Skip to content
Snippets Groups Projects
Select Git revision
  • c55d4df1d30a4d09d0abf476330d61a67814cdaf
  • master default protected
  • devel
  • hruska-feature-clients-api
  • malostik-#5066-deduplicate-idea-ids
  • warden-postgresql-port
  • hruska-feature-#6799-filter-keys
  • hruska-feature-5066-duplicateIdeaID
  • warden-client-3.0-beta3
  • warden-server-3.0-beta3
  • warden-client-2.2-final
  • warden-server-2.2-final
  • warden-client-3.0-beta2
  • warden-server-3.0-beta2
  • warden-client-2.2
  • warden-server-2.2-patch3
  • warden-client-3.0-beta1
  • warden-server-3.0-beta1
  • warden-server-2.2-patch1
  • warden-client-3.0-beta0
  • warden-server-3.0-beta0
  • warden-server-2.2
  • warden-server-2.1-patch1
  • warden-client-2.1
  • warden-server-2.1
  • warden-server-2.1-beta6
  • warden-server-2.1-beta5
  • warden-server-2.1-beta4
28 results

warden3

EOSC Notebooks

This directory has all the files to get started with a new deployment of EOSC Notebooks.

Admin Environment Setup

Hashicorp Vault

Prepare environment for interrating with Hashicorp Vault:

export VAULT_ADDR=https://secrets.egi.eu

Login:

# optional (values from environment)
# read CLIENT_ID CLIENT_SECRET
# export CLIENT_ID CLIENT_SECRET

# login to vault
./vault-login.py

Note: example commands to create secrets for "eosc-dev":

prefix=/users/e1662e20-e34b-468c-b0ce-d899bc878364@egi.eu/eosc-dev
vault kv put -mount secrets $prefix/FEDCLOUD_DYNAMIC_DNS $HOST1=$SECRET1 $HOST2=$SECRET2
vault kv put -mount secrets $prefix/deployment-hub checkin_host=... client_id=... client_secret=...

Inventory parameters

Used parameters in ansible recipes:

  • mail_fromdomain: hostname in from header
  • mail_local: disable e-mail (only local delivery)
  • site_name: site identifier
  • vault_mount_point:: path to secrets in the Vault