Directly accessing SQLite

Directly accessing the SQLite database

rqlite maintains data consistency and high availability by managing the SQLite database under the hood, and most applications should interact with rqlite exclusively through its HTTP API. However, there may be cases where you wish to access the underlying SQLite database directly. As improper direct access can lead to data loss, this guide details the best practices to follow to avoid any risk of such loss.

Can I modify the SQLite database directly?

No, you must never modify the SQLite database directly. All modifications of the database should occur through the rqlite HTTP API. If you alter the SQLite file directly, including changing its journaling mode or checkpointing the Write-Ahead Log (WAL), the behavior of rqlite becomes undefined. In other words you’ll probably break rqlite, and may lose data.

Can I read the SQLite database?

Yes, you may read the SQLite file directly, but it is critical to follow certain guidelines when doing so:

  • Operating System Protection: You should use operating system-level mechanisms to enforce read-only access to the directory containing the SQLite files1. Configure the file permissions so that any user or process reading the SQLite database (apart from the rqlite system) cannot modify the SQLite files, even accidentally.

  • Read-Only Access: Any client reading the SQLite database should open the database connection in read-only mode.2

Why are these guidelines important? A SQLite client, even if it wrote no data to the database, may checkpoint the WAL when closing its connection. Checkpointing the WAL will alter the state of the database and will break rqlite. It’s also important to note that while direct reads in production are a known use case, it has not been extensively tested.

The impact of Long-Running Reads

Long-running read transactions can interfere with rqlite’s ability to snapshot the database. rqlite periodically snapshots the SQLite database as part of the Raft subsystem, but this process requires exclusive access to the database. If a long-running read holds a lock on the database, snapshotting will be delayed, which may eventually lead to excessive disk usage or degraded performance.

Snapshotting typically only takes a few milliseconds, so this is unlikely to be an issue in practise.


  1. Specifically the files that must be protected are the main SQLite database file, the WAL file (-wal), and any shared-memory file (-shm). ↩︎

  2. You can enable read-only mode via the SQLite C API, or by setting the query parameter mode=ro if using a filename URI↩︎

Last modified December 2, 2024: Add config (7fa2303)