Using LIKPI

Installation

The CMDB can be installed in three ways, each suited to a different operating model.

All-In-One Fat JAR

  1. Prerequisites: Java 21, PostgreSQL.
  2. Execute cmdb-schema.sql against your PostgreSQL instance.
  3. Extract LIKPI-CMDB.zip.
  4. Run start-cmdb.bat (Windows) or ./start-cmdb.sh (Linux/Mac).
  5. The backend APIs and the bundled React UI are available at http://localhost:8888.

Decoupled 2-ZIP (Enterprise)

  1. Backend: Same as the All-In-One approach, but from the backend-only ZIP. The API server runs on port 8888.
  2. Frontend: Extract the frontend ZIP. Host the build/ folder with Nginx or Apache.
  3. Configure the web server to reverse-proxy /api/* requests to the backend.

Configuring Enterprise LDAP/LDAPS

For production use, follow these steps to enable secure directory authentication.

  1. Obtain the LDAP server’s public certificate (ldap-server.crt).

  2. Create a Java TrustStore:

    keytool -import -alias corp-ldap-cert -file ldap-server.crt -keystore cmdb-truststore.jks -storepass changeit -noprompt
    
  3. Update the database configuration:

    UPDATE sys_config
    SET config_value = '{
      "enabled": true,
      "url": "ldaps://ad.company.internal:636",
      "bind_dn": "cn=cmdb_service_account,ou=Services,dc=company,dc=internal",
      "bind_password": "YourSecurePassword",
      "user_base_dn": "ou=Users,dc=company,dc=internal",
      "user_search_filter": "(sAMAccountName={0})",
      "group_base_dn": "ou=Groups,dc=company,dc=internal",
      "group_search_filter": "(member={0})"
    }'::jsonb
    WHERE config_key = 'ldap_config';
    

    For OpenLDAP, use ``(uid={0})`` and ``(memberUid={0})``.

  4. Start the JVM with the TrustStore:

    java -cp ".:lib/*" \
      -Djavax.net.ssl.trustStore=/opt/cmdb/certs/cmdb-truststore.jks \
      -Djavax.net.ssl.trustStorePassword=changeit \
      com.cmdb.CmdbApp
    

Troubleshooting LDAP:

Error Root Cause Solution
PKIX path building failed Java does not trust the certificate Ensure the .crt was imported into the .jks and the path is correct.
No subject alternative DNS name Hostname in URL does not match the certificate Use the exact FQDN. For testing, add -Dcom.sun.jndi.ldap.object.disableEndpointIdentification=true.
Invalid Credentials (401) Bind DN incorrect or User Base DN misconfigured Double-check the credentials and that the user is inside the specified user_base_dn.
No LDAP groups found Group Search Filter wrong For AD use (member={0}), for OpenLDAP use (memberUid={0}).

After the directory connection is established, map LDAP groups to internal CMDB roles via the Admin UI or the POST /api/admin/ldap/mappings API.

AI Assistant

  • Open the chat panel and ask natural-language questions, e.g., “How many Tomcat servers are down?”
  • The assistant will display a human-readable summary and a dynamic chart (Pie, Bar, Table).
  • Follow-up questions are understood within the session context.

Building Custom Dashboards

  1. Navigate to the Dashboard Factory.
  2. Create a new dashboard, then Add Widget.
  3. Drag and resize the widget card on the CSS grid.
  4. Enter a PostgreSQL query that returns the data you need.
  5. Choose a visualisation type (Scalar, Pie, Bar, Histogram, Radar, Table) and configure colours, labels, and units.
  6. Save the dashboard. Use the Dashboard Viewer to display it to end users.

Configuring Triggers

  1. Go to Administration -> Triggers.
  2. Create a new trigger, specifying the target CI class and operations (CREATE, UPDATE, DELETE).
  3. Define conditions (e.g., ci_status CHANGED_TO "DOWN").
  4. Attach one or more actions:
    • Webhook: URL, method, custom headers, and a payload template.
    • Slack/Teams: Webhook URL and message template.
    • Email: Recipients, subject, HTML body.
    • JS Script: Custom remediation logic using the cmdbApi object.

Once saved, the trigger will fire automatically on matching events.


This document covers the complete feature set of the LIKPI Fast & Light CMDB. For developer-oriented API details and database schema references, consult the source code and inline comments.

API Integration & Automation

The LIKPI CMDB is built with an “API-First” philosophy. Every action achievable in the UI can be fully automated via our comprehensive REST API.

Stateless Authentication All API endpoints are secured using stateless JSON Web Tokens (JWT). Developers must first call the POST /api/login endpoint to retrieve a Bearer token, which is then passed in the Authorization header of subsequent requests.

API Reference & Postman The CMDB ships with a fully interactive OpenAPI 3.0 specification.

  • Interactive Docs: Navigate to API Reference in the documentation sidebar to view the interactive Redoc UI, which includes payload examples for all 80+ endpoints.
  • Postman Collection: Administrators can download the official Postman Collection from the developer portal, which includes pre-configured authentication scripts and payload templates for CI creation, graph traversal, and AIOps queries.