-
Notifications
You must be signed in to change notification settings - Fork 3
WebProtégé Next Generation Overview
The newest version of WebProtege is built using a microservices architecture. We are gradually transitioning WebProtege away from being a monolithic application to one that is composed as a bunch of small services. This will make WebProtege more extensible going forward and will allow it to scale better as we receive more and more projects on webprotege.stanford.edu and as ontologies and knowledge graphs get larger and larger.
The table below outlines the backend micro-services along with the default ports that they run on. Any WebProtégé installation will need to set up and run these sevices along with any external dependencies. Executable JARs are Spring Boot Applications. The default port can be overriden using -Dserver.port
Service Name | Brief Description | Default Port | Form | External Dependencies |
---|---|---|---|---|
webprotege-backend | Represents the current backend monolith. We are gradually transitioning away from this monolithic service using the strangler vine pattern (see Fowler). Note that the current backend lies on the "spring" branch | 7770 | Executable JAR | MongoDB, MinIO |
webprotege-authorization-service | Manages user roles and capabilities | 7771 | Executable JAR | MongoDB |
webprotege-ontology-processing-service | Processes uploaded ontologies by parsing them, resolving owl:imports and converting them to a format that can be quickly parsed and loaded into a project and revision history | 7772 | Executable JAR | MinIO |
webprotege-snapshot-generator-service | Generates snapshots of a particular project revision for download or downstream processing | 7773 | Executable JAR | MinIO |
webprotege-gwt-api-gateway | Provides a unified API for the webprotege-gwt-frontend | Executable JAR | ||
webprotege-gwt-ui | Serves the user interface and translates requests from GWT, sent via GWT-RPC, to backend requests routed via the API Gate Way service | 8080 | WAR |
Apache Kafka | WebProtege uses asynchronous messaging for inter-service communication on the backend. This is facilitated by Apache Kafka | 9092 |
---|---|---|
Apache Zoo Keeper | Used in combination with Apache Kafka | 2181 |
MongoDB | MongoDB is used to store a variety of json documents that represent structured information that WebProtege uses for things like forms, tags, user-roles and capabilities, user-activity, | 27019 |
MinIO | MinIO is used for blob storage of project snapshots (for download) and uploaded and processed ontologies. MinIO can be run locally or, more commonly, it is used as an interface to something like Amazon S3. | 9000 |
Apache Tomcat | The main WebProtege user interface is written using The Google Web Tooklit (GWT) and this runs as a container based web-app. | 8080 (Note this clashes with Keycloak) |
Keycloak | Provides authentication services | 8080 |
WebProtégé also requires access to the local file system for storing ontology change logs. Change logs are currently stored using the BinaryOWL log format. WebProtégé needs to be able to create and append changes to files in order for this functionality to be available.