could
be done on the number of unprocessed tasks, CPU load, memory load, etc. If load balancing is
needed, you can create an IExecutorService proxy that wraps the one returned by Hazelcast.
Using the members from the ClusterService or member information from
SPI:MembershipAwareService, it could route free tasks to a specific member based on load.
Destroying Executors: You need to be careful when shutting down an IExecutorService because it
will shutdown all corresponding executors in every member, and therefore subsequent calls to
proxy will result in a RejectedExecutionException. When the executor is destroyed and later a
HazelcastInstance.getExecutorService is done with the ID of the destroyed executor, then a new
executor will be created as if the old one never existed.
Executors doesn’t log exceptions: When a task fails with an exception or an error, this exception
will not be logged by Hazelcast. This is in line with the ThreadPoolExecutorService from Java, but
it can be annoying when you are spending a lot of time trying to find out why something doesn’t
work. This can easily be fixed. You can add a try/catch in your runnable and log the exception.
You can also wrap the runnable/callable in a proxy that does the logging; the last option will keep
your code a bit cleaner.
HazelcastInstanceAware: When a task is deserialized, in a lot of cases you need to access the
HazelcastInstance. This can be done by letting the task implement HazelcastInstanceAware. For
more information, see Serialization: HazelcastInstanceAware.
7.1. ITopic
Hazelcast provides a publish/subscribe mechanism: com.hazelcast.core.ITopic is a distributed solution
for publishing messages to multiple subscribers. Any number of members can publish messages to a
topic, and any number of members can receive messages for the topics they have subscribed to. The
message can be an ordinary POJO, although it must be able to serialize (see Serialization) since it needs
to go over the wire.
We’ll show you how the distributed topic works based on a simple example where a single topic is
shared between a publisher and a subscriber. The publisher publishes the current date on the topic.
The subscriber acquires the same topic and adds a MessageListener to subscribe itself to the topic.
public class SubscribedMember {
@Override
public void onMessage(Message<Date> m) {
System.out.println("Received: "+m.getMessageObject());
}
}
}
When we start up the subscriber, we’ll see "Subscribed" in the console. Then we start the publisher,
and after it publishes the message "Published", the subscriber will output something like:
To make it more interesting, you can start multiple subscribers. If you run the publisher again, all
subscribers will receive the same published message.
In the SubscribedMember example, we dynamically subscribe to a topic. If you prefer a more static
approach, you can also subscribe to a topic through the configuration file.
<topic name="topic">
<message-listeners>
<message-listener>MessageListenerImpl</message-listener>
</message-listeners>
</topic>
Hazelcast uses reflection to create an instance of the MessageListenerImpl. For this to work, this class
needs to have a no-arg constructor. If you need more flexibility creating a MessageListener
implementation, you could have a look at the programmatic configuration where you can pass an
explicit instance instead of a class.
Config config = new Config();
TopicConfig topicConfig = new TopicConfig();
topicConfig.setName("topic");
MessageListener listener = new YourMessageListener(arg1,arg2,...);
topicConfig.addMessageListenerConfig(new ListenerConfig(listener));
config.addTopicConfig(topicConfig);
Hazelcast provides certain ordering guarantees on the delivery of messages. If a cluster member
publishes a sequence of messages, Hazelcast guarantees that each MessageListener will receive these
messages in the order they were published by that member. If messages m1, m2, m3 are published (in
this order) by member M, then each listener will receive the messages in the same order: m1, m2, m3.
Even though messages will be received in the same order by default, nothing can be done about the
ordering of messages sent by different members. Imagine that member M sends m1, m2, m3 and
member N sends n1, n2, n3. Then listener1 could receive m1, m2, m3, n1, n2, n3, but listener2 could
receive n1, m1, n2, m2, n3, m3. This is valid because, in both cases, the ordering of messages send by M
or N is not violated.
But in some cases, you want all listeners to receive the messages in exactly the same order. If listener1
receives m1, m2, m3, n1, n2, and n3 in that order, then you want listener2 to receive the messages in
exactly the same order. To realize this ordering guarantee, Hazelcast provides a global-order-enabled
setting. Be careful—it will have a considerable impact on throughput and latency.
The global-order-enabled setting doesn’t do anything about synchronization between listener1 and
listener2. So it could be that listener1 already is processing n3 (the last message in the sequence) but
listener is still busy processing m1 (the first message in the sequence).
• Also, there could be instances of unprocessed events due to slow listeners, and this may affect
other Topics as they share the same queue to publish and deliver messages.
• There could also be scenarios where a message could be lost, such as:
◦ to prevent the system from going OOM, the event queue is normally restricted with
capacity (default is 1,000,000). So, if the queue is full and a message arrives, the event gets
dropped.
◦ if a member receives a message and the member crashes, the message is lost.
◦ if a member sends a message on a topic but the message is still on the transmission queue
of the connection and the member crashes, the message is lost even though the
topic.publish completed long time ago.
To address these very precise corner cases and add to the richness of ITopic, Hazelcast has introduced
a new structure ReliableTopic. It can be initialised as:
ReliableTopic is built using RingBuffer, the latest addition in the collection of Hazelcast’s distributed
data structures. Each instance of ReliableTopic has its own RingBuffer to store messages. ReliableTopic
requires same process to add subscribers as in normal ITopic (see above for more details), i.e., by
implementing and adding the interface MessageListener. Some of the immediate benefits that
ReliableTopic provides are listed below.
• Since each ReliableTopic instance has its own RingBuffer, there is no sharing of resources. For
example, messages are processed directly from Topic’s RingBuffer without being placed on the
shared queue.
• ReliableTopic can also be configured to use dedicated executor pool to process messages in its
RingBuffer. This translates into complete isolation and zero resource sharing.
• Each RingBuffer is replicated on one of the other nodes in the cluster, which further means that all
the messages have backup. Therefore, in case of a node failure, messages are not lost.
• Each RingBuffer can have variable capacity, which allows you to restrict the number of messages
that can be published on a Topic.
• For slow subscribers, ReliableTopic does not allow other components of the cluster to slow down.
In default situations, a slow listener will fall behind and may not receive the message it subscribed
for. Check out ReliableMessageListener to learn how to obtain more control over the functioning of
ReliableTopic with slow listeners.
• While RingBuffer provides high performance reads, it also gives the reader the ability to reread a
message multiple times in case of an error. Hazelcast also performs appropriate responsive
operations in various events such as capacity breach, etc. See TopicOverloadPolicy for more details.
Messages are always ordered in ReliableTopic, i.e., they are always received in the same order as they
were published. The property global-order-enabled does not have any significance when used with
ReliableTopic and is ignored.
This means that by default, all messages sent by member X and topic T will always be executed by the
same thread. There are some limitations caused by this approach. The most important is that if
processing messages takes a lot of time, the thread will not be able to process other events, and that
could become problematic. Another problem is that because the ITopic relies on the event system,
other Topics could be starved from threads.
You can deal with this by increasing the number of threads running in the striped executor of the
event system. Use the property hazelcast.event.thread.count, which defaults to 5 threads.
You can also deal with this by offloading the message processing to another thread. You can implement
this with the StripedExecutor.
public class SubscribedMember {
@Override
public void onMessage(final Message<Date> m) {
StripedRunnable task = new StripedRunnable() {
@Override
public int getKey() {
return topicName.hashCode();
}
@Override
public void run() {
System.out.println("Received: " +
m.getMessageObject());
}
};
executor.execute(task);
}
}
}
In this example, the work is offloaded to the striped executor with the StripedRunnable, where the
thread that executes the message is determined based on the topic name. In this example, the capacity
work queue of the executor is unbound, which could lead to OOME problems. In most cases it is better
to give the work queue a maximum capacity so that a call can either fail directly or wait until space
becomes available (see the TimedRunnable to control the timeout). Be careful about blocking for too
long because the onMessage is called by a Thread of the event system, and hogging this thread could
lead to problems in the system.
In this case there is only a single topic and we have a single executor, but you could decide to create an
executor per ITopic. If you don’t care about ordering of the messages, you could use an ordinary
executor instead of a striped executor.
Threading model: The ITopic is built on top of the event system. For more information regarding
the threading model of the ITopic, see Threading Model.
Not transactional: The ITopic is not transactional, so be careful when it is used inside a
transaction. If the transaction fails after a message is sent or consumed and the transaction is
rolled back, the message sending or consumption will not be rolled back.
No garbage collection: There is no garbage collection for the topics. As long as the topics are not
destroyed, they will be managed by Hazelcast. This can lead to memory issues since the topics
are stored in memory.
There are a few ways to deal with this issue. One way is to create a garbage collection
mechanism for the ITopic. Create a topic statistics IMap with the topic name as key, a pair
containing the last processed message count, and timestamp as value. When a topic is retrieved
from the HazelcastInstance, place an entry in the topic statistics map if it is missing. Periodically
iterate over all topics from the topics statistics map, such as using the IMap.localKeySet()
method. Then retrieve the local statistics from the ITopic using the ITopic.getLocalTopicStats()
method and check if the number of processed messages has changed, using the information from
the topic statistics map. If there is a difference, update the topic statics in the map; the new
timestamp can be determined using the Cluster.getClusterTime() method. If there is no change,
and the time period between the current timestamp and the last timestamp exceeds a certain
threshold, the topic and the entry in the topic statistics map can be destroyed. This solution isn’t
perfect, since it could happen that a message is sent to a topic that has been destroyed; the topic
will be recreated, but the subscribers are gone.
No durable subscriptions: If a subscriber goes offline, it will not receive messages that were sent
while it was offline.
No metadata: The message is an ordinary POJO and therefore it doesn’t contain any metadata
(like a timestamp or an address) to reply to. Luckily, this can be solved by wrapping the message
in an envelope - a new POJO - and setting the metadata on that envelope.
No queue per topic: Hazelcast doesn’t publish the messages on a topic-specific queue. Instead, it
makes a single stripe of queues—the event queue. By default, the size of the queue is limited to
1,000,000, but you can change that with the hazelcast.event.queue.capacity property.
When the capacity of the queue is reached, the calling thread will block until either there is
capacity on the queue or a timeout happens. When the timeout happens, Hazelcast logs a
warning that includes the topic name and the sender of the message. However, the producer of
this message remains agnostic about what happened.
If the event queue is full, Hazelcast will block for a short period. The default is 250 ms, but you
can change that using the hazelcast.event.queue.timeout.millis property. Be careful making the
timeout; you don’t own the blocked thread, and that could be an internal Hazelcast thread, such
one that deals with I/O. If a thread blocks for a long period, it could lead to problems in other
parts of the system.
Statistics: If you are interested in obtaining ITopic statistics, you can enable statistics using the
statistics-enabled property.
<topic name="topic">
<statistics-enabled>true</statistics-enabled>
</topic>
The statistics, like total messages published/received, can only be accessed from cluster members
using topic.getLocalTopicStats. Topic statistics can’t be retrieved by the client, because only a
member has knowledge about what happened to its topic. If you need to have global statistics,
you need to aggregate the statistics of all members.
8.1. Overview
Hazelcast Jet, built on top of the Hazelcast IMDG, is a distributed processing engine for fast stream and
batch processing of large data sets. It reuses the features and services of Hazelcast IMDG, but it is a
separate product with features not available in IMDG.
With Hazelcast IMDG providing storage functionality, Jet performs parallel execution in a Hazelcast Jet
cluster, composed of Jet instances, to enable data-intensive applications to operate in near real-time.
Jet uses green threads (threads that are scheduled by a runtime library or VM) to achieve this parallel
execution.
Since Jet uses Hazelcast IMDG’s discovery mechanisms, it can be used both on-premises and on the
cloud environments. Hazelcast Jet typically runs on several machines that form a cluster.
In addition to the Pipeline API, Jet also offers a distributed implementation of java.util.stream. You
can express your computation over any data source Jet supports using the familiar API from the JDK 8.
This distributed implementation can be used for simple transform and reduce operations on top of
IMap and IList.
There is also Jet’s Core API for advanced users to build custom data sources and sinks, to have a low-
level control over the data flow, to fine-tune performance and build DSLs.
Please see
http://docs.hazelcast.org/docs/jet/0.5/manual/Work_with_Jet/Start_Jet_and_Submit_Jobs_to_It.html in the
Hazelcast Jet Reference Manual to see a simple example.
• Streaming analytics
• Online trading
The aforementioned use cases require huge amounts of data to be processed in near real-time.
Hazelcast Jet achieves this by processing the incoming records as soon as possible, hence lowering the
latency, and ingesting the data at high-velocity. Jet’s execution model and keeping both the
computation and data storage in memory enables high application speeds.
Batch data is considered as bounded, i.e., finite, and fast batch processing typically may refer to
running a job on a data set which is available in a data center. You simply provide one or more pre-
existing datasets and order Hazelcast Jet to mine them for the information you need.
Stream data is considered as unbounded, i.e., infinite, and infinite stream processing deals with in-
flight data before it is stored. It offers lower latency; data is processed on-the-fly and you do not have
to wait for the whole data set to arrive in order to run a computation.
A Jet job is implemented as a Hazelcast IMDG proxy, similar to the other services and data structures in
Hazelcast. Hazelcast operations are used for different actions that can be performed on a job. Jet can
also be used with the Hazelcast Client, which uses the Hazelcast Open Binary Protocol to communicate
different actions to the server instance.
In the Hazelcast Jet world, Hazelcast IMDG can be used for data ingestion prior to processing,
connecting multiple Jet jobs, enriching processed events, caching the remote data, distributing Jet-
processed data, and running advanced data processing tasks on top of IMDG data structures.
Hazelcast Jet can use Hazelcast IMDG’s IMap, ICache and IList on the embedded cluster as sources
(data structures from which Jet reads data) and sinks (data structures to which Jet writes data). IMap
and ICache are partitioned data structures distributed across the cluster and Jet members can read
from these structures by having each member read just its local partitions. Hazelcast IMDG’s IList is
stored on a single partition; all the data will be read on the single member that owns that partition.
Please refer to IMap and ICache and IList in the Hazelcast Jet Reference Manual to learn how Jet uses
these IMDG data structures. In addition to these data structures, Jet can also process a stream of
changes of IMap and ICache, using the Event Journal.
You can use Hazelcast Jet with embedded Hazelcast IMDG or a remote Hazelcast IMDG cluster. Benefits
of using Hazelcast Jet with embedded Hazelcast IMDG are as follows:
• Enriching processed events; cache remote data, e.g., fact tables from a database, on Jet members.
• Improving development processes by making start up of a Jet cluster simple and fast.
Jet Jobs use Hazelcast IMDG connector by allowing reading and writing records to/from a remote
Hazelcast IMDG instance. You can use a remote Hazelcast IMDG cluster for the following cases:
• Isolating the processing cluster (Jet) from operational data storage cluster (IMDG).
Fast-Aggregations are a good fit for simple operations (count, distinct, sum, avg, min, max, etc.).
However, they may not be sufficient for operations that group data by key and produce the results of
size O(keyCount). The architecture of Hazelcast aggregations is not well suited to this use case,
although it will still work even for moderately sized results (up to 100 MB, as a ballpark figure).
Hazelcast Jet can be the preferred choice for larger sized results and whenever something more than a
single aggregation step is needed.
Another Hazelcast IMDG computing feature is Entry Processors. They are used for fast mutating
operations in an atomic way, in which the map entry is mutated by executing logic directly on the JVM
where the data resides. And this means the network hops are reduced and atomicity is provided in a
single step. Keeping this in mind, you can use Hazelcast IMDG Entry Processors when they perform
bulk mutations of an IMap, where the processing function is fast and involves a single map entry per
call. On the other hand, you can prefer to use Hazelcast Jet when the processing involves multiple
entries (aggregations, joins, etc.), or involves multiple computing steps to be made parallel, or when the
data source and sink are not a single IMap instance.
Currently the event journal does not expose a public API for reading the event
journal in Hazelcast IMDG. The event journal can be used to stream event data to
Hazelcast Jet, so it should be used in conjunction with Hazelcast Jet. Because of this
we will describe how to configure it but not how to use it from IMDG. If you enable
and configure the event journal, you may only reach it through private API and you
will most probably not get any benefits but the journal will retain events
nevertheless and consume heap space.
The event journal has a fixed capacity and an expiration time. Internally it is structured as a ringbuffer
(partitioned by ringbuffer item) and shares many similarities with it.
By default, an event journal is configured with a capacity of 10000 items. This creates a single array
per partition, roughly the size of the capacity divided by the number of partitions. Thus, if the
configured capacity is 10000 and the number of partitions is 271, we will create 271 arrays of size 36
(10000/271). If a time-to-live is configured, then an array of longs is also created that stores the
expiration time for every item. A single array of the event journal keeps events that are only related to
the map entries in that partition. In a lot of cases you may want to change this capacity number to
something that better fits your needs. As the capacity is shared between partitions, keep in mind not to
set it to a value which is too low for you. Setting the capacity to a number lower than the partition
count will result in an error when initializing the event journal.
Below is a programmatic configuration example of an event journal with a capacity of 5000 items for a
map, and 10000 items for a cache:
EventJournalConfig myMapJournalConfig = new EventJournalConfig()
.setMapName("myMap")
.setEnabled(true)
.setCapacity(5000)
.setTimeToLiveSeconds(20);
The mapName and cacheName attributes define the map or cache to which this event journal configuration
applies. You can use pattern-matching and the default keyword when doing so. For instance, by using a
mapName of journaled*, the journal configuration will apply to all maps whose names start with
"journaled" and don’t have other journal configurations that match (e.g., if you would have a more
specific journal configuration with an exact name match). If you specify the mapName or cacheName as
default, the journal configuration will apply to all maps and caches that don’t have any other journal
configuration. This means that potentially all maps and/or caches will have one single event journal
configuration.
Chapter 9. Hazelcast Clients
So far in this book, the examples showed members that were full participants in the cluster. Those
members will know about others and they will host partitions. In some cases, however, you only want
to connect to the cluster to read/write data from the cluster or execute operations; you don’t want to
participate as a full member in the cluster. In other words, you want to have a client.
A client allows you to connect to the cluster and not have any of the responsibilities a normal cluster
member has. When a Hazelcast operation is performed by a client, the operation is forwarded to a
cluster member where it will be processed. A client needs both the Hazelcast core JAR and the
Hazelcast client JAR on the classpath.
We will implement an example client where a message is put on a queue by a client and taken from the
queue by a full member. Let’s start with the full member.
To see how the client is running, first start the full member and wait till it is up. Then start the client.
You will see that the server prints Hello. If you look in the log for the full member, you will see that the
client never pops up as a member of the cluster.
In this example, we use programmatic configuration for the ClientConfig. You can also configure a
ClientConfig using the configuration file by:
The advantage of configuring the Hazelcast client using a configuration file is that you can easily pull
the client configuration out of the code, which makes the client more flexible. For example, you could
use a different configuration file for every environment you are working in (dev, staging, production).
In some cases, the static nature of the configuration files can be limiting if you need to have dynamic
information, such as the addresses. For that, you can first load the ClientConfig using a configuration
file, and then adjust the dynamic fields.
HazelcastInstance hz = HazelcastClient.newHazelcastClient()
Hazelcast will use the following sequence of steps to determine the client configuration file to use.
1. Check if there is a system property hazelcast.client.config. If it exists, it is used. This means that
you can set the configuration from the command line using
-Dhazelcast.client.config=/foo/bar/client.xml. You can also refer to a classpath resource using
-Dhazelcast.client.config=classpath:client.xml. This makes it possible to bundle multiple
configurations in your JAR and select one on startup.
If you don’t configure anything, the client will use the default configuration.
With off-heap capabilities, Hazelcast is now seen as a primary player in the vertical of Cache-As-
A-Service use cases in a multi-tenant application. Normally in such use cases, many clients
communicate with a central repository of servers holding tons of data in memory and consume
cache as a service from this cluster. This sometimes causes complexities when keeping both
client and servers on the same version was mandatory. For instance, upgrades require
downtimes and additional maintenance costs. In some cases it is just not possible to upgrade all
instances/groups of application clients together.
Starting with Hazelcast 3.5, a new Java native client library hazelcast-client-new-xxx.jar will be
available in the release package. This library uses Hazelcast’s new client protocol, which
provides client and server version independent compliance. With the new protocol, Hazelcast
will allow any client to work with any version of server with 3.5 and above. It will also allow
backward compatibility, any client of version 3.x (where x > 5) will be able to connect with
servers on lower version up to 3.5.
With the new client protocol, Hazelcast provides greater flexibility to maintain a cluster of client
and server nodes of different versions and allows maximum robustness.
• A client contains a thread pool that is used for internal administration like heartbeat checking,
scheduling of refreshing partitions, firing events when members are added and removed, etc.
• A client has a single connection to the cluster for communication, just like cluster members have
among each other. This connection is an expensive resource and it is best to reuse it.
In most cases, it is best to create the client in the beginning and keep reusing it throughout the lifecycle
of the client application.
• addressList: Known addresses of the cluster. It does not need to include all addresses, only enough
to make sure that at least one will be online. See Failover.
• connectionAttemptLimit: Maximum number of times to try using the addresses to connect to the
cluster. Defaults to 2. When a client starts or a client loses the connection with the cluster, it will try
to make a connection with one of the cluster member addresses. In some cases, a client cannot
connect to these addresses. For example, the cluster is not yet up or it is not reachable. Instead of
giving up, one can increase the attempt limit to create a connection. Also have a look at the
connectionAttemptPeriod.
• listeners: Enables listening to the cluster state. Currently only the LifecycleListener is supported.
• smart: If true, the client will route the key based operations to the owner of the key at the best
effort. Note that regardless of the usage of smart routing, an operation is always executed on the
owner. The cached table is updated every second. Defaults to true.
• redoOperation: If true, the client will redo the operations that were executing on the server when
the client lost the connection. The disconnect could have occurred because of the network, or
simply because the member died. In any case, it would not be clear whether the application was
performed or not. For idempotent operations this is harmless, but for non-idempotent operations,
retrying can cause undesirable effects. Note that the redo can perform on any member. If false, the
operation will throw the RuntimeException that is wrapping IOException. Defaults to false.
• socketOptions: Configures the network socket options with the methods setKeepAlive(x),
setTcpNoDelay(x), setReuseAddress(x), setLingerSeconds(x), and setBufferSize(x).
• serializationConfig: Configures how to serialize and deserialize on the client side. For all classes
that are deserialized to the client, the same serialization needs to be configured as was configured
for the cluster. For more information see Serialization.
• socketInterceptor: Allows you to intercept socket connections before a node joins the cluster or a
client connects to a node. This provides the ability to add custom hooks to join and perform
connection procedures.
• classLoader: In Java, you can configure a custom classLoader. It will be used by the serialization
service and to load any class configured in configuration, such as event listeners or ProxyFactories.
9.3. LoadBalancing
When a client connects to the cluster, it will have access to the full list of members and it will be kept in
sync, even if the ClientConfig only has a subset of members. If an operation needs to be sent to a
specific member, it will be sent directly to that member. If an operation can be executed on any
member, Hazelcast does automatic load balancing over all members in the cluster.
One of the new features in Hazelcast 3.0 is the routing mechanism being pulled into an interface:
This means that if you have specific routing requirements (such as load balance on CPU load, memory
load, or queue sizes), you can meet these requirements by creating a custom LoadBalancer
implementation. In future releases of Hazelcast, some of these implementations might be provided out
of the box. If you implement a custom LoadBalancer, you can listen to member changes using the
following example.
The MembershipListener functionality makes it easy to create a deterministic LoadBalancer for the
following reasons.
• The MembershipListener init method will be called with a set of all current members.
• No events will be lost between calling init and calling memberAdded or memberRemoved.
• The memberAdded and memberRemoved methods will be called in the order that the events happened
within the cluster. There is a total ordering of membership events since they will be coordinated
from the master node.
LoadBalancer instances should not be shared between clients; every client should get its own instance.
The load balancer can be configured from the ClientConfig.
9.4. Failover
In a production environment, the client should support failover to increase high availability. This is
realized in two parts:
Configuring multiple member addresses in the ClientConfig. As long as one of these members is online,
the client will be able to connect to the cluster and will know about all members in the cluster.
The responsibility of the LoadBalancer implementation. It can register itself as a MembershipListener and
receive a list of all members in the cluster, and it will be notified if members are added or removed.
The LoadBalancer can use this update list of member addresses for routing.
9.5. Client Connection Strategy
Your client’s starting mode can be configured as async or sync. When it is set to async, Hazelcast will
create the client without waiting a connection to the cluster. In this case, the client instance throws an
exception until it connects to the cluster. If it is sync, the client will not be created until the cluster is
ready to use clients and a connection with the cluster is established. The default sync start.
You can also configure how the client will reconnect to the cluster after a disconnection, using the
method setReconnectMode: (i) disabling the reconnection (OFF), (ii) enabling the reconnection in a
blocking manner where all the waiting invocations will be blocked until a cluster connection is
established or failed (ON), and (iii) enabling reconnection in a non-blocking manner where all the
waiting invocations will receive a HazelcastClientOfflineException (ASYNC). The default is ON.
<hazelcast-client>
...
<client-connection-strategy async-start="true" reconnect-mode="ASYNC" />
...
</hazelcast-client>
The group name defaults to dev. For more information, see Network Configuration: Cluster Groups.
One word of advice: watch out when sharing domain objects between client and server, as this can
cause a tight coupling since the client starts to see the internals of your domain objects. A
recommended practice is to introduce Data Transfer Objects (DTOs), special objects that are optimized
for client/server exchange. DTOs cause some duplication, but having some duplication is better to deal
with than tight coupling, which can make a system very fragile.
9.8. SSL
In Hazelcast 3, you can encrypt communication between client and cluster using SSL. This means that
the whole network traffic, which includes normal operations like a map.put and includes passwords in
credentials and GroupConfig, cannot be read and potentially modified.
keytool -genkey -alias hazelcast -keyalg RSA -keypass password -keystore hazelcast.ks
-storepass password
keytool -export -alias hazelcast -file hazelcast.cer -keystore hazelcast.ks -storepass
password keytool
-import -v -trustcacerts -alias hazelcast -keypass password -file hazelcast.cer -keystore
hazelcast.ts
-storepass password
HazelcastInstance hz = Hazelcast.newHazelcastInstance(config);
BlockingQueue<String> queue = hz.getQueue("queue");
System.out.println("Full member up");
for (; ; )
System.out.println(queue.take());
}
}
9.9. Good To Know
Shutdown: If you don’t need a client anymore, it is very important to shut it down using the
shutdown method or using the LifeCycleService.
client.getLifecycleService().shutdown();
The reason why the client shutdown is important, especially for short lived clients, is that the
shutdown releases resources. It will shutdown the client thread pool and the connection pool.
When a connection is closed, the client/member socket is closed and the ports are released,
making them available for new connections. Network traffic is also reduced since the heartbeat
does not need to be sent anymore. Also, the client resources running on the cluster, such as the
EndPoint or distributed Locks that have been acquired by the client, are released. If the client is
not shut down and resources like the Lock have not been released, every thread that wants to
acquire the lock is going to deadlock.
SPI: The Hazelcast client can also call SPI operations, see SPI, but you need to make sure that the
client has access to the appropriate classes and interfaces.
2 way clients: There are cases where you have a distributed system split in different clusters, but
there is a need to communicate between the clusters. Instead of creating one big Hazelcast
cluster, it could be split up in different groups. To be able to have each group communicate with
the other groups, create multiple clients. If you have two groups, A and B, then A should have a
client to B and B should have a client to A.
HazelcastSerializationException: If you run into this exception with the message "There is no
suitable serializer for class YourObject", then you have probably forgotten to configure the
SerializationConfig for the client. See Serialization. In many cases you want to copy/paste the
whole serialization configuration of the server to make sure that the client and server are able to
serialize/deserialize the same classes.
None smart clients and load balancing: If a client is not smart, it will randomize the members list
and try to connect to one of these members until it succeeds. So if you have a 16 node cluster and
two members are configured in the client, the entire load will go through these members. The
consequence is that the load isn’t equally spread over the members. Try to add as many
members as possible in the client configuration to balance the load better.
In Hazelcast, when an object needs to be serialized (for example, because the object is placed in a
Hazelcast data structure like a map or queue), Hazelcast first checks if the object is an instance of
DataSerializable or Portable. If that fails, Hazelcast checks if the object is a well-known type, such as
String, Long, Integer, byte[], ByteBuffer, or Date, since serialization for these types can be optimized.
Then, Hazelcast checks for user specified types, such as ByteArraySerializer and ByteStreamSerializer.
If that fails, Hazelcast will fall back on Java serialization (including the Externalizable). If this also fails,
the serialization fails because the class cannot be serialized. This sequence of steps is useful to
determine which serialization mechanism is going to be used by Hazelcast if a class implements
multiple interfaces, such as Serializable and Portable.
Whatever serialization technology is used, Hazelcast will not automatically download a class
definition, if it is needed. Therefore, you need to make sure that your application has all the classes it
needs on the classpath.
10.1. Serializable
The native Java serialization is the easiest serialization mechanism to implement, since a class often
only needs to implement the java.io.Serializable interface.
When this class is serialized, all non-static, non-transient fields will automatically be serialized.
Make sure to add serialVersionUID since this prevents the JVM from calculating one on the fly, which
can lead to all kinds of class compatibility issues. In the examples it is not always added to reduce
space, but for production code there is no excuse not to add it.
When you use serialization, you don’t control the actual byte-content because you don’t have exact
control over how an Object is (de)serialized. In most cases this won’t be an issue, but if you are using a
method that relies on the byte-content comparisons, and the byte-content of equal objects is different,
unexpected behavior will occur. An example of such a method is the
IMap.replace(key,expected,update), and an example of a serialized data structure with unreliable byte-
content is a HashMap. So if your expected class directly or indirectly relies on a HashMap, the replace
method could fail to replace keys.
10.2. Externalizable
Another serialization technique supported by Hazelcast is the java.io.Externalizable. It provides more
control over how fields are serialized/deserialized, and it can also help to improve performance
compared to standard Java serialization. Here is an example of the Externalizable in action.
@Override
public void readExternal(ObjectInput in)
throws IOException, ClassNotFoundException {
this.name = in.readUTF();
}
@Override
public void writeExternal(ObjectOutput out)
throws IOException {
out.writeUTF(name);
}
}
The writing and reading of fields is explicit and reading needs to be done in the same order as writing.
Unlike the Serializable, the serialVersionUID is not required.
10.3. DataSerializable
Although Java serialization is very easy to use, it comes at a price.
• Java serialization lacks control over how the fields are serialized/deserialized.
• Java serialization also has suboptimal performance due to streaming class descriptors, versions,
keeping track of seen objects to deal with cycles, etc. These cause additional CPU load and
suboptimal size of serialized data.
These limitations are why the DataSerializable serialization mechanism was introduced in Hazelcast 1.
public Person(){}
@Override
public void readData(ObjectDataInput in)
throws IOException {
this.name = in.readUTF();
}
@Override
public void writeData(ObjectDataOutput out)
throws IOException {
out.writeUTF(name);
}
}
This DataSerializable looks a lot like the Externalizable functionality since an explicit serialization of
the fields is required. Just like the Externalizable, the reading of the fields needs to be done in the same
order as they are written. Apart from implementing the DataSerializable interface, no further
configuration is needed. As soon as this Person class is serialized, Hazelcast checks to see whether it
should implement the DataSerializable interface.
One requirement for a DataSerializable class is that it has a no-argument constructor. This is needed
during deserialization because Hazelcast needs to create an instance. You can make this constructor
private so that it won’t be visible to normal application code.
To see the DataSerializable in action, let’s have a look at the following code.
public class Member {
Person(name=Peter)
10.3.1. IdentifiedDataSerializable
One of the problems with DataSerializable is that it uses reflection to create an instance of the class.
One of the new features of Hazelcast 3 is the IdentifiedDataSerializable. It relies on a factory to create
the instance and therefore is faster when deserializing, since deserialization relies on creating new
instances.
The first step is to modify the Person class to implement the IdentifiedDataSerializable interface.
public class Person implements IdentifiedDataSerializable {
private String name;
public Person(){}
@Override
public void readData(ObjectDataInput in)
throws IOException {
this.name = in.readUTF();
}
@Override
public void writeData(ObjectDataOutput out)
throws IOException {
out.writeUTF(name);
}
@Override
public int getFactoryId() {
return PersonDataSerializableFactory.FACTORY_ID;
}
@Override
public int getId() {
return PersonDataSerializableFactory.PERSON_TYPE;
}
@Override
public String toString() {
return String.format("Person(name=%s)", name);
}
}
This IdentifiedDataSerializable Person class looks a lot like the Person class from the DataSerializable,
but two additional methods are added: getFactoryId and getId. The getFactoryId should return a
unique positive number, and the getId should return a unique positive number within its
corresponding PersonDataSerializableFactory. Thus, IdentifiedDataSerializable implementations can
return the same ID as long as the getFactoryId is different. You could move the IDs to the
DataSerializableFactory implementation to have a clear overview.
The next step is creating a PersonDataSerializableFactory which is responsible for creating an instance
of the Person class.
public class PersonDataSerializableFactory
implements DataSerializableFactory{
@Override
public IdentifiedDataSerializable create(int typeId) {
if(typeId == PERSON_TYPE){
return new Person();
}else{
return null;
}
}
}
The create method is the only method that you need to implement. If you have many subclasses, you
might consider using a switch case statement instead of a bunch of if-else statements. If a type ID of
an unknown type is received, you can return null or throw an exception. If null is returned, Hazelcast
will throw an exception for you.
<hazelcast>
<serialization>
<data-serializable-factories>
<data-serializable-factory
factory-id="1">PersonDataSerializableFactory</data-serializable-factory>
</data-serializable-factories>
</serialization>
</hazelcast>
If you look closely, you see that the PersonDataSerializableFactory.FACTORY_ID has the same value as
the factory-id field in the XML. This is very important since Hazelcast relies on these values to find the
right DataSerializableFactory when deserializing.
Person(name=Peter)
10.4. Portable
With the introduction of Hazelcast 3.0, a new serialization mechanism was added: the Portable. The
cool thing about Portable is that object creation is pulled into user space, so you control the
initialization of the Portable instances and you are not forced to use a no-argument constructor. For
example, you could inject dependencies or you could even decide to move the construction of the
Portable from a prototype bean in a Spring container.
To demonstrate how the Portable mechanism works, let’s create a Portable version of the Person class.
public class Person implements Portable {
private String name;
Person(){
}
@Override
public int getClassId() {
return PortableFactoryImpl.PERSON_CLASS_ID;
}
@Override
public int getFactoryId() {
return PortableFactoryImpl.FACTORY_ID;
}
@Override
public void writePortable(PortableWriter writer)
throws IOException {
System.out.println("Serialize");
writer.writeUTF("name", name);
}
@Override
public void readPortable(PortableReader reader)
throws IOException {
System.out.println("Deserialize");
this.name = reader.readUTF("name");
}
@Override
public String toString() {
return String.format("Person(name=%s)",name);
}
}
The write method includes the field names, which makes it possible to read particular fields without
being forced to read all of them. This is useful for querying and indexing: it reduces overhead because
deserialization isn’t needed. Unlike the DataSerializable, the order of reading and writing fields isn’t
important since it is based on name. Also, a no-argument constructor is added so that it can be
initialized from the PortableFactoryImpl; if you place it in the same package, you could give it a
package friendly access modifier to reduce visibility.
The last two interesting methods are getClassId, which returns the identifier of that class, and
getFactoryId, which must return the ID of the PortableFactory that will take care of serializing and
deserializing.
The next step is the PortableFactory which is responsible for creating a new Portable instance based on
the class ID. In our case, the implementation is very simple since we only have a single Portable class.
import com.hazelcast.nio.serialization.*;
public class PortableFactoryImpl implements PortableFactory {
public final static int PERSON_CLASS_ID = 1;
public final static int FACTORY_ID = 1;
@Override
public Portable create(int classId) {
switch (classId) {
case PERSON_CLASS_ID:
return new Person();
}
return null;
}
}
In practice, the switch case probably will be a lot bigger. If an unmatched classId is encountered, null
should be returned, which will lead to a HazelcastSerializationException. A class ID needs to be unique
within the corresponding PortableFactory and needs to be bigger than 0. You can declare the class ID in
the class to serialize, but you could add it to the PortableFactory to have a good overview of which IDs
are there.
A factory ID needs to be unique and larger than 0. You probably will have more than one
PortableFactory. To make sure that every factory gets a unique factory ID, you could make a single
class/interface where all PortableFactory IDs in your system are declared, as shown below.
The getFactoryId should make use of these constants. This prevents looking all over the place if the
factory ID is unique.
Hazelcast can have multiple portable factories. You need to make sure that the factory-id in the XML is
the same as in the code.
Serialize
Serialize
Deserialize
Person(name=Peter)
The Person is serialized when it is stored in the map and it is deserialized when it is read. Serialize is
called twice because for every Portable class, the first time it is (de)serialized, Hazelcast generates a
new class that supports the serialization/deserialization process. For this generation process, another
serialization is executed to figure out the metadata (the fields and their types).
The names of the fields are case-sensitive and need to be valid java identifiers. Therefore, they should
not contain characters such as . or -.
Portable supports versioning and is language/platform independent. This makes Portable useful for
client/cluster communication. Another advantage is that Portable can be more performant for map
queries: it avoids full serialization because data can be retrieved at the field level. Otherwise, if the
serialization is needed only for intra-cluster communication, then DataSerializable is still a good
alternative. The disadvantage of Portable is that of all metadata: the fields that are available are part of
the payload of every serialized object. So the amount of data transferred with a Portable is a lot more
than with a DataSerializable. If you want to use the fastest serialization mechanism, it is best to have a
look at the IdentifiedDataSerializable, since no field metadata is sent over the line.
If a Portable has a Portable field, the write and read operations need to be forwarded to that object. For
example, we could add a Portable address field to Person.
If the field is of type Portable and null, the PortableWriter.writePortable(String fieldName, Portable
portable) method will complain about the null. This is because with a null value, the type of the field is
unknown and this causes problems with the platform independent nature of Portable. In that case, you
can call the PortableWriter.writePortable(String fieldName, int classId, Portable portable) method,
where an explicit class ID needs to be passed.
If the object is not a Portable, primitive, array or String, then there is no direct support for
serialization. Of course, you could transform the object using Java serialization to a byte array, but this
would mean that platform independence is lost. A better solution is to create some form of String
representation, potentially using XML, to maintain platform compatibility. The methods
readUTF/writeUTF can perfectly deal with null Strings, so passing null object references is no problem.
Serialization of the DistributedObject is not provided out of the box. For example, you can’t put an
ISemaphore on an IQueue on one machine and take it from another, but there are solutions to this
problem.
One solution is to pass the ID of the DistributedObject, perhaps in combination with the type. When
deserializing, look up the object in the HazelcastInstance. For example, in the case of an IQueue, you can
call HazelcastInstance.getQueue(id) or Hazelcast.getDistributedObject. Passing the type is useful if you
don’t know the type of the DistributedObject.
If you are deserializing your own Portable distributed object and it receives an ID that needs to be
looked up, the class can implement the HazelcastInstanceAware interface. Since the HazelcastInstance
is set after deserialization, you need to store the IDs first, and then you could do the actual retrieval of
the distributed objects in the setHazelcastInstance method.
When using the Portable functionality, the field name is added so that the fields can be retrieved easily
and the field can be indexed and used within queries without needing to deserialize the object. In
some cases this can cause a lot of overhead. If overhead is an issue, you can write raw data using the
PortableWriter.getRawDataOutput() method and read it using the PortableReader.getRawDataInput()
method. Reading and writing raw data should be the last reading and writing operations on the
PortableReader and PortableWriter.
10.4.5. Cycles
One thing to look out for, which also goes for DataSerializable, is the cycles between objects—they can
lead to a stack overflow. Standard Java serialization protects against this, but since manual traversal is
done in Portable objects, there is no protection out of the box. If this is an issue, you could store a map
in a ThreadLocal that can be used to detect cycles and a special placeholder value could be serialized to
end the cycle.
10.4.6. Subtyping
Subtyping with the Portable functionality is easy: let every subclass has its own unique type ID, and
then add these IDs to the switch/case in the PortableFactory so that the correct class can be
instantiated.
10.4.7. Versioning
In practice, multiple versions of the same class could be serialized and deserialized, such as a Hazelcast
client with an older Person class compared to the cluster. Luckily, the Portable functionality supports
versioning. In the configuration, you can explicitly pass a version using the <portable-version> tag
(defaults to 0).
<serialization>
<portable-version>1</portable-version>
<portable-factories>
<portable-factory factory-id="1">PortableFactoryImpl</portable-factory>
</portable-factories>
</serialization>
When a Portable instance is deserialized, apart from the serialized fields of that Portable, metadata like
the class id and the version are also stored. That is why it is important that every time you make a
change in the serialized fields of a class, the version is also changed. In most cases, incrementing the
version is the simplest approach.
Adding fields to a Portable is simple. However, you probably need to work with default values if an old
Portable is deserialized.
Removing fields can lead to problems if a new version of that Portable (with the removed field) is
deserialized on a client that depends on that field.
Renaming fields is simpler because the Portable mechanism does not rely on reflection, so there is no
automatic mapping of fields on the class and fields in the serialized content.
An issue to watch out for is changing the field type, although Hazelcast can do some basic type
upgrading (for example, int to long or float to double).
Renaming the Portable is simple since the name of the Portable is not stored as metadata, but the class
ID (which is a number) is stored.
Hazelcast provides access to the metadata of the object to be deserialized through the PortableReader.
The version, available fields, the type of the fields, etc., can be retrieved, so you have full control over
how the deserialization should take place.
10.5. StreamSerializer
One of the additions to Hazelcast 3 is to use a stream for serializing and deserializing data by
implementing the StreamSerializer. The StreamSerializer is practical if you want to create your own
implementations, and you can also use it to adapt an external serialization library, such as JSON,
protobuf, Kryo, etc.
Let’s start with a very simple object we will serialize using a StreamSerializer.
As you can see, there are no interfaces to implement. There is also no need for a no-argument
constructor.
The next step is the StreamSerializer implementation for this Person class.
public class PersonStreamSerializer
implements StreamSerializer<Person> {
@Override
public int getTypeId() {
return 1;
}
@Override
public void write(ObjectDataOutput out, Person person)
throws IOException {
out.writeUTF(person.getName());
}
@Override
public Person read(ObjectDataInput in) throws IOException {
String name = in.readUTF();
return new Person(name);
}
@Override
public void destroy() {
}
}
The implementation is quite simple. The ObjectDataOutput and ObjectDataInput have methods available
for primitives like int, boolean, etc., and also for String; writeUTF/readUTF can safely deal with null and
also for objects. See Object Traversal.
In practice, classes probably have more fields. If you are writing the fields, make sure that they are
read in the same order as they are written.
The type ID needs to be unique so that on deserialization, Hazelcast is able to figure out which
serializer should be used to deserialize the object. Hazelcast has claimed the negative IDs and will
throw an error if your type ID is smaller than 1.
A practical way to generate unique IDs is to use a class (or interface) where you define all type IDs in
your system:
@Override
public int getTypeId() {
return MySerializationConstants.PERSON_TYPE;
}
...
It is very important never to change the order of the type IDs when you have old deserialized instances
somewhere. This is because a change of the order will change the actual value of the type ID, so
Hazelcast will not be able to correctly deserialize objects that were created using the old order.
<serialization>
<serializers>
<serializer
type-class="Person">PersonStreamSerializer</serializer>
</serializers>
</serialization>
In this case, we have registered the serializer PersonStreamSerializer for the Person class. When
Hazelcast is going to serialize an object, it looks up the serializer registered for the class for that object.
Hazelcast is quite flexible; if it fails to find a serializer for a particular class, it first tries to match based
on superclasses and then on interfaces. You could create a single StreamSerializer that can deal with a
class hierarchy if that StreamSerializer is registered for the root class of that class hierarchy. If you use
this approach, you need to write sufficient data to the stream so that on deserialization, you can figure
out exactly which class needs to be instantiated.
It is not possible to create StreamSerializers for well known types like Long, String, primitive arrays,
etc., since Hazelcast already registers them.
Person{name='peter'}
In practice, you often need to deal with object graphs. Luckily, this is quite easy. To create the graph, we
add the Car class. Each car has a color and an owner.
public class Car {
private String color;
private Person owner;
@Override
public String toString() {
return "Car{" +
"color='" + color + '\'' +
", owner=" + owner +
'}';
}
}
The interesting part is the StreamSerializer for the car, especially the ObjectDataOutput.writeObject and
ObjectDataInput.readObject methods.
public class CarStreamSerializer
implements StreamSerializer<Car> {
@Override
public int getTypeId() {
return MySerializationConstants.CAR_TYPE;
}
@Override
public void write(ObjectDataOutput out, Car car)
throws IOException {
out.writeObject(car.getOwner());
out.writeUTF(car.getColor());
}
@Override
public Car read(ObjectDataInput in) throws IOException {
Person owner = in.readObject();
String color = in.readUTF();
return new Car(owner,color);
}
@Override
public void destroy() {
}
}
When the writeObject is called, Hazelcast will look up a serializer for the particular type. Hazelcast has
serializers available for the wrapper types like Long, Boolean, etc. Luckily, the writeObject (and
readObject) are perfectly able to deal with null.
<serialization>
<serializers>
<serializer
type-class="Person">PersonStreamSerializer</serializer>
<serializer
type-class="Car">CarStreamSerializer</serializer>
</serializers>
</serialization>
map.put("mycar", car);
System.out.println(map.get("mycar"));
}
}
Car{color='red', owner=Person{name='peter'}}
Traversing object graphs for serialization and reconstructing object graphs on deserialization is quite
simple. One thing you need to watch out for is cycles, see Cycles.
10.5.2. Collections
If the field of an object needs to be serialized with the stream serializer, then currently there is no
other solution except to write a custom serializer for that field. Support for collection serializers
probably will be added in the near future, but for the time being you might have a look at the following
two implementations. First, the serializer for the LinkedList.
public class LinkedListStreamSerializer
implements StreamSerializer<LinkedList> {
@Override
public int getTypeId() {
return MySerializationConstants.LINKEDLIST_TYPE;
}
@Override
public void write(ObjectDataOutput out, LinkedList l)
throws IOException {
out.writeInt(l.size());
for(Object o: l){
out.writeObject(o);
}
}
@Override
public LinkedList read(ObjectDataInput in)
throws IOException {
LinkedList l = new LinkedList();
int size = in.readInt();
for(int k=0;k<size;k++){
l.add(in.readObject());
}
return l;
}
@Override
public void destroy() {
}
}
@Override
public int getTypeId() {
return MySerializationConstants.HASHMAP_TYPE;
}
@Override
public HashMap read(final ObjectDataInput in)
throws IOException {
int size = in.readInt();
HashMap m = new HashMap(size);
for(int k=0;k<size;k++){
Object key = in.readObject();
Object value = in.readObject();
m.put(key,value);
}
return m;
}
@Override
public void write(final ObjectDataOutput out, final HashMap m)
throws IOException {
out.writeInt(m.size());
Set<Map.Entry> entrySet = m.entrySet();
for(Map.Entry entry: entrySet){
out.writeObject(entry.getKey());
out.writeObject(entry.getValue());
}
}
@Override
public void destroy() {
}
}
It is very important that you know which collection classes are being serialized. If there is no collection
serializer registered, the system will default to the GlobalSerializer, which defaults to normal
serialization. This might not be the behavior you are looking for.
Writing a customer serializer, such as a StreamSerializer, can be a lot of work. Luckily, there are a lot
of serialization libraries for this. Kryo is one of the libraries we use at Hazelcast. It is quite fast and
flexible, and it results in small byte arrays. It can also deal with object cycles.
Let’s start with a simple Person class.
private Person(){}
@Override
public String toString() {
return String.format("Person(name=%s)", name);
}
}
The Kryo instance is not thread-safe and therefore you can’t create PersonKryoSerializer with a Kryo
instance as a field. However, since the Kryo instance is relatively expensive to create, we want to reuse
the instance, so the Kryo instance is put on a local thread.
public class PersonKryoSerializer implements StreamSerializer<Person> {
@Override
public int getTypeId() {
return 2;
}
@Override
public void write(ObjectDataOutput objectDataOutput, Person product)
throws IOException {
Kryo kryo = kryoThreadLocal.get();
Output output = new Output((OutputStream) objectDataOutput);
kryo.writeObject(output, product);
output.flush();
}
@Override
public Person read(ObjectDataInput objectDataInput)
throws IOException {
InputStream in = (InputStream) objectDataInput;
Input input = new Input(in);
Kryo kryo = kryoThreadLocal.get();
return kryo.readObject(input, Person.class);
}
@Override
public void destroy() {
}
}
The PersonKryoSerializer is relatively simple to implement. The nice thing is that Kryo takes care of
cycle detection and produces much smaller serialized data than Java serialization. For one of our
customers we managed to reduce the size of map entries from a 15 kilobyte average using Java
Serialization, to a less than six kilobyte average. When we enabled Kryo compression, we managed to
get it below three kilobytes.
The PersonKryoSerializer needs to be configured in Hazelcast.
<hazelcast>
<serialization>
<serializers>
<serializer type-class="Person">PersonKryoSerializer</serializer>
</serializers>
</serialization>
</hazelcast>
Person(name=Peter)
In the previous example, we showed how Kryo can be implemented as a StreamSerializer. The cool
thing is that you can just plug in a serializer for a particular class, even if that class already implements
a different serialization strategy such as Serializable. If you don’t have the chance to implement Kryo
as StreamSerializer, you can also directly implement the serialization on the class. You can do this by
using the DataSerializable and (de)serializing each field using Kryo. This approach is especially useful
if you are still working on Hazelcast 2.x. Kryo is not the only serializable library; you also might want
to have a look at Jackson Smile, Protobuf, etc.
10.6. ByteArraySerializer
An alternative to the StreamSerializer is the ByteArraySerializer. With the ByteArraySerializer, the
raw bytearray internally used by Hazelcast is exposed. This is practical if you are working with a
serialization library that works with bytearrays instead of streams.
@Override
public void destroy() {
}
@Override
public int getTypeId() {
return 1;
}
@Override
public byte[] write(Person object) throws IOException {
return object.getName().getBytes();
}
@Override
public Person read(byte[] buffer) throws IOException {
String name = new String(buffer);
return new Person(name);
}
}
The PersonByteArraySerializer can be configured in the same way that the StreamSerializer is
configured.
<serialization>
<serializers>
<serializer
type-class="Person">PersonByteArraySerializer</serializer>
</serializers>
</serialization>
There can only be one global serializer. For this global serializer, the StreamSerializer.getTypeId
method does not need to return a relevant value.
10.8. HazelcastInstanceAware
In some cases, when an object is deserialized it needs access to the HazelcastInstance so that
distributed objects can be accessed. You can do this by implementing HazelcastInstanceAware, as in the
following example.
@Override
public void setHazelcastInstance(HazelcastInstance hz) {
this.hz = hz;
System.out.println("hazelcastInstance set");
}
@Override
public String toString() {
return String.format("Person(name=%s)",name);
}
}
After this person is deserialized, Hazelcast will check if the object implements HazelcastInstanceAware
and will call the setHazelcastInstance method. The hz field needs to be transient since it should not be
serialized.
Injecting a HazelcastInstance into a domain object (an Entity) like Person isn’t going to win you a
beauty contest, but it is a technique you can use in combination with Runnable/Callable
implementations that are executed by an IExecutorService that sends them to another machine. After
deserialization of such a task, the implementation of the run/call method often needs to access the
HazelcastInstance.
A best practice for implementing the setHazelcastInstance method is to only set the HazelcastInstance
field and not execute operations on the HazelcastInstance. The reason behind this is that for some
HazelcastInstanceAware implementations, the HazelcastInstance isn’t fully up and running when it is
injected.
You need to be careful when using the HazelcastInstanceAware on anything other than the root object
that is serialized. Hazelcast sometimes optimizes local calls by skipping serialization. Some
serialization technologies, like Java serialization, don’t allow for applying additional logic when an
object graph is deserialized. In these cases, only the root of the graph is checked if it implements
HazelcastInstanceAware, but the graph isn’t traversed.
10.8.1. UserContext
Obtaining dependencies other than a HazelcastInstance was more complicated in Hazelcast 2.x. Often
the only way to do this was to rely on some form of static field. Hazelcast 3 provides a new solution
using the user context: a (Concurrent)Map that can be accessed from the HazelcastInstance using the
getUserContext() method. In the user context, arbitrary dependencies can be placed using some key as
String.
Let’s start with an EchoService dependency that we want to make available in an EchoTask that will be
executed using a Hazelcast distributed executor.
There are no special requirements for this dependency and no interfaces to implement. It is just an
ordinary POJO.
This EchoService dependency needs to be injected into the UserContext so it can be found when we
execute the EchoTask.
public class Member {
public static void main(String[] args){
EchoService echoService = new EchoService();
Injecting a dependency into the UserContext is quite simple. It is important to understand that
Hazelcast doesn’t provide support for injecting dependencies into the user context from the XML
configuration, since this would require knowledge of how to create the actual dependency. The
Hazelcast configuration is purely meant as a configuration mechanism for Hazelcast and not as a
general purpose object container like Spring. Therefore, you need to add the dependencies to the
UserContext programmatically.
The final step is retrieval of the dependency. Implement the HazelcastInstanceAware interface that
injects the HazelcastInstance. From this HazelcastInstance, we can retrieve the UserContext by calling
the getUserContext method.
public class EchoTask
implements Runnable, Serializable,
HazelcastInstanceAware {
@Override
public void run() {
EchoService echoService =
(EchoService)hz.getUserContext().get("echoService");
echoService.echo(msg);
}
@Override
public void setHazelcastInstance(HazelcastInstance hz) {
this.hz = hz;
}
}
hello
It is possible to configure user-context on the Config, and you can also directly configure the user-
context of the HazelcastInstance. This is practical if you need to add dependencies on the fly. Do not
forget to clean up what you put in the user-context, else you might run into resource problems like an
OutOfMemoryError.
Changes made in the user-context are local to a member only. Other members in the cluster are not
going to observe changes in the user-context of one member. If you need to have that EchoService
available on each member, you need to add it to the user-context on each member.
It is important to know that when a HazelcastInstance is created using a Config instance, a new user-
context ConcurrentMap is created and the content of the user-context of the Config is copied. Therefore,
changes made to the user-context of the HazelcastInstance will not reflect on any other
HazelcastInstance created using the same Config instance.
10.9. ManagedContext
In some cases, when a serialized object is deserialized, not all of its fields can be deserialized because
they are transient. These fields could be important data structures like executors, database
connections, etc. Hazelcast provides a mechanism that is invoked when an object is deserialized and
gives you the ability to fix the object by setting missing fields and call methods, wrapping it inside a
proxy, etc., so it can be used. This mechanism is called the ManagedContext and you can configure it on
the SerializationConfig.
In the following example, we have a DummyObject with a serializable field named ser and a transient
field named trans.
@Override
public String toString() {
return "DummyObject{" +
"ser='" + ser + '\'' +
", trans=" + trans +
'}';
}
}
When this object is deserialized, the serializable field will be set, but the transient field will be null. To
prevent this from happening, we can create a ManagedContext implementation that will restore this
field.
@Override
public Object initialize(Object obj) {
if (obj instanceof DummyObject) {
((DummyObject) obj).trans = new Thread();
}
return obj;
}
}
When an object is deserialized, the initialize method will be called. In our case, we are going to
restore the transient field. To see the ManagedContextImpl in action, have a look at the following code.
public class Member {
map.put("1", input);
DummyObject output = map.get("1");
System.out.println(output);
System.exit(0);
}
}
DummyObject{ser='someValue', trans=Thread[Thread-2,5,main]}
DummyObject{ser='someValue', trans=Thread[Thread-3,5,main]}
If you need to have dependencies in your ManagedContext, you can let it implement the
HazelcastInstanceAware interface. You can retrieve custom dependencies using the UserContext.
Be careful using the ManagedContext on anything other than the root object that is serialized, as
Hazelcast sometimes optimizes local calls by skipping serialization. Also, some serialization
technologies, like Java serialization, don’t allow for applying additional logic when an object graph is
deserialized. In these cases, only the root of the object graph can be offered to the ManagedContext, but
the graph isn’t traversed.
Encryption for in memory storage: Having raw data in memory is a potential security risk. The
risk can be mitigated by modifying the serialization behavior of the class so that it encrypts the
data on writing and decrypts on reading. In some cases, such as storing a String in a map, the
instance needs to be wrapped in a different type (for example, EncryptedPortableString) to
override the serialization mechanism.
Mixing serializers: If an object graph is serialized, different parts of the graph could be serialized
using different serialization technologies, for example, some parts with Portable and other parts
with StreamSerializers and Serializers. Normally this won’t be an issue, but if you need to
exchange these classes with the outside world, it is best to have everything serialized using
Portable.
In Memory: Currently all serialization is done in memory. If you are dealing with large object
graphs or large quantities of data, you need to keep this in mind. There is a feature request to
make it possible to use streams between members and members/clients and to overcome this
memory limitation. Hopefully, this will be implemented in the near future.
• Atomicity. Without atomicity, some of the operations on Hazelcast structures could succeed while
others fail, leaving the system in an inconsistent state.
• Consistency. This moves the state of the system from one valid state to the next.
• Isolation: The transaction should behave as if it were the only transaction running. Normally there
are all kinds of isolation levels that allow certain anomalies to happen.
• Durability: This makes sure that if a system crashes after a transaction commits, that nothing gets
lost.
There are fundamental changes in the transaction API in Hazelcast 3. In Hazelcast 2.x, some of the data
structures could be used with or without a transaction. In Hazelcast 3, transactions are possible only
on explicit transactional data structures, such as the TransactionalMap, TransactionalMultiMap,
TransactionalQueue, TransactionalSet and the TransactionalList. The reason behind this design choice
is that not all operations can be made transactional because if they were made transactional, they
would have huge performance/scalability implications. To prevent running into surprises, transactions
are only available on explicit transactional data structures.
Another change in the transaction API is that the TransactionContext is the new interface to use. It
supports the same basic functionality as the Hazelcast 2.x Transaction, such as begin, commit, and
rollback. But it also supports accessing transactional data structures like the TransactionalMap and
TransactionalQueue.
Using a transaction is simple. In the above example, the transactional map is retrieved within the
transaction. It is not allowed to retrieve a transactional data structure in one transaction and reuse it
in another one. The retrieved object, in this case the TransactionalMap, is a proxy to the real data
structure, and it will contain transaction specific states, such as cache. Therefore, that object should
not be reused. Of course, the same transactional data structure can be retrieved multiple times within
the same transaction.
<map name="employees">
....
</map>
A TransactionalMap will have all the configuration options you have on a normal IMap. The same goes
for the TransactionalMultiMap, which is backed up by a MultiMap.
Because the TransactionalMap is built on top of the IMap, the TransactionalMap can be loaded as an IMap.
public class TransactionalMember {
public static void main(String[] args) {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
TransactionContext txCxt = hz.newTransactionContext();
txCxt.beginTransaction();
TransactionalMap<String,Employee> employees = txCxt.getMap("employees");
employees.put("1",new Employee());
txCxt.commitTransaction();
The employee that was put in the TransactionalMap is being retrieved from the IMap. In practice, you
probably never want to do this.
If you have enabled JMX, the TransactionalMap and TransactionalMultiMap will appear as a normal
Map/MultiMap.
11.2. TransactionOptions
In some cases, the default behavior of the Transaction does not work and needs to be fine tuned. With
the Hazelcast transaction API, you can do this by using the TransactionOptions object and passing it to
the HazelcastInstance.newTransactionContext(TransactionOptions) method.
1. timeoutMillis: Time in milliseconds a transaction will hold a lock. Defaults to 2 minutes. In most
cases, this timeout is enough since the transaction should be executed quickly.
3. durability: Number of backups for the transaction log, defaults to 1. See Partial Commit Failure for
more information.
The following fragment makes use of the TransactionOptions to configure a TransactionContext which is
TWO_PHASE, has a timeout of 1 minute, and a durability of 1.
11.2.1. TransactionType
With the TransactionType you can influence how much guarantee you get when a member crashes
when a transaction is committing. Hazelcast provides two TransactionTypes. Their names are a bit
confusing.
1. LOCAL: Unlike the name suggests, LOCAL is a two phase commit. First, if everyone agrees, all cohorts
are asked to prepare. Then, all cohorts are asked to commit. If during the commit phase one or
more members crashes, the system could be left in an inconsistent state because some of the
members might have committed and others might not have.
2. TWO_PHASE: The two phase commit is more than the classic two phase commit (if you want a regular
two phase commit, use LOCAL). Before it commits, it copies the commit log to the other members, so
in case of member failure, another member can complete the commit.
So which one should you use? It depends. LOCAL will perform better but TWO_PHASE will provide better
consistency in case of failure.
11.3. TransactionalTask
In the previous example we manually managed the transaction—we manually began one and
manually committed it when the operation was finished, and we manually rolled back the transaction
on failure. This method can cause a lot of code noise due to the repetitive boilerplate code, but the code
can be simplified by using the TransactionalTask and the
HazelcastInstance.executeTransaction(TransactionalTask) method. This method automatically begins a
transaction when the task starts and automatically commits it on success or performs a rollback when
a Throwable is thrown.
The previous example could be rewritten to use the TransactionalTask like this.
public class TransactionalTaskMember {
public static void main(String[] args) throws Throwable {
HazelcastInstance hz = Hazelcast.newHazelcastInstance();
hz.executeTransaction(new TransactionalTask() {
@Override
public Object execute(TransactionalTaskContext context)
throws TransactionException {
TransactionalMap<String,String> map = context.getMap("map");
map.put("1", "1");
map.put("2", "2");
return null;
}
});
System.out.println("Finished");
System.exit(0);
}
}
An anonymous inner class is used to create an instance of the TransactionalTask and to pass it to the
HazelcastInstance.executeTransaction method, where it will be executed using a transaction. It is
important to understand that the execution of the task is done on the calling thread, so there is no
hidden multi-threading going on.
Just as with the raw TransactionContext, you can use the TransactionalTask in combination with the
TransactionOptions by calling the
HazelcastInstance.executeTransaction(TransactionOptions,TransactionalTask) method like in this
example.
When a transactional operation is executed on a member, this member will keep track of the changes
by putting them in a transaction log. If a transaction hits multiple members, each member will store a
subset of the transaction log. When the transaction is preparing for commit, this transaction change log
will be replicated durability times.
Hazelcast’s Transaction API provides isolation from other concurrently executing transactions. By
default, Hazelcast provides a READ_COMMITTED isolation level, so dirty reads are not possible,
although non-repeatable and phantom reads are. If you are in a transaction, you can read the data in
your transaction and the data that is already committed. If you are not in a transaction, you can only
read the committed data. This isolation level is sufficient for most use cases since it is a nice balance of
scalability and correctness.
The REPEATABLE_READ isolation level can also be exercised using the method getForUpdate() of
TransactionalMap.
One of the read anomalies that can happen in transactional systems is a dirty read. Imagine a map
with keys of type String and values of type Integer. If transaction-1 modifies key foo and increments
the value from 0 to 1, and transaction-2 reads key foo and sees value 1, and then transaction-1 aborts,
but transaction-2 still sees the value 1, a value that was never committed. This is called a dirty read.
The dirty reads are prevented in Hazelcast by deferring the write till the commit of the transaction. All
changes are stored locally in the transaction and therefore are invisible to other transactions. Only
when the transaction commits and the cohorts have agreed with the the commit are the changes
actually written. This means that in Hazelcast it is impossible to see the changes of a transaction in
progress since all these changes are tracked locally in the transaction and these are not visible to other
transactions.
If you want to avoid non-repeatable reads, meaning the isolation level is REPEATABLE_READ, all reads
should be done using the method getForUpdate() of TransactionalMap. This method uses locks to
prevent non-repeatable reads.
The Hazelcast transaction supports Read Your Writes (RYW) consistency, meaning that when a
transaction makes an update and later reads that data, it will see its own updates. Other transactions
are not able to see these uncommitted changes, otherwise they would suffer from dirty reads.
Higher isolation levels such as SERIALIZED are not desirable due to lack of scalability. With the
SERIALIZED isolation level, the phantom read isn’t allowed. Imagine an empty map where transaction-
1 reads the size of this map at time t1 and sees 0. Then transaction-2 starts, inserts a map entry, and
commits. If transaction-1 reads the size and sees 1, it is suffering from a phantom read.
Often the only way to deal with a phantom read is to lock the whole data structure to prevent other
transactions inserting/removing map entries. This is undesirable because it would cause a cluster wide
blockage of this data structure. That is why Hazelcast does not provide protection against phantom
reads, and therefore the isolation level is limited to READ_COMMITTED and REPEATABLE_READ.
If a non-transactional data structure (such as a non-transactional IMap instance) is accessed during the
execution of a transaction, the access is oblivious to a running transaction. Therefore, if you were to
read the same non-transactional data structure multiple times, you could observe changes. Take care
when you choose to access non-transactional data structures while executing a transaction.
It isn’t possible to access a transactional data structure without a transaction. If that happens, an
IllegalStateException is thrown.
11.6. Locking
It is important to understand how the locking within Hazelcast transactions work. For example, if a
map.put is done, the transaction will automatically lock the entry for that key for the remaining
duration of the transaction. If another transaction wants to do an update on the same key, it also wants
to acquire the lock and will wait till the lock is released or the transaction runs into a timeout (see
TransactionOptions.timeoutMillis).
Reads on a map entry will not acquire the lock, but reads will be blocked if another transaction has
acquired that lock. Therefore, one transaction is not able to read map entries locked by another
transaction. Reads don’t block writes, but writes can block reads. If you want to acquire the lock when
reading, check the TransactionalMap.getForUpdate method. This provides the same locking semantics as
a map.put and can be compared with the select for update SQL statement.
Hazelcast doesn’t have fine-grained locks like a readwritelock; the lock acquired is exclusive. If a lock
can’t be acquired within a transaction, the operation will timeout after 30 seconds and throw an
OperationTimeoutException. This provides protection against deadlocks. If a lock was acquired
successfully but expires and therefore will be released, the transaction will happily continue executing
operations. Only when the transaction is preparing for commit is this released lock detected and a
TransactionException thrown. When a transaction aborts or commits, all locks are automatically
released. Also, when a transaction expires, its locks will automatically be released.
If you are automatically retrying a transaction that throws an OperationTimeoutException, and you do
not control the number of retries, it is possible that the system will run into a livelock. Livelocks are
even harder to deal with than deadlocks because the system appears to do something since the threads
are busy, but there is either not much or no progress due to transaction rollbacks. Therefore, it is best
to limit the number of retries and perhaps throw some kind of Exception to indicate failure.
One big difference between the EntityManager and the Hazelcast transaction is that the EntityManager
will track your dirty objects and will update/insert the objects when the transaction commits. So
normally you load one or more entities, modify them, commit the transaction and let the
EntityManager deal with writing the changes back to the database. The Hazelcast transaction API
doesn’t work like this, so the following code is broken.
11.8. XA Transactions
It is likely that an application system needs to manage multiple resources in the same transaction. As a
standard, XA describes the interface between the global transaction manager and the local resource
manager. XA allows multiple resources (such as databases, application servers, message queues,
transactional caches, etc.) to be accessed within the same transaction, thereby preserving the ACID
properties across applications. XA uses a two-phase commit to ensure that all resources either commit
or rollback any particular transaction consistently.
By implementing the XAResource interface, Hazelcast provides XA transactions and it is fully XA-
compliant. You can obtain the HazelcastXAResource instance via HazelcastInstance. Below is example
code that uses Atomikos for transaction management:
try {
TransactionContext context = xaResource.getTransactionContext();
TransactionalMap map = context.getMap("m");
map.put("key", "value");
// other resource operations
transaction.delistResource(xaResource, XAResource.TMSUCCESS);
tm.commit();
} catch (Exception e) {
tm.rollback();
}
<%
UserTransaction txn = null;
HazelcastConnection conn = null;
HazelcastInstance hazelcastInstance = Hazelcast.newHazelcastInstance();
try {
Context context = new InitialContext();
txn = (UserTransaction) context.lookup( "java:comp/UserTransaction" );
txn.begin();
HazelcastConnectionFactory cf = (HazelcastConnectionFactory)
context.lookup ( "java:comp/env/HazelcastCF" );
conn = cf.getConnection();
txn.commit();
} catch ( Throwable e ) {
if ( txn != null ) {
try {
txn.rollback();
} catch ( Exception ix ) {
ix.printStackTrace();
};
}
e.printStackTrace();
} finally {
if ( conn != null ) {
try {
conn.close();
} catch (Exception ignored) {};
}
}
%>
11.9.1. Resource Adapter Configuration
The Hazelcast resource adapter is a standard JCA resource adapter. Thus, deployment and
configuration is no different than configuring any other resource adapter. Although resource adapter
installation and configuration is container-specific, the most common steps are:
2. Deploy hazelcast-jca-rar-version.rar. Usually there is some kind of deploy directory. The name of
the directory varies by container.
4. Configure your application to use the Hazelcast resource. Update web.xml and/or ejb-jar.xml to let
the container know that your application will use the Hazelcast resource and define the resource
reference.
5. Make the container-specific application configuration to specify the JNDI name used for the
resource in the application.
11.10. Performance
Although transactions may be easy to use, their usage can influence the application performance
drastically due to locking and dealing with partial failed commits. Try to keep transactions as short as
possible so that locks are held for the least amount of time and the least amount of data is locked. Also
try to co-locate data in the same partition if possible.
No support for transaction propagation: It isn’t possible to create nested transactions without
using XA transactions. If you do, an IllegalStateException will be thrown.
Hazelcast client: Transactions can also be used from the Hazelcast client.
Queue operations: For queue operations (offer, poll), offered and/or polled objects are copied to
the owner member in order to safely commit/rollback. Moreover, if an item is polled in a
transaction, it is really polled and other poll operations return different items or null if the
queue is empty during the transaction. If the transaction rollbacks, then the item is offered to the
queue again. The same applies for remove/add operations of TransactionalSet and
TransactionalList.
ITopic: There is no transactional ITopic. Perhaps this will be implemented in the future.
No thread locals: The Transaction API doesn’t rely on thread local storage. If you need to offload
some work to a different thread, pass the TransactionContext to the other thread. The
transactional data structures can be passed as well, but the other thread could also retrieve them
again since a transactional data structure can be retrieved multiple times from the
TransactionContext instance.
MapStore and QueueStore: MapStore and QueueStore do not participate in transactions. Hazelcast
will suppress exceptions thrown by store in a transaction.
Hazelcast offers a specification-compliant JCache implementation. This is not just a simple wrapper
around the Hazelcast APIs. Rather, Hazelcast implements a caching structure from the ground up to
optimize the behavior to the needs of JCache. The Hazelcast JCache implementation is 100% TCK
(Technology Compatibility Kit) compliant and therefore passes all specification requirements.
In addition to the given specification, Hazelcast JCache has features like asynchronous versions of
almost all operations to give the user extra power.
For Maven users, the coordinates look like the following code:
<dependency>
<groupId>javax.cache</groupId>
<artifactId>cache-api</artifactId>
<version>1.0.0</version>
</dependency>
<dependency>
<groupId>com.hazelcast</groupId>
<artifactId>hazelcast-all</artifactId>
<version>3.4</version>
</dependency>
12.2. Setting Up JCache Providers
Use JCache providers to create caches for a specification-compliant implementation. Those providers
abstract the platform-specific behavior and bindings, and provide the different JCache required
features.
Hazelcast has two types of providers. Depending on your application setup and the cluster topology,
you can use the Client Provider (used by Hazelcast clients) or the Server Provider (used by cluster
nodes).
You configure the JCache javax.cache.spi.CachingProvider by either specifying the provider at the
command line or by declaring the provider inside the Hazelcast configuration XML file.
Hazelcast implements a delegating CachingProvider that can automatically be configured for either
client or server mode and that delegates to the real underlying implementation based on the user’s
choice. The delegating `CachingProvider`s fully qualified class name is:
com.hazelcast.cache.HazelcastCachingProvider
To configure the delegating provider at the command line, add the following parameter to the Java
startup call, depending on the chosen provider:
-Dhazelcast.jcache.provider.type=[client|server]
For cluster topologies where Hazelcast light clients are used to connect to a remote Hazelcast cluster,
use the Client Provider to configure JCache. To request this CachingProvider using
Caching#getCachingProvider( String ) or Caching#getCachingProvider( String, ClassLoader ), use the
following fully qualified class name:
com.hazelcast.client.cache.impl.HazelcastClientCachingProvider
If a Hazelcast node is embedded into an application directly and the Hazelcast client is not used, the
Server Provider is required. In this case, the node itself becomes a part of the distributed cache and
requests and operations are distributed directly across the cluster by its given key.
com.hazelcast.cache.impl.HazelcastServerCachingProvider
javax.cache.Caching:
This is the access point into the JCache API. It retrieves the general CachingProvider backed by any
compliant JCache implementation, such as Hazelcast JCache.
javax.cache.spi.CachingProvider:
This is the SPI that is implemented to bridge between the JCache API and the implementation itself.
Hazelcast nodes and clients use different providers, chosen as seen in the [Configuring JCache Provider
section](#configuring-jcache-provider), and which enable the JCache API to interact with Hazelcast
clusters.
javax.cache.CacheManager:
The CacheManager provides the capability to create new and manage existing JCache caches.
javax.cache.configuration.Configuration, javax.cache.configuration.MutableConfiguration:
These two classes are used to configure a cache prior to retrieving it from a CacheManager. The
Configuration interface, therefore, acts as a common super type for all compatible configuration
classes such as MutableConfiguration.
javax.cache.Cache:
This interface represents the cache instance itself. It is comparable to java.util.Map but offers special
operations dedicated to the caching use case. Therefore, for example, javax.cache.Cache::put, unlike
java.util.Map::put, does not return the old value previously assigned to the given key.
// Retrieve the CachingProvider which is automatically backed by
// the chosen Hazelcast server or client provider
CachingProvider cachingProvider = Caching.getCachingProvider();
// Create a CacheManager
CacheManager cacheManager = cachingProvider.getCacheManager();
We ask the CachingProvider, which creates and manages named caches, to return a
javax.cache.CacheManager. This is the general application’s entry point into JCache.
To create the cache, we call javax.cache.CacheManager::createCache with a name for the cache and the
previously created configuration. If you need to retrieve a previously created cache, you can use the
corresponding method overload javax.cache.CacheManager::getCache.
The example uses simple put and get calls from the java.util.Map interface. The
javax.cache.Cache::put has a void return type and does not return the previously assigned value of the
key. To imitate the java.util.Map::put method, the JCache cache has a method called getAndPut.
Factory implementations are easy to do—they follow the default Provider- or Factory-Pattern. The
sample class UserCacheEntryListenerFactory shown below implements a custom JCache Factory.
@Override
public CacheEntryListener<Integer, User> create() {
// Just create a new listener instance
return new UserCacheEntryListener();
}
}
• It implements CacheLoader.
• It overrides the load method to compute or retrieve the value corresponding to key.
• It overrides the loadAll method to compute or retrieve the values corresponding to keys.
@Override
public User load( Integer key ) throws CacheLoaderException {
// Just call through into the dao
return userDao.findUserById( key );
}
@Override
public Map<Integer, User> loadAll( Iterable<? extends Integer> keys )
throws CacheLoaderException {
• It implements CacheWriter.
• It overrides the write method to write the specified entry to the underlying store.
• It overrides the writeAll method to write the specified entries to the underlying store.
• It overrides the delete method to delete the key entry from the store.
• It overrides the deleteAll method to delete the data and keys from the underlying store for the
given collection of keys, if present.
@Override
public void write( Cache.Entry<? extends Integer, ? extends User> entry )
throws CacheWriterException {
@Override
public void writeAll( Collection<Cache.Entry<...>> entries )
throws CacheWriterException {
@Override
public void deleteAll( Collection<?> keys ) throws CacheWriterException {
// Retrieve the iterator to clean up the collection from
// written keys in case of an exception
Iterator<?> iterator = keys.iterator();
while ( iterator.hasNext() ) {
// Write entry using dao
delete( iterator.next() );
// Remove from collection of keys
iterator.remove();
}
}
}
• It implements EntryProcessor.
@Override
public User process( MutableEntry<Integer, User> entry, Object... arguments )
throws EntryProcessorException {
• CacheEntryRemovedListener: Fires after a cache entry was removed (not expired) from the cache.
• CacheEntryExpiredListener: Fires after a cache entry has been expired. Expiry does not have to be a
parallel process, it is only required to be executed on the keys that are requested by Cache::get and
some other operations. For a full table of expiry please see the
https://www.jcp.org/en/jsr/detail?id=107, point 6.
In this example application, the listener is implemented to print event information on the console. That
visualizes what is going on in the cache. This application performs the following tasks:
• It implements CacheEntryCreatedListener.
@Override
public void onCreated( Iterable<CacheEntryEvent<...>> cacheEntryEvents )
throws CacheEntryListenerException {
printEvents( cacheEntryEvents );
}
@Override
public void onUpdated( Iterable<CacheEntryEvent<...>> cacheEntryEvents )
throws CacheEntryListenerException {
printEvents( cacheEntryEvents );
}
@Override
public void onRemoved( Iterable<CacheEntryEvent<...>> cacheEntryEvents )
throws CacheEntryListenerException {
printEvents( cacheEntryEvents );
}
@Override
public void onExpired( Iterable<CacheEntryEvent<...>> cacheEntryEvents )
throws CacheEntryListenerException {
printEvents( cacheEntryEvents );
}
By default, JCache delivers a set of predefined expiry strategies in the standard API.
• AccessedExpiryPolicy: Expires after a given set of time measured from creation of the cache entry;
the expiry timeout is updated on accessing the key.
• CreatedExpiryPolicy: Expires after a given set of time measured from creation of the cache entry;
the expiry timeout is never updated.
• EternalExpiryPolicy: Never expires. This is the default behavior, similar to ExpiryPolicy to be set to
null.
• ModifiedExpiryPolicy: Expires after a given set of time measured from creation of the cache entry;
the expiry timeout is updated on updating the key.
• TouchedExpiryPolicy: Expires after a given set of time measured from creation of the cache entry;
the expiry timeout is updated on accessing or updating the key.
Because EternalExpirePolicy does not expire cache entries, it is still possible to evict values from
memory if an underlying CacheLoader is defined.
When creating a cache through a CacheManager, its specified URI scope must be prepended to the
pure cache name as a prefix while getting the cache via getCache. Prefix generation for full cache name
is exposed through the method getPrefixedCacheName. If the URI scope and classloader is not specified,
the pure cache name can be used directly while retrieving the cache.
If you have a cache which is specified in Hazelcast configuration but not created yet, you can get this
cache by its name. This creates the cache before retrieving it. Note that HazelcastInstance does not
support creating a cache by specifying configuration; this is supported by Hazelcast’s CacheManager as
it is.
If a valid JCache library does not exist on the classpath, the exception IllegalState is thrown.
12.6. Hazelcast JCache Extension - ICache
Hazelcast provides extension methods to Cache API through the interface com.hazelcast.cache.ICache.
It has two sets of extensions:
• Cache operations with custom ExpiryPolicy parameter to apply on that specific operation. See
[Custom ExpiryPolicy](#custom-expirypolicy).
ICache data structure can also be used by Hazelcast Jet for Real-Time Stream
Processing (by enabling the Event Journal on your cache) and Fast Batch Processing.
Hazelcast Jet uses ICache as a source (reads data from ICache) and as a sink (writes
data to ICache). Please see the Fast Batch Processing and Real-Time Stream
Processing use cases for Hazelcast Jet. Please also see here in the Hazelcast Jet
Reference Manual to learn how Jet uses ICache, i.e., how it can read from and write
to ICache.
Another Hazelcast ICache feature different from the normal JCache specification is Hazelcast’s
asynchronous versions of almost all methods, returning a com.hazelcast.core.ICompletableFuture. By
using these methods and the returned future objects, you can use JCache in a reactive way by
registering zero or more callbacks on the future to prevent blocking the current thread.
The asynchronous versions of the methods append the phrase Async to the method name. The example
code below uses the method putAsync().
• get(key):
• getAsync(key)
• getAsync(key, expiryPolicy)
• put(key, value):
• putAsync(key, value)
• putAsync(key, value, expiryPolicy)
• putIfAbsent(key, value):
• putIfAbsentAsync(key, value)
• putIfAbsentAsync(key, value, expiryPolicy)
• getAndPut(key, value):
• getAndPutAsync(key, value)
• getAndPutAsync(key, value, expiryPolicy)
• remove(key):
• removeAsync(key)
• remove(key, value):
• removeAsync(key, value)
• getAndRemove(key):
• getAndRemoveAsync(key)
• replace(key, value):
• replaceAsync(key, value)
• replaceAsync(key, value, expiryPolicy)
• replace(key, oldValue, newValue):
• getAndReplaceAsync(key, value)
• getAndReplaceAsync(key, value, expiryPolicy)
The JCache specification has an option to configure a single ExpiryPolicy per cache. Hazelcast ICache
extension offers the possibility of defining a custom ExpiryPolicy per key by providing a set of method
overloads with an expirePolicy parameter, as in the list of asynchronous methods in the [Async
Methods section](#async-methods). This means that you can pass custom expiry policies to a cache
operation.
To pass a custom ExpirePolicy, a set of overloads is provided. You can use them as shown in the
following code example.
The ExpirePolicy instance can be pre-created, cached, and re-used, but only for each cache instance.
This is because ExpirePolicy implementations can be marked as java.io.Closeable. The following list
shows the provided method overloads over javax.cache.Cache by com.hazelcast.cache.ICache featuring
the ExpiryPolicy parameter:
• get(key):
• get(key, expiryPolicy)
• getAll(keys):
• getAll(keys, expirePolicy)
• put(key, value):
• putAll(map, expirePolicy)
• putIfAbsent(key, value):
By default, data structures in Hazelcast store data on heap in serialized form for the highest data
compaction, yet these data structures are still subject to Java Garbage Collection (GC). Modern
hardware has much more available memory than when GC was designed. If you want to make use of
that hardware and scale up by specifying higher heap sizes, GC becomes an increasing problem, as the
application faces long GC pauses that make the application unresponsive. Also, you may get out of
memory errors if you fill your whole heap. Garbage collection, which is the automatic process
managing the program’s runtime memory, often forces you into configurations where multiple JVMs
with small heaps (sizes of 2-4GB per node) run on a single physical hardware device to avoid garbage
collection pauses. This results in oversized clusters to hold data and leads to performance-level
requirements.
Hazelcast High-Density Memory Store, the successor to Hazelcast Elastic Memory, is Hazelcast’s new
enterprise in-memory storage solution. It solves garbage collection limitations so that applications can
exploit hardware memory more efficiently without the need for oversized clusters.
High-Density Memory Store is designed as a pluggable memory manager that enables multiple
memory stores for different data structures. These memory stores are all accessible using a common
access layer that scales up to terabytes of the main memory on a single JVM by minimizing the GC
pressure. High-Density Memory Store enables predictable application scaling and boosts performance
and latency while minimizing garbage collection pauses.
In order to scale up using Hazelcast Enterprise, Hazelcast’s High-Density Memory storage solution
keeps your huge data on RAM and accesses them efficiently without incurring garbage collection
overhead.
Architecturally, Hazelcast has an on-heap memory store and a separate High-Density Memory Store.
High-Density Memory Store has multiple implementations: an on-heap SLAB Allocator that uses heap
memory, and a native memory implementation that allocates the memory using “sun.misc.Unsafe”
outside of JVM heap. Only the native memory-based implementation is exposed to the end users. These
implementations have different ergonomics but share the ability to hold data in the JVM process while
avoiding garbage collection pauses.
You can use High-Density Memory Store both in Hazelcast members (server nodes) and clients. On the
server side, each member holds large amounts of data (hundreds of GBs) on the High-Density storage.
On the client side, very large near caches (GBs) can prevent server access over the network by
accessing data locally so data access speeds measure in nanoseconds rather than in milliseconds.
You can configure High-Density Memory Store for use with IMap, which provides a highly capable and
feature rich distributed Map, and ICache - Hazelcast’s implementation of JCache. For more details,
please see the IMap on High-Density Memory and JCache on High-Density Memory sections.
• size: Maximum size of the native memory that can be allocated. The whole configured native
memory is not allocated at startup; it is allocated on demand. Default value is 512 MB.
◦ STANDARD: Allocate/free memory using the default OS memory manager. Each allocate/free
interacts with the OS to allocate/free memory.
◦ POOLED: (the default value) Manage memory blocks using internal memory pools. Therefore,
each allocate/free, except those bigger than page size, does not interact with OS. It tries to find
available memory of the requested memory size inside the internal memory pools for memory
allocation; if it can not be found, it interacts with OS. For freeing memory, it marks disposed
memory block as available to be used later.
Using the POOLED allocator is strongly recommended. Here are the advantages: * when
allocation sizes vary in a wide range, fragmentation grows so large that the OOM killer
can terminate the process; or, if available, process memory overflows to swap space
which kills the performance. * malloc/free are subject to contention on
multithreaded/multicore systems.
◦ The STANDARD allocator is used internally by the POOLED allocator or for debugging purposes.
If you still want to use OS memory management, you can set the allocator type to STANDARD in
your native memory configuration.
• minimum block size: Minimum size of the blocks in bytes for splitting and fragmenting a page
block assigned to an allocation request. It is used only by the POOLED memory allocator. Default
value is 16.
• page size: Size of the page in bytes to allocate for a memory block. It is used only by the POOLED
memory allocator. Default value is 1 << 22 = 4194304 bytes, about 4 MB.
• metadata space percentage: Defines the percentage of the allocated native memory that is used
for the metadata, such as offsets. This percentage is used only by the POOLED memory allocator.
Default value is 12.5. If the sizes of keys and values (records) are too small, it is advised that you use
more metadata space because, in the case of small key/value sizes, the memory usage of metadata
and records are close to each other and metadata space can overflow before records fill up the user
memory space (user memory space = total native memory space - metadata space). Your data can
occupy, at most, the percentage of 100 - metadata-space-percentage of the configured maximum
native memory size; the remaining percentage is reserved for internals of High-Density memory.
For example, when you configure 100GB maximum native memory size and 20 percent metadata
space, your data can use at most 80GB native memory.
You need to enable native memory configuration explicitly for programmatic and
declarative configuration.
<cache name="myCache">
<in-memory-format>NATIVE</in-memory-format>
</cache>
<map name="myMap">
<in-memory-format>NATIVE</in-memory-format>
</map>
<near-cache name="myNearCache">
<in-memory-format>NATIVE</in-memory-format>
</cache>
Here are the configuration examples for native memory storage formatted cache which can occupy at
most 90% of the maximum configured native memory size.
<cache name="myCache">
<eviction size="90"
max-size-policy="USED_NATIVE_MEMORY_PERCENTAGE" eviction-policy="LFU"/>
</cache>
Here are configuration examples for native memory storage formatted map which can occupy at most
90% of the maximum configured native memory size.
mapConfig.setEvictionPolicy(EvictionPolicy.LFU);
MaxSizeConfig maxSizeConfig = new MaxSizeConfig();
maxSizeConfig.setSize(90);
maxSizeConfig.setMaximumSizePolicy(MaxSizePolicy.USED_NATIVE_MEMORY_PERCENTAGE);
mapConfig.setMaxSizeConfig(maxSizeConfig);
<map name="myMap">
<eviction-policy>LFU</eviction-policy>
<max-size policy="USED_NATIVE_MEMORY_PERCENTAGE">90</max-size>
</map>
You can configure the eviction for near cache in the same way you do for map and
cache, as described in the above examples. Just configure the eviction and include it
in the near cache configuration.
There is no public API to access node based High-Density memory statistics. However, you can see the
native memory usage in the logs by enabling the health monitor. Set the system property
hazelcast.health.monitoring.level or the group property (GroupProperty.HEALTH_MONITORING_LEVEL) to
any value of “HealthMonitorLevel” except “OFF” (default value is “SILENT”).
The following is an example health monitor log. The native memory usage and GC statistics are
highlighted:
When you enable Hazelcast Management Center, you can see the High-Density memory usage and GC
statistics in the panel “MemoryUtilization” at the Management Center web console as shown below.
Chapter 14. Network Configuration
Hazelcast can run perfectly within a single JVM. This is excellent for development and to speed up
testing. But the true strength of Hazelcast becomes apparent when a cluster of JVMs running on
multiple machines is created. Having a cluster of machines makes Hazelcast resilient to failure; if one
machine fails, the data will failover to another machine as if nothing happened. It also makes
Hazelcast scalable—just add extra machines to the cluster to gain additional capacity. You can create
clusters by configuring the network settings.
To test the networking settings, we are going to make use of the following minimalistic Hazelcast
member, which loads the configuration from a Hazelcast XML configuration file unless specified
otherwise.
<hazelcast>
...
<network>
...
</network>
...
</hazelcast>
For reasons of brevity, this example leaves out the enclosing Hazelcast tags. You can find the complete
sources for this book on the Hazelcast website. For a Hazelcast cluster to function correctly, all
members must be able to directly contact every other member. Suppose you have three Hazelcast
members: member1, member2, and member3. Hazelcast does not support the situation of member1
being unable to connect directly to member2, then trying to connect to member2 by going through
member3. Hazelcast is a peer-to-peer cluster, i.e., all members in a cluster should be able to connect to
each other directly. A Hazelcast member doesn’t act as a proxy for another member.
14.2. Port
One of the most basic configuration settings is the port Hazelcast uses for communication between the
members. You can set this with the port property in the network configuration. It defaults to 5701.
<network>
<port>5701</port>
</network>
If you start the member, you will get output like the following.
As you can see, the port 5701 is used, so port 5702 is assigned. By default, Hazelcast will try 100 ports to
find a free one it can bind to, i.e., Hazelcast tries ports between 5701 and 5801 (exclusive) here until it
finds a free one. In some cases, you want to control the number of ports tried. For example, you could
have a large number of Hazelcast instances running on a single machine or you only want a few ports
to be used. You can do this by specifying the port-count attribute, which defaults to 100. In the
following example you can see the port-count with a value of 200.
<network>
<port port-count="200">5701</port>
</network>
In most cases you won’t need to specify the port-count attribute, but it can be very practical in those
rare cases where you need to.
If you only want to make use of a single explicit port, you can disable the automatic port increment
using the auto-increment attribute (which defaults to true) as shown below.
<network>
<port auto-increment="false">5701</port>
</network>
If you look at the end of the logging, you’ll see the following warning:
WARNING: [192.168.1.104]:5701 [dev] No join method is enabled! Starting standalone.
You will get this warning no matter how many members you start because if you use the XML
configuration, by default no join mechanism is selected and therefore the members can’t join to form a
cluster. To specify a join mechanism, see Join Mechanism.
<network>
<outbound-ports>
<!-- ports between 33000 and 35000 -->
<ports>33000-35000</ports>
<!-- comma separated ports -->
<ports>37000,37001,37002,37003</ports>
<ports>38000,38500-38600</ports>
</outbound-ports>
</network>
As you can see, you can specify ports in a comma-separated way, or you can define a range, as well.
In programmatic configuration you use the method addOutboundPort to add only one port. If you need
to add a group of ports, then use the method addOutboundPortDefinition.
In the declarative configuration, the element ports can be used for both single and multiple port
definitions.
14.4. Reuse Address
When you shutdown a cluster member, the server socket port will be in the TIME_WAIT state for the next
couple of minutes. If you start the member right after shutting it down, you may not be able to bind it
to the same port because it is in the TIME_WAIT state. If you set the reuse-address element to true, the
TIME_WAIT state is ignored and you can bind the member to the same port again.
<network>
<reuse-address>true</reuse-address>
</network>
1. TCP/IP-cluster.
2. Multicast.
3. Amazon EC2.
One of these mechanisms needs to be enabled to form a cluster, or else they will remain standalone. If
you use programmatic Hazelcast configuration, multicast is enabled by default. If you use XML
configuration, none is enabled so you need to enable one. After joining the cluster, Hazelcast relies on
TCP for internal communication.
14.5.1. Multicast
With multicast discovery, a member will send a message to all members that listen to a specific
multicast group. It is the easiest mechanism to use, but it is not always available. Here is an example of
a very minimalistic multicast configuration:
<network>
<join>
<multicast enabled="true"/>
</join>
</network>
If you start one member, you will see output like this:
Members [1] {
Member [192.168.1.104]:5701 this
}
The member is started. Currently, the cluster has a single member. If you start another member on the
same machine, the following will be added to the output on the console of the first member:
Members [2] {
Member [192.168.1.104]:5701 this
Member [192.168.1.104]:5702
}
The first member can see the second member, and if we look at the end of logging for the second
member, we’ll find something similar:
Members [2] {
Member [192.168.1.104]:5701
Member [192.168.1.104]:5702 this
}
We now have a two-member Hazelcast cluster running on a single machine. It becomes more
interesting if you start multiple members on different machines.
You can tune the multicast configuration using the following elements:
1. multicast-group: With multicast, a member is part of the multicast group and will not receive
multicast messages from other groups. By setting the multicast-group or the multicast-port, you
can have separate Hazelcast clusters within the same network, so it is a best practice to use
separate groups if the same network is used for different purposes. The multicast group IP address
doesn’t conflict with normal unicast IP addresses since they have a specific range that is excluded
from normal unicast usage: 224.0.0.0 to 239.255.255.255 (inclusive) and defaults of 224.2.2.3. The
address 224.0.0.0 is reserved and should not be used.
2. multicast-port: The port of the multicast socket where the Hazelcast member listens and where it
sends discovery messages. Unlike normal unicast sockets where only a single process can listen to a
port, with multicast sockets multiple processes can listen to the same port. You don’t need to worry
that multiple Hazelcast members running on the same JVM will conflict. This property defaults to
54327.
3. multicast-time-to-live: Sets the default time-to-live for multicast packets sent out to control the
scope of the multicasts. Defaults to 32. The maximum is 255.
4. multicast-timeout-seconds: Specifies the time in seconds that a node should wait for a valid
multicast response from another node running in the network before declaring itself as master
node and creating its own cluster. This applies only to the startup of nodes where no master has
been assigned yet. If you specify a high value such as 60 seconds, each node is going to wait 60
seconds until a master is selected. Be careful when providing a high value. Also avoid setting the
value too low since nodes could give up too early and create their own cluster. This property
defaults to two seconds.
<network>
<join>
<multicast enabled="true">
<multicast-group>224.2.2.3</multicast-group>
<multicast-port>54327</multicast-port>
<multicast-time-to-live>32</multicast-time-to-live>
<multicast-timeout-seconds>2</multicast-timeout-seconds>
</multicast>
</join>
</network>
By default, multicast join requests of all machines will be accepted, but in some cases you want to have
more control. With trusted-interfaces you can control the machines you want to listen to by
registering their IP address as a trusted member. If a join request is received for a machine that is not
a trusted member, it will be ignored and it will be prevented from joining the cluster. Below is an
example where only join requests of 192.168.1.104 are allowed.
<network>
<join>
<multicast enabled="true">
<trusted-interfaces>
<interface>192.168.1.104</interface>
</trusted-interfaces>
</multicast>
</join>
</network>
Hazelcast supports a wildcard on the last octet of the IP address, such as 192.168.1.*, and also supports
an IP range on the last octet, such as 192.168.1.100-110. If you do not specify any trusted-interfaces so
the set of trusted interfaces is empty, no filtering will be applied.
If you have configured trusted interfaces but one or more nodes are not joining a cluster, your trusted
interfaced configuration may be too strict. Hazelcast will log on the finest level if a message is filtered
out so you can see what is happening.
If you use the programmatic configuration, the trusted interfaces are called trusted members.
If you don’t see members joining, it is likely that multicast is not available. A firewall could be the
cause; you can test this by disabling the firewall or enabling multicast in the firewall (see Firewall).
Also, multicast could be disabled on the network, or the network might not support it. In NIX
environments, you can check if your network interface supports multicast by calling ifconfig | grep
-i multicast, though that does not guarantee that multicast is available. To check if multicast is
available, iperf is a useful tool (available for Windows/NIX/OSX). To test multicast using multicast-
group 224.2.2.3, open a terminal on two machines within the network, then run the following in the
first terminal iperf -s -u -B 224.2.2.3 -i 1 and run iperf -c 224.2.2.3 -u -T 32 -t 3 -i 1 in the
other terminal. If data is being transferred, then multicast is working.
If you want to use multicast for local development and it isn’t working, you can try the following
unicast configuration.
<network>
<join>
<multicast enabled="false"/>
<tcp-ip enabled="true"/>
</join>
</network>
14.5.4. TCP/IP Cluster
In the previous section we used multicast, but in production environments multicast often is
prohibited, and often in cloud environments, multicast is not supported. Thus, Hazelcast provides
another discovery mechanism, the TCP/IP cluster. Members should connect to one or more well-known
members. Once members have connected to these well-known members and joined the cluster, they
will keep each other up to date with all member addresses.
Here is an example of a TCP/IP cluster configuration with a well-known member with IP 192.168.1.104:
<network>
<join>
<tcp-ip enabled="true">
<member>192.168.1.104</member>
</tcp-ip>
</join>
</network>
You can configure multiple members using a comma separated list, or with multiple <member> entries.
You can define a range of IPs using the syntax 192.168.1.100-200. If no port is provided, Hazelcast will
automatically try the ports 5701..5703. If you do not want to depend on IP addresses, you can provide
the hostname. Instead of using more than one <member> to configure members, you can also use
<members>.
<network>
<join>
<tcp-ip enabled="true">
<members>192.168.1.104,192.168.1.105</members>
</tcp-ip>
</join>
</network>
This is very useful in combination with XML variables (see Learning The Basics: Variables).
By default, Hazelcast will bind (accept incoming traffic) to all local network interfaces. If this is an
unwanted behavior, you can set the hazelcast.socket.bind.any to false. In that case, Hazelcast will first
use the interfaces configured in the interfaces/interfaces to resolve one interface to bind to. If none is
found, Hazelcast will use the interfaces in the tcp-ip/members to resolve one interface to bind to. If no
interface is found, it will default to localhost.
When a large number of IPs are listed and members can’t build up a cluster, you can set the
connection-timeout-seconds attribute, which defaults to 5, to a higher value. You can configure first
scan and delay between scans using the property hazelcast.merge.first.run.delay.seconds and
respectively hazelcast.merge.next.run.delay.seconds. By default, Hazelcast will scan every 5 seconds.
Required Member
If a member needs to be available before a cluster is started, there is an option to set the required
member:
<tcp-ip enabled="true">
<required-member>192.168.1.104</required-member>
<member>192.168.1.104</member>
<member>192.168.1.105</member>
</tcp-ip>
In this example, a cluster will only start when member 192.168.1.104 is found. Once this member is
found, it will become the master. That means required-member is the address of the expected master
node.
Apart from Multicast and the TCP/IP-cluster join mechanisms, there is a third mechanism: Amazon
AWS. This mechanism, which makes use of TCP/IP discovery behind the scenes, reads out EC2 instances
within a particular region and has certain tag-keys/values or a security group. These instances will be
the well known members of the cluster. A single region is used to let new nodes discover the cluster,
but the cluster can span multiple regions (it can even span multiple cloud providers). Let’s start with a
very simple setup.
<network>
<join>
<aws enabled="true">
<access-key>my-access-key</access-key>
<secret-key>my-secret-key</secret-key>
</aws>
</join>
</network>
my-access-key and my-secret-key need to be replaced with your access key and secret key. Make sure
that the started machines have a security group where the correct ports are opened (see Firewall). Also
make sure that the enabled="true" section is added because if you don’t add it, the AWS configuration
will not be picked up (it is disabled by default). To prevent hardcoding the access-key and secret-key,
see Learning the Basics: Variables.
• region: The region where the machines are running. Defaults to us-east-1. If you run in a different
region, you need to specify it, otherwise the members will not discover each other.
• tag-key,tag-value: Allows you to limit the numbers of EC2 instances to look at by providing them
with a unique tag-key/tag-value. This makes it possible to create multiple clusters in a single data
center.
• security-group-name: Just like the tag-key,tag-value, it filters out EC2 instances. This doesn’t need to
be specified.
• host-header: You can give an entry point URL for your web service using this property. It is optional.
The aws tag accepts an attribute called conn-timeout-seconds. The default value is 5 seconds. You can
increase it if you have many IPs listed and members can not properly build up the cluster.
You can use Hazelcast even if you are using a cloud provider other than Amazon EC2. You can use the
programmatic API to configure a TCP/IP cluster. The well-known members need to be retrieved from
your cloud provider (for example, using JClouds).
If you have problems connecting and you are not sure that the EC2 instances are being found correctly,
check out the AWSClient class. This client is used by Hazelcast to determine all the private IP addresses
of EC2 instances you want to connect to. If you feed it the configuration settings that you are using, you
can see if the EC2 instances are being found.
Another thing you can do when your cluster is not being created correctly is change the log level to
finest/debug. Hazelcast will log the instances in a region it is encountering and will also tell if an
instance is accepted or rejected and the reason for rejection.
• Non-matching group-name.
• Non-matching tag-key/tag-value.
A full step-by-step tutorial on how to start a demo application on Amazon EC2 can be found in the
appendix.
14.5.6. Partition Group Configuration
Normally, Hazelcast prevents the master and the backup partitions from being stored on the same JVM
to guarantee high availability, but multiple Hazelcast members of the same cluster can run on the
same machine, and thus when the machine fails, both master and backup can fail. Hazelcast provides
a solution for this problem in the form of partition groups.
<hazelcast>
<partition-group enabled="true" group-type="HOST_AWARE"/>
</hazelcast>
Using this configuration, all members that share the same hostname/host IP will be part of the same
group and therefore will not host both master and backup(s). Another reason partition groups can be
useful is that normally Hazelcast considers all machines to be equal and therefore will distribute the
partitions evenly, but in some cases machines are not equal, such as different amounts of memory
available or slower CPUs, and that could lead to a load imbalance. With a partition group, you can
make member groups where each member-group has the same capacity and where each member has the
same capacity as the other members in the same member-group. In the future, perhaps a balance factor
will be added to relax these constraints. Here is an example where we define multiple member groups
based on matching IP addresses.
<hazelcast>
<partition-group enabled="true" group-type="CUSTOM">
<member-group>
<interface>10.10.1.*</interface>
</member-group>
<member-group>
<interface>10.10.2.*</interface>
</member-group
</partition-group>
</hazelcast>
In this example, where the group-type is "CUSTOM", there are two member groups, where the first
member-group contains all member with an IP 10.10.1.0-255 and the second member-group contains all
member with an IP of 10.10.2.0-255. You can use this approach to create different groups for each data
center so that when the primary data center goes offline, the backup data center can take over.
• HOST_AWARE: You can group members automatically using the IP addresses of members, so
members sharing the same network interface will be grouped together. All members on the same
host (IP address or domain name) will be a single partition group.
• PER_MEMBER: You can give every member its own group. Each member is a group of its own and
primary and backup partitions are distributed randomly (not on the same physical member). This
gives the least amount of protection and is the default configuration for a Hazelcast cluster. This
grouping type provides good redundancy when Hazelcast members are on separate hosts.
However, if multiple instances run on the same host, this type is not a good option.
• ZONE_AWARE: You can use this type with Hazelcast on jclouds or on Azure. When a Hazelcast
cluster is deployed on either of these cloud platforms, zone, rack, and host information is put to the
Hazelcast member attributes map during the discovery process. Hazelcast creates the partition
groups with respect to member attributes map entries that include zone, rack, and host
information. When using ZONE_AWARE configuration, backups are created in the other zones.
Each zone will be accepted as one partition group.
• SPI: You can provide your own partition group implementation using the SPI configuration. To
create your partition group implementation, you need to first extend the DiscoveryStrategy class of
the discovery service plugin, override the method public PartitionGroupStrategy
getPartitionGroupStrategy(), and return the PartitionGroupStrategy configuration in that
overridden method.
<hazelcast>
<group>
<name>application1</name>
</group>
</hazelcast>
A group is something other than a partition-group; with the former you create isolated clusters and
with the latter you control how partitions are being mapped to members.
14.7. SSL
In a production environment, you often want to prevent the communication between Hazelcast
members from being tampered with or being read by an intruder because the communication could
contain sensitive information. Hazelcast provides SSL encryption as a solution.
The basic functionality is provided by the SSLContextFactory interface and it is configurable through
the the SSL section in network configuration. Hazelcast provides a default implementation called the
BasicSSLContextFactory, which we are going to use for the example.
<network>
<join>
<multicast enabled="true"/>
</join>
<ssl enabled="true">
<factory-class-name>
com.hazelcast.nio.ssl.BasicSSLContextFactory
</factory-class-name>
<properties>
<property name="keyStore">keyStore.jks</property>
<property name="keyStorePassword">password</property>
</properties>
</ssl>
</network>
The keyStore is the path to the keyStore and the keyStorePassword is the password of the keystore. In the
example code you can find an already created keystore; you can also find how to create one yourself in
the documentation. When you start a member, you will see that SSL is enabled.
There are some additional properties that you can set on the BasicSSLContextFactory:
Another way you can configure the keyStore and keyStorePassword is through the
javax.net.ssl.keyStore and javax.net.ssl.keyStorePassword system properties. The recommended
practice is to make a single keystore file that is shared between all instances. It isn’t possible to include
the keystore within the JAR.
14.8. OpenSSL
TLS/SSL in Java is normally provided by the JRE. However, the performance overhead can be
significant; even with AES intrensics enabled. If you are using Linux, Hazelcast provides OpenSSL
integration for TLS/SSL which can provide significant performance improvements.
OpenSSL can be used on clients and/or members. For best performance, it is recommended to install
on a client and member, and configure the appropriate cipher suite(s).
Integrating OpenSSL into Hazelcast is achieved with the steps explained below.
14.8.1. Installing OpenSSL
Make sure you installed OpenSSL 1.0.1 or newer release. Along with OpenSSL, you need to install
Apache Portable Runtime library and Netty libraries. For a Maven based project the latter is easy:
<dependencies>
<dependency>
<groupId>io.netty</groupId>
<artifactId>netty-tcnative-boringssl-static</artifactId>
<version>1.1.33.Fork26</version>
</dependency>
<dependency>
<groupId>io.netty</groupId>
<artifactId>netty-all</artifactId>
<version>4.1.8.Final</version>
</dependency>
...
</dependencies>
Configuring OpenSSL in Hazelcast is straight forward. On the client and/or member side, the following
snippet enables TLS/SSL using OpenSSL:
<network>
...
<ssl enabled="true">
<factory-class-name>com.hazelcast.nio.ssl.OpenSSLEngineFactory</factory-class-
name>
<properties>
<property name="keyStore">hazelcast.keystore</property>
<property name="keyStorePassword">123456</property>
<property name="keyManagerAlgorithm">SunX509</property>
<property name="trustManagerAlgorithm">SunX509</property>
<property name="trustStore">hazelcast.truststore</property>
<property name="trustStorePassword">123456</property>
<property name="protocol">TLSv1.2</property>
</properties>
</ssl>
</network>
The configuration is almost the same as regular TLS/SSL integration. The main difference is the
OpenSSLEngineFactory factory class.
Here are the descriptions for the properties:
• keystore: Path of your keystore file. Note that your keystore’s type must be JKS.
• keyManagerAlgorithm: Name of the algorithm based on which the authentication keys are provided.
• trustManagerAlgorithm: Name of the algorithm based on which the trust managers are provided.
• truststore: Path of your truststore file. The file truststore is a keystore file that contains a collection
of certificates trusted by your application. Its type should be JKS.
• protocol: Name of the algorithm which is used in your TLS/SSL. Its default value is TLS. Available
values are:
◦ SSL
◦ SSLv2
◦ SSLv3
◦ TLS
◦ TLSv1
◦ TLSv1.1
◦ TLSv1.2
All of the above algorithms support Java 6 and higher versions, except the TLSv1.2 supports Java 7 and
higher versions. For the protocol property, we recommend you to provide SSL or TLS with its version
information, e.g., TLSv1.2. Note that if you configure only SSL or TLS, it will be converted to SSLv3 and
TLSv1.2.
To get the best performance out of OpenSSL, the correct cipher suites need to be configured. Each
cipher suite has different performance and security characteristics and depending on the hardware
and selected cipher suite, the overhead of TLS can range from dramatic to almost negligible.
The cipher suites are configured using the ciphersuites property as shown below:
<ssl enabled="true">
<factory-class-name>com.hazelcast.nio.ssl.OpenSSLEngineFactory</factory-class-name>
<properties>
<property name="keyStore">upload/hazelcast.keystore</property>
...
...
...
<property name="ciphersuites">TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</property>
</properties>
</ssl>
The ciphersuites property accepts a comma separated list (spaces, enters, tabs are filtered out) of
cipher suites in the order of preference.
You can configure a member and client with different cipher suites; but there should be at least one
shared cipher suite.
One of the cipher suites that gave very low overhead but still provides solid security is the
'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256'. However in our measurements this cipher suite only
performs well using OpenSSL; using the regular Java TLS integration, it performs badly. So keep that in
mind when configuring a client using regular SSL and a member using OpenSSL.
Please check with your security expert to determine which cipher suites are appropriate and run
performance tests to see which ones perform well in your environment.
If you don’t configure the cipher suites, then both client and/or member will determine a cipher suite
by themselves during the TLS/SSL handshake. This can lead to suboptimal performance and lower
security than required.
14.9. Encryption
Hazelcast also supports symmetric encryption based on the Java Cryptography Architecture (JCA). The
main advantage of using the JCA is that it is easier to set up because you don’t need to deal with the
keystore. The main disadvantage is that it is less secure because SSL relies on an on-the-fly created
public/private key pair and the symmetric encryption relies on a constant password/salt.
SSL and symmetric encryption solutions have roughly the same CPU and network bandwidth overhead
because they rely on symmetric encryption for the main data; only the public key is encrypted using
asymmetric encryption. Compared to non-encrypted data, the performance degradation will be
roughly 50%. To demonstrate the encryption, let’s have a look at the following configuration.
<network>
<join>
<multicast enabled="true"/>
</join>
<symmetric-encryption enabled="true">
<algorithm>PBEWithMD5AndDES</algorithm>
<salt>somesalt</salt>
<password>somepass</password>
<iteration-count>19</iteration-count>
</symmetric-encryption>
</network>
When we start two members using this configuration, we’ll see that the symmetric encryption is
activated.
Since encryption relies on the JCA, additional algorithms can be used by enabling the Bouncy Castle
JCA provider through the property hazelcast.security.bouncy.enabled. Hazelcast used to support
asymmetric encryption, but due its complex setup, this feature has been removed from Hazelcast 3.0.
Currently, there is no support for encryption between a native client and a cluster member.
For this validation, Hazelcast IMDG Enterprise comes with the class DefaultSecretStrengthPolicy to
identify all possible weaknesses of secrets and to display a warning in the system logger. Note that, by
default, no matter how weak the secrets are, the cluster members will still start after logging this
warning; however, this is configurable and explained later in this section.
• Large keyspace use, ensuring the use of at least three of the following:
◦ mixed case;
◦ alpha;
◦ numerals;
◦ special characters; and
◦ no dictionary words.
The rules “Minimum length of eight characters” and “no dictionary words” can be configured using the
following system properties:
Example:
-Dhazelcast.security.secret.policy.min.length=10
Example:
-Dhazelcast.security.dictionary.policy.wordlist.path=”/Desktop/myWordList”
You can implement SecretStrengthPolicy to develop your custom strength policy for a more flexible or
strict security. After you implement it, you can use the following system property to point to your
custom class:
Example:
-Dhazelcast.security.secret.strength.default.policy.class=”com.impl.myStrengthPolicy”
By default, secret strength policy is NOT enforced. This means, if a weak secret is detected, an
informative warning will be showed in the system logger and the members will continue to initialize.
However, you can enforce the policy using the following system property so that the members will not
be started until the weak secret errors are fixed:
The following is a sample warning when secret strength policy is NOT enforced, i.e., the above system
property is set to “false”:
The following is a sample warning when secret strength policy is enforced, i.e., the above system
property is set to “true”:
WARNING: [192.168.2.112]:5701 [dev] [3.9-SNAPSHOT]
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ SECURITY WARNING @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Symmetric Encryption Password does not meet the current policy and complexity
requirements.
*Must contain at least 1 number.
*Must contain at least 1 special character.
Group Password does not meet the current policy and complexity requirements.
*Must not be set to the default.
*Must have at least 1 lower and 1 upper case characters.
*Must contain at least 1 number.
*Must contain at least 1 special character.
Symmetric Encryption Salt does not meet the current policy and complexity requirements.
*Must contain 8 or more characters.
*Must contain at least 1 number.
*Must contain at least 1 special character.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Exception in thread "main" com.hazelcast.security.WeakSecretException: Weak secrets found
in configuration, check output above for more details.
at
com.hazelcast.security.impl.WeakSecretsConfigChecker.evaluateAndReport(WeakSecretsConfigC
hecker.java:49)
at
com.hazelcast.instance.EnterpriseNodeExtension.printNodeInfo(EnterpriseNodeExtension.java
:197)
at com.hazelcast.instance.Node.<init>(Node.java:194)
at
com.hazelcast.instance.HazelcastInstanceImpl.createNode(HazelcastInstanceImpl.java:163)
at com.hazelcast.instance.HazelcastInstanceImpl.<init>(HazelcastInstanceImpl.java:130)
at
com.hazelcast.instance.HazelcastInstanceFactory.constructHazelcastInstance(HazelcastInsta
nceFactory.java:195)
at
com.hazelcast.instance.HazelcastInstanceFactory.newHazelcastInstance(HazelcastInstanceFac
tory.java:174)
at
com.hazelcast.instance.HazelcastInstanceFactory.newHazelcastInstance(HazelcastInstanceFac
tory.java:124)
at com.hazelcast.core.Hazelcast.newHazelcastInstance(Hazelcast.java:58)
You can also specify which network interfaces Hazelcast should use. Servers mostly have more than
one network interface so you may want to list the valid IPs. You can use range characters (* and -) for
simplicity. For instance, 10.3.10.* refers to IPs between 10.3.10.0 and 10.3.10.255. Interface 10.3.10.4-18
refers to IPs between 10.3.10.4 and 10.3.10.18 (4 and 18 included). If network interface configuration is
enabled (it is disabled by default) and if Hazelcast cannot find an matching interface, it will print a
message on the console and won’t start on that member.
<hazelcast>
<network>
<interfaces enabled="true">
<interface>10.3.16.*</interface>
<interface>10.3.10.4-18</interface>
<interface>192.168.1.3</interface>
</interfaces>
</network>
</hazelcast>
14.12. Firewall
When a Hazelcast member connects to another Hazelcast member, it binds to server port 5701 (see the
port configuration section) to receive the inbound traffic. On the client side also, a port needs to be
opened for the outbound traffic. By default, this will be an ephemeral port since it doesn’t matter which
port is being used as long as the port is free. The problem is that the lack of control on the outbound
port can be a security issue, because the firewall needs to expose all ports for outbound traffic.
Hazelcast provides means to control outbound ports to address these concerns. For example, if we
want to allow the port range 30000-31000, we can configure like this:
<network>
<join>
<multicast enabled="true"/>
</join>
<outbound-ports>
<ports>30000-31000</ports>
</outbound-ports>
</network>
To demonstrate the outbound ports' configuration, start two Hazelcast members with this
configuration. When the members are fully started, execute sudo lsof -i | grep java. Below you can
see the cleaned output of that command:
There are 2 java processes, 46117 and 46120, that listen to ports 5701 and 5702 (inbound traffic). You
can see that java process 46120 uses port 30609 for outbound traffic.
Apart from specifying port ranges, you can also specify individual ports. You can combine multiple
port configurations either by separating them with commas or by providing multiple <ports> sections.
If you want to use port 30000, 30005 and port range 31000 till 32000, you could say the following:
<ports>30000,30005,31000-32000</ports>.
14.12.1. iptables
If you are using iptables, the following rule can be added to allow for outbound traffic from ports
33000-31000:
iperf -s -p 5701
This means that you are listening to port 5701.
Replace 192.168.1.107 with the IP address of your first machine. If you run the command and you get
output like this:
then you know the two machines can connect to each other. However, if you see something like this:
------------------------------------------------------------
Server listening on TCP port 5701
TCP window size: 85.3 KByte (default)
------------------------------------------------------------
connect failed: No route to host
------------------------------------------------------------
then you know that you might have a network connection problem on your hands.
To provide faster access times and lower access latencies, Hibernate second level cache offers the
ability to plug in a second-level cache that keeps pre-provisioned object data in-memory. This cache
associates with the SessionFactory object. This means that the cache is not restricted to a single session
but is shared across sessions, and therefore data is available to the entire application, not just to the
current user. This can greatly improve application performance, as commonly used data can be held in
memory in the application tier.
Hazelcast provides a distributed second level cache for your Hibernate entities, collections, and
queries.
You should consider two main configuration aspects in your Hibernate configuration file (e.g.
hibernate.cfg.xml): enabling the second level cache and specifying the factory class that will be used by
Hibernate.
To enable the second level cache, set the below property to “true” in the Hibernate configuration file:
<property name="hibernate.cache.use_second_level_cache">true</property>
<property name="hibernate.cache.region.factory_class">
com.hazelcast.hibernate.HazelcastCacheRegionFactory
</property>
HazelcastCacheRegionFactory uses standard Hazelcast Distributed Maps to cache the data, so all cache
operations go through the wire. All operations like get, put, and remove will be performed using the
Distributed Map logic.
HazelcastLocalCacheRegionFactory stores data in a local node and sends invalidation messages when an
entry is updated/deleted locally.
You can define a custom-named Hazelcast configuration XML file with one of these Hibernate
configuration properties.
<property name="hibernate.cache.provider_configuration_file_resource_path">
hazelcast-custom-config.xml
</property>
<property name="hibernate.cache.hazelcast.configuration_file_path">
hazelcast-custom-config.xml
</property>
Hazelcast creates a separate distributed map for each Hibernate cache region. This means that you can
easily configure these regions via Hazelcast map configuration, e.g., backup counts, eviction policies,
and near cache.
With P2P mode, each Hibernate deployment launches its own Hazelcast Instance. You can also
configure Hibernate to use an existing instance instead of creating a new HazelcastInstance for each
SessionFactory. To do this, set the hibernate.cache.hazelcast.instance_name Hibernate property to the
`HazelcastInstance’s name.
You can also set up Hazelcast to connect to the cluster as a Native Client. A Native Client is not a cluster
member—it connects to one of the cluster members and delegates all cluster-wide operations to the
cluster member. A client instance started in the Native Client mode uses Smart Routing—when the
relied cluster member dies, the client transparently switches to another live member.
<property name="hibernate.cache.hazelcast.use_native_client">true</property>
To set up Native Client, add the Hazelcast group-name, group-password and cluster member
address properties.
<property name="hibernate.cache.hazelcast.native_client_address">10.34.22.15</property>
<property name="hibernate.cache.hazelcast.native_client_group">dev</property>
<property name="hibernate.cache.hazelcast.native_client_password">dev-pass</property>
Note that to use Native Client, you should add hazelcast-client-<version>.jar into your classpath.
If you use Hibernate annotations, you can add a class-cache or collection-cache element into your
Hibernate configuration file with the usage attribute set to one of these strategies:
First, we need a database table. Let’s use Derby for this purpose:
This table will have the first name, last name and salary columns. Now, let’s create our employee
object:
package com.hazelcast.hibernate;
public Employee() {
}
Finally, the following is the class that will let us perform basic operations on the employee object. Here,
only the list operation is given as an example. You can see the full code at our code samples repository.
public class ManageEmployee {
while (true) {
Thread.sleep(100);
System.out.print("[" + current + ". session] Enter command: ");
String command = reader.nextLine();
if (command.equals("list")) {
List employees = currentSession.createQuery("FROM Employee").list();
for (Object entry : employees) {
Employee employee = (Employee) entry;
System.out.print("Id: " + employee.getId());
System.out.print(", first name: " + employee.getFirstName());
System.out.print(", last name: " + employee.getLastName());
System.out.println(", salary: " + employee.getSalary());
}
} else if ....
....
....
} else {
System.out.println("Command not found. Use help.");
}
}
}
}
Now, we have to perform some configurations to map the employee object and provide a factory class.
Make sure that you put the Hazelcast configuration file, hazelcast.xml, into the root of your classpath.
First, we will create a Hibernate mapping XML file whose content looks like the following:
Employee.hbm.xml
<hibernate-mapping>
<class name="com.hazelcast.hibernate.Employee" table="employee">
<id name="id" type="int" column="id"/>
<property name="firstName" column="first_name" type="string"/>
<property name="lastName" column="last_name" type="string"/>
<property name="salary" column="salary" type="int"/>
</class>
</hibernate-mapping>
As you can see, this XML file maps the employee object’s properties to the related columns of the
database table. Now we will create a Hibernate configuration XML file in which we set the mapping
resource (the above XML file) and other SessionFactory properties:
hibernate.cfg.xml
<hibernate-configuration>
<session-factory>
<property name="hibernate.cache.use_second_level_cache">true</property>
<property name="hibernate.cache.use_query_cache">false</property>
<property name="hibernate.cache.region.factory_class"
>com.hazelcast.hibernate.HazelcastCacheRegionFactory</property>
<property name="hibernate.cache.hazelcast.use_native_client">false</property>
<property name="hibernate.connection.driver_class"
>org.apache.derby.jdbc.EmbeddedDriver</property>
<property name="hibernate.connection.url">jdbc:derby:hibernateDB</property>
<mapping resource="Employee.hbm.xml"/>
</session-factory>
</hibernate-configuration>
In the above Hibernate configuration file we set the factory class as HazelcastCacheRegionFactory,
meaning that we will use the standard Hazelcast Distributed Map to cache the data. When you run the
ManageEmployee class, you will be prompted to enter a command. The following is an example output
when you enter add, list, open, and `change as the commands.
[1.session] Enter command: add
Id: 1
First name: Joey
Last Name: Hallaign
Salary: 30.000
[1.session] Enter command: open
[2.session] Enter command: add
Id: 2
First name: John
Last Name: Baileys
Salary: 40.000
[2.session] Enter command: list
Id: 2, first name: John, last name: Baileys, salary: 40.000
[2.session] Enter command: change
[1.session] Enter command: list
Id: 1, first name: Joey, last name: Hallaign, salary: 30.000
You can see all the available operations by typing help as the command.
As you can see, we used Hazelcast’s distributed map as a Hibernate second level cache to create and
close sessions, add and delete entries, and list the entries for each session we created.
Chapter 16. Integrating Hazelcast with Spring
(From JavaWorld.com, Open source Java projects, by Steven Haines) Spring Integration is an enterprise
integration framework that provides out-of-the-box implementation of the patterns in the now-classic
Enterprise Integration Patterns book. Building on Spring’s Inversion of Control design pattern, Spring
Integration abstracts message sources and destinations and uses message passing and message
manipulation to integrate various components within the application environment. Applications built
with Spring Integration are able to send messages between components, either across a message bus to
another server in your environment or even to another class within the same virtual machine.
You can integrate Hazelcast with Spring for versions of Spring 2.5+.
• hazelcast-version.jar
Then you can declare Hazelcast Objects using the default Spring beans namespace. Example code for a
Hazelcast Instance declaration is listed below.
• hazelcast-spring-version.jar
• hazelcast-version.jar
or
• hazelcast-all-version.jar
Declaring Beans
Hazelcast has its own namespace hazelcast for bean definitions. You can easily add the namespace
declaration xmlns:hz="http://www.hazelcast.com/schema/spring" to the beans element in the context
file so that the hz namespace shortcut can be used as a bean declaration.
<beans xmlns="http://www.springframework.org/schema/beans"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:hz="http://www.hazelcast.com/schema/spring"
xsi:schemaLocation="http://www.springframework.org/schema/beans
http://www.springframework.org/schema/beans/spring-beans-3.0.xsd
http://www.hazelcast.com/schema/spring
http://www.hazelcast.com/schema/spring/hazelcast-spring-3.7.xsd">
You can configure the Hazelcast instance and Hazelcast clients with Hazelcast Namespace.
• map
• multiMap
• replicatedmap
• queue
• topic
• set
• list
• executorService
• idGenerator
• atomicLong
• atomicReference
• semaphore
• countDownLatch
• lock
Hazelcast Distributed ExecutorService, or more generally any Hazelcast managed object, can benefit
from these features. To enable SpringAware objects, you must first configure HazelcastInstance using
hazelcast namespace as explained in [Configuring Spring](#configuring-spring) and add the
<hz:spring-aware /> tag.
<context:annotation-config />
<hz:hazelcast id="instance">
<hz:config>
<hz:spring-aware />
<hz:group name="dev" password="password"/>
<hz:network port="5701" port-auto-increment="false">
<hz:join>
<hz:multicast enabled="false" />
<hz:tcp-ip enabled="true">
<hz:members>10.10.1.2, 10.10.1.3</hz:members>
</hz:tcp-ip>
</hz:join>
</hz:network>
...
</hz:config>
</hz:hazelcast>
• Create a class called SomeValue which contains Spring Bean definitions like ApplicationContext and
SomeBean.
@SpringAware
@Component("someValue")
@Scope("prototype")
public class SomeValue implements Serializable, ApplicationContextAware {
@Autowired
public void setSomeBean( SomeBean someBean) {
this.someBean = someBean;
}
@PostConstruct
public void init() {
someBean.doSomethingUseful();
init = true;
}
...
}
• Get SomeValue Object from Context and put it into Hazelcast Distributed Map on Node-1.
HazelcastInstance hazelcastInstance =
(HazelcastInstance) context.getBean( "hazelcast" );
SomeValue value = (SomeValue) context.getBean( "someValue" )
IMap<String, SomeValue> map = hazelcastInstance.getMap( "values" );
map.put( "key", value );
• Read SomeValue Object from Hazelcast Distributed Map and assert that init method is called since it
is annotated with @PostConstruct.
HazelcastInstance hazelcastInstance =
(HazelcastInstance) context.getBean( "hazelcast" );
IMap<String, SomeValue> map = hazelcastInstance.getMap( "values" );
SomeValue value = map.get( "key" );
Assert.assertTrue( value.init );
<hz:hazelcast id="hazelcast">
...
</hz:hazelcast>
Hazelcast uses its Map implementation for the underlying cache. You can configure a map with your
cache’s name if you want to set additional configurations, such as ttl.
<hz:hazelcast id="hazelcast">
<hz:config>
...
Since Hazelcast `Map`s/`Collection`s are designed to hold very large data that a single machine
cannot carry, iterating through whole values can cause out of memory errors.
To avoid this issue, the target property/attribute can be declared as un-typed Map/Collection as shown
below.
public class SomeBean {
@Autowired
IMap map; // instead of IMap<K, V> map
@Autowired
IQueue queue; // instead of IQueue<E> queue
...
}
Or, parameters of injection methods (constructor, setter) can be un-typed as shown below.
IQueue<E> queue;
...
This counter will be stored in Hazelcast, and it can be called by different members. This counter will
also be scalable—the capacity for the number of counters scales with the number of members in the
cluster. The counter will be highly available—if a member hosting that counter fails, a backup will
already be available on a different member and the system will continue as if nothing happened. We
are going to do this step by step; in each section, a new piece of functionality is going to be added.
In this section, we are going to show you a very basic CounterService whose lifecycle is managed by
Hazelcast. That may not be extremely interesting in and of itself, but that is the first part that needs to
be in place for the Counter functionality. The CounterService is the gateway into the Hazelcast
internals. Through this gateway, you will be able to create proxies, participate in partition migration,
and so on.
• init: This method is called when CounterService is initialized. It gives you the ability to do some
initializing. The NodeEngine gives access to the internals of Hazelcast such as the HazelcastInstance
and the PartitionService. Through the Properties object, you can pass in your own properties.
• shutdown: This method is called when CounterService is shut down. It gives the ability to clean up
resources.
• reset: This method is called when the members have run into the split-brain problem. This occurs
when disconnected members that have created their own cluster are merged back into the main
cluster. Services can also implement the SplitBrainHandleService to indicate that they can take part
in the merge process. For the CounterService, we are going to implement as a no-op.
The next step is to enable the CounterService; in our case, we are going to configure that with
hazelcast.xml.
<network>
<join><multicast enabled="true"/> </join>
</network>
<services>
<service enabled="true">
<name>CounterService</name>
<class-name>CounterService</class-name>
</service>
</services>
1. name: This needs to be a unique name because it will be used to look up the service when a remote
call is made. In our case, we’ll call it CounterService. Please realize that this name will be sent with
every request, so the longer the name, the more data that needs to be (de)serialized and sent over
the line. Don’t make it too long, but also don’t reduce it to something that is not understandable.
2. class: Class of the service, in this case, CounterService. The class needs to have a no-arg constructor,
otherwise the object can’t be initialized.
You can also pass properties, which will be passed to the init method. You can do this using the
following syntax:
<service enabled="true">
<name>CounterService</name>
<class-name>CounterService</class-name>
<properties>
<someproperty>10</someproperty>
</properties>
</service>
If you want to parse more complex XML, see the com.hazelcast.spi.ServiceConfigurationParser, which
will give you access to the XML DOM tree.
If we start this code with our implemented CounterService, we’ll see the following output.
CounterService.init
The CounterService is started as part of the startup of the HazelcastInstance. If you shutdown the
HazelcastInstance, for example, by using Control-C, then you will see:
CounterService.shutdown
17.1.2. Proxy
In the previous section we created a CounterService that starts when Hazelcast starts, but apart from
that it doesn’t do anything yet. In this section, we connect the Counter interface to the CounterService,
we do a remote call on the member hosting the eventual counter data/logic, and we return a dummy
result. In Hazelcast, remoting is done through a Proxy—on the client side, you get a proxy that exposes
your methods. When a method is called, the proxy creates an operation object, sends this operation to
the machine responsible to execute that operation, and eventually sends the result.
First we let the Counter implement the DistributedObject interface to indicate that it is a distributed
object. Some additional methods will be exposed, such as getName, getId, and destroy.
The next step is enhancing the CounterService. Apart from implementing the
com.hazelcast.spi.ManagedService interface, it now also implements the
com.hazelcast.spi.RemoteService interface. Through this interface, a client can get a handle of a Counter
proxy.
@Override
public DistributedObject createDistributedObject(String objectName) {
return new CounterProxy(objectName, nodeEngine, this);
}
@Override
public void destroyDistributedObject(String objectName) {
//no-op
}
....
The methods of the ManagedService were left out, but you can find the full source in the examples for
the book. The createDistributedObject returns a CounterProxy. This proxy is a local representation of
(potentially) remote managed data and logic. It is important to realize that caching the proxy instance
and removing the proxy instance is done outside of this service, so we don’t need to take care of it
ourselves.
@Override
public String getServiceName() {
return CounterService.NAME;
}
@Override
public String getName() {
return name;
}
@Override
public int inc(int amount) {
NodeEngine nodeEngine = getNodeEngine();
IncOperation operation = new IncOperation(name, amount);
int partitionId = nodeEngine.getPartitionService().getPartitionId(name);
InvocationBuilder builder = nodeEngine.getOperationService()
.createInvocationBuilder(CounterService.NAME, operation, partitionId);
try {
final Future<Integer> future = builder.invoke();
return future.get();
} catch (Exception e) {
throw ExceptionUtil.rethrow(e);
}
}
}
The CounterProxy does not contain counter state; it is just a local representative of remote
data/functionality. Therefore, the CounterProxy.inc method needs to be invoked on the machine for
hosting the partition that contains the real counter. This can be done using the Hazelcast SPI, which
takes care of sending operations to the correct machine, executing the operation, and returning the
results.
If you take a closer look at the inc method, you see that the first thing it does is create the IncOperation
with the given name and the amount. Next, it gets the partitionId; this is done based on the name so
that all operations for a given name will always result in the same partitionId. Then, it creates an
InvocationBuilder based on the operation and the partitionId using the InvocationBuilder. This is
where the connection is made between the operation and the partition.
The last part is invoking the Invocation and waiting for its result. This is done using a Future, which
gives us the ability to synchronize on completion of that remote executed operation and to get the
results. In this case, we do a simple get since we don’t care about a timeout; for real systems, it is often
better to use a timeout since most operations should complete in a certain amount of time. If they don’t
complete, it could be a sign of problems; waiting indefinitely could lead to stalling systems without any
form of error logging.
If the execution of the operation fails with an exception, an ExecutionException is thrown and needs to
be dealt with. Hazelcast provides a utility function for that: ExceptionUtil.rethrow(Throwable). If you
want to keep the checked exception, you need to deal with exception handling yourself, and the
ExceptionUtil is not of much use. A nifty improvement for debugging is that if a remote exception is
thrown, the stacktrace includes the remote side and the local side. This makes it possible to figure out
what went wrong on both sides of the call.
If the exception is an InterruptedException, you can do two things: propagate the InterruptedException,
since it is a good practice for blocking methods like shown below, or use the ExceptionUtil.rethrow for
all exceptions.
try {
final Future<Integer> future = invocation.invoke();
return future.get();
} catch(InterruptedException e){
throw e;
} catch(Exception e){
throw ExceptionUtil.rethrow(e);
}
In this case, we don’t care about the InterruptedException and therefore we catch all exceptions and let
them be handled by the ExceptionUtil; it will be wrapped in a HazelcastException and the interrupt
status will be set.
Currently it isn’t possible to abort an operation by calling the future.cancel method. Perhaps this will
be added in a later release. This is also the reason why Executor Futures are not working, since the
executor is built on top of the SPI.
Let’s do the part of the example that has been missing so far: the IncOperation.
class IncOperation extends AbstractOperation
implements PartitionAwareOperation {
The first three methods —run, returnsResponse and getResponse— are part of the execution. The run
method is responsible for the actual execution; in this case, it is an empty placeholder. Since the inc
operation is going to return a response, the returnsResponse method returns true. If your method is
asynchronous and does not need to return a response, it is better to return false because that is faster.
The actual response we stored in the returnValue field is retrieved using the getResponse method.
Another important part of the IncOperation is that it implements the PartitionAwareOperation interface.
This is an indicator for the OperationService that this operation should be executed on a certain
partition. In our case, the IncOperation should be executed on the partition hosting our counter.
Because the IncOperation needs to be serialized, the writeInternal and readInternal methods need to be
overwritten so that the objectId and amount are serialized and will be available when this operation
runs. For deserialization, it is also mandatory that the operation has a no-arg constructor.
System.out.println("Finished");
}
}
We can see that our counters are being stored in different members (check the different port
numbers). We can also see that the increment does not do any real logic yet since the value remains at
0. We will solve this in the next section.
In this example we managed to get the basics up and running, but some things are not correctly
implemented. For example, in the current code, a new proxy is always returned instead of a cached
one. Also, the destroy is not correctly implemented on the CounterService. In the following examples,
these issues will be resolved.
17.1.3. Container
In this section, we upgrade the functionality so that it features a real distributed counter. Some kind of
data structure will hold an integer value and can be incremented, and we will also cache the proxy
instances and deal with proxy instance destruction.
The first thing we do is create a Container for every partition in the system, and the container will
contain all counters and proxies for a given partition.
Hazelcast guarantees that within a single partition, only a single thread will be active. So we don’t need
to deal with concurrency control while accessing a container.
The examples in this chapter rely on a Container instance per partition, but you have complete
freedom as to how to do that. A different approach used in Hazelcast is dropping the Container and
letting the CounterService have a map of counters.
You can use the ID of the counter as key and an Integer as value. The only thing you need to take care
of is selecting the values for the specific partition where operations are executed. This can be as simple
as the following example.
for(Map.Entry<String,Integer> entry: counters.entrySet()){
String id = entry.getKey();
int partitionId = nodeEngine.getPartitionService().getPartitionId(id);
if(partitionid == requiredPartitionId){
...do operation
}
}
You can choose whichever solution you prefer. The container approach is nice because there will not
be any mutable shared state between partitions. It also makes operations on partitions simpler, since
you don’t need to filter out data that does not belong to a certain partition.
@Override
public void init(NodeEngine ne, Properties properties) {
this.nodeEngine = nodeEngine;
containers = new Container[ne.getPartitionService().getPartitionCount()];
for (int k = 0; k < containers.length; k++)
containers[k] = new Container();
}
@Override
public CounterProxy createDistributedObject(String objectName) {
int partitionId = nodeEngine.getPartitionService().getPartitionId(objectName);
Container container = containers[partitionId];
container.init(objectName);
return new CounterProxy(objectName, nodeEngine, this);
}
@Override
public void destroyDistributedObject(String objectName) {
int partitionId = nodeEngine.getPartitionService().getPartitionId(objectName);
Container container = containers[partitionId];
container.destroy(objectName);
}
...
In the init method, a container is created for every partition. The next step is the
createDistributedObject method; apart from creating the proxy, we also initialize the value for that
given proxy to 0, so that we don’t run into a NullPointerException. In the destroyDistributedObject
method, the value for the object is removed. If we don’t clean up, we’ll end up with memory that isn’t
removed, and that can potentially can lead to an out of memory error.
...
@Override
public void run() throws Exception {
System.out.println("Executing " + objectId + ".inc() on: "
+ getNodeEngine().getThisAddress());
...
The container can easily be retrieved using the partitionId: the range of partition IDs is 0 to
partitionCount (exclusive), so it can be used as an index on the container array. Once the container has
been retrieved, we can access the value. This example moved all inc logic in the IncOperation, but you
may prefer to move the logic to the CounterService or to the Partition.
System.out.println("Round 1");
for (Counter counter: counters)
System.out.println(counter.inc(1));
System.out.println("Round 2");
for (Counter counter: counters)
System.out.println(counter.inc(1));
System.out.println("Finished");
System.exit(0);
}
}
Round 1
Executing 0counter.inc() on: Address[192.168.1.103]:5702
1
Executing 1counter.inc() on: Address[192.168.1.103]:5702
1
Executing 2counter.inc() on: Address[192.168.1.103]:5701
1
Executing 3counter.inc() on: Address[192.168.1.103]:5701
1
Round 2
Executing 0counter.inc() on: Address[192.168.1.103]:5702
2
Executing 1counter.inc() on: Address[192.168.1.103]:5702
2
Executing 2counter.inc() on: Address[192.168.1.103]:5701
2
Executing 3counter.inc() on: Address[192.168.1.103]:5701
2
Finished
This means that we now have a basic distributed counter up and running!
In our previous example we managed to create real distributed counters. The only problem is that
when members leave or join the cluster, the content of the partition containers does not migrate to
different members. In this section, we are going to make that happen with partition migration.
class Container {
void clear() {
values.clear();
}
1. toMigrationData: This method is called when Hazelcast wants to start the migration of the partition
on the member that currently owns the partition. The result of the toMigrationData is partition data
in a form that can be serialized to another member.
2. applyMigrationData: This method is called when the migrationData that is created by the
toMigrationData method is applied to a member that is going to be the new partition owner.
3. clear: This method is called for two reasons: either when the partition migration has succeeded
and the old partition owner can get rid of all the data in the partition, or when the partition
migration operation fails and the new partition owner needs to roll back its changes.
The next steps are to create a CounterMigrationOperation that will be responsible for transferring the
migrationData from one machine to anther and to call the applyMigrationData on the correct partition of
the new partition owner.
public class CounterMigrationOperation extends AbstractOperation {
public CounterMigrationOperation() {
}
@Override
public void run() throws Exception {
CounterService service = getService();
Container container = service.containers[getPartitionId()];
container.applyMigrationData(migrationData);
}
@Override
protected void writeInternal(ObjectDataOutput out) throws IOException {
out.writeInt(migrationData.size());
for (Map.Entry<String, Integer> entry : migrationData.entrySet()) {
out.writeUTF(entry.getKey());
out.writeInt(entry.getValue());
}
}
@Override
protected void readInternal(ObjectDataInput in) throws IOException {
int size = in.readInt();
migrationData = new HashMap<String, Integer>();
for (int i = 0; i < size; i++)
migrationData.put(in.readUTF(), in.readInt());
}
}
During the execution of a migration, no other operations will be running in that partition. Therefore,
you don’t need to deal with thread-safety.
The last part is connecting all the pieces. This is done by implementing MigrationAwareService as an
additional interface on the CounterService, which will signal Hazelcast that our service is able to
participate in partition migration.
public class CounterService implements ManagedService,
RemoteService, MigrationAwareService {
...
@Override
public void beforeMigration(PartitionMigrationEvent e) {
//no-op
}
@Override
public void clearPartitionReplica(int partitionId) {
Container container = containers[partitionId];
container.clear();
}
@Override
public Operation prepareReplicationOperation(
PartitionReplicationEvent e) {
Container container = containers[e.getPartitionId()];
Map<String, Integer> data = container.toMigrationData();
return data.isEmpty() ? null : new CounterMigrationOperation(data);
}
@Override
public void commitMigration(PartitionMigrationEvent e) {
if (e.getMigrationEndpoint() == MigrationEndpoint.SOURCE) {
Container c = containers[e.getPartitionId()];
c.clear();
}
}
@Override
public void rollbackMigration(PartitionMigrationEvent e) {
if (e.getMigrationEndpoint() == MigrationEndpoint.DESTINATION) {
Container c = containers[e.getPartitionId()];
c.clear();
}
}
}
• prepareMigrationOperation: This method returns all the data in the partition that is going to be
moved. It migrates only the master and the first backup data, since CounterService supports only
one backup.
• commitMigration: This method commits the migrated data. In this case, committing means that we
clear the container for the partition of the old owner. Even though we don’t have any complex
resources like threads or database connections, clearing the container is advisable to prevent
memory issues. This method is called on both the primary and the backup. If this node is on the
source side of migration (partition is migrating FROM this node) and the migration type is MOVE
(partition is migrated completely, not copied to a backup node), then the method removes partition
data from this node. If this node is the destination or the migration type is copy, then the method
does nothing. If this node is on the destination side of migration (partition is migrating TO this
node) then this method removes partition data from this node. If this node is on the source, then
this method does nothing.
Thread.sleep(10000);
Thread.sleep(10000);
System.out.println("Finished");
System.exit(0);
}
}
The counters have moved: 0counter moved from 192.168.1.103:5702 to 192.168.1.103:5705, but it is
incremented correctly. Our counters can now move around in the cluster. If you need to have more
capacity, add a machine and the counters will be redistributed. If you have surplus capacity, shut down
the instance and the counters will be redistributed.
17.1.5. Backups
In this last section, we deal with backups; we make sure that when a member fails, then the data of the
counter is available on another node. This is done by replicating that change to another member in the
cluster. With the SPI, you can do this by letting the operation implement the
com.hazelcast.spi.BackupAwareOperation interface. Below, you can see this interface being implemented
on the IncOperation.
class IncOperation extends AbstractOperation
implements PartitionAwareOperation, BackupAwareOperation {
...
@Override
public int getAsyncBackupCount() {
return 0;
}
@Override
public int getSyncBackupCount() {
return 1;
}
@Override
public boolean shouldBackup() {
return true;
}
@Override
public Operation getBackupOperation() {
return new IncBackupOperation(objectId, amount);
}
}
The last method is the getBackupOperation, which returns the actual operation that is going to make the
backup; the backup itself is an operation and will run on the same infrastructure. If a backup should
be made and, for example, getSyncBackupCount returns 3, then three IncBackupOperation instances are
created and sent to the three machines containing the backup partition. If there are fewer machines
available than backups that need to be created, Hazelcast will just send a smaller number of
operations. But it could be that if the cluster is too small, you don’t get the same high availability
guarantees you specified.
public IncBackupOperation() {
}
@Override
protected void writeInternal(ObjectDataOutput out) throws IOException {
super.writeInternal(out);
out.writeUTF(objectId);
out.writeInt(amount);
}
@Override
protected void readInternal(ObjectDataInput in) throws IOException {
super.readInternal(in);
objectId = in.readUTF();
amount = in.readInt();
}
@Override
public void run() throws Exception {
CounterService service = getService();
System.out.println("Executing backup " + objectId + ".inc() on: "
+ getNodeEngine().getThisAddress());
Container c = service.containers[getPartitionId()];
c.inc(objectId, amount);
}
}
Hazelcast will also make sure that a new IncOperation for that particular key will not be executing
before the (synchronous) backup operation has completed.
The IncOperation has executed, and the backup operation has executed. The operations have been
executed on different cluster members to guarantee high availability. One of the experiments you
could do is to modify the test code so you have a cluster of members in different JVMs and see what
happens with the counters when you kill one of the JVMs.
Don’t hog the operation thread: Don’t execute long-running operations on the operation thread,
especially not on partition-specific operation threads. This could cause major problems in the
system because the partition (and other partitions running on that same thread) will wait for
your operation to complete. Operations should be very short.
Hazelcast Discovery SPI defines a common set of interfaces and internal classes to handle and expose
member discovery to external (third-party) vendors. It provides the vendor with the possibility of
implementing a custom discovery mechanism to find Hazelcast cluster members based on the given
configuration inside Hazelcast. Discovery might use any kind of vendor-specific API and is completely
up to the vendor to be implemented in the best way.
Let’s briefly describe these interfaces; note that the following interfaces are within the
com.hazelcast.spi.discovery package:
• DiscoveryStrategy: The main entry point for you to implement your corresponding member
discovery strategies. Its main purpose is to return discovered members on request. It also offers
light lifecycle capabilities for setup and teardown logic (for example, opening or closing sockets or
REST API clients). It can also perform automatic registration / de-registration on service discovery
systems when needed.
• DiscoveryNode: Describes a member in the Discovery SPI. It is used for multiple purposes, since it
will be returned from strategies for discovered members. It is also passed to
DiscoveryStrategyFactory’s factory method to define the local member itself if created on a
Hazelcast member; on Hazelcast clients, null will be passed.
• NodeFilter: Defines additional filters for the members when query languages for discovery
strategies are not enough to describe members.
• DiscoveryService: Is a part of the integration domain and supports Discovery SPI when you
integrate Hazelcast into your own system. If you are using DiscoverStrategy, you don’t need to use
DiscoveryService.
Now let’s implement a simple discovery strategy that uses the local /etc/hosts file to lookup IP
addresses. The strategy implementation expects hosts to be configured with hostname sub-groups
under the same domain.
First, let’s define a configuration property called site-domain. This will allow you to configure your site
domain for the discovery inside the hosts file.
package com.hazelcast.examples.spi.discovery;
import com.hazelcast.config.properties.PropertyDefinition;
import com.hazelcast.config.properties.PropertyTypeConverter;
import com.hazelcast.config.properties.SimplePropertyDefinition;
You can also add a value validator to the above code to guarantee that the configured site-domain has a
value that represents a domain.
import com.hazelcast.config.properties.PropertyDefinition;
import com.hazelcast.logging.ILogger;
import com.hazelcast.spi.discovery.DiscoveryNode;
import com.hazelcast.spi.discovery.DiscoveryStrategy;
import com.hazelcast.spi.discovery.DiscoveryStrategyFactory;
import java.util.Collection;
import java.util.Map;
@Override
public Class<? extends DiscoveryStrategy> getDiscoveryStrategyType() {
return HostsDiscoveryStrategy.class;
}
@Override
public DiscoveryStrategy newDiscoveryStrategy(DiscoveryNode discoveryNode, ILogger
logger,
Map<String, Comparable> properties) {
return new HostsDiscoveryStrategy(logger, properties);
}
@Override
public Collection<PropertyDefinition> getConfigurationProperties() {
return PROPERTIES;
}
}
The above code implements the DiscoveryStrategyFactory interface, which describes the factory
contract that creates a certain DiscoveryStrategy. Your factory now defines properties known to your
discovery strategy implementation and provides a clean way to instantiate it. While creating the
HostsDiscoveryStrategy you ignore the passed DiscoveryNode since this strategy will not support
automatic registration of new nodes. In cases where the strategy does not support registration, the
environment has to handle this in some provided way. When created on a Hazelcast client, the
provided DiscoveryNode will be null, as there is no local member in existence.
• As the content, add a line to this resource file that reads as your full canonical class name; in the
case of above code, it is “com.hazelcast.examples.spi.discovery.HostsDiscoveryStrategyFactory”.
Now you implement the discovery itself. For ease of implementation, when we create the class
HostsDiscoveryStrategy we are going to extend AbstractDiscoveryStrategy, which is a convenience
abstract class meant to ease the implementation of your discovery strategies. It provides additional
support for reading and resolving configuration properties and for empty implementations of lifecycle
methods if they are unnecessary. Please see the example code below:
package com.hazelcast.examples.spi.discovery;
import com.hazelcast...;
// ...
}
With the above code, our discovery strategy implementation retrieves the configuration property for
the site-domain. You can override that value from the configuration of the system environment or JVM
properties. This is useful when the hazelcast.xml defines a setup for a developer system (like
cluster.local) and operations want to override it for the real deployment. By providing a prefix (in
this case discovery.hosts shown above) we created an external property named discovery.hosts.site-
domain that can be set as an environment variable, or passed as a JVM property from the startup script.
The value for the property discovery.hosts.site-domain will be looked up first in the JVM properties
,(or hazelcast.xml <properties/> section), then in the system environment, and finally in the
configuration properties.
Now, let’s implement the actual lookup and the mapping as already prepared in the discoverNodes
method.
String hostsPath;
if ( os.contains( "Windows" ) ) {
hostsPath = HOSTS_WINDOWS;
} else {
hostsPath = HOSTS_NIX;
}
After collecting the address assignments configured in the hosts file, we are going to map these
assignments to the `DiscoveryNode`s to return them from your strategy.
private Iterable<DiscoveryNode> mapToDiscoveryNodes( List<String> assignments ) {
Collection<DiscoveryNode> discoveredNodes = new ArrayList<DiscoveryNode>();
You now have a full discovery, executed whenever Hazelcast asks for IPs. So why not read them in
once and cache them? Members might go down or come up over time. Since we expect the hosts file to
be injected into the running container, it also might change over time. You want to get the latest
available members, so you read the file on request.
To use the new DiscoveryStrategy implementation, you can configure it like in the following example:
<hazelcast>
<!-- activate Discovery SPI -->
<properties>
<property name="hazelcast.discovery.enabled">true</property>
</properties>
<network>
<join>
<!-- deactivating other discoveries -->
<multicast enabled="false"/>
<tcp-ip enabled="false" />
<aws enabled="false"/>
<properties>
<property name="site-domain">cluster.local</property>
</properties>
</discovery-strategy>
</discovery-strategies>
</join>
</network>
</hazelcast>
One aspect of replication techniques is about where a replicated data set is accessed and updated. For
instance, primary-copy systems first elect a replica, which can be called as primary, master, etc., and
use that replica to access the data. Changes in the data on the primary replica are propagated to other
replicas. This approach has different namings, such as primary-copy, single-master, passive replication.
The primary-copy technique is a powerful model as it prevents conflicts, deadlocks among the replicas.
However, primary replicas can become bottlenecks. On the other hand, we can have a different
technique by eliminating the primary-copy and treating each replica as equal. These systems can
achieve a higher level of availability as a data entry can be accessed and updated using any replica.
However, it can become more difficult to keep the replicas in sync with each other.
Replication techniques also differ in how updates are propagated among replicas.
• One option is to update each replica as part of a single atomic transaction, called as eager
replication or synchronous replication. Consensus algorithms apply this approach to achieve strong
consistency on a replicated data set. The main drawback is the amount of coordination and
communication required while running the replication algorithm. CP systems implement
consensus algorithms under the hood.
• Another option is the lazy replication technique, which is also called as asynchronous replication.
Lazy replication algorithms execute updates on replicas with separate transactions. They generally
work with best-effort. By this way, the amount of coordination among the replicas are degraded
and data can be accessed in a more performant manner. Yet, it can happen that a particular update
is executed on some replicas but not on others, which will lead replicas to diverge. Such problems
can be resolved with different approaches, such as read-repair, write-repair, anti-entropy. Lazy
replication techniques are popular among AP systems.
With lazy replication, when the primary replica receives an update operation for a key, it executes the
update locally, and propagates it to backup replicas. It marks each update with a logical timestamp so
that backups apply them in the correct order and converge to the same state with the primary. Backup
replicas can be used to scale reads (see the High Availability with no strong consistency but monotonic
reads guarantee.
Hazelcast offers features such as Quorum, ILock, AtomicLong, etc. In the journey of being a highly
elastic, dynamic and easy to use product, Hazelcast tries to provide best-effort consistency guarantees
without being a complete CP solution. Therefore, we recommend these features to be used for
efficiency purposes in general, instead of correctness. For instance, they can be used to prevent to run
a resource-extensive computation multiple times, which would not create any correctness problem if
runs more than once.
Please note that CP systems can have similar problems as well. However, in a CP system, once a replica
performs an update locally (i.e., commits the update), the underlying consensus algorithm guarantees
durability of the update for the rest of the execution.
On the other hand, in AP systems like Hazelcast, a replica can perform an update locally, even if the
update is not to be performed on other replicas. This is a fair trade-off to reduce amount of
coordination among replicas, and maintain high throughput & high availability of the system. These
systems employ additional measurements to maintain consistency in a best-effort manner. In this
regard, Hazelcast tries to minimize effect of such scenarios using an active anti-entropy solution as
follows:
• For each primary replica it is assigned, it creates a summary information and sends it to the
backups.
• Then, each backup member compares the summary information with its own data to see if it is up-
to-date with the primary.
• If a backup member detects a missing update, it triggers the synchronization process with the
primary.
When a Hazelcast member receives a partition specific operation, it executes the operation and
propagates it to backup replica(s) with a logical timestamp. Number of backups for each operation
depends on the data structure and its configuration.
Two types of backup replication are available: sync and async. Despite what their names imply, both
types are still implementations of the lazy (async) replication model. The only difference between sync
and async is that, the former makes the caller block until backup updates are applied by backup
replicas and acknowledgments are sent back to the caller, but the latter is just fire & forget. Number of
sync and async backups are defined in the data structure configurations, and you can use a
combination of sync and async backups.
When backup updates are propagated, response of the execution including number of sync backup
updates is sent to the caller and after receiving the response, caller waits to receive the specified
number of sync backup acknowledgements for a predefined timeout. This timeout is 5 seconds by
default and defined by the system property hazelcast.operation.backup.timeout.millis.
A backup update can be missed because of a few reasons, such as a stale partition table information on
a backup replica member, network interruption, or a member crash. That’s why sync backup acks
require a timeout to give up. Regardless of being a sync or async backup, if a backup update is missed,
the periodically running anti-entropy mechanism detects the inconsistency and synchronizes backup
replicas with the primary. Also the graceful shutdown procedure ensures that all backup replicas for
partitions whose primary replicas are assigned to the shutting down member will be consistent.
• As explained above, when an invocation does not receive a response in time, invocation will fail
with an OperationTimeoutException. This exception does not say anything about outcome of the
operation, that means operation may not be executed at all, it may be executed once or twice (due
to member left case explained above).
18.5. IndeterminateOperationStateException
For partition-based mutating invocations, such as map.put(), a caller waits with a timeout for the
operation that is executed on corresponding partition’s primary replica and backup replicas, based on
the sync backup configuration of the distributed data structure. Hazelcast 3.9 introduces a new
mechanism to detect indeterminate situations while making such invocations. If
hazelcast.operation.fail.on.indeterminate.state system property is enabled, a mutating invocation
throws IndeterminateOperationStateException when it encounters the following cases:
• The operation fails on partition primary replica member with MemberLeftException. In this case, the
caller may not determine the status of the operation. It could happen that the primary replica
executes the operation, but fails before replicating it to all the required backup replicas. Even if the
caller receives backup acks from some backup replicas, it cannot decide if it has received all
required ack responses, since it does not know how many acks it should wait for.
• There is at least one missing ack from the backup replicas for the given timeout duration. In this
case, the caller knows that the operation is executed on the primary replica, but some backup may
have missed it. It could be also a false-positive, if the backup timeout duration is configured with a
very small value. However, Hazelcast’s active anti-entropy mechanism eventually kicks in and
resolves durability of the write on all available backup replicas as long as the primary replica
member is alive.
When an invocation fails with IndeterminateOperationStateException, the system does not try to
rollback the changes which are executed on healthy replicas. Effect of a failed invocation may be even
observed by another caller, if the invocation has succeeded on the primary replica. Hence, this new
behavior does not guarantee linearizability. However, if an invocation completes without
IndeterminateOperationStateException when the configuration is enabled, it is guaranteed that the
operation has been executed exactly-once on the primary replica and specified number of backup
replicas of the partition.
Please note that IndeterminateOperationStateException does not apply to read-only operations, such as
map.get(). If a partition primary replica node crashes before replying to a read-only operation, the
operation is retried on the new owner of the primary replica.
Chapter 19. Threading Model
This chapter discusses the threading model of Hazelcast. This will help you understand how to write
an efficient system and how to not cause cluster stability issues.
You can configure the number of I/O-threads using the hazelcast.io.thread.count system property,
which defaults to three per member. This means that if three is used, in total there are seven I/O-
threads: one accept-I/O-thread, three read-I/O-threads, and three write-I/O-threads. Each I/O-thread has
its own Selector instance and waits on Selector.select if there is nothing to do.
In case of the I/O-read-thread, when sufficient bytes for a packet have been received, the Packet object
is created. This Packet is then sent to the system where it is de-multiplexed. If the Packet header signals
that it is an operation/response, it is handed over to the operation service (please see Operation
Threading). If the Packet is an event, it is handed over to the event service (please see Event
Threading).
If the packet is a request (an operation sent by a client), the I/O-thread reads the partition ID. If set, the
packet is placed on the correct partition-aware operation thread; it does not matter if the partition is
on the member or not. If the partition is on the member, the operation is executed by the partition-
aware operation thread. Otherwise, the partition-aware operation thread sends the operation to the
correct machine by handing it over to the correct I/O-thread. The partition-aware operation thread is
immediately released for the next operation; the response is returned to the client using an
asynchronous callback mechanism.
If the packet is a request and the partition ID is not set, the request is put on the executor in the
ClientEngineImpl. This executor can be configured using the hazelcast.clientengine.thread.count
property, which defaults to the number of cores times twenty.
You can set the following properties to alter the behavior of the system.
3. hazelcast.event.queue.timeout.millis: Timeout for placing an item on the work queue. Its default
value is 250.
If you process a lot of events and you have many cores, changing the value of
hazelcast.event.thread.count property to a higher value is a good idea. This way, more events can be
processed in parallel.
Multiple components share the same event queues. If there are two topics, say topics A and B, they may
share the same queue(s) for certain messages and therefore the same event thread, also. If there are a
lot of pending messages produced by A, then B needs to wait. Also, when processing a message from A
takes a long time and the event thread is used for that, B will suffer from this. That is why it is better to
offload processing to a dedicated thread (pool) so that systems are better isolated.
If events are produced at a higher rate than they are consumed, the queue will grow in size. To prevent
overloading the system and running into an OutOfMemoryException, the queue is given a capacity of 1
million items. When the maximum capacity is reached, the items are dropped. This means that the
event system is a "best effort" system. There is no guarantee that you are going to get an event. It can
also be that Topic A has a lot of pending messages, and therefore B cannot receive messages because
the queue has no capacity and messages for B are dropped. In addition, events are not reliable because
if the JVM of the receiver crashes, all the messages in the event queues will be lost.
You can configure the IExecutor using the ExecutorConfig (programmatic configuration) or using
<executor> (declarative configuration).
To execute partition-aware operations, an array of operation threads is created. By default, the size of
this array is two times the number of cores, with a minimum of two. You can change it using the
hazelcast.operation.thread.count property.
Each operation thread has its own work queue; it will consume messages from that work queue. If a
partition-aware operation needs to be scheduled, the right thread is found using the formula below.
After the threadIndex is determined, the operation is put in the work queue of that operation thread.
This means three things.
1. A single operation thread executes operations for multiple partitions; if there are 271 partitions
and 10 partition threads, then roughly every operation thread will execute operations for 27
partitions.
2. Each partition belongs to only one operation thread. All operations for a partition will always be
handled by exactly the same operation thread.
3. No concurrency control is needed to deal with partition-aware operations because once a partition-
aware operation is put on the work queue of a partition-aware operation thread, you get the
guarantee that only one thread is able to touch that partition.
Because of this threading strategy, there are two forms of false sharing you need to be aware of:
1. With false sharing of the partition, two completely independent data structures share the same
partitions: for example, if there is a map employees and a map orders, it could be that an
employees.get(peter) (running on partition 25) is blocked by a map.get of orders.get(1234) (also
running on partition 25). So, if independent data structures share the same partition, a slow
operation on one data structure can slow the other data structures.
2. With false sharing of the partition-aware operation thread, each operation thread is responsible for
executing operations on a number of partitions. For example, thread-1 could be responsible for
partitions 0,10,20…, and thread-2 could be responsible for partitions 1,11,21…,etc. If an operation
for partition 1 is taking a lot of time, it will block the execution of an operation of partition 11
because both of them are mapped to exactly the same operation thread.
You need to be careful with long running operations because you could be starving operations of a
thread. The general rule is that the partition thread should be released as soon as possible because
operations are not designed to execute long running operations. That is why it is very dangerous to
execute a long running operation-—for example, using AtomicReference.alter or a IMap.executeOnKey—-
because these operations will block others operations to be executed.
Currently there is no support for work stealing. Different partitions that map to the same thread may
need to wait till one of the partitions is finished, even though there are other free partition operation
threads available.
Example:
Take a three node cluster. Two members will have 90 primary partitions and one member will have 91
primary partitions. Let’s say you have one CPU and four cores per CPU. By default, eight operation
threads will be allocated to serve 90 or 91 partitions.
A non-partition-aware operation thread will never execute an operation for a specific partition. Only
partition-aware operation threads execute partition-aware operations.
Unlike the partition-aware operation threads, all the generic operation threads share the same work
queue: genericWorkQueue.
If a non-partition-aware operation needs to be executed, it is placed in that work queue and any
generic operation thread can execute it. The big advantage of this method is that you automatically
have work balancing since any generic operation thread is allowed to pick up work from this queue.
The disadvantage of this method is that this shared queue can be a point of contention. We do not see
this in production because performance is dominated by I/O and the system is not executing very
many non-partition-aware operations.
In some cases, the system needs to execute operations with a higher priority, such as an important
system operation. To support priority operations, we do the following:
1. For partition-aware operations, each partition thread has its own work queue, but apart from that,
it also has a priority work queue. It will always check this priority queue before it processes work
from its normal work queue.
Because a worker thread will block on the normal work queue (either partition-specific or generic), a
priority operation may not picked up because it will not be put on the queue where it is blocking. We
always send a kick the worker operation that does nothing but trigger the worker to wake up and
check the priority queue.
19.5. Operation-response and Invocation-future
When an operation is invoked, a Future is returned. Let’s take the example code below.
The calling side blocks for a reply. In this case, GetOperation is set in the work queue for the partition of
key, where it eventually is executed. On execution, a response is returned and placed on the work
queue of the response thread. This thread will signal the future and notifies the blocked thread that a
response is available. In the future, we will expose this Future to the outside world, and we will provide
the ability to register a completion listener so you can do asynchronous calls.
In the future, this will be optimized to reduce the amount of expensive systems calls, such as
lock.acquire/notify and the expensive interaction with the operation queue. We will probably add
support for a caller-runs mode, so that an operation is directly executed on the calling thread.
19.7. Queries
Unlike regular operations that run on operation threads,such as IMap.get, there is also a group of
operations that do not run on partition threads, but run instead on query threads. For example, the
Collection<V> IMap.values(Predicate predicate) method. This means there is a separate thread pool
that executes queries so queries can be run in parallel with regular operations. You can influence the
size of the query thread pool by creating an ExecutorConfig (either programmatically or through XML)
for the hz:query executor.
Unlike regular partition operations, the MapLoader.loadAll(keys) is not executed on a partition thread.
This means that regular operations for that partition that access different data structures can still be
executed, instead of being blocked, .
Chapter 20. Performance Tips
20.1. Cluster Design
Hazelcast assumes that the cluster is homogeneous, i.e., that all nodes within a cluster have equal
memory, equal storage capacity, equal network bandwidth, etc. It will not look at the resources of a
member to determine which partitions can be moved in or out. In practice, this means that if your
cluster is not homogeneous, then a lite member with few resources is responsible for the same load as
a heavyweight member with many resources. If this is an issue, it is probably best to set up multiple
clusters and to use clients to let clusters communicate with each other. There are plans to support
heterogeneous members in the cluster, for example, by making use of sub-clusters, but this isn’t
concrete yet.
Assume that you have a five member Hazelcast Cluster and you want to set the minimum number of
three members for the cluster to continue operating. The following declarative example is the
configuration for this scenario:
<hazelcast>
....
<quorum name="quorumRuleWithThreeNodes" enabled="true">
<quorum-size>3</quorum-size>
<quorum-type>READ</quorum-type>
</quorum>
<map name="default">
<quorum-ref>quorumRuleWithThreeNodes</quorum-ref>
</map>
....
</hazelcast>
You should enable the Split Brain Protection by setting the enabled attribute to true. With the quorum-
size element, you can give the minimum number of members required for the cluster to be
operational. Also, using the quorum-type element, you can specify which operations participate in the
Split Brain Protection. Available values are READ, WRITE and READ_WRITE.
Split Brain Protection is supported for the following Hazelcast data structures:
Cluster Membership is established and maintained by heartbeats. A network partitioning will present
some members as being unreachable. While configurable, it is normally seconds or tens of seconds
before the cluster is adjusted to exclude unreachable members. The cluster size is based on the
currently understood number of members.
For this reason, there will be a time window between the network partitioning and the application of
Split Brain Protection.
The problem is that these counters probably end up in different partition because the name of a
DistributedObject not only is used for identification, it also determines the partition.
3. Use IMap.set(k, v) instead of put(k,v) so that the old value doesn’t have to be returned (and thus,
no deserialization).
5. If you really need MapStore, then consider using write-behind; write-through will slow you down.
You can use these statistics to access all kinds of metrics. For example, in the case of IMap, you can see
the number of map entries in that member, and the total number of put operations executed.
-Dcom.sun.management.jmxremote
Enable the Hazelcast property hazelcast.jmx using Hazelcast configuration (API, XML, Spring) or by
setting the system property -Dhazelcast.jmx=true.
Use jconsole, jvisualvm (with the MBean plugin) or another JMX compliant monitoring tool.
JMX also exposes the local stats.
The detected slow operations are logged as warnings in the Hazelcast log files:
Stacktraces are always reported to the Management Center, but by default they are not printed to keep
the log size small. If logging of stacktraces is enabled (using
hazelcast.slow.operation.detector.stacktrace.logging.enabled property), the full stacktrace is printed
every 100 invocations. All other invocations print a shortened version.
Since a Hazelcast cluster can run for a very long time, Hazelcast purges the slow operation logs
periodically to prevent an OOME (out of memory error). You can configure the purge interval and the
retention time for each invocation.
The purging removes each invocation whose retention time is exceeded. When all invocations are
purged from a slow operation log, the log is deleted.
20.9. Other
The SystemLogServices retains some logging information that you can use with the Management Center.
If you are not using it, you can disable it by setting hazelcast.system.log.enabled to false.
Chapter 21. Appendix
21.1. Hazelcast on EC2 Tutorial
This is a step-by-step tutorial on how to configure a very basic Hazelcast cluster inside Amazon EC2.
This tutorial expects that you have ssh available (on Windows you can use Putty) and that you have an
Amazon EC2 account. You also need to have your Amazon access key and secret key. The access key
should look similar to this:
BNELSKS9B8LDLE8NXKKA
384c32KDLLDM44l3l3lddudueIEEL/Uldlx395uM
https://console.aws.amazon.com/ec2/v2/home?region=eu-west-1.