--- # Version to deploy metabase_version: 0.38.0 # URL to fetch the jar metabase_jar_url: https://downloads.metabase.com/v{{ metabase_version }}/metabase.jar # Expected sha1 of the jar metabase_jar_sha1: 2d2333deff92c18784c4a0e0d23288b29d2c8a87 # Should ansible handle upgrades ? If set to false, only the initial install (and the config) will be handled metabase_manage_upgrade: True # User account under which metabase will run # Will be created metabase_user: metabase # Path under which metabase will be installed metabase_root_dir: /opt/metabase # Port on which metabase will listen metabase_port: 3002 # List of IP or CIDR allowed to reach metabase_port metabase_src_ip: [] # MySQL database metabase_db_server: "{{ mysql_server | default('localhost') }}" metabase_db_port: 3306 metabase_db_name: metabase metabase_db_user: metabase # A random pass will be generated and stored in the meta dir if not defined # metabase_db_pass: S3cr3t. # Email of the admins metabase_admin_email: "{{ system_admin_email }}" # From email for emails sent by metabase metabase_from_email: metabase-noreply@{{ ansible_domain }} # Settings for sending emails metabase_smtp_server: localhost metabase_smtp_port: 25 # metabase_smtp_user: metabase@example.org # metabase_smtp_pass: S3cr3t. metabase_smtp_starttls: False # Encryption key to protect credentials stored in the DB # If not set, a random one will be created and store in the mata directory # metabase_encryption_key: SuperS3cr3t. # Default language for notifications metabase_lang: fr # Public URL to reach metabase. # Will most likely need to be adjusted, because you'll put it behind a reverse proxy don't you ? metabase_public_url: http://{{ inventory_hostname }}:{{ metabase_port }}/ # LDAP Auth settings metabase_ldap: "{{ (ad_auth | default(False) or ldap_auth | default(False)) | ternary(True,False) }}" metabase_ldap_attr_email: mail metabase_ldap_attr_firstname: givenName metabase_ldap_attr_lastname: sn metabase_ldap_server: "{{ (ldap_uri is defined) | ternary(ldap_uri | urlsplit('hostname'), ad_auth | default(False) | ternary(ad_realm | default(samba_realm) | default(ansible_domain) | lower, ansible_domain)) }}" metabase_ldap_port: "{{ (ldap_auth is defined and ldap_auth | urlsplit('port') is search('\\d+')) | ternary(ldap_auth | urlsplit('port'), '389') }}" # metabase_ldap_user: CN=Metabase,OU=Apps,DC=example,DC=org # metabase_ldap_pass: S3cr3t. metabase_ldap_user_base: "{{ (ad_ldap_user_search_base is defined and ad_auth) | ternary(ad_ldap_user_search_base, ad_auth | default(False) | ternary('DC=' + ad_realm | default(samba_realm) | default(ansible_domain) | regex_replace('\\.',',DC='), 'ou=Users,' + ldap_base)) }}" metabase_ldap_user_filter: (&{{ ad_auth | default(False) | ternary('(objectClass=user)(objectCategory=person)(primaryGroupId=513)','(objectClass=inetOrgPerson)') }}(|(uid={login})(mail={login})) metabase_ldap_group_base: "{{ (ad_ldap_group_search_base is defined and ad_auth) | ternary(ad_ldap_group_search_base, ad_auth | default(False) | ternary('DC=' + ad_realm | default(samba_realm) | default(ansible_domain) | regex_replace('\\.',',DC='), 'ou=Groups,' + ldap_base)) }}"