platform-debug
tag.SPRING_DATASOURCE_URL
jdbc:postgresql://postgres:5432/steadybitdb
SPRING_DATASOURCE_USERNAME
postgres
SPRING_DATASOURCE_PASSWORD
postgres
STEADYBIT_DB_WEB_ENABLED
true
SPRING_REDIS_HOST
redis
SPRING_REDIS_PORT
6379
SPRING_REDIS_USERNAME
SPRING_REDIS_PASSWORD
SPRING_REDIS_SSL
false
SPRING_REDIS_CLIENT_NAME
STEADYBIT_TENANT_AGENTKEY
foobar
STEADYBIT_WEB_PUBLIC_URL
STEADYBIT_WEB_PUBLIC_EXPERIMENT_PORT
STEADYBIT_WEB_PUBLIC_EXPERIMENT_URL
LOGGING_FORMAT
text
format. Set this this to json
to switch the log format to JSON.STEADYBIT_AUTH_PROVIDER
STATIC
for static authentication
Example: LDAP
STEADYBIT_AUTH_STATIC_0_USERNAME
admin
STEADYBIT_AUTH_STATIC_0_PASSWORD
{noop}admin
STEADYBIT_AUTH_LDAP_MANAGER_DN
and STEADYBIT_AUTH_LDAP_MANAGER_PASSWORD
is set. The users are authenticated by doing a bind with their credentials, unless STEADYBIT_AUTH_LDAP_METHOD
is set to password-compare
.STEADYBIT_AUTH_PROVIDER
LDAP
for LDAP-Authentication
Example: LDAP
STEADYBIT_AUTH_LDAP_URL
ldap://openldap:389/dc=steadybit,dc=com
STEADYBIT_AUTH_LDAP_MANAGER_DN
uid=admin,ou=system
STEADYBIT_AUTH_LDAP_MANAGER_PASSWORD
STEADYBIT_AUTH_LDAP_USER_DN_PATTERNS
uid={0},ou=people
STEADYBIT_AUTH_LDAP_METHOD
bind
or password-compare
.
Default: bind
STEADYBIT_AUTH_LDAP_PASSWORD_ATTRIBUTE
password-compare
Default: userPassword
STEADYBIT_AUTH_SYNC_ADMIN_GROUP_DN
Admin
users
Example: cn=steadybit_admin,ou=groups,dc=steadybit,dc=com
STEADYBIT_AUTH_SYNC_USER_GROUP_DN
User
users
Example: cn=steadybit_user,ou=groups,dc=steadybit,dc=com
STEADYBIT_AUTH_LDAP_SYNC_TEAM_SEARCH_FILTER
ou=teams,ou=groups,dc=steadybit,dc=com
STEADYBIT_AUTH_LDAP_SYNC_TEAM_KEY_ATTRIBUTE
cn=steadybit_admin,ou=groups,dc=steadybit,dc=com
STEADYBIT_AUTH_LDAP_SYNC_TEAM_NAME_ATTRIBUTE
cn=steadybit_admin,ou=groups,dc=steadybit,dc=com
STEADYBIT_AUTH_SYNC_CRON
0 0 */2 ? * * *
authorization_code
grant type.The first user to login will be assigned theADMIN
role, all other will be assigned theUSER
role. The roles can be changed by an admin user via the UI.
STEADYBIT_AUTH_PROVIDER
OAUTH2
for OIDC-Authentication
Example: OAUTH2
STEADYBIT_AUTH_OAUTH2_ISSUER_URI
https://keycloak/auth/realms/demo
STEADYBIT_AUTH_OAUTH2_CLIENT_ID
steadybit
STEADYBIT_AUTH_OAUTH2_CLIENT_SECRET
ijhdfpjdf80wiphubfqwd113342r
STEADYBIT_AUTH_OAUTH2_USER_NAME_ATTRIBUTE
sub
STEADYBIT_AUTH_OAUTH2_FULL_NAME_ATTRIBUTE
name
STEADYBIT_AUTH_OAUTH2_CLAIMS_TEAM_NAME_ATTRIBUTE_NAME
groups
Example value in OIDC provider for single team: team1
Example value in OIDC provider for multiple teams: ["team1","team2"]
SERVER_SSL_*
properties and requires a java keystore (typically PKCS12).SERVER_PORT
8080
SERVER_SSL_KEY_STORE
.jks
or .p12
file).
Example: file:/keystores/steadybit.p12
SERVER_SSL_KEY_STORE_TYPE
PKCS12
SERVER_SSL_KEY_STORE_PASSWORD
SERVER_SSL_KEY_ALIAS
SERVER_SSL_KEY_PASSWORD