A RocksDB-based capture index (CDX) server for web archives.
Features:
- Speaks both OpenWayback (XML) and PyWb (JSON) CDX protocols
- Realtime, incremental updates
- Compressed indexes (varint packing + snappy), typically 1/4 - 1/5 the size of CDX files.
- Primary-secondary replication
- Access control (experimental, see below)
Things it doesn't do (yet):
- Sharding, replication
- CDXJ
Used in production at the National Library of Australia and British Library with 8-9 billion record indexes.
Build:
mvn package
Run:
java -jar target/outbackcdx*.jar
Command line options:
Usage: java -jar outbackcdx.jar [options...]
-b bindaddr Bind to a particular IP address
-c, --context-path url-prefix
Set a URL prefix for the application to be mounted under
-d datadir Directory to store index data under
-i Inherit the server socket via STDIN (for use with systemd, inetd etc)
-j jwks-url perm-path Use JSON Web Tokens for authorization
-k url realm clientid Use a Keycloak server for authorization
-m max-open-files Limit the number of open .sst files to control memory usage
(default 396 based on system RAM and ulimit -n)
-p port Local port to listen on
-t count Number of web server threads
-r count Cap on number of rocksdb records to scan to serve a single request
-x Output CDX14 by default (instead of CDX11)
-v Verbose logging
-y file Custom fuzzy match canonicalization YAML configuration file
Primary mode (runs as a replication target for downstream Secondaries)
--replication-window interval interval, in seconds, to delete replication history from disk.
0 disables automatic deletion. History files can be deleted manually by
POSTing a replication sequenceNumber to /<collection>/truncate_replication
Secondary mode (runs read-only; polls upstream server on 'collection-url' for changes)
--primary collection-url URL of collection on upstream primary to poll for changes
--update-interval poll-interval Polling frequency for upstream changes, in seconds. Default: 10
--accept-writes Allow writes to this node, even though running as a secondary
--batch-size Approximate max size (in bytes) per replication batch
The server supports multiple named indexes as subdirectories. Currently indexes are created automatically when you first write records to them.
OutbackCDX does not include a CDX indexing tool for reading WARC or ARC files. Use
the cdx-indexer
scripts included with OpenWayback or PyWb.
You can load records into the index by POSTing them in the (11-field) CDX format Wayback uses:
$ cdx-indexer mycrawlw.warc.gz > records.cdx
$ curl -X POST --data-binary @records.cdx http://localhost:8080/myindex
Added 542 records
The canonicalized URL (first field) is ignored, OutbackCDX performs its own canonicalization.
Limitation: Loading an extremely large number of CDX records in one POST request can cause an out of memory error. Until this is fixed you may need to break your request up into several smaller ones. Most users send one POST per WARC file.
Deleting records works the same way as loading them. POST the records you wish to delete to /{collection}/delete:
$ curl -X POST --data-binary @records.cdx http://localhost:8080/myindex/delete
Deleted 542 records
When deleting OutbackCDX does not check whether the records actually existed in the index. Deleting non-existent records has no effect and will not cause an error.
Records can be queried in CDX format:
$ curl 'http://localhost:8080/myindex?url=example.org'
org,example)/ 20030402160014 http://example.org/ text/html 200 MOH7IEN2JAEJOHYXIEPEEGHOHG5VI=== - - 2248 396 mycrawl.warc.gz
CDX formatted as JSON arrays:
$ curl 'http://localhost:8080/myindex?url=example.org&output=json'
[
[
"org,example)/",
20030402160014,
"http://example.org/",
"text/html",
200,
"MOH7IEN2JAEJOHYXIEPEEGHOHG5VI===",
2248,
396,
"mycrawl.warc.gz"
]
]
OpenWayback "OpenSearch" XML:
$ curl 'http://localhost:8080/myindex?q=type:urlquery+url:http%3A%2F%2Fexample.org%2F'
<?xml version="1.0" encoding="UTF-8"?>
<wayback>
<request>
<startdate>19960101000000</startdate>
<enddate>20180526162512</enddate>
<type>urlquery</type>
<firstreturned>0</firstreturned>
<url>org,example)/</url>
<resultsrequested>10000</resultsrequested>
<resultstype>resultstypecapture</resultstype>
</request>
<results>
<result>
<compressedoffset>396</compressedoffset>
<compressedendoffset>2248</compressedendoffset>
<mimetype>text/html</mimetype>
<file>mycrawl.warc.gz</file>
<redirecturl>-</redirecturl>
<urlkey>org,example)/</urlkey>
<digest>MOH7IEN2JAEJOHYXIEPEEGHOHG5VI===</digest>
<httpresponsecode>200</httpresponsecode>
<robotflags>-</robotflags>
<url>http://example.org/</url>
<capturedate>20030402160014</capturedate>
</result>
</results>
</wayback>
Query URLs that match a given URL prefix:
$ curl 'http://localhost:8080/myindex?url=http://example.org/abc&matchType=prefix'
Find the first 5 URLs with a given domain:
$ curl 'http://localhost:8080/myindex?url=example.org&matchType=domain&limit=5'
Find the next 10 URLs in the index starting from the given URL prefix:
$ curl 'http://localhost:8080/myindex?url=http://example.org/abc&matchType=range&limit=10'
Return results in reverse order:
$ curl 'http://localhost:8080/myindex?url=example.org&sort=reverse'
Return results ordered closest to furthest from a given timestamp:
$ curl 'http://localhost:8080/myindex?url=example.org&sort=closest&closest=20030402172120'
See the API Documentation for more details about the available options.
Point Wayback at a OutbackCDX index by configuring a RemoteResourceIndex. See the example RemoteCollection.xml shipped with OpenWayback.
<property name="resourceIndex">
<bean class="org.archive.wayback.resourceindex.RemoteResourceIndex">
<property name="searchUrlBase" value="http://localhost:8080/myindex" />
</bean>
</property>
Create a pywb config.yaml file containing:
collections:
testcol:
archive_paths: /tmp/warcs/
#archive_paths: http://remote.example.org/warcs/
index:
type: cdx
api_url: http://localhost:8080/myindex?url={url}&closest={closest}&sort=closest
# outbackcdx doesn't serve warc records
# so we blank replay_url to force pywb to read the warc file itself
replay_url: ""
The ukwa-heritrix project includes some classes that allow OutbackCDX to be used as a source of deduplication data for Heritrix crawls.
Access control can be enabled by setting the following environment variable:
EXPERIMENTAL_ACCESS_CONTROL=1
Rules can be configured through the GUI. Have Wayback or other clients query a particular named access point. For example to query the 'public' access point.
http://localhost:8080/myindex/ap/public
See docs/access-control.md for details of the access control model.
Alias records allow the grouping of URLs so they will deliver as if they are different snapshots of the same page.
@alias <source-url> <target-url>
For example:
@alias http://legacy.example.org/page-one http://www.example.org/page1
@alias http://legacy.example.org/page-two http://www.example.org/page2
Aliases do not currently work with url prefix queries. Aliases are resolved after normal canonicalisation rules are applied.
Aliases can be mixed with regular CDX lines either in the same file or separate files and in any order. Any existing records that the alias rule affects the canonicalised URL for will be updated when the alias is added to the index.
Deletion of aliases is not yet implemented.
RocksDB some data in memory (binary search index, bloom filter) for each open SST file. This improves performance at the cost of using more memory. OutbackCDX uses the following heuristic by default to limit the maximum number of open SST files in an attempt not to exhaust the system's memory.
RocksDB max_open_files = (totalSystemRam / 2 - maxJvmHeap) / 10 MB
This default may not be suitable when multiple large indexes are in use or when OutbackCDX is sharing a server with
many other processes. You can override the limit OutbackCDX's -m
option.
If you find OutbackCDX using too much memory or you need more performance try adjusting the limit. The optimal setting
will depend on your index size and hardware. If you have a lot of memory -m -1
(no limit) will allow RocksDB to open
all SST files on startup and should give the best query performance. However with slow disks it can also make startup
very slow. You may also need to increase the kernel's max open file description limit (ulimit -n
).
By default OutbackCDX is unsecured and assumes some external method of authorization such as firewall rules or a reverse proxy are used to secure it. Take care not to expose it to the public internet.
Alternatively one of the following authorization methods can be enabled.
Authorization to modify the index and access control rules can be controlled using JSON Web Tokens. To enable this you will typically use some sort of separate authentication server to sign the JWTs.
OutbackCDX's -j
option takes two arguments, a JWKS URL for the public key of the auth server and a slash-delimited
path for where to find the list of permissions in the JWT received as a HTTP bearer token. Refer to your auth server's
documentation for what to use.
Currently the OutbackCDX web dashboard does not support generic JWT/OIDC authorization. (Patches welcome.)
OutbackCDX can use Keycloak as an auth server to secure both the API and dashboard.
- In your Keycloak realm's settings create a new client for OutbackCDX with the protocol
openid-connect
and the URL of your OutbackCDX instance. - Under the client's roles tab create the following roles:
- index_edit - can create or delete index records
- rules_edit - can create, modify or delete access rules
- policies_edit - can create, modify or delete access policies
- Map your users or service accounts to these client roles as appropriate.
- Run OutbackCDX with this option:
-k https://{keycloak-server}/auth {realm} {client-id}
Note: JWT authentication will be enabled automatically when using Keycloak. You don't need to set the -j
option.
OutbackCDX can be configured to compute a field using a HMAC or cryptographic digest. This feature is intended to be used in conjunction with a web server or cloud storage provider which provides temporary access to WARC files using a signed URL. To allow compatibility with a variety of different storage servers the structure of the message and field values are configured using templates.
--hmac-field name algorithm message-template field-template secret-key expiry-secs
The field will be made available as name
to the fl
CDX query parameter. Multiple HMAC fields can be defined
as long as they have different names.
The algorithm
may be one of HmacSHA256
, HmacSHA1
, HmacMD5
, SHA-256
, SHA-1
, MD5
or any other MAC or
MessageDigest from a Java security provider. Your system may have additional algorithms available depending on the
version and configuration of Java.
The message-template
configures the input to the HMAC or digest function. See the list of templates variables below.
The field-template
configures the field value returned and is typically used to construct a URL. See the list of templates variables below.
The secret-key
is the key of the HMAC functions. When using non-HMAC digest functions (which don't have a natural key
parameter) the key may be substituted into the message-template
using $secret_value
.
The expiry-secs
parameter is used to calculate an expiry time for this secure link. If you don't use the $expires
variable just set it to zero.
In addition to the fields of each capture record ($filename
, $length
, $offset
etc) the following extra
variables are available in templates:
$dollar
- a dollar sign ("$")$expires
- expiry time in seconds since unix epoch$expires_hex
- expiry time in hexadecimal seconds since unix epoch$expires_iso8601
- expiry time as a UTC ISO 8601 timestamp$hmac_base64
- computed hmac/digest value as a base64 string (only available in value template)$hmac_base64_pct
- computed hmac/digest value as a base64 string with + encoded as %2B$hmac_base64_url
- computed hmac/digest value as a base64 url-safe string$hmac_hex
- computed hmac/digest value as a hex string (only available in value template)$secret_key
- the secret key (only available in message template)$now
- current time in seconds since unix epoch$now_hex
- current time in hexadecimal seconds since unix epoch$now_iso8601
- current time as a UTC ISO 8601 timestamp$CR
- a carriage return ("\r")$CRLF
- a carriage return line feed ("\r\n")$LF
- a line feed ("\n")
The alternative variable syntax ${filename}
may also be used.
Note: The secure link module bundled with nginx uses the insecure MD5 algorithm. Consider using the community-developed HMAC secure link module instead.
Example nginx configuration:
location /warcs/ {
secure_link $arg_md5,$arg_expires;
secure_link_md5 "$secure_link_expires|$uri|$http_range|secret";
if ($secure_link != "1") { return 403; }
...
}
Corresponding OutbackCDX option:
--hmac-field warcurl md5 '$expires|/warcs/$filename|$range|$secret_key'
'http://nginx.example.org/warcs/$filename?expires=$expires&md5=$hmac_base64_url'
secret 3600
(As yet untested.)
Example nginx configuration:
location /warcs/ {
secure_link_hmac $arg_st,$arg_ts,$arg_e;
secure_link_hmac_algorithm sha256;
secure_link_hmac_secret secret;
secure_link_hmac_message $uri|$arg_ts|$arg_e|$http_range;
if ($secure_link_hmac != "1") { return 403; }
...
}
Corresponding OutbackCDX option:
--hmac-field warcurl Hmacsha256 '/warcs/$filename|$now|3600|$http_range'
'http://nginx.example.org/warcs/$filename?st=$hmac_base64_url&ts=$now&e=3600
secret 0
lighttpd mod_secdownload
Example lighttpd configuration:
secdownload.algorithm = "hmac-sha256"
secdownload.secret = "secret"
secdownload.document-root = "/data/warcs/"
secdownload.uri-prefix = "/warcs/"
secdownload.timeout = 3600
Corresponding OutbackCDX option:
--hmac-field warcurl Hmacsha256 '/$now_hex/$filename'
'http://lighttpd.example.org/warcs/$hmac_base64_url/$now_hex/$filename' secret 0
(Based on the S3 documentation but as yet untested.)
Replace s3-access-key-id
, s3-secret-key
and bucket
with appropriate values:
--hmac-field url Hmacsha1 'GET$LF$LF$LF$expires$LF/bucket/$filename'
'https://s3.amazonaws.com/bucket/$filename?AWSAccessKeyId=s3-access-key-id&Expires=$expires&Signature=$hmac_base64_pct'
s3-secret-key 3600