Ansible roles
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

65 lines
3.1 KiB

---
# Version to deploy
metabase_version: 0.38.0
# URL to fetch the jar
metabase_jar_url: https://downloads.metabase.com/v{{ metabase_version }}/metabase.jar
# Expected sha1 of the jar
metabase_jar_sha1: 2d2333deff92c18784c4a0e0d23288b29d2c8a87
# Should ansible handle upgrades ? If set to false, only the initial install (and the config) will be handled
metabase_manage_upgrade: True
# User account under which metabase will run
# Will be created
metabase_user: metabase
# Path under which metabase will be installed
metabase_root_dir: /opt/metabase
# Port on which metabase will listen
metabase_port: 3002
# List of IP or CIDR allowed to reach metabase_port
metabase_src_ip: []
# MySQL database
metabase_db_server: "{{ mysql_server | default('localhost') }}"
metabase_db_port: 3306
metabase_db_name: metabase
metabase_db_user: metabase
# A random pass will be generated and stored in the meta dir if not defined
# metabase_db_pass: S3cr3t.
# Email of the admins
metabase_admin_email: "{{ system_admin_email }}"
# From email for emails sent by metabase
metabase_from_email: metabase-noreply@{{ ansible_domain }}
# Settings for sending emails
metabase_smtp_server: localhost
metabase_smtp_port: 25
# metabase_smtp_user: metabase@example.org
# metabase_smtp_pass: S3cr3t.
metabase_smtp_starttls: False
# Encryption key to protect credentials stored in the DB
# If not set, a random one will be created and store in the mata directory
# metabase_encryption_key: SuperS3cr3t.
# Default language for notifications
metabase_lang: fr
# Public URL to reach metabase.
# Will most likely need to be adjusted, because you'll put it behind a reverse proxy don't you ?
metabase_public_url: http://{{ inventory_hostname }}:{{ metabase_port }}/
# LDAP Auth settings
metabase_ldap: "{{ (ad_auth | default(False) or ldap_auth | default(False)) | ternary(True,False) }}"
metabase_ldap_attr_email: mail
metabase_ldap_attr_firstname: givenName
metabase_ldap_attr_lastname: sn
metabase_ldap_server: "{{ (ldap_uri is defined) | ternary(ldap_uri | urlsplit('hostname'), ad_auth | default(False) | ternary(ad_realm | default(samba_realm) | default(ansible_domain) | lower, ansible_domain)) }}"
metabase_ldap_port: "{{ (ldap_auth is defined and ldap_auth | urlsplit('port') is search('\\d+')) | ternary(ldap_auth | urlsplit('port'), '389') }}"
# metabase_ldap_user: CN=Metabase,OU=Apps,DC=example,DC=org
# metabase_ldap_pass: S3cr3t.
metabase_ldap_user_base: "{{ (ad_ldap_user_search_base is defined and ad_auth) | ternary(ad_ldap_user_search_base, ad_auth | default(False) | ternary('DC=' + ad_realm | default(samba_realm) | default(ansible_domain) | regex_replace('\\.',',DC='), 'ou=Users,' + ldap_base)) }}"
metabase_ldap_user_filter: (&{{ ad_auth | default(False) | ternary('(objectClass=user)(objectCategory=person)(primaryGroupId=513)','(objectClass=inetOrgPerson)') }}(|(uid={login})(mail={login}))
metabase_ldap_group_base: "{{ (ad_ldap_group_search_base is defined and ad_auth) | ternary(ad_ldap_group_search_base, ad_auth | default(False) | ternary('DC=' + ad_realm | default(samba_realm) | default(ansible_domain) | regex_replace('\\.',',DC='), 'ou=Groups,' + ldap_base)) }}"