Skip to content

Installation

Platform as a Service

Dashjoin offers a fully managed Platform as a Service available at https://dashjoin.com/#getstarted.

Download and local setup

Installers and binaries for Windows, MacOS, and Linux are available at https://download.dashjoin.com/

Important: These binaries run Dashjoin as a developer application, not as a service.

  • windows/dashjoin-exe.zip

Portable Dashjoin Platform Executable including Java Runtime. Unzip and start dashjoin.exe in a command prompt.

  • windows/dashjoin-version.msi

Dashjoin Windows Installer.

Same contents as windows/dashjoin-exe.zip plus start menu icon.

  • macos/dashjoin-exe.zip

Portable Dashjoin Platform Executable including Runtime.

Unzip and start MacOS/Dashjoin in a command prompt

Note: if you get an error saying "This Application is broken", Apple Quarantine needs to be cleared with this command:

xattr -cr Contents

  • macos/Dashjoin-version.dmg

Dashjoin MacOS Installer

Note: if you get an error saying "This Application is broken", Apple Quarantine needs to be cleared with this command:

xattr -cr Dashjoin-*.dmg

  • linux/dashjoin-exe.zip

Portable Dashjoin Platform Executable including Java Runtime.

Unzip and start bin/Dashjoin in a command prompt

  • linux/dashjoin-version.deb

Dashjoin Linux Installer. Same contents as linux/dashjoin-exe.zip

  • dashjoin-jar.zip

Generic Java Archive (JAR) for all platforms

Creating a local Admin User

After installing Dashjoin, no user is set up in the system (a user can be defined via the environment variables - see below for more information). To set up the local development admin user, navigate to http://localhost:8080/#/setup.

Choose a name, a username, and the password.

Example: Name Local Admin, username admin, password My.secure.pass!

Note:

this only works the very first time! After a development admin is created, no more local users can be created from the UI.

To change or disable the local user, please edit or delete the files djroles.properties and djusers.properties in the application root directory. Here are more details on local users

The Dashjoin authentication is configured to allow log in using social Google or Github accounts, or to allow registration of users by e-mail and password (authentication via e-mail uses the Google Firebase authentication).

Click here for a demo video.

Local users

Local users are maintained in the files djusers.properties and djroles.properties.

As the purpose for local users is for setup + dev, there is no management UI. To create / update users, or change the pwd, the corresponding entries have to be changed there.

Passwords need to be specified as hash of username:Dashjoin:password

Follow these steps to add/change a local user:

1. Add the user's password to djusers.properties

Important - hash the password salted with username + realm "Dashjoin": For user "myuser" and password "mypass", need hash of myuser:Dashjoin:mypass

For this example the result is a3f1c2e80af79503cef46f9e198919d3 (see how to calculate below)

So we need to add this line to djusers.properties:

myuser=a3f1c2e80af79503cef46f9e198919d3

2. Add the user's role(s) to djroles.properties

To give "myuser" the "authenticated" role, add this line to djroles.properties:

myuser=authenticated
Multiple roles can be added with comma separation

How to calculate the password hash

  • Linux/MacOS:

    echo -n "myuser:Dashjoin:mypass" | md5sum -
    

  • Windows:

    powershell Write-Host -NoNewline "myuser:Dashjoin:mypass" >temp.txt
    powershell (Get-FileHash -algorithm md5 temp.txt).Hash.ToLower()
    del temp.txt
    
    need to store the string in a file temp.txt first (please delete after). Make sure there are no additional spaces and newlines

  • Online:

For test/dev purposes you can also use an online service like https://emn178.github.io/online-tools/md5.html

Note this might be insecure if the online service stores or re-publishes the entered strings!

Opening the Dashjoin application

To access the application, navigate to http://localhost:8080

Docker

This is the easiest and recommended way to run Dashjoin as a production service. The official container image dashjoin/platform is hosted on dockerhub

docker pull dashjoin/platform
docker run -p 8080:8080 dashjoin/platform

Point your browser to http://localhost:8080.

If you would like to make the registered databases and credentials persistent, you can mount the "model" folder:

docker run -p 8080:8080 -v PERSISTENT_FOLDER:/deployments/model dashjoin/platform

Run local Dashjoin installation as service

If you have installed Dashjoin locally and want to run the application as a service, here are links on how to set up the service (not supported for production):

Environment

Dashjoin uses the Quarkus configuration framework. A Dashjoin instance can be configured using the following environment variables:

  • DJ_ADMIN_USER: admin user name (defaults to "admin")
  • DJ_ADMIN_PASS: admin password (default is blank)
  • DJ_ADMIN_ROLES: initial admin roles (defaults to the "admin" role)
  • DASHJOIN_HOME: defines the dashjoin working directory (defaults to /deployments/model when using docker or the directory where the platform was launched). If you are using a platfrom executable or installer version, the working directory is set to userhome/.dashjoin and cannot be modified
  • DASHJOIN_APPURL: optional git url where an app is cloned / pulled from
  • DJ_SID: optional system ID (contents of the file .secretid)

By default, the service will be bound to 0.0.0.0 (all IP addresses) and serve HTTP on port 8080.

For configuring HTTP ports, keystores etc. please refer to the Quarkus HTTP reference. The following example shows how to change the HTTP port using the windows executable:

> set QUARKUS_HTTP_PORT=3333
> Dashjoin.exe

How to enable HTTPS

Note: in a production environment, very often a global load balancer (or other edge device) that serves HTTPS to the outside and connects to the Dashjoin service using HTTP is used.

To enable HTTPS for the platform, the certificate file and the key file are required (usually called cert.pem and key.pem).

Alternatively you can use a Java keystore, and you can also disable HTTP completely. Please refer to the Quarkus HTTP reference for all configuration options.

Configure the service with the following settings:

QUARKUS_HTTP_SSL_CERTIFICATE_FILE=/path/to/cert.pem
QUARKUS_HTTP_SSL_CERTIFICATE_KEY_FILE=/path/to/key.pem

By default, the HTTPS port is 8443. To change it use:

QUARKUS_HTTP_SSL_PORT=58443

Self-signed certificate

For test + dev, you can create a self-signed certificate with the following command

openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout key.pem -out cert.pem

Import an SSL certificate to the Java trust store

When accessing a third party system via SSL or HTTPS, the SSL certificate of the destination system needs to be trusted.

In most cases this works "automatically" when the certificate was created such that an already trusted root certificate is already part of the Java trustStore. The trust store contains all major root certificates and is maintained by the Java vendor.

When you encounter an error similar to the following:

javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.
SunCertPathBuilderException: unable to find valid certification path to requested target

this means that the SSL certificate of the host being contacted is not trusted, and access was denied. This means that the certificate is either self-signed (dev or test), or by a root certificate not trusted (for example a corporate internal root certificate).

There are 2 options to solve this situation:

  • if the destination host is under your control, create and use a certificate that is trusted

This is usually the preferred method, as it does not require to manually edit the trustStore.

Remember that whenever the SSL certificate needs to be renewed (i.e. after expiry), the error will again show up, and another change to the trustStore is required, and the procedure needs to be repeated!

  • import the SSL certificate to the Java trustStore

The import procedure involves several steps. Please follow this detailed guide that shows how to import the certificate to the existing Java trust store called cacerts

Let's call the new trust store including the imported certificate(s) my-cacerts, now it needs to be made available to the running application in this location:

<java.home>/lib/security/cacerts

Note that the Java home is logged upon startup of the platform as java.home:

Dashjoin Platform 3.1.38-e525ab3-6e8f7b6 (built 2022-12-20T17:31:57+0000)
Linux 5.15.49-linuxkit aarch64 / OpenJDK 64-Bit Server VM 17.0.5+8-jvmci-22.3-b08 - GraalVM CE 22.3.0
availableProcessors 4 / maxMemory (MB) 8192 / freeMemory (MB) 64 / totalMemory (MB) 80
> cwd       = /deployments
> java.home = /opt/graalvm-ce-java17-22.3.0

 _________         ______   ____    ____     
  ___/ __ \____ ______/ /_    (_)___  (_)___ 
   _/ / / / __ `/ ___/ __ \  / / __ \/ / __ \
   / /_/ / /_/ (__  ) / / / / / /_/ / / / / /
  /_____/\__,_/____/_/ /_/_/ /\____/_/_/ /_/ 
                        /___/                

              Powered by Quarkus 2.14.3.Final

If you have access to the file system of the installed Dashjoin platform, you can replace the file with the new version (copy my-cacerts over cacerts).

In the containerized application, we can mount the file in the cacerts location. When using the docker CLI, use a mount option like

-v /path/to/my-cacerts:/opt/<java.home>/lib/security/cacerts

A complete Docker command using a customized logincfg.json and my-cacerts in the current directory:

docker run -p 8080:8080 \
  -v $(pwd)/logincfg.json:/deployments/assets/logincfg.json \
  -v $(pwd)/my-cacerts:/opt/graalvm-ce-java17-22.3.0/lib/security/cacerts \
  dashjoin/platform:latest

Cross-origin resource sharing (CORS)

CORS is a mechanism that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served. CORS is enabled by default, with standard settings.

All configuration options are described in the CORS filter section.

Logging levels for diagnostics

Verbosity of the Dashjoin Platform is minimized for production workloads. The default level for logging is INFO.

In order to increase verbosity for the whole platform, you can use

QUARKUS_LOG_LEVEL=DEBUG

You can also change the log level of a certain category (module or file), for example to change com.dashjoin.launch logging to DEBUG:

QUARKUS_LOG_CATEGORY__COM_DASHJOIN_LAUNCH__LEVEL=DEBUG

Build Locally

Prerequisites:

  • Java (11 or later)
  • Node (12 or later)
  • Maven (3.6 or later)
  • Angular CLI (11 or later)
  • For Windows users: you need to create the symbolic link in "platform\dashjoin\src\main\resources\META-INF": mklink /D resources ..\..\..\..\..\angular\dist\angular

Dashjoin uses Quarkus as runtime framework (https://quarkus.io). You can run your application in dev mode using:

platform/angular$ npm install [--legacy-peer-deps # required if nvm -version > 7.0!)
platform/angular$ ng build
platform$ mvn install
platform/dashjoin$ mvn compile quarkus:dev

Point your browser to http://localhost:8080.

You can use the provided launch file to directly run from within Eclipse (right-click on the launch file, "Run as" or "Debug as" -> "Dashjoin", note that you need to adjust your jdk, mvn, and working directory location in the file "Dashjoin.launch"). This requires the Eclipse Quarkus plugin (https://quarkus.io/blog/eclipse-got-quarkused/) and the Lombok plugin (https://projectlombok.org/setup/eclipse) to be installed. Launching with "Debug as" will also enable live coding mode.

The application can be packaged and installed locally using:

platform/dashjoin$ mvn package install

It produces the dashjoin-0.0.1-SNAPSHOT-runner.jar file in the /target directory. Be aware that it’s not an uber-jar as the dependencies are copied into the target/lib directory.

If you want to build an uber-jar, execute the following command:

platform/dashjoin$ mvn package -Dquarkus.package.type=uber-jar

The application is now runnable using java -jar target/dashjoin-0.0.1-SNAPSHOT-runner.jar.

Eclipse

The Eclipse IDE can be used to develop and debug locally. First install the Eclipse Quarkus tools.

After cloning the Github repository, you need to import at least the following Maven projects into the Eclipse workspace:

  • dashjoin
  • dashjoin-core

Optional additional modules: * dashjoin-demo * dashjoin-kafka * dashjoin-mongodb

The Maven dependencies need to be initialized with (right click dashjoin project folder) -> Maven -> Update Project. The Angular UI must be built using the CLI, please refer to the previous section.

When everything was build successfully, you can use the Dashjoin.launch configuration to run or debug the platform. The Quarkus launcher supports hot loading of resources, i.e. any changes made will be adjusted at runtime without having to restart the platform. (Note: you will have to adjust the absolute folder references in the launch file to you own workspace settings)

Version History

1.0 (May 2021)

  • Launch of the platform

2.0 (Jan 2022)

  • Extended support for databases: MongoDB, ArangoDB, RDF
  • Support for graph queries: database drivers can implement graph / path queries, widgets can display graph query results and the platform has basic support for OpenCypher
  • Chart improvements: support for stacked bar charts, ability to configure charts with all ChartJS options
  • New Function: the "receive" function supports streaming data / IoT use cases
  • App development / lifecycle: apps can be written collaboratively on GitHub, auto-installed upon platform launch
  • Functions and databases can be deployed as micro-services using the RemoteDatabase driver

2.1 (April 2022)

  • UI: HTML component, icons editor and display icon specification, run write queries from catalog, JSONata editor, MAP widget, PDF export
  • ETL: streaming XML, YAML, transparent HTTP caching
  • JSONata: 100% compatibility to JSONataJS, functions with multiple parameters
  • Graph Search: PathQL integration
  • Data Model: JSONb arrays can be foreign keys, allow specifying external ontology

2.5 (July 2022)

  • UI
  • Components can be scheduled to redraw live data
  • Chart, table and tree widget support JSONata in addition to DB queries
  • Page variables can be set via the URL
  • Charts are clickable and navigate to the respective instance page
  • Forms support document upload
  • Search: Results can be restricted per database and table
  • Data Model
  • Databases, tables and properties can be assigned a "title" that is used in forms and hyperlinks
  • A description can be set for databases, tables and properties, enhancing the technical metadata with semantics
  • Support for SQL views
  • SDK
  • Monaco editor integrated for editing SQL, HTML, and CSS
  • Introduced CSV parsing options
  • New openText function allows web scaping

3.0 (Oct 2022)

  • UI
  • Query editor preview enhanced for complex queries
  • Query catalog improvements for scripts and write queries
  • Display and table widgets support showing images, hyperlinks and lists
  • Query processing
  • Support for multiple SQL result sets
  • Streaming DB copy
  • Better support for stored procedures
  • Access control
  • Row level security
  • SDK
  • Ability to provide alternative development DBs and REST services
  • Platform helps in identifying missing / orphaned queries / functions
  • Platform offers JSON:API and ODATA interfaces

3.1 (Dec 2022)

  • UI
  • Create and edit queries directly from layout editor
  • Ability to block entire pages for certain user roles
  • Easy customization of the toolbar for different user roles
  • Query processing
  • Support union queries in query preview
  • SDK
  • Support downloading binary data

3.2 (Jan 2023)

  • OpenAPI
  • Dashjoin Apps can expose OpenAPI interface
  • Implement existing OpenAPI specification via functions
  • SwaggerHub integration
  • Platform
  • ARM support
  • CORS configuration
  • UI
  • Optional confirmation dialog for button widget
  • SDK
  • Ability to include static assets in apps

4.0 (May 2023)

  • AI & ML
  • Docker container / REST API for deploying custom models
  • Image, face, and optical character recognition container
  • Large language model for translation services
  • Large language model for chat and instructions
  • JSONata bindings for OpenAPI and Dashjoin AI & ML APIs
  • Automatic entity reconciliation and classification
  • JSONata notebooks
  • Ad hoc queries supported via JSONata
  • File upload to JSONata notebooks
  • Ad hoc ETL via JSONata
  • Data Model
  • Entity relationship schema visualization
  • Table statistics
  • Platform
  • System exec JSONata function
  • Improved SQLite insert performance
  • SDK
  • GIT operations available via JSONata

5.0 (Jan 2024)

  • UI
  • Revamped user interface with several theme customization options
  • WYSIWYG drag and drop layout editor
  • Form layout integrated into the layout editor
  • Edit and arrange diagrams and flow charts using the diagram widget
  • Notebooks support map, table, and chart visualizations
  • Platform
  • Improved JSONata performance
  • SDK
  • Write your own widgets using any 3rd party JavaScript library and integrate them into the layout editor
  • Manage your app versions and unit testing via the new Dashjoin Studio
  • Dashjoin Studio bundles all required tools and makes them available right in your browser

5.1 (April 2024)

  • Dashjoin AI Assistant
  • Provisions a powerful large language model in a GDPR compliant way
  • Allows defining document collections that the AI can use to answer questions
  • Fully secured and ready to be managed by role based access control
  • UI
  • AI Chat Widget to interface with the AI Assistant
  • Graph widget to explore the data graph - can be configured via JSONata and OpenCypher graph queries
  • Platform
  • New cloud offering includes ProgreSQL and flexible workloads
  • Multi-tenant playground online
  • SDK
  • Optimized performance for JSONata openExcel
  • JSONata curl command as a flexible HTTP client
  • openHtml function to scrape webpages

5.2 (July 2024)

  • UI
  • Ability to specify redirect behavior after edit / delete
  • Delete confirmation for table bulk delete
  • Button form can be pre-populated
  • Rows per table can be set
  • Conditional rendering for all widgets
  • onRender JSONata hook for all pages
  • Multi file upload in forms
  • Filter improvements
  • Platform
  • Ability to track platform users' first and last login times
  • Incremental ETL from file resources
  • SDK
  • JSONata upsert function
  • Support credential store for any kind of REST header / API key

5.3 (Oct 2024)

  • UI
  • Analytics widget allows users to easily apply filters to charts and tables
  • Voice (speech to text) input form element
  • Support for comparators in table filters
  • Enhanced JSONata support for the tree widget
  • Container widget allows rendering a child for each array item
  • Forms support entering arrays of foreign keys
  • Platform
  • Docker container / REST API for extracting text from PDF, Word, and HTML files
  • Support PostgreSQL array type
  • Support anonymous guest login
  • SDK
  • Support for externalizing JSONata into separate files
  • JSONata text to speech function
  • curl supports socket timeout