A DynamoDB backend for konserve.
Add to your dependencies:
For asynchronous execution take a look at the konserve example.
(require '[konserve-dynamodb.core :refer [connect-store]]
'[konserve.core :as k])
(def dynamodb-spec
{:region "us-west-1"
:table "konserve-demo"
})
(def store (connect-store dynamodb-spec :opts {:sync? true}))
(k/assoc-in store ["foo" :bar] {:foo "baz"} {:sync? true})
(k/get-in store ["foo"] nil {:sync? true})
(k/exists? store "foo" {:sync? true})
(k/assoc-in store [:bar] 42 {:sync? true})
(k/update-in store [:bar] inc {:sync? true})
(k/get-in store [:bar] nil {:sync? true})
(k/dissoc store :bar {:sync? true})
;; Multi-key atomic operations (limited to 100 items per transaction by DynamoDB)
(k/multi-assoc store {:user1 {:name "Alice"}
:user2 {:name "Bob"}}
{:sync? true})
(k/append store :error-log {:type :horrible} {:sync? true})
(k/log store :error-log {:sync? true})
(let [ba (byte-array (* 10 1024 1024) (byte 42))]
(time (k/bassoc store "banana" ba {:sync? true})))
(k/bassoc store :binbar (byte-array (range 10)) {:sync? true})
(k/bget store :binbar (fn [{:keys [input-stream]}]
(map byte (slurp input-stream)))
{:sync? true})
Note that you do not need full DynamoDB rights if you manage the bucket outside, i.e.
create it before and delete it after usage form a privileged account. Connection
will otherwise create the table and it can be deleted by delete-store. You can activate
Amazon X-Ray by setting :x-ray? to true in
the DynamoDB spec.
This backend supports atomic multi-key operations (multi-assoc, multi-get, multi-dissoc), allowing you to read, write, or delete multiple keys in a single operation.
Important: All operations are limited to 100 items due to DynamoDB API constraints. Exceeding this limit will throw an error.
;; Write multiple keys atomically (uses TransactWriteItems API)
(k/multi-assoc store {:user1 {:name "Alice"}
:user2 {:name "Bob"}}
{:sync? true})
;; Read multiple keys in one request (uses BatchGetItem API)
(k/multi-get store [:user1 :user2 :user3] {:sync? true})
;; => {:user1 {:name "Alice"}, :user2 {:name "Bob"}}
;; Note: Returns sparse map - only found keys are included
;; Delete multiple keys atomically (uses TransactWriteItems API)
(k/multi-dissoc store [:user1 :user2] {:sync? true})
;; => {:user1 true, :user2 true}
;; Returns map indicating which keys existed before deletion
| Operation | DynamoDB API | Atomicity | Limit |
|---|---|---|---|
multi-assoc | TransactWriteItems | Atomic (all-or-nothing) | 100 items |
multi-get | BatchGetItem | Eventual/Strong consistency* | 100 items |
multi-dissoc | TransactWriteItems | Atomic (all-or-nothing) | 100 items |
*Consistency for reads depends on the :consistent-read? option in your dynamodb-spec (default: false for eventual consistency).
A common
approach
to manage AWS credentials is to put them into the environment variables as
AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY to avoid storing them in plain
text or code files. Alternatively you can provide the credentials in the
dynamodb-spec as :access-key and :secret.
Copyright © 2024-2025 Christian Weilbach
Licensed under Eclipse Public License (see LICENSE).
Can you improve this documentation?Edit on GitHub
cljdoc builds & hosts documentation for Clojure/Script libraries
| Ctrl+k | Jump to recent docs |
| ← | Move to previous article |
| → | Move to next article |
| Ctrl+/ | Jump to the search field |