The Nuts node supports different backends for storage. This page describes the particulars of each backend and how to configure it.
The node does not automatically back up your data or keys. This is something you need to set up regardless the backend you use.
Clustering is not supported. Even if you use a backend that supports concurrent access (e.g. Redis), you can’t have multiple Nuts nodes use the same data storage.
Data is everything your node produces and stores, except private keys. It is also everything that is produced and published by other nodes in the network.
Even if you configure external data storage (Redis), certain data is still stored on disk (e.g. search indexes). Although this does not need to be in backup, depending on the network state size it can take a long time to rebuild it. So you should always retain the data directory when restarting or upgrading the node.
By default, all data (aside from private keys) is stored on disk using BBolt. You don’t need to configure anything to get it working, but don’t forget the backup procedure. If an alternative data store is configured (e.g. Redis), volatile data (projections that are generally quick to rebuild) is still stored in BBolt. You can back up volatile data, but it is not required.
If the node is configured to use Redis it stores network state in the configured Redis server.
To use Redis, configure
You can configure username/password authentication using
If you need to prefix the keys (e.g. you have multiple Nuts nodes using the same Redis server) you can set
with an alphanumeric string. All keys written to Redis will then have that prefix followed by a separator.
You can connect to your Redis server over TLS by specifying a Redis connection URL in
The server’s certificate will be verified against the OS’ CA bundle.
Make sure to configure persistence for your Redis server.
You can enable Redis Sentinel by configuring
storage.redis.sentinel. The following properties must be configured:
mastermust contain the name of the Redis Sentinel master
nodesmust contain a list of Redis Sentinel to initially connect to.
If using a connection URL for
storage.redis.address (e.g. to enable TLS) the host in the URL won’t be used.
However, it still must be provided but can be any arbitrary value.
Other configuration and connection URL parameters (not specific) to Sentinel still apply.
storage: redis: address: redis://irrelevant sentinel: master: mymaster nodes: - instance1:1234 - instance2:5678
Review the configuration reference for additional Redis Sentinel configuration parameters.
Your node generates and stores private keys when you create DID documents or add new keys to it. Private keys are very sensitive! If you leak them, others could alter your presence on the Nuts network and possibly worse. If you lose them you need to re-register your presence on the Nuts network, which could be very cumbersome. Thus, it’s very important the private key storage is both secure and reliable.
This is the default backend but not recommended for production. It stores keys unencrypted on disk. Make sure to include the directory in your backups and keep these in a safe place. If you want to use filesystem in strict mode, you have to set it explicitly, otherwise the node fails during startup.
This storage backend is the current recommended way of storing secrets. It uses the Vault KV version 1 store.
The path prefix defaults to
kv and can be configured using the
There needs to be a KV Secrets Engine (v1) enabled under this prefix path.
All private keys are stored under the path
Each key is stored under the kid, resulting in a full key path like
A Vault token must be provided by either configuring it using the config
crypto.vault.token or setting the VAULT_TOKEN environment variable.
The token must have a vault policy which has READ and WRITES rights on the path. In addition it needs to READ the token information “auth/token/lookup-self” which should be part of the default policy.
Migrating to Hashicorp Vault
Migrating your private keys from the filesystem to Vault is relatively easy: just upload the keys to Vault under
Alternatively you can use the
fs2vault crypto command, which takes the directory containing the private keys as argument (the example assumes the container is called nuts-node and NUTS_DATADIR=/opt/nuts/data):
docker exec nuts-node nuts crypto fs2vault /opt/nuts/data/crypto
In any case, make sure the key-value secret engine exists before trying to migrate (default engine name is
External Store API
The external store API is still experimental and may change in the future.
Anyone with access to the external store can read/write your private keys, so make sure it’s properly secured and only the Nuts node can access it.
The Nuts node can be configured to use an external store for private keys. This allows you to use your own key management system. The external store must implement the Nuts Secret store API specification. This OpenAPI specification is available from the Secret Store API repository on GitHub.
In order to use an external store, you need to set the
crypto.storage option to
external. You also need to configure the
crypto.external.address option to the address of the external store. The following example shows the typical configuration for a Nuts Vault proxy.
crypto: storage: external external: address: https://localhost:8210
Migrating to external storage
If you want to migrate your private keys from the filesystem to an external store, you can use the Nuts command line interface with the
fs2external crypto command. It takes the directory containing the private keys as argument (the example assumes the container is called nuts-node and NUTS_DATADIR=/opt/nuts/data):
docker exec nuts-node nuts crypto fs2external /opt/nuts/data/crypto
If you use the vaultkv store and want to start using the vault proxy, read the documentation of the Nuts Vault proxy.
Available external storage implementations
The following list contains all the known implementations of the Nuts external store API:
Nuts Vault proxy. This is a proxy that integrates with Hashicorp Vault. It uses the Vault KV store to store the keys. The proxy is developed by the Nuts foundation and is available under an open source license.
If you want to build your own store, take a look at the documentation at Integrate with an external secret store.
The Nuts node stores your trusted issuers in
This file should be kept persistent and should be part of the backup procedure.