| # |
| # Licensed to the Apache Software Foundation (ASF) under one |
| # or more contributor license agreements. See the NOTICE file |
| # distributed with this work for additional information |
| # regarding copyright ownership. The ASF licenses this file |
| # to you under the Apache License, Version 2.0 (the |
| # "License"); you may not use this file except in compliance |
| # with the License. You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # |
| |
| ######### Graph Database Configs ######### |
| # Graph Storage |
| atlas.graph.storage.backend=${titan.storage.backend} |
| atlas.graph.storage.hbase.table=apache_atlas_titan |
| |
| ${titan.storage.properties} |
| |
| # Delete handler |
| # |
| # This allows the default behavior of doing "soft" deletes to be changed. |
| # |
| # Allowed Values: |
| # org.apache.atlas.repository.graph.SoftDeleteHandler - all deletes are "soft" deletes |
| # org.apache.atlas.repository.graph.HardDeleteHandler - all deletes are "hard" deletes |
| # |
| #atlas.DeleteHandler.impl=org.apache.atlas.repository.graph.SoftDeleteHandler |
| |
| # Entity audit repository |
| # |
| # This allows the default behavior of logging entity changes to hbase to be changed. |
| # |
| # Allowed Values: |
| # org.apache.atlas.repository.audit.HBaseBasedAuditRepository - log entity changes to hbase |
| # org.apache.atlas.repository.audit.NoopEntityAuditRepository - disable the audit repository |
| # |
| ${entity.repository.properties} |
| |
| |
| # Graph Search Index |
| atlas.graph.index.search.backend=${titan.index.backend} |
| |
| ${titan.index.properties} |
| |
| |
| ######### Notification Configs ######### |
| atlas.notification.embedded=true |
| atlas.kafka.data=${sys:atlas.home}/data/kafka |
| atlas.kafka.zookeeper.connect=localhost:9026 |
| atlas.kafka.bootstrap.servers=localhost:9027 |
| atlas.kafka.zookeeper.session.timeout.ms=400 |
| atlas.kafka.zookeeper.connection.timeout.ms=200 |
| atlas.kafka.zookeeper.sync.time.ms=20 |
| atlas.kafka.auto.commit.interval.ms=1000 |
| atlas.kafka.auto.offset.reset=smallest |
| atlas.kafka.hook.group.id=atlas |
| atlas.kafka.auto.commit.enable=false |
| atlas.notification.create.topics=true |
| atlas.notification.replicas=1 |
| atlas.notification.topics=ATLAS_HOOK,ATLAS_ENTITIES |
| # Enable for Kerberized Kafka clusters |
| #atlas.notification.kafka.service.principal=kafka/_HOST@EXAMPLE.COM |
| #atlas.notification.kafka.keytab.location=/etc/security/keytabs/kafka.service.keytab |
| |
| ######### Hive Lineage Configs ######### |
| ## Schema |
| atlas.lineage.schema.query.hive_table=hive_table where __guid='%s'\, columns |
| atlas.lineage.schema.query.Table=Table where __guid='%s'\, columns |
| |
| ## Server port configuration |
| #atlas.server.http.port=21000 |
| #atlas.server.https.port=21443 |
| |
| ######### Security Properties ######### |
| |
| # SSL config |
| atlas.enableTLS=false |
| |
| #truststore.file=/path/to/truststore.jks |
| #cert.stores.credential.provider.path=jceks://file/path/to/credentialstore.jceks |
| |
| #following only required for 2-way SSL |
| #keystore.file=/path/to/keystore.jks |
| |
| # Authentication config |
| |
| atlas.authentication.method.kerberos=false |
| atlas.authentication.method.ldap=false |
| atlas.authentication.method.file=true |
| |
| #### ldap.type= LDAP or AD |
| atlas.authentication.method.ldap.type=LDAP |
| |
| #### user credentials file |
| atlas.authentication.method.file.filename=${sys:atlas.home}/conf/users-credentials.properties |
| |
| |
| ######## LDAP properties ######### |
| #atlas.authentication.method.ldap.url=ldap://<ldap server url>:389 |
| #atlas.authentication.method.ldap.userDNpattern=uid={0}\,ou=People\,dc=example\,dc=com |
| #atlas.authentication.method.ldap.groupSearchBase=dc=example\,dc=com |
| #atlas.authentication.method.ldap.groupSearchFilter=(member=uid={0}\,ou=Users\,dc=example\,dc=com) |
| #atlas.authentication.method.ldap.groupRoleAttribute=cn |
| #atlas.authentication.method.ldap.base.dn=dc=example\,dc=com |
| #atlas.authentication.method.ldap.bind.dn=cn=Manager\,dc=example\,dc=com |
| #atlas.authentication.method.ldap.bind.password=<password> |
| #atlas.authentication.method.ldap.referral=ignore |
| #atlas.authentication.method.ldap.user.searchfilter=(uid={0}) |
| #atlas.authentication.method.ldap.default.role=<default role> |
| |
| |
| ######### Active directory properties ####### |
| #atlas.authentication.method.ldap.ad.domain=example.com |
| #atlas.authentication.method.ldap.ad.url=ldap://<AD server url>:389 |
| #atlas.authentication.method.ldap.ad.base.dn=(sAMAccountName={0}) |
| #atlas.authentication.method.ldap.ad.bind.dn=CN=team\,CN=Users\,DC=example\,DC=com |
| #atlas.authentication.method.ldap.ad.bind.password=<password> |
| #atlas.authentication.method.ldap.ad.referral=ignore |
| #atlas.authentication.method.ldap.ad.user.searchfilter=(sAMAccountName={0}) |
| #atlas.authentication.method.ldap.ad.default.role=<default role> |
| |
| ######### JAAS Configuration ######## |
| |
| #atlas.jaas.KafkaClient.loginModuleName = com.sun.security.auth.module.Krb5LoginModule |
| #atlas.jaas.KafkaClient.loginModuleControlFlag = required |
| #atlas.jaas.KafkaClient.option.useKeyTab = true |
| #atlas.jaas.KafkaClient.option.storeKey = true |
| #atlas.jaas.KafkaClient.option.serviceName = kafka |
| #atlas.jaas.KafkaClient.option.keyTab = /etc/security/keytabs/atlas.service.keytab |
| #atlas.jaas.KafkaClient.option.principal = atlas/_HOST@EXAMPLE.COM |
| |
| ######### Server Properties ######### |
| atlas.rest.address=http://localhost:21000 |
| # If enabled and set to true, this will run setup steps when the server starts |
| #atlas.server.run.setup.on.start=false |
| |
| ######### Entity Audit Configs ######### |
| atlas.audit.hbase.tablename=apache_atlas_entity_audit |
| atlas.audit.zookeeper.session.timeout.ms=1000 |
| atlas.audit.hbase.zookeeper.quorum=localhost:2181 |
| |
| ######### High Availability Configuration ######## |
| atlas.server.ha.enabled=false |
| #### Enabled the configs below as per need if HA is enabled ##### |
| #atlas.server.ids=id1 |
| #atlas.server.address.id1=localhost:21000 |
| #atlas.server.ha.zookeeper.connect=localhost:2181 |
| #atlas.server.ha.zookeeper.retry.sleeptime.ms=1000 |
| #atlas.server.ha.zookeeper.num.retries=3 |
| #atlas.server.ha.zookeeper.session.timeout.ms=20000 |
| ## if ACLs need to be set on the created nodes, uncomment these lines and set the values ## |
| #atlas.server.ha.zookeeper.acl=<scheme>:<id> |
| #atlas.server.ha.zookeeper.auth=<scheme>:<authinfo> |
| |
| |
| |
| #########POLICY FILE PATH ######### |
| atlas.auth.policy.file=${sys:atlas.home}/conf/policy-store.txt |
| |
| ######### Type Cache Implementation ######## |
| # A type cache class which implements |
| # org.apache.atlas.typesystem.types.cache.TypeCache. |
| # The default implementation is org.apache.atlas.typesystem.types.cache.DefaultTypeCache which is a local in-memory type cache. |
| #atlas.TypeCache.impl= |
| |
| #########authorizer impl class ######### |
| atlas.authorizer.impl=SIMPLE |
| |
| ######### Performance Configs ######### |
| #atlas.graph.storage.lock.retries=10 |
| #atlas.graph.storage.cache.db-cache-time=120000 |
| |
| ######### Business Catalog ######### |
| atlas.taxonomy.default.name=Catalog |