Overview
This document is made up of four sections, describing installation , post-installation
work , performance and the admin interface
Installation
Installing a group of ICATs
If your facility depends upon a single ICAT instance then
ingestion of data can be held up by a user making an expensive query.
To avoid this it is suggested that you install multiple servers
each running a Glassfish with an ICAT but all sharing one database and
one icat.lucene server. It is recommended that you install the
machines individually first and make sure that each works before tying
them together. Finally ingestion can be directed to one node and the
other nodes can be load balanced for user access by, for example, an
Apache web server.
All machines must use the same database and icat.lucene server
Authentication can either be carried out on one machine - which
has the advantage that you only have authenticator logs building up on
that machine or each machine can host its own authenticators. If an
icat.server is configured with the new style restful authenticators
then more than one equivalent authenticator server may be specified to
make the system more robust. If you use the old style where JNDI
settings must be specified it is recommended for each icat.server to
have its own authenticators.
The icat.servers are linked by specifying a cluster parameter in
the run.properties file for each machine. This parameter may be the
same for each machine as the software tries to avoid sending messages
to itself.
You could then set up an Apache front end to do load balancing. This
will probably just connect to the satellites leaving the central
machine to handle ingestion of data. See Apache
front end for one way of doing this.
Schema upgrade
Lucene database
Any existing lucene database should be removed. The location of
this would have been specified in the previous icat.properties file.
Ensure that the directory specified there is empty.
Database schema
The direct upgrade of the database schema is supported for icat.server
4.7.0 and newer. This is done automatically: the initialization of
icat.server will create all missing tables, indices, and columns when
the new version is deployed for the first time.
For older ICAT installations, you need to upgrade to 4.7.0 first,
following the
install
instructions of that version. In a second step, you can make use of
implied schema upgrade while installing the current version.
Database triggers (optional)
If you want the new attributes fileSize and fileCount in Dataset and
Investigation to be updated automatically whenever a datafile or
dataset is added/modified/deleted, you can also set up triggers in your
database. This can be done for MySQL or MariaDB by running
mysql -u icat -p icat < create_triggers_mysql_5_0.sql
or for Oracle by running
sqlplus icat @create_triggers_oracle_5_0.sql
where in both cases it is assumed that the tables are owned by user
"icat". This automatically initializes the fileSize and fileCount of all
existing datasets and investigations. Note that ICAT should not be
running while this is done to avoid inconsistencies.
The setup.properties file
- container
-
Values must be chosen from: TargetServer
Though only Glassfish is working properly at the moment.
- home
- is the top level of the container installation. For Glassfish
it must contain "glassfish/domains" and for JBoss (wildfly) it must
contain jboss-modules.jar.
- port
- is the administration port of the container which is
typically 4848 for Glassfish and 9990 for JBoss.
- secure
- must be set to true or false. If true then only https and not
http connections will be allowed.
- db.driver
- is the name of the jdbc driver which must match the jar file
installed in the container and matching your database.
- db.url
- url to connect to your database. For example:
jdbc:mysql://localhost:3306/icat
- db.username
- username to connect to your database.
- db.password
- password to connect to your database.
- db.target
-
This is optional and may be used to control the SQL generated by the
JPA. Values must be chosen from: TargetDatabase
- db.logging
-
This is optional and if set to one of the values in Eclipse
Link logging.level controls the logging of JPA generated SQL
statements.
The logback.xml file
If you wish to modify the provided logging levels then rename
logback.xml.example to logback.xml and edit to suit your needs.
The run.properties file
- lifetimeMinutes
- Defines the lifetime of an ICAT sessionid. You should avoid
making it have a long duration as this increases the risk if it is
intercepted, lost or stolen.
- rootUserNames
- Is a space separated list of user identifiers having full
access to all tables. The format of the user identifier is determined
by the chosen authentication plugin. The authn_db and authn_ldap
plugins may be configured to either return the simple user name or to
prepend it with a name identifying the mechanism. For example if
there is a an entry "root" in the database then if the authn_db
authenticator is configured without a mechanism then the user name to
consider will be just "root", however if it has been configured with
a mechanism of "db" then the string "db/root" must be specified.
- maxEntities
- Restrict total number of entities to return in a search or
get call. This should be set as small as possible to protect the
server from running out of memory. However if you set it too small it
may prevent users from doing reasonable things.
- maxIdsInQuery
- For handling INCLUDEs, ICAT may generate queries which are
not acceptable to the database system. To avoid this problem such
queries are broken down. This is the maximum size of each chunk which
must not exceed 1000 for Oracle.
- importCacheSize
- the size of a cache used during import to avoid an excessive
number of calls to the database. The cache is dropped after each call
to import to ensure that authorization rules are enforced. As the
cache is short-lived, modifications to ICAT are unlikely to result in
stale information being used from the cache.
- exportCacheSize
- the size of a cache used during export to avoid an excessive
number of calls to the database. The cache is dropped after each call
to export to ensure that authorization rules are enforced. As the
cache is short-lived, modifications to ICAT are unlikely to result in
stale information being used from the cache.
- authn.list
- is a space separated set of mnemonics for a user to select
the authenticator in the login call. Authenticators are separate
applications which may be "Remote EJBs", identified by jndi, if
installed in the same container or they may be restful services
identified by url. The list must not reference Remote EJBs which are
not installed as these are checked when ICAT performs its
initialisation; their absence will cause ICAT to not start.
- authn.<mnemonic>.url
- is a space separated list of the urls of machines with a
restful authenticator service. This will take the form:
https://example.com:443 There must be one such entry for each restful
authenticator. If more than one url is provided the services
referenced must be functionally equivalent. An invalid URL syntax
will cause the ICAT server not to start. This must not be set for an
EJB Authenticator.
- authn.<mnemonic>.jndi
-
is the jndi name to locate an EJB authenticator. When you installed
the authenticator a message would have appeared in the server.log
stating the JNDI names. The name will start:
java:global/
There must be one such entry for each EJB authenticator. This must
not be set for a restful Authenticator.
- authn.<mnemonic>.friendly
- is optional. It gives a name that a tool might use to label
the plugin.
- authn.<mnemonic>.admin
- is optional. Set to true if you wish to indicate that this
authenticator should only be advertised to administration tools.
- notification.list
- is optional. It is a space separated set of Entity names for
which you with to generate notifications. For each one there must be
another line saying under what conditions you wish to generate a
notification for the entity.
- notification.<entity name>
- a string of letters taken from the set "C" and "U" indicating
for which operations (create and update) you wish to be notified for
that kind of operation on the entity.
- log.list
- is optional. If present it specifies a set of call types to
log via JMS calls. The types are specified by a space separated list
of values taken from READ, WRITE, SESSION, INFO.
- lucene.url
- This is optional. It is the machine url of the icat.lucene
server if needed. It is needed for TopCAT to work.
- lucene.populateBlockSize
- This is ignored if lucene.url is not set. The number of
entries to batch off to the lucene server when using lucenePopulate.
- lucene.directory
- This is ignored if lucene.url is not set. Path of a directory
holding files for requests that are queued to go the icat.lucene
server.
- lucene.backlogHandlerIntervalSeconds
- This is ignored if lucene.url is not set. How often to check
the backlog file.
- lucene.enqueuedRequestIntervalSecond
- This is ignored if lucene.url is not set. How often to
transmit lucene requests to the icat.lucene server.
- lucene.entitiesToIndex = Datafile Dataset Investigation InvestigationUser DatafileParameter DatasetParameter InvestigationParameter Sample
- The entities to index with Lucene. For example, remove 'Datafile' and 'DatafileParameter' if the number of datafiles exceeds lucene's limit of 2^32 entries in an index
- jms.topicConnectionFactory
- This is optional and may be used to override the default
value of java:comp/DefaultJMSConnectionFactory
- key
- This is optional but if there is an IDS server in use and it
has a key for digest protection of Datafile.location then this key
value must be identical.
Check that ICAT works
A small test program,
testicat,
will have been installed for you. This is a python script which
requires that the suds client is available. This connects as one of
the root users you defined as 'rootUserNames' in the icat.properties
file. Invoke the script specifying the url of the machine on which the
ICAT service is deployed (something like https://example.com:8181),
the mnemonic for the chosen authentication plugin followed by the
credentials for one of the root user names supported by that plugin.
These credentials should be passed in as pairs of parameters with key
followed by value. For example:
testicat https://example.com:8181 db username root
password secret
It should report:
Logged in as ... with 119.9... minutes to go
Login, search,
create, delete and logout operations were all successful.
This script can be run at any time as it is almost harmless - it
simply creates a "Group" with an unlikely name and removes it again.
In case of problems, first erase the directory /tmp/suds and try
the testicat again. If it still fails, look at the log files:
server.log and icat.log which can both be found in the logs directory
below your domain. Look also at the relevant authenticator log.
Post-installation work
Fresh Install
If this is a fresh install then you can use the import facility
to do the initial icat population or you could use the icat manager to
create rules, a Facility and other high level entities.
If you are using Oracle the type NUMBER(38, 19) will have been used
for all floating point numbers. This constrains the values that can be
stored - they may be truncated or rejected. To fix this please execute
the SQL statements in
fix_floats_oracle.sql
In all cases
Populate the lucene index by using the
icatadmin tool.
Performance
To improve performance:
- Consider creating the indices defined in indices.sql. Indices
can make a huge difference to the database performance but there is
also a small cost for each index.
- Make entities readable by anyone if they contain no sensitive
information. This is generally the case for those entities that
implement an many-to-many relationship. For example InvestigationUser
relates Investigation to User but has no attributes. By making it
world readable no access to Investigation or User is granted. An in
memory cache of world readable entities is maintained by ICAT.
- Add entries to PublicStep to allow the INCLUDE mechanism to
be less costly. PublicStep is explained in the ICAT Java Client User
Manual. Its contents are also held in an in-memory cache for
performance.
The icatadmin tool
Administration operations have been added to the ICAT API and are
accessible via the icatadmin tool which will have been installed by
the
setup.py
script. It should be invoked as:
icatadmin <url> <plugin>
<credentials>... -- <command> <args>...
to run a single command or
icatadmin <url> <plugin>
<credentials>...
to be prompted for a series of commands as shown below. In
either case if you specify '-' as the password you will be prompted
for it. Note that in the single command case the "--" marker is needed
to terminate the list of credentials. For example:
icatadmin https://example.com:8181 db username root
password secret -- properties
Only users mentioned in the rootUserNames of the icat.properties file
are authorized to use this command.
- populate [<entity name>]
- re-populates lucene for the specified entity name. This is
useful if the database has been modified directly rather than by
using the ICAT API. This call is asynchronous and simply places the
request in a set of entity types to be populated. When the request is
processed all lucene entries of the specified entity type are first
cleared then the corresponding icat entries are scanned to
re-populate lucene. To find what it is doing please use the
"populating" operation described below. It may also be run without an
entity name in which case it will process all entities. The new
lucene index will not be seen until it is completely rebuilt. While
the index is being rebuilt ICAT can be used as normal as any lucene
updates are stored to be applied later.
- populating
- returns a list of entity types to be processed for populating
lucene. Normally the first item returned will be being processed
currently.
- commit
- instructs lucene to update indices. Normally this is not
needed as it is will be done periodically according to the value of
lucene.commitSeconds
- clear
- stops any population and clears all the lucene indices.