docker-compose -v
docker login repo.arenadc.io -u login -p password
AUTHORIZER_CLASS_NAME=org.openmetadata.service.security.DefaultAuthorizer
AUTHORIZER_REQUEST_FILTER=org.openmetadata.service.security.JwtFilter
AUTHORIZER_ADMIN_PRINCIPALS=[admin]
AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org
AUTHENTICATION_PROVIDER=custom-oidc
CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak
AUTHENTICATION_PUBLIC_KEYS=[http://10.80.0.22:8081/realms/datasec/protocol/openidconnect/certs,http://10.80.0.22:8585/api/v1/system/config/jwks]
AUTHENTICATION_AUTHORITY=http://10.80.0.22:8081/realms/data-sec
AUTHENTICATION_CLIENT_ID=open-metadata
AUTHENTICATION_CALLBACK_URL=http://10.80.0.22:8585/callback
cd /opt/adc/
sudo docker compose -f docker-compose.yml --env-file adc-noauth.env up -d #basic authentication
#or
sudo docker compose -f docker-compose-keycloak.yml --env-file adc.env up -d #keycloak authentication
#Database configuration for server container
SERVER_DB_DRIVER_CLASS=org.postgresql.Driver
SERVER_DB_SCHEME=postgresql
SERVER_DB_USE_SSL=false
SERVER_DB_USER=openmetadata_user
SERVER_DB_USER_PASSWORD=openmetadata_password
SERVER_DB_HOST=postgresql
SERVER_DB_PORT:-5432
SERVER_DB_DATABASE=openmetadata_db
cron_backup.sh #add/delete job with backup_pg.sh to cron
backup_pg.sh #create pg_dump with timestamp and rotate
sudo chmod 777 –R /opt/adc/ingestion-dags
# ADC Server Airflow Configuration
PIPELINE_SERVICE_CLIENT_ENDPOINT: ${PIPELINE_SERVICE_CLIENT_ENDPOINT:-
http://ingestion:8080}
docker load < adc-db-v0.4.0.zip
docker ps –a
docker compose ps -a
docker compose logs
http://[server_addres]:8585
cd /opt/addc #stop all containers
docker compose stop #stop all containers
docker compose rm #stop all containers
docker volume prune #clear all volumes
docker container prune #clear all containers
sudo docker-compose -f docker-compose.yml --env-file adc_noauth.env down
или
sudo docker-compose -f docker-compose-keycloak.yml --env-file adc.env up -
d
sudo docker exec adc_postgresql_1 pg_dump -U postgres -Ft --column-inserts
-d openmetadata_db > /opt/adc/db_backups/dump_openmetadata.tar
sudo docker exec adc_postgresql_1 pg_dump -U postgres --column-inserts -d
openmetadata_db > /opt/adc/db_backups/dump_openmetadata.sql
sudo docker exec adc_postgresql_1 pg_dump -U postgres -Ft --column-inserts
-d airflow_db > /opt/adc/db_backups/dump_air.tar
sudo docker exec adc_postgresql_1 pg_dump -U postgres --column-inserts -d
openmetadata_db > /opt/adc/db_backups/dump_air.sql
sudo docker exec adc_postgresql_1 pg_dump -U postgres -Ft --column-inserts
-d camunda_db > /opt/adc/db_backups/dump_camunda.tar --при необходимости
sudo docker exec adc_postgresql_1 pg_dump -U postgres --column-inserts -d
camunda_db > /opt/adc/db_backups/dump_camunda.sql --при необходимости
sudo docker cp adc_ingestion_1:/opt/airflow/dags /opt/adc/db_backups/dags
sudo docker cp adc_ingestion_1:/opt/airflow/dag_generated_configs
/opt/adc/db_backups/dag_generated_configs
sudo docker stop <container name>
DROP SCHEMA IF EXISTS public CASCADE;
CREATE SCHEMA IF NOT EXISTS public;
sudo docker cp /opt/adc/db_backups/dump_openmetadata.tar <postgres
container>:/home
sudo docker cp /opt/adc/db_backups/dump_air.tar <postgres container>:/home
sudo docker exec adc_postgresql_1 pg_restore -U postgres -d
openmetadata_db /home/dump_openmetadata.tar
sudo docker exec adc_postgresql_1 pg_restore -U postgres -d
openmetadata_db /home/dump_air.tar
sudo docker cp /opt/adc/db_backups/dags adc_ingestion_1:/opt/airflow/dags
sudo docker cp /opt/adc/db_backups/dag_generated_configs
adc_ingestion_1:/opt/airflow/dag_generated_configs
sudo docker start <container_name>
cp -r /var/lib/docker/volumes/adc{old_folder_name}_keycloak-data/_data /your_folder
cp -r /your_folder/_data /var/lib/docker/volumes/adc{new_folder_name}_keycloak-data/
sudo docker-compose -f docker-compose-keycloak.yml --env-file adc.env down
sudo docker-compose -f docker-compose-keycloak.yml --env-file adc.env up -d
Создание Realm
Создание Client
Настройки Client
Создание пользователя
Создание пользователя
AUTHENTICATION_PUBLIC_KEYS=[ http://host/realms/your_realm/protocol/openid-connect/certs,http://host:8585/api/v1/config/jwks ]
AUTHENTICATION_AUTHORITY= http://host/realms/your_realm
AUTHORIZER_ADMIN_PRINCIPALS=[admin]
AUTHORIZER_PRINCIPAL_DOMAIN=@your_domain.ru
AUTHENTICATION_PROVIDER=custom-oidc
CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak
AUTHENTICATION_PUBLIC_KEYS=[ http://host:8081/realms/data-sec/protocol/openid-connect/certs,http://host:8585/api/v1/system/config/jwks ]
AUTHENTICATION_AUTHORITY= http://host:8081/realms/data-sec
AUTHENTICATION_CLIENT_ID=open-metadata
AUTHENTICATION_CALLBACK_URL= http://host:8585/callback
Просмотр логов приложения