Java Client Documentation
This is the reference for the QuestDB Java Client when QuestDB is used as a server.
For embedded QuestDB, please check our Java Embedded Guide.
The QuestDB Java client is baked right into the QuestDB binary.
The client provides the following benefits:
- Automatic table creation: No need to define your schema upfront.
- Concurrent schema changes: Seamlessly handle multiple data streams with on-the-fly schema modifications
- Optimized batching: Use strong defaults or curate the size of your batches
- Health checks and feedback: Ensure your system's integrity with built-in health monitoring
- Automatic write retries: Reuse connections and retry after interruptions
Quick start
Add a QuestDB as a dependency in your project's build configuration file.
- Maven
- Gradle
<dependency>
<groupId>org.questdb</groupId>
<artifactId>questdb</artifactId>
<version>8.1.0</version>
</dependency>
compile group: 'org.questdb', name: 'questdb', version: '8.1.0'
The code below creates an instance of a client configured to use HTTP transport to connect to a QuestDB server running on localhost on port 9000. It then sends two rows, each containing one symbol and two floating-point values. The client requests the server to assign a timestamp to each row based on the server's wall-clock time.
package com.example.sender;
import io.questdb.client.Sender;
public class HttpExample {
public static void main(String[] args) {
try (Sender sender = Sender.fromConfig("http::addr=localhost:9000;")) {
sender.table("trades")
.symbol("symbol", "ETH-USD")
.symbol("side", "sell")
.doubleColumn("price", 2615.54)
.doubleColumn("amount", 0.00044)
.atNow();
sender.table("trades")
.symbol("symbol", "TC-USD")
.symbol("side", "sell")
.doubleColumn("price", 39269.98)
.doubleColumn("amount", 0.001)
.atNow();
}
}
}
The configuration for the client is specified using a configuration string. This string follows the format:
<protocol>::<key>=<value>;<key>=<value>;...;
The valid transport protocols are:
http
: ILP/HTTPhttps
: ILP/HTTP with TLS encryptiontcp
: ILP/TCPtcps
: ILP/TCP with TLS encryption
A transport protocol and the key addr=host:port
are
required. The key addr
defines the hostname and port of the QuestDB server. If
the port is not specified, it defaults to 9000 for HTTP(s) transports and 9009
for TCP(s) transports. For a complete list of options, refer to the
Configuration Options section.
Example with TLS and Authentication enabled
This sample configures a client to use HTTP transport with TLS enabled for a connection to a QuestDB server. It also instructs the client to authenticate using HTTP Basic Authentication.
When using QuestDB Enterprise, authentication can also be done via REST token. Please check the RBAC docs for more info.
package com.example.sender;
import io.questdb.client.Sender;
public class HttpsAuthExample {
public static void main(String[] args) {
try (Sender sender = Sender.fromConfig("https::addr=localhost:9000;username=admin;password=quest;")) {
sender.table("trades")
.symbol("symbol", "ETH-USD")
.symbol("side", "sell")
.doubleColumn("price", 2615.54)
.doubleColumn("amount", 0.00044)
.atNow();
sender.table("trades")
.symbol("symbol", "TC-USD")
.symbol("side", "sell")
.doubleColumn("price", 39269.98)
.doubleColumn("amount", 0.001)
.atNow();
}
}
}
Client instantiation
There are three ways to create a client instance:
- From a configuration string. This is the most common way to create a
client instance. It describes the entire client configuration in a single
string. See Configuration options for all available
options. It allows sharing the same configuration across clients in different
languages.
try (Sender sender = Sender.fromConfig("http::addr=localhost:9000;auto_flush_rows=5000;retry_timeout=10000;")) {
// ...
} - From an environment variable. The
QDB_CLIENT_CONF
environment variable is used to set the configuration string. Moving configuration parameters to an environment variable allows you to avoid hard-coding sensitive information such as tokens and password in your code.export QDB_CLIENT_CONF="http::addr=localhost:9000;auto_flush_rows=5000;retry_timeout=10000;"
try (Sender sender = Sender.fromEnv()) {
// ...
} - Using the Java builder API. This provides type-safe configuration.
try (Sender sender = Sender.builder(Sender.Transport.HTTP)
.address("localhost:9000")
.autoFlushRows(5000)
.retryTimeoutMillis(10000)
.build()) {
// ...
}
General usage pattern
-
Create a client instance via
Sender.fromConfig()
. -
Use
table(CharSequence)
to select a table for inserting a new row. -
Use
symbol(CharSequence, CharSequence)
to add all symbols. You must add symbols before adding other column type. -
Use the following options to add all the remaining columns:
stringColumn(CharSequence, CharSequence)
longColumn(CharSequence, long)
doubleColumn(CharSequence, double)
boolColumn(CharSequence, boolean)
timestampColumn(CharSequence, Instant)
, ortimestampColumn(CharSequence, long, ChronoUnit)
-
Use
at(Instant)
orat(long timestamp, ChronoUnit unit)
oratNow()
to set a designated timestamp. -
Optionally: You can use
flush()
to send locally buffered data into a server. -
Go to the step no. 2 to start a new row.
-
Use
close()
to dispose the Sender after you no longer need it.
Flushing
Client accumulates data into an internal buffer. Flushing the buffer sends the data to the server over the network and clears the buffer.
Flushing can be done explicitly or automatically.
Explicit flushing
An explicit flush can be done by calling the flush()
method.
try (Sender sender = Sender.fromConfig("http::addr=localhost:9000;")) {
sender.table("trades")
.symbol("symbol", "ETH-USD")
.symbol("side", "sell")
.doubleColumn("price", 2615.54)
.doubleColumn("amount", 0.00044)
.atNow();
sender.table("trades")
.symbol("symbol", "TC-USD")
.symbol("side", "sell")
.doubleColumn("price", 39269.98)
.doubleColumn("amount", 0.001)
.atNow();
sender.flush();
}
Automatic flushing
To avoid accumulating very large buffers, the client will - by default - flush the buffer automatically.
HTTP auto-flushing is triggered when appending a row to the internal buffer and the buffer either:
- Reaches 75,000 rows
- Hasn't been flushed for 1 second.
Both parameters control batching and can be customized. Larger batches can improve throughput, but can increase lag between data ingestion and visibility in a target table. Smaller batches can reduce this lag, but can also reduce throughput.
A configuration string example that auto-flushes every 10 rows or every 10 seconds, whichever comes first:
http::addr=localhost:9000;auto_flush_rows=10;auto_flush_interval=10000;
An example with auto-flushing disabled:
http::addr=localhost:9000;auto_flush=off;
TCP auto-flushing is triggered when appending a row to the internal sender buffer and the buffer is full.
Auto-flushing is also triggered when the client is being closed. Be aware that retrying of failed requests is disabled when flushing on close.
Error handling
The HTTP transport supports automatic retries for failed requests deemed recoverable. Recoverable errors include network errors, some server errors, and timeouts, while non-recoverable errors encompass invalid data, authentication errors, and other client-side errors.
Retrying is particularly beneficial during network issues or when the server is
temporarily unavailable. The retrying behavior can be configured through the
retry_timeout
configuration option or via the builder API with
retryTimeoutMillis(long timeoutMillis)
. The client continues to retry
recoverable errors until they either succeed or the specified timeout is
reached. Upon reaching the timeout, the client ceases retry attempts and throws
LineSenderException
.
When utilizing the HTTP transport, the client can be reused after receiving an error. Conversely, a client using TCP transport should be discarded after an error, necessitating the creation of a new client.
Retrying is disabled for failed requests when executing a flush upon closure.
The TCP transport lacks support for error propagation from the server. In such
cases, the server merely closes the connection upon encountering an error, which
manifests as a LineSenderException
on the client side. Consequently, the
client receives no additional error information from the server. This limitation
significantly contributes to the preference for HTTP transport over TCP
transport.
Designated timestamp considerations
The concept of designated timestamp is important when ingesting data into QuestDB.
There are two ways to assign a designated timestamp to a row:
-
User-assigned timestamp: The client assigns a specific timestamp to the row.
java.time.Instant timestamp = Instant.now(); // or any other timestamp
sender.table("trades")
.symbol("symbol", "ETH-USD")
.symbol("side", "sell")
.doubleColumn("price", 2615.54)
.doubleColumn("amount", 0.00044)
.at(timestamp);The
Instant
class is part of thejava.time
package and is used to represent a specific moment in time. Thesender.at()
method can accept a long timestamp representing the elapsed time since the beginning of the Unix epoch, as well as aChronoUnit
to specify the time unit. This approach is useful in high-throughput scenarios where instantiating anInstant
object for each row is not feasible due to performance considerations. -
Server-assigned timestamp: The server automatically assigns a timestamp to the row based on the server's wall-clock time. Example:
sender.table("trades")
.symbol("symbol", "ETH-USD")
.symbol("side", "sell")
.doubleColumn("price", 2615.54)
.doubleColumn("amount", 0.00044)
.atNow();
We recommended to use User-assigned timestamps when ingesting data into QuestDB. Using Server-assigned hinder the ability to deduplicate rows which is important for exactly-once processing.
QuestDB works best when rows are ingested in chronological order. This means rows with older timestamps are ingested before rows with newer timestamps.
Configuration options
Client can be configured either by using a configuration string as shown in the examples above, or by using the builder API.
The builder API is available via the Sender.builder(Transport transport)
method.
When using the configuration string, the following options are available:
HTTP transport authentication
username
: Username for HTTP basic authentication.password
: Password for HTTP basic authentication.token
: Bearer token for HTTP authentication.
TCP transport authentication
username
: Username for TCP authentication.token
: Token for TCP authentication.
Auto-flushing
auto_flush
: Global switch for the auto-flushing behavior. Options areon
oroff
. Defaults toon
.auto_flush_rows
: The number of rows that will trigger a flush. This option is supported for HTTP transport only. Defaults to 75,000.auto_flush_interval
: The time in milliseconds that will trigger a flush. Defaults to 1000. This option is support for HTTP transport only.
The TCP transport for a client automatically flushes when its buffer is full.
The TCP transport utilizes a fixed-size buffer, and its maximum size is the same
as the initial size. Thus, the option init_buf_size
(see below) effectively
controls the auto-flushing behavior of the TCP transport.
Buffer
init_buf_size
: The initial size of the buffer in bytes. Default: 65536 (64KiB)max_buf_size
: The maximum size of the buffer in bytes. Default: 104857600 (100MiB) This option is support for HTTP transport only. TCP transport uses a fixed-size buffer and its maximum size is the same as the initial size.
HTTP Transport
retry_timeout
: The time in milliseconds to continue retrying after a failed HTTP request. The interval between retries is an exponential backoff starting at 10ms and doubling after each failed attempt up to a maximum of 1 second. Default: 10000 (10 seconds)request_timeout
: The time in milliseconds to wait for a response from the server. This is in addition to the calculation derived from therequest_min_throughput
parameter. Default: 10000 (10 seconds)request_min_throughput
: Minimum expected throughput in bytes per second for HTTP requests. If the throughput is lower than this value, the connection will time out. This is used to calculate an additional timeout on top ofrequest_timeout
. This is useful for large requests. You can set this value to0
to disable this logic.
TLS encryption
To enable TLS, select the https
or tcps
protocol.
The following options are available:
tls_roots
: Path to a Java keystore file containing trusted root certificates. Defaults to the system default trust store.tls_roots_password
: Password for the keystore file. It's always required whentls_roots
is set.tls_verify
: Whether to verify the server's certificate. This should only be used for testing as a last resort and never used in production as it makes the connection vulnerable to man-in-the-middle attacks. Options areon
orunsafe_off
. Defaults toon
.
Other considerations
- Please refer to the ILP overview for details about transactions, error control, delivery guarantees, health check, or table and column auto-creation.
- The Sender is not thread-safe. For multiple threads to send data to QuestDB, each thread should have its own Sender instance. An object pool can also be used to re-use Sender instances.
- The Sender instance has to be closed after it is no longer in use. The Sender
implements the
java.lang.AutoCloseable
interface, and therefore the try-with-resource pattern can be used to ensure that the Sender is closed. - The method
flush()
can be called to force sending the internal buffer to a server, even when the buffer is not full yet.