mirror of
				https://github.com/datahub-project/datahub.git
				synced 2025-11-04 04:39:10 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			71 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
			
		
		
	
	
			71 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			Bash
		
	
	
	
	
	
DATAHUB_GMS_HOST=datahub-gms
 | 
						|
DATAHUB_GMS_PORT=8080
 | 
						|
DATAHUB_SECRET=YouKnowNothing
 | 
						|
DATAHUB_APP_VERSION=1.0
 | 
						|
DATAHUB_PLAY_MEM_BUFFER_SIZE=10MB
 | 
						|
JAVA_OPTS=-Xms512m -Xmx512m -Dhttp.port=9002 -Dconfig.file=datahub-frontend/conf/application.conf -Djava.security.auth.login.config=datahub-frontend/conf/jaas.conf -Dlogback.configurationFile=datahub-frontend/conf/logback.xml -Dlogback.debug=false -Dpidfile.path=/dev/null
 | 
						|
 | 
						|
# Uncomment and set these to support SSL connection to GMS
 | 
						|
# NOTE: Currently GMS itself does not offer SSL support, these settings are intended for when there is a proxy in front
 | 
						|
#       of GMS that handles SSL, such as an EC2 Load Balancer.
 | 
						|
#DATAHUB_GMS_USE_SSL=true
 | 
						|
#DATAHUB_GMS_SSL_PROTOCOL=
 | 
						|
 | 
						|
# Uncomment and set custom SSL truststore settings
 | 
						|
# SSL_TRUSTSTORE_FILE=datahub-frontend/conf/truststore.jks
 | 
						|
# SSL_TRUSTSTORE_TYPE=jks
 | 
						|
# SSL_TRUSTSTORE_PASSWORD=MyTruststorePassword
 | 
						|
 | 
						|
# Uncomment to enable Metadata Service Authentication
 | 
						|
# METADATA_SERVICE_AUTH_ENABLED=true
 | 
						|
 | 
						|
# Uncomment & populate these configs to enable OIDC SSO in React application.
 | 
						|
# Required OIDC configs
 | 
						|
# AUTH_OIDC_ENABLED=true
 | 
						|
# AUTH_OIDC_CLIENT_ID=1030786188615-rr9ics9gl8n4acngj9opqbf2mruflqpr.apps.googleusercontent.com
 | 
						|
# AUTH_OIDC_CLIENT_SECRET=acEdaGcnfd7KxvsXRFDD7FNF
 | 
						|
# AUTH_OIDC_DISCOVERY_URI=https://accounts.google.com/.well-known/openid-configuration
 | 
						|
# AUTH_OIDC_BASE_URL=http://localhost:9001
 | 
						|
# Optional OIDC configs
 | 
						|
# AUTH_OIDC_USER_NAME_CLAIM=email
 | 
						|
# AUTH_OIDC_USER_NAME_CLAIM_REGEX=([^@]+)
 | 
						|
# AUTH_OIDC_SCOPE=
 | 
						|
# Optional Provisioning Configs
 | 
						|
# AUTH_OIDC_JIT_PROVISIONING_ENABLED=true
 | 
						|
# AUTH_OIDC_PRE_PROVISIONING_REQUIRED=false
 | 
						|
# AUTH_OIDC_EXTRACT_GROUPS_ENABLED=false
 | 
						|
# AUTH_OIDC_GROUPS_CLAIM=groups
 | 
						|
 | 
						|
# Uncomment to disable JAAS username / password authentication (enabled by default)
 | 
						|
# AUTH_JAAS_ENABLED=false
 | 
						|
 | 
						|
# Uncomment to disable persistence of client-side analytics events
 | 
						|
# DATAHUB_ANALYTICS_ENABLED=false
 | 
						|
 | 
						|
# Required Kafka Producer Configs
 | 
						|
KAFKA_BOOTSTRAP_SERVER=broker:29092
 | 
						|
DATAHUB_TRACKING_TOPIC=DataHubUsageEvent_v1
 | 
						|
 | 
						|
# Required Elastic Client Configuration (Analytics)
 | 
						|
ELASTIC_CLIENT_HOST=elasticsearch
 | 
						|
ELASTIC_CLIENT_PORT=9200
 | 
						|
 | 
						|
# Optional Elastic Client Configurations
 | 
						|
# ELASTIC_CLIENT_THREAD_COUNT=2
 | 
						|
# ELASTIC_CLIENT_CONNECTION_REQUEST_TIMEOUT=50
 | 
						|
 | 
						|
# To support SSL connections to Elastic, uncomment and set the following
 | 
						|
# ELASTIC_CLIENT_USE_SSL=true
 | 
						|
# ELASTIC_CLIENT_SSL_PROTOCOL=TLSv1.2
 | 
						|
# ELASTIC_CLIENT_SSL_SECURE_RANDOM_IMPLEMENTATION=
 | 
						|
# ELASTIC_CLIENT_SSL_TRUST_STORE_FILE=
 | 
						|
# ELASTIC_CLIENT_SSL_TRUST_STORE_TYPE=
 | 
						|
# ELASTIC_CLIENT_SSL_TRUST_STORE_PASSWORD=
 | 
						|
# ELASTIC_CLIENT_SSL_KEY_STORE_FILE=
 | 
						|
# ELASTIC_CLIENT_SSL_KEY_STORE_TYPE=
 | 
						|
# ELASTIC_CLIENT_SSL_KEY_STORE_PASSWORD=
 | 
						|
 | 
						|
# To use simple username/password authentication to Elasticsearch over HTTPS
 | 
						|
# set ELASTIC_CLIENT_USE_SSL=true and uncomment:
 | 
						|
# ELASTIC_CLIENT_USERNAME=
 | 
						|
# ELASTIC_CLIENT_PASSWORD= |