Dgraph Administration
Each Dgraph Alpha exposes various administrative (admin) endpoints both over HTTP and GraphQL, for example endpoints to export data and to perform a clean shutdown. All such admin endpoints are protected by three layers of authentication:
- IP White-listing (use
--whitelist
flag in alpha to whitelist IPs other than localhost). - Poor-man’s auth, if alpha is started with the
--auth_token
flag (means you will need to pass theauth_token
asX-Dgraph-AuthToken
header while making the HTTP request). - Guardian-only access, if ACL is enabled (means you need to pass the ACL-JWT
of a Guardian user using the
X-Dgraph-AccessToken
header while making the HTTP request).
An admin endpoint is any HTTP endpoint which provides admin functionality.
Admin endpoints usually start with the /admin
path. The current list of admin
endpoints includes the following:
/admin
/admin/backup
/admin/config/lru_mb
/admin/draining
/admin/export
/admin/shutdown
/admin/schema
/alter
/login
There are a few exceptions to the general rule described above:
/login
: This endpoint logs-in an ACL user, and provides them with a JWT. Only IP Whitelisting and Poor-man’s auth checks are performed for this endpoint./admin
: This endpoint provides GraphQL queries/mutations corresponding to the HTTP admin endpoints. All of the queries/mutations on/admin
have all three layers of authentication, except forlogin (mutation)
, which has the same behavior as the above HTTP/login
endpoint.
Whitelisting Admin Operations
By default, admin operations can only be initiated from the machine on which the Dgraph Alpha runs.
You can use the --whitelist
option to specify whitelisted IP addresses and ranges for hosts from which admin operations can be initiated.
dgraph alpha --whitelist 172.17.0.0:172.20.0.0,192.168.1.1 ...
This would allow admin operations from hosts with IP between 172.17.0.0
and 172.20.0.0
along with
the server which has IP address as 192.168.1.1
.
Restricting Mutation Operations
By default, you can perform mutation operations for any predicate. If the predicate in mutation doesn’t exist in the schema, the predicate gets added to the schema with an appropriate Dgraph Type.
You can use --mutations disallow
to disable all mutations,
which is set to allow
by default.
dgraph alpha --mutations disallow
Enforce a strict schema by setting --mutations strict
.
This mode allows mutations only on predicates already in the schema.
Before performing a mutation on a predicate that doesn’t exist in the schema,
you need to perform an alter operation with that predicate and its schema type.
dgraph alpha --mutations strict
Securing Alter Operations
Clients can use alter operations to apply schema updates and drop particular or all predicates from the database. By default, all clients are allowed to perform alter operations. You can configure Dgraph to only allow alter operations when the client provides a specific token. This can be used to prevent clients from making unintended or accidental schema updates or predicate drops.
You can specify the auth token with the --auth_token
option for each Dgraph Alpha in the cluster.
Clients must include the same auth token to make alter requests.
$ dgraph alpha --auth_token=<authtokenstring>
$ curl -s localhost:8080/alter -d '{ "drop_all": true }'
# Permission denied. No token provided.
$ curl -s -H 'X-Dgraph-AuthToken: <wrongsecret>' localhost:8180/alter -d '{ "drop_all": true }'
# Permission denied. Incorrect token.
$ curl -H 'X-Dgraph-AuthToken: <authtokenstring>' localhost:8180/alter -d '{ "drop_all": true }'
# Success. Token matches.
Exporting Database
An export of all nodes is started by locally executing the following GraphQL mutation on the /admin
endpoint of an Alpha node (e.g. localhost:8080/admin
) using any compatible client like Insomnia, GraphQL Playground or GraphiQL.
mutation {
export(input: {format: "rdf"}) {
response {
message
code
}
}
}
--whitelist
flag on dgraph alpha
.
This triggers an export for all Alpha groups of the cluster. The data is exported from the following Dgraph instances:
- For the Alpha instance that receives the GET request, the group’s export data is stored with this Alpha.
- For every other group, its group’s export data is stored with the Alpha leader of that group.
It is up to the user to retrieve the right export files from the Alphas in the cluster. Dgraph does not copy all files to the Alpha that initiated the export. The user must also ensure that there is sufficient space on disk to store the export.
Each Alpha leader for a group writes output as a gzipped file to the export
directory specified via the --export
flag (defaults to a directory called "export"
). If any of the groups fail, the
entire export process is considered failed and an error is returned.
Starting in Dgraph v20.11.0 you can provide an absolute path to the directory where you want to export data in the GraphQL mutation request, as follows:
mutation {
export(input: {format: "rdf",destination: "<absolute-path-to-your-export-dir>"}) {
response {
message
code
}
}
}
The data is exported in RDF format by default. A different output format may be specified with the
format
field. For example:
mutation {
export(input: {format: "json"}) {
response {
message
code
}
}
}
Currently, “rdf” and “json” are the only formats supported.
Encrypting Exports
Export is available wherever an Alpha is running. To encrypt an export, the Alpha must be configured with the encryption-key-file
.
encryption-key-file
was used for encryption-at-rest
and will now also be used for encrypted backups and exports.
Shutting Down Database
A clean exit of a single Dgraph node is initiated by running the following GraphQL mutation on /admin endpoint.
--whitelist
flag on dgraph alpha
.
mutation {
shutdown {
response {
message
code
}
}
}
This stops the Alpha on which the command is executed and not the entire cluster.
Deleting database
Individual triples, patterns of triples and predicates can be deleted as described in the DQL docs.
To drop all data, you could send a DropAll
request via /alter
endpoint.
Alternatively, you could:
- Shutdown Dgraph and wait for all writes to complete,
- Delete (maybe do an export first) the
p
andw
directories, then - Restart Dgraph.
Upgrading Database
Doing periodic exports is always a good idea. This is particularly useful if you wish to upgrade Dgraph or reconfigure the sharding of a cluster. The following are the right steps to safely export and restart.
- Start an export
- Ensure it is successful
- Shutdown Dgraph and wait for all writes to complete
- Start a new Dgraph cluster using new data directories (this can be done by passing empty directories to the options
-p
and-w
for Alphas and-w
for Zeros) - Reload the data via bulk loader
- Verify the correctness of the new Dgraph cluster. If all looks good, you can delete the old directories (export serves as an insurance)
These steps are necessary because Dgraph’s underlying data format could have changed, and reloading the export avoids encoding incompatibilities.
Blue-green deployment is a common approach to minimize downtime during the upgrade process.
This approach involves switching your application to read-only mode. To make sure that no mutations are executed during the maintenance window you can
do a rolling restart of all your Alpha using the option --mutations disallow
when you restart the Alphas. This will ensure the cluster is in read-only mode.
At this point your application can still read from the old cluster and you can perform the steps 4. and 5. described above. When the new cluster (that uses the upgraded version of Dgraph) is up and running, you can point your application to it, and shutdown the old cluster.
Upgrading from v1.2.2 to v20.03.0 for Enterprise Customers
- Use binary backup to export data from old cluster
- Ensure it is successful
- Shutdown Dgraph and wait for all writes to complete
- Upgrade
dgraph
binary tov20.03.0
- Restore from the backups using upgraded
dgraph
binary - Start a new Dgraph cluster using the restored data directories
- Upgrade ACL data using the following command:
dgraph upgrade --acl -a localhost:9080 -u groot -p password
Upgrading from v20.03.0 to v20.07.0 for Enterprise Customers
-
Use binary backup to export data from old cluster
-
Ensure it is successful
-
Shutdown Dgraph and wait for all writes to complete
-
Upgrade
dgraph
binary tov20.07.0
-
Restore from the backups using upgraded
dgraph
binary -
Start a new Dgraph cluster using the restored data directories
-
Upgrade ACL data using the following command:
dgraph upgrade --acl -a localhost:9080 -u groot -p password -f v20.03.0 -t v20.07.0
This is required because previously the type-names
User
,Group
andRule
were used by ACL. They have now been renamed asdgraph.type.User
,dgraph.type.Group
anddgraph.type.Rule
, to keep them in dgraph’s internal namespace. This upgrade just changes the type-names for the ACL nodes to the new type-names.You can use
--dry-run
option indgraph upgrade
command to see a dry run of what the upgrade command will do. -
If you have types or predicates in your schema whose names start with
dgraph.
, then you would need to manually alter schema to change their names to something else which isn’t prefixed withdgraph.
, and also do mutations to change the value ofdgraph.type
edge to the new type name and copy data from old predicate name to new predicate name for all the nodes which are affected. Then, you can drop the old types and predicates from DB.
Post Installation
Now that Dgraph is up and running, to understand how to add and query data to Dgraph, follow Query Language Spec. Also, have a look at Frequently asked questions.