DATAHUB_GMS_HOST=datahub-gms DATAHUB_GMS_PORT=8080 DATAHUB_SECRET=YouKnowNothing DATAHUB_APP_VERSION=1.0 DATAHUB_PLAY_MEM_BUFFER_SIZE=10MB JAVA_OPTS=-Xms512m -Xmx512m -Dhttp.port=9002 -Dconfig.file=datahub-frontend/conf/application.conf -Djava.security.auth.login.config=datahub-frontend/conf/jaas.conf -Dlogback.configurationFile=datahub-frontend/conf/logback.xml -Dlogback.debug=false -Dpidfile.path=/dev/null # Uncomment and set these to support SSL connection to GMS # NOTE: Currently GMS itself does not offer SSL support, these settings are intended for when there is a proxy in front # of GMS that handles SSL, such as an EC2 Load Balancer. #DATAHUB_GMS_USE_SSL=true #DATAHUB_GMS_SSL_PROTOCOL= # Uncomment and set custom SSL truststore settings # SSL_TRUSTSTORE_FILE=datahub-frontend/conf/truststore.jks # SSL_TRUSTSTORE_TYPE=jks # SSL_TRUSTSTORE_PASSWORD=MyTruststorePassword # Uncomment to disable Metadata Service Authentication # METADATA_SERVICE_AUTH_ENABLED=false # Uncomment & populate these configs to enable OIDC SSO in React application. # Required OIDC configs # AUTH_OIDC_ENABLED=true # AUTH_OIDC_CLIENT_ID= # AUTH_OIDC_CLIENT_SECRET= # AUTH_OIDC_DISCOVERY_URI=https:///.well-known/openid-configuration # AUTH_OIDC_BASE_URL=http://localhost:9001 # Optional OIDC configs # AUTH_OIDC_USER_NAME_CLAIM=email # AUTH_OIDC_USER_NAME_CLAIM_REGEX=([^@]+) # AUTH_OIDC_SCOPE= # Optional Provisioning Configs # AUTH_OIDC_JIT_PROVISIONING_ENABLED=true # AUTH_OIDC_PRE_PROVISIONING_REQUIRED=false # AUTH_OIDC_EXTRACT_GROUPS_ENABLED=false # AUTH_OIDC_GROUPS_CLAIM=groups # Uncomment to disable JAAS username / password authentication (enabled by default) # AUTH_JAAS_ENABLED=false # Uncomment to disable persistence of client-side analytics events # DATAHUB_ANALYTICS_ENABLED=false # Required Kafka Producer Configs KAFKA_BOOTSTRAP_SERVER=broker:29092 DATAHUB_TRACKING_TOPIC=DataHubUsageEvent_v1 # Required Elastic Client Configuration (Analytics) ELASTIC_CLIENT_HOST=elasticsearch ELASTIC_CLIENT_PORT=9200 # Optional Elastic Client Configurations # ELASTIC_CLIENT_THREAD_COUNT=2 # ELASTIC_CLIENT_CONNECTION_REQUEST_TIMEOUT=50 # To support SSL connections to Elastic, uncomment and set the following # ELASTIC_CLIENT_USE_SSL=true # ELASTIC_CLIENT_SSL_PROTOCOL=TLSv1.2 # ELASTIC_CLIENT_SSL_SECURE_RANDOM_IMPLEMENTATION= # ELASTIC_CLIENT_SSL_TRUST_STORE_FILE= # ELASTIC_CLIENT_SSL_TRUST_STORE_TYPE= # ELASTIC_CLIENT_SSL_TRUST_STORE_PASSWORD= # ELASTIC_CLIENT_SSL_KEY_STORE_FILE= # ELASTIC_CLIENT_SSL_KEY_STORE_TYPE= # ELASTIC_CLIENT_SSL_KEY_STORE_PASSWORD= # To use simple username/password authentication to Elasticsearch over HTTPS # set ELASTIC_CLIENT_USE_SSL=true and uncomment: # ELASTIC_CLIENT_USERNAME= # ELASTIC_CLIENT_PASSWORD= # Uncomment the following to enable monitoring # ENABLE_PROMETHEUS=true # DATAHUB_DEBUG=true # ENABLE_OTEL=true # OTEL_RESOURCE_ATTRIBUTE={"service.name": "datahub-frontend"} # OTEL_SERVICE_NAME=datahub-frontend # OTEL_LOG_LEVEL=debug # OTEL_METRICS_EXPORTER=console # OTEL_TRACES_EXPORTER=console # OTEL_LOGS_EXPORTER=console # OTEL_SDK_DISABLED=false # OTEL_INSTRUMENTATION_COMMON_DEFAULT_ENABLED=true # OTEL_PROPAGATORS=tracecontext,baggage