mirror of
				https://github.com/datahub-project/datahub.git
				synced 2025-10-31 02:37:05 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			72 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			72 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
| DATAHUB_GMS_HOST=datahub-gms
 | |
| DATAHUB_GMS_PORT=8080
 | |
| DATAHUB_SECRET=YouKnowNothing
 | |
| DATAHUB_APP_VERSION=1.0
 | |
| DATAHUB_PLAY_MEM_BUFFER_SIZE=10MB
 | |
| JAVA_OPTS=-Xms512m -Xmx512m -Dhttp.port=9002 -Dconfig.file=datahub-frontend/conf/application.conf -Djava.security.auth.login.config=datahub-frontend/conf/jaas.conf -Dlogback.configurationFile=datahub-frontend/conf/logback.xml -Dlogback.debug=false -Dpidfile.path=/dev/null
 | |
| 
 | |
| # Uncomment and set these to support SSL connection to GMS
 | |
| # NOTE: Currently GMS itself does not offer SSL support, these settings are intended for when there is a proxy in front
 | |
| #       of GMS that handles SSL, such as an EC2 Load Balancer.
 | |
| #DATAHUB_GMS_USE_SSL=true
 | |
| #DATAHUB_GMS_SSL_PROTOCOL=
 | |
| 
 | |
| # Uncomment and set custom SSL truststore settings
 | |
| # SSL_TRUSTSTORE_FILE=datahub-frontend/conf/truststore.jks
 | |
| # SSL_TRUSTSTORE_TYPE=jks
 | |
| # SSL_TRUSTSTORE_PASSWORD=MyTruststorePassword
 | |
| 
 | |
| # Uncomment to disable Metadata Service Authentication
 | |
| # METADATA_SERVICE_AUTH_ENABLED=false
 | |
| 
 | |
| # Uncomment & populate these configs to enable OIDC SSO in React application.
 | |
| # Required OIDC configs
 | |
| # AUTH_OIDC_ENABLED=true
 | |
| # AUTH_OIDC_CLIENT_ID=<client id>
 | |
| # AUTH_OIDC_CLIENT_SECRET=<client secret>
 | |
| # AUTH_OIDC_DISCOVERY_URI=https://<idp host>/.well-known/openid-configuration
 | |
| # AUTH_OIDC_BASE_URL=http://localhost:9001
 | |
| # Optional OIDC configs
 | |
| # AUTH_OIDC_USER_NAME_CLAIM=email
 | |
| # AUTH_OIDC_USER_NAME_CLAIM_REGEX=([^@]+)
 | |
| # AUTH_OIDC_SCOPE=
 | |
| # Optional Provisioning Configs
 | |
| # AUTH_OIDC_JIT_PROVISIONING_ENABLED=true
 | |
| # AUTH_OIDC_PRE_PROVISIONING_REQUIRED=false
 | |
| # AUTH_OIDC_EXTRACT_GROUPS_ENABLED=false
 | |
| # AUTH_OIDC_GROUPS_CLAIM=groups
 | |
| 
 | |
| # Uncomment to disable JAAS username / password authentication (enabled by default)
 | |
| # AUTH_JAAS_ENABLED=false
 | |
| 
 | |
| # Uncomment to disable persistence of client-side analytics events
 | |
| # DATAHUB_ANALYTICS_ENABLED=false
 | |
| 
 | |
| # Required Kafka Producer Configs
 | |
| KAFKA_BOOTSTRAP_SERVER=broker:29092
 | |
| DATAHUB_TRACKING_TOPIC=DataHubUsageEvent_v1
 | |
| 
 | |
| # Required Elastic Client Configuration (Analytics)
 | |
| ELASTIC_CLIENT_HOST=elasticsearch
 | |
| ELASTIC_CLIENT_PORT=9200
 | |
| 
 | |
| # Optional Elastic Client Configurations
 | |
| # ELASTIC_CLIENT_THREAD_COUNT=2
 | |
| # ELASTIC_CLIENT_CONNECTION_REQUEST_TIMEOUT=50
 | |
| 
 | |
| # To support SSL connections to Elastic, uncomment and set the following
 | |
| # ELASTIC_CLIENT_USE_SSL=true
 | |
| # ELASTIC_CLIENT_SSL_PROTOCOL=TLSv1.2
 | |
| # ELASTIC_CLIENT_SSL_SECURE_RANDOM_IMPLEMENTATION=
 | |
| # ELASTIC_CLIENT_SSL_TRUST_STORE_FILE=
 | |
| # ELASTIC_CLIENT_SSL_TRUST_STORE_TYPE=
 | |
| # ELASTIC_CLIENT_SSL_TRUST_STORE_PASSWORD=
 | |
| # ELASTIC_CLIENT_SSL_KEY_STORE_FILE=
 | |
| # ELASTIC_CLIENT_SSL_KEY_STORE_TYPE=
 | |
| # ELASTIC_CLIENT_SSL_KEY_STORE_PASSWORD=
 | |
| 
 | |
| # To use simple username/password authentication to Elasticsearch over HTTPS
 | |
| # set ELASTIC_CLIENT_USE_SSL=true and uncomment:
 | |
| # ELASTIC_CLIENT_USERNAME=
 | |
| # ELASTIC_CLIENT_PASSWORD=
 | 
