-
Notifications
You must be signed in to change notification settings - Fork 3
WebProtégé Next Generation Overview
The newest version of WebProtege is built using a microservices architecture. We are gradually transitioning WebProtege away from being a monolithic application to one that is composed as a bunch of small services. This will make WebProtege more extensible going forward and will allow it to scale better as we receive more and more projects on webprotege.stanford.edu and as ontologies and knowledge graphs get larger and larger. Third parties will also be able to create their own isolated backend-extensions, which are akin to plugins for Desktop Protégé.
This document gives a brief overview of the set of WebProtégé microservices and the external services that WebProtégé relies upon.
The table below outlines the backend micro-services along with the default ports that they run on. Any WebProtégé installation will need to set up and run these sevices along with any external dependencies. This is currently a manual process, but going forward we will be automating the build and deployment process.
Executable JARs are Spring Boot Applications. The default port can be overriden using the server.port
configuration property.
Service Name | Brief Description and Relevant Configuration Properties | Default Port | Form | External Dependencies |
---|---|---|---|---|
webprotege-backend | Represents the current backend monolith. We are gradually transitioning away from this monolithic service using the strangler vine pattern [Fowler, Richardson]. Note that the current backend lies on the "spring" branch. Use spring.data.mongodb.uri to configure the connection to MongoDB. |
7770 | Spring Boot Application (Executable JAR) | MongoDB, MinIO |
webprotege-authorization-service | Manages user roles and capabilities. Use spring.data.mongodb.uri to configure the connection to MongoDB. |
7771 | Spring Boot Application (Executable JAR) | MongoDB |
webprotege-ontology-processing-service | Processes uploaded ontologies by parsing them, resolving owl:imports and converting them to a format that can be quickly parsed and loaded into a project and revision history. The following configuration properties should be specified when running this service: webprotege.directories.data , minio.clientKey , minio.clientSecret , minio.endPoint
|
7772 | Spring Boot Application (Executable JAR) | MinIO |
webprotege-snapshot-generator-service | Generates snapshots of a particular project revision for download or downstream processing. The following configuration properties should be specified when running this service: webprotege.directories.data , minio.clientKey , minio.clientSecret , minio.endPoint
|
7773 | Spring Boot Application (Executable JAR) | MinIO |
webprotege-gwt-api-gateway | Provides a unified API for the webprotege-gwt-frontend. The following configuration properties should be specified |
7777 | Spring Boot Application (Executable JAR) | |
webprotege-gwt-ui | Serves the user interface and translates requests from GWT, sent via GWT-RPC, to backend requests routed via the API Gate Way service | 8080 | WAR |
The following diagram gives a flavor of the over all design of WebProtégé
WebProtégé requires the following third party services:
Service | Description | Default Port |
---|---|---|
Apache Kafka | WebProtege uses asynchronous messaging for inter-service communication on the backend. This is facilitated by Apache Kafka | 9092 |
Apache Zoo Keeper | Used in combination with Apache Kafka | 2181 |
MongoDB | MongoDB is used to store a variety of json documents that represent structured information that WebProtege uses for things like forms, tags, user-roles and capabilities, user-activity, | 27019 |
MinIO | MinIO is used for blob storage of project snapshots (for download) and uploaded and processed ontologies. MinIO can be run locally or, more commonly, it is used as an interface to something like Amazon S3. | 9000 |
Apache Tomcat | The main WebProtege user interface is written using The Google Web Tooklit (GWT) and this runs as a container based web-app. | 8080 (Note this clashes with Keycloak) |
Keycloak | Provides authentication services. Note that the default port is 8080, but this can be overridden when starting keycloak using the jboss.socket.binding.port-offset property.WebProtégé will attemt to connect to Keycloak with a client id of webprotege and it expects there to be a webprotege realm as well, however this can be overridden when starting the API gateway service. |
8080 |
WebProtégé also requires access to the local file system for storing ontology change logs. Change logs are currently stored using the BinaryOWL log format. WebProtégé needs to be able to create and append changes to files in order for this functionality to be available.
WebProtégé uses an asynchornous style of communication between backend services. You can read more about it on the API documentation page.