Server configuration

Dropwizard 1.0 is used to start and configure Jetty and to parse and validate the command line and configuration file. This is only mentioned here as the Dropwizard Configuration Reference lists and explains the base settings that can be used in the configuration file.

Changed in version 4.7: The Dropwizard version was updated from 0.7.1 to 1.0.

Environment variables

Environment variables can be used in the YAML configuration file.

For example:

  driverClass: org.postgresql.Driver
  url: jdbc:postgresql://${DATABASE_HOST}/${DATABASE_NAME}
  user: ${DATABASE_USER}
  password: ${DATABASE_PASSWORD}

Additional settings

In addition, the following properties are supported:


New in version 4.6.

  • type: If this is a master/read-write or read-only database. Either master (default), read_only_replica, read_only_snapshot.


New in version 4.6.

  • requestLogging: If request logging is enabled. Default is true.
  • searchHistory: If search history is updated with new searches. Default is true.


New in version 4.7.

The location of external private keys and credentials. Used to authenticate against storages and other endpoints. See Storage credentials for more information. Example:

    path: /env/vidispine/server.keystore
    password: changeit
    token: 2262e94c-39c3-b9a8-605d-f0450dfc558b
    keyPrefix: secret/
    path: /etc/secrets/

Java KeyStore

Java Keystore containing private keys.

  • keyStore:
    • path: The path to the Java keystore.
    • password: The key store password.


A Hashicorp Vault server storing private keys and credentials. Private keys will be read from the private_key field. Usernames and passwords from the username and password fields respectively.

  • vault:
    • address: The HTTP URL to the Vault server.
    • token: The Vault access token.
    • keyPrefix: Optional prefix to use with all aliases.

Local file system

Read private keys and credentials from files on the local file system.

Private keys will be read from the file with the same name as the private key alias. Usernames and passwords will be read from the files username and password from the directory with the same name as the alias.

  • file:
    • path: The directory containing secret files.


Configures how to connect to ActiveMQ.

  • user: The user to authenticate as.
  • password: The password to authenticate using.
  • url: Default is “tcp://localhost:61616”.
  • embeddedBroker: The broker URI to use to start an embedded broker. For example “broker:(tcp://localhost:61616)”. Default is “” (no embedded broker).


If you are using embedded ActiveMQ with KahanDB, the KahanDB journal log could keep growing if there are expired messages in the queue “ActiveMQ.DLQ”.

To fix this, you will need to enable jmx in the broker URI , and purge the queue manually using activemq-admin.

embeddedBroker: broker:(tcp://localhost:61616)?usekahadb=true&
./activemq-admin -Dactivemq.jmx.url=service:jmx:rmi:///jndi/rmi://localhost:1099/jmxrmi purge ActiveMQ.DLQ

Or setup a standalone ActiveMQ instance, and set processExpired=”false”


These settings configures the stateless container in OpenEJB. They are explained in more detail at

  • maxSize: The maximum number of beans in the stateless bean pool. Default is 10.
  • idleTimeout:
  • strictPooling: If the pool may NOT grow larger then maxSize. Default is false.


  • bindAddress: The address to bind on, as an IP address or hostname. Default is
  • bindPort: The port to bind on. Default is 7800.
  • bindPortRange: The range of ports to try in case bindPort is taken. Default is 30.
  • externalAddress: The address to publish to members in the cluster. Default is bindAddress.
  • externalPort: The port to publish to members in the cluster. Default is the port that was bound on.