xbat Logo XBAT
AboutDemo
CTRL+K
Megware logo

Database

Initial setup of the xbat databases

xbat uses MongoDB for storing user, job and configuration data while QuestDB is used for time-series data. The xbat.service must be running in order to access the databases for intial configuration.

The Mongo database is hosted within the docker infrastructure (xbat-mongodb). Data is persistently stored at /var/lib/xbat/mongodb/ on the host and then mounted into the container. The corresponding mongod.conf is created on installation at /etc/xbat/ and does not require further modification.

Attach to xbat-mongodb container to start the configuration:

podman exec -it xbat-mongodb /bin/bash

Follow the steps below to create the necessary accounts for authentication. All accounts for authentication must be created in database admin

mongo
use admin

Create an admin account to manage MongoDB. This account is different from the admin account used to access xbat.

db.createUser({
    user: "admin",
    pwd: passwordPrompt(),
    roles: [
        { role: "userAdminAnyDatabase", db: "admin" },
        "readWriteAnyDatabase"
    ]
});

Exit mongo with CTRL+D. From now on access to MongoDB requires authentication. Exit the mongo tool and log back in with

mongo --authenticationDatabase=admin --username admin

Afterwards add a user called xbat. These credentials will be used by the xbat services to access the database and must be entered in the /etc/xbat/xbat.conf file under the [mongodb] section (user and password).

use admin
db.createUser(
    {
     user: "xbat",
     pwd: passwordPrompt(),
     roles: [ { role: "readWrite", db: "xbat" }]
    }
)

Authentication of all users is handled by OAuth and requires creating the admin user and client on initial setup. Switch to the xbat database with the following command:

use xbat

Create the xbat admin account. The default password is admin and can be changed via the user interface. All other users will be imported from the User Management System upon their first login.

db.users.insert({
    user_name: "admin",
    user_type: "admin",
    password: "*4ACFE3202A5FF5CF467898FC58AAB1D615029441"
});

Create the frontend and swagger clients for admin. All other user clients will be created automatically.

db.clients.insert({
    name: "admin",
    client_id: "wf_admin",
    redirect_uris: "",
    default_scopes:
        "benchmarks_r benchmarks_w configurations_r configurations_w projects_r projects_w settings_r settings_w users_r users_w user_self_r user_self_w benchmarks_dr benchmarks_dw"
});

db.clients.insert({
    name: "admin",
    client_id: "admin",
    redirect_uris:
        "https://localhost:7000/api/v1/ui/oauth2-redirect.html https://127.0.0.1:7000/api/v1/ui/oauth2-redirect.html",
    default_scopes:
        "benchmarks_r benchmarks_w configurations_r configurations_w projects_r projects_w settings_r settings_w users_r users_w user_self_r user_self_w benchmarks_dr benchmarks_dw"
});

The xbat daemon (xbatd) also authenticates with the backend via the REST-API. Create a client for xbatd by generating a client secret (typically a random string with length between 32 and 64).

openssl rand -base64 32

Insert the xbatd client into the database.

db.clients.insert({
    name: "xbatd",
    client_id: "xbatd",
    client_secret: "<CLIENT_SECRET>",
    redirect_uris: "",
    default_scopes: "benchmarks_dr benchmarks_dw"
});

Exit the mongo shell with CTRL+D and set the credentials of the xbat user in the /etc/xbat/xbat.conf file under the [mongodb] section.

QuestDB is hosted within the docker infrastructure (xbat-questdb). Data is persistently stored at /var/lib/xbat/questdb/ on the host and then mounted into the container. The corresponding questdb-log.conf and questdb.conf are created on installation at /etc/xbat/. The latter requires to set user and password for the PGWire and HTTP interface.

# for backend
pg.password=<password>
pg.user=<user>

# for xbatd
http.user=<user>
http.password=<password>

Afterwards set the credentials at /etc/xbat/xbat.conf for [questdb] accordingly. The user and password are equivalent to pg.user and pg.password in the questdb.conf. Credentials for api_user and api_password must match http.user and http.password.

QuestDB and Valkey require adjusting sysctl settings to prevent unpredictable behaviour and out-of-memory exceptions (see here).

Modify /etc/sysctl.conf to change limits.

# add/set open file limit (QuestDB)
fs.file-max=1048576

# add/set max virtual memory areas limit (QuestDB)
vm.max_map_count=1048576

# enable memory overcommitment (Valkey)
vm.overcommit_memory=1

Afterwards apply the changes with sysctl -p.

Edit this Page on GitHub