Remove GWC layers and workspace after testing so the tests can be run idempotently
GeoServer Cloud
GeoServer Cloud is GeoServer ready to use in the cloud through dockerized microservices.
This project is an opinionated effort to split GeoServer's geospatial services and API offerings as individually deployable components of a microservices based architecture.
As such, it builds on top of existing GeoServer software components, adapting and/or extending them in an attempt to achieve functional decomposition by business capability; which roughly means each OWS service, the Web UI, the REST API, and probably other components such as the Catalog and Configuration subsystem, become self-contained, individually deployable and scalable micro-services.
Architecture
The following diagram depicts the system's general architecture.
GeoServer Cloud Architecture Diagram
Does that mean GeoServer's .war is deployed several times, with each instance exposing a given "business capability"?
ABSOLUTELY NOT.
Each microservice is its own self-contained application, including only the GeoServer dependencies it needs. Moreover, care has been taken so that when a dependency has both required and non-required components, only the required ones are loaded.
Technology
With GeoServer being a traditional, Spring Framework based, monolithic servlet application, a logical choice has been made to base the GeoServer derived microservices in the Spring Boot framework.
Additionally, Spring Cloud technologies enable crucial capabilities such as dynamic service discovery, externalized configuration, distributed events, API gateway, and more.
Only a curated list of the vast amount of GeoServer extensions will be supported, as they are verified and possibly adapted to work with this project's architecture. The current version supports the following extensions:
- jdbc config
- jdbc store
- pgraster
- datadir-catalog-loader
- authkey authentication
- web-resource explorer
- css style
- mb style
- GWC S3 Storage
- GWC Azure Blob Storage
- Pregeneralized feature datastore
- vectortiles
- flatgeobuf
- cog
- importer
- imagepyramid
Advanced ACL system is available through the project GeoServer ACL which offers the same capacities as GeoFence.
OAuth is available by using the geOrchestra Gateway in replacement of the GeoServer Cloud one.
License
GeoServer Cloud licensed under the GPLv2.
Distribution and deployment
Docker images for all the services are available on DockerHub, under the GeoServer Cloud organization.
You can find production-suitable deployment files for docker-compose and podman under the docs/deploy folder.
Also, a base Helm chart and examples for Kubernetes is available at the camptocamp/helm-geoserver-cloud Github repository.
Contributing
Please read the contribution guidelines before contributing pull requests to the GeoServer Cloud project.
Follow the developer's guide to know more about the project's technical details.
Status
v1.8.11 released against GeoServer 2.25.3.
Read the changelog for more information.
Bugs
GeoServer Cloud's issue tracking is at this GitHub repository.
Roadmap
Follow the development progress on these GitHub Kanban boards
Building
Requirements:
The simple make command from the project root directory will build, test, and install all the project artifacts, and build the GeoServer-Cloud Docker images. So for a full build just run:
make
To build without running tests, run
make install
and run tests with
make test
finally clean the build with
make clean
Build the docker images
As mentioned above, a make with no arguments will build everything.
But to build only the docker images, run:
make build-image
This runs the build-base-images, build-image-infrastructure, and build-image-geoserver targets,
which you can also run individually during development depending on your needs. Usually,
you'd run make build-image-geoserver to speed up the process when made a change and want
to test the geoserver containers, without having to rebuild the base and infra images.
Targeted builds
GeoServer Cloud-specific modules source code is under the src/ directory.
When you already have the 2.23.0-CLOUD GeoServer artifacts, you can choose to only build these projects, either by:
$ ./mvnw clean install -f src/
Or
$ cd src/
$ ../mvnw clean install
Note on custom upstream GeoServer version
GeoServer Cloud depends on a custom GeoServer branch, gscloud/gs_version/integration, which contains patches to upstream GeoServer that have not yet been integrated into the mainstream main branch.
Additionally, this branch changes the artifact versions (e.g. from 2.23-SNAPSHOT to 2.23.0-CLOUD), to avoid confusing maven if you also work with vanilla GeoServer, and to avoid your IDE downloading the latest 2.23-SNAPSHOT artifacts from the OsGeo maven repository, overriding your local maven repository ones, and having confusing compilation errors that would require re-building the branch we need.
The gscloud/gs_version/integration branch is checked out as a submodule on the camptocamp/geoserver-cloud-geoserver repository, which publishes the custom geoserver maven artifacts to the Github maven package registry.
The root pom adds this additional maven repository, so no further action is required for the geoserver-cloud build to use those dependencies.
Development runs
The ./compose folder contains docker-compose files intended only for development.
For instructions on running GeoServer Cloud in your environment, follow the Quick Start guide on the user guide.
Run as non-root
First thing first, edit the .env file to set the GS_USER variable to the user and group ids
the applications should run as.
Usually the GID and UID of your user, such as:
echo `id -g`:`id -u`
1000:1000
Healthchecks use curl hitting the http://localhost:8081/actuator/health spring-boot actuator endpoint, which
also provides Kubernetes liveness and readiness probes at /actuator/health/liveness and /actuator/health/readiness
respectively.
The services run on the 8080 port, and are exposed using different host ports. The spring-boot-actuator is set up at port 8081.
The gateway-service proxies requests from the 9090 local port:
Choose your Catalog and Configuration back-end
You need to run compose.yml and pick one compose override file for a given GeoServer Catalog
and Configuration back-end.
DataDirectory Catalog back-end
The datadir spring boot profile enables the traditional "data directory" catalog back-end,
with all GeoServer containers sharing the same directory. On a k8s deployment you would need a
ReadWriteMany persistent volume.
GeoServer-Cloud can start from an empty data directory.
The catalog-datadir.yml docker compose override enables the datadir profile and
initializes a volume with the default GeoServer release data directory.
Run with:
$ docker compose -f compose.yml -f catalog-datadir.yml
or the more convenient shell script:
$ ./datadir up -d
PostgreSQL Catalog back-end
The pgconfig spring boot profile enables the PostgreSQL catalog back-end.
This is the preferred Catalog back-end for production deployments, and requires a PostgreSQL 15.0+ database
The catalog-pgconfig.yml docker compose override enables the pgconfig profile and
sets up a PostgreSQL container named pgconfigdb.
On a production deployment, it is expected that the database is a provided service and not part of the GeoServer Cloud deployment.
Run with:
$ docker compose -f compose.yml -f catalog-pgconfig.yml
Or the more convenient shell script:
$ ./pgconfig up -d
PGBouncer:
Given the pgconfig catalog back-end will set up a database connection pool on each container,
when scaling out you might run out of available connections in the Postgres server. A good way
to avoid that and make better use of resources is to use a connection pooling service, such
as pgbouncer.
Use the catalog-pgconfig.yml in combination with the pgbouncer.yml docker compose override. pgbouncer.yml
will override the three database containers with separate pgbouncer instances for each:
pgconfigdbbecomes apgbouncercontainer pointing to thepgconfigdb_pgcontainer.acldbbecomes apgbouncercontainer pointing to theacldb_pgcontainer, and holds the GeoServer ACL databasepostgisbecomes apgbouncercontainer pointing to thepostgis_pgcontainer.
The
postgisis container used to host sample data, it is not required but useful during development.
Access GeoServer
Verify the services are running with dcd ps or dcp ps as appropriate.
$ curl "http://localhost:9090/geoserver/cloud/ows?request=getcapabilities&service={WMS,WFS,WCS,WPS}"
$ curl -u admin:geoserver "http://localhost:9090/geoserver/cloud/rest/workspaces.json"
Browse to http://localhost:9090/geoserver/cloud/
Note the
/geoserver/cloudcontext path is set up in thegateway-service's externalized configuration, and enforced through theGEOSERVER_BASE_PATHincompose.yml. You can change it to whatever you want. The default gateway-service.yml configuration file does not set up a context path at all, and hence GeoServer will be available at the root URL.