ConfigurationsΒΆ

The application is configurable with environment variable. Below we present the list of configurations and there usage.

Below is the component wise configurations.

DB Setup: RDBMS hosting the primary datastore can be configured using below setting.

Config

Remark

SCT_DB_TYPE

Database (Options: mysql, postgres, sqlite)

SCT_DB_HOST

Database host

SCT_DB_PORT

Database port

SCT_DB_NAME

Database name

SCT_DB_SCHEMA

Database schema

SCT_DB_USER

Database user

SCT_DB_PWD

Database user password

SCT_DB_TABLE_BLACKLIST

Comma separated pattern in name for table that need not be considered to be viewed by this tool

UI Setup: Web UI operation settings.

Config

Remark

SCT_UI_PAGESIZE

Max record to show per page

SCT_UI_DOWNLOAD_SIZE

Max record in downloaded CSV

SCT_UI_UPLOAD_SIZE

Max record that can be appended uploaded feature

Audit Setup: Currently only RDBMS based audit is supported.

Audit table can be made available before starting tool:

create table governance.sct_audits (
    audit_id serial PRIMARY KEY,
    audit_user VARCHAR (100) not null,
    audit_time timestamp NOT NULL DEFAULT NOW(),
    operation_performed VARCHAR (100) not null,
    table_name VARCHAR (100) not null,
    operation_status VARCHAR (15) not null,
    operation_metadata VARCHAR (5000)
);

Config

Remark

SCT_AUDIT_TYPE

Database type (Options: mysql, postgres, sqlite)

SCT_AUDIT_DB_NAME

Audit database

SCT_AUDIT_DB_SCHEMA

Audit schema

SCT_AUDIT_DB_HOST

Database hostname

SCT_AUDIT_DB_PORT

Database port

SCT_AUDIT_DB_USER

Database user

SCT_AUDIT_DB_PWD

Database password

SCT_AUDIT_DB_TABLE

Audit table

SCT_AUDIT_TABLE_CREATE

Create audit table while app initiation (yes/no)

Scheduler Setup: Uploaded files are processed asynchronously using scheduler.

Additional maintenance work can also be scheduled using configuration.

Config

Remark

SCT_SCHEDULER_INTERVAL_VALUE

Schedule interval

SCT_SCHEDULER_JOB_MAX_ATTEMPT

Number of attempt before failing the scheduler action

SCT_SCHEDULER_CUSTOM_JOB

Module and function name for custom scheduled task

Authentication Setup: Currently only Okta based authentication is supported.

There is also new user registration page where new user request for access which drops mail to admin to add user to Okta organization.

Config

Remark

SCT_AUTH_OKTA_DOMAIN

Okta Domain

SCT_AUTH_OKTA_CLIENT_ID

Okta Client Id

SCT_AUTH_OKTA_CLIENT_SECRET

Okta Client secret

Authorization Setup: Current there are four predefined roles for authorization, below is the access for the same.

  • NONE: No access

  • VIEWER: View table data only, no mutation allowed

  • OPERATOR: View and mutate table data

  • ADMIN: View and mutate table data also track audits

Note

If you have not enabled authentication you need to set SCT_ACCESS_ANONYMOUS_ROLE to ADMIN.

You can use wild card * if you want to give *all authenticated* user to a role.

Config Remark

SCT_ACCESS_ANONYMOUS_ROLE

Roles assigned to anonymous user (without login)

SCT_ACCESS_ADMIN

List of principal assigned ADMIN role

SCT_ACCESS_OPERATOR

List of principal assigned OPERATOR role

SCT_ACCESS_VIEWER

List of principal assigned VIEWER role

Email Setup: If you do not want to use email notification set enabled to blank string. If you enable you will need to provide configuration from your email provider.

Config

Remark

SCT_MAIL_ENABLED

Mail notification is enabled or disabled

SCT_MAIL_SERVER

Mail Server

SCT_MAIL_PORT

Mail Server Port

SCT_MAIL_USE_TLS

Mail Server TLS Support

SCT_MAIL_USE_SSL

Mail Server SSL Support

SCT_MAIL_USERNAME

Mail Server User

SCT_MAIL_PASSWORD

Mail Server User Password

SCT_MAIL_RECIPIENTS

Notification Recipients (Comma Separated List)

Warning

All configuration defaults are available for verification and updating in module utilities.sct_env.