1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
7 var DefaultYAML = []byte(`# Copyright (C) The Arvados Authors. All rights reserved.
9 # SPDX-License-Identifier: AGPL-3.0
11 # Do not use this file for site configuration. Create
12 # /etc/arvados/config.yml instead.
14 # The order of precedence (highest to lowest):
15 # 1. Legacy component-specific config files (deprecated)
16 # 2. /etc/arvados/config.yml
17 # 3. config.default.yml
23 # Token to be included in all healthcheck requests. Disabled by default.
24 # Server expects request header of the format "Authorization: Bearer xxx"
29 # In each of the service sections below, the keys under
30 # InternalURLs are the endpoints where the service should be
31 # listening, and reachable from other hosts in the cluster.
34 "http://example.host:12345": {}
67 # Base URL for Workbench inline preview. If blank, use
68 # WebDAVDownload instead, and disable inline preview.
69 # If both are empty, downloading collections from workbench
72 # It is important to properly configure the download service
73 # to migitate cross-site-scripting (XSS) attacks. A HTML page
74 # can be stored in collection. If an attacker causes a victim
75 # to visit that page through Workbench, it will be rendered by
76 # the browser. If all collections are served at the same
77 # domain, the browser will consider collections as coming from
78 # the same origin and having access to the same browsing data,
79 # enabling malicious Javascript on that page to access Arvados
80 # on behalf of the victim.
82 # This is mitigating by having separate domains for each
83 # collection, or limiting preview to circumstances where the
84 # collection is not accessed with the user's regular
87 # Serve preview links using uuid or pdh in subdomain
88 # (requires wildcard DNS and TLS certificate)
89 # https://*.collections.uuid_prefix.arvadosapi.com
91 # Serve preview links using uuid or pdh in main domain
92 # (requires wildcard DNS and TLS certificate)
93 # https://*--collections.uuid_prefix.arvadosapi.com
95 # Serve preview links by setting uuid or pdh in the path.
96 # This configuration only allows previews of public data or
97 # collection-sharing links, because these use the anonymous
98 # user token or the token is already embedded in the URL.
99 # Other data must be handled as downloads via WebDAVDownload:
100 # https://collections.uuid_prefix.arvadosapi.com
106 # Base URL for download links. If blank, serve links to WebDAV
107 # with disposition=attachment query param. Unlike preview links,
108 # browsers do not render attachments, so there is no risk of XSS.
110 # If WebDAVDownload is blank, and WebDAV uses a
111 # single-origin form, then Workbench will show an error page
113 # Serve download links by setting uuid or pdh in the path:
114 # https://download.uuid_prefix.arvadosapi.com
126 # ShellInABox service endpoint URL for a given VM. If empty, do not
127 # offer web shell logins.
129 # E.g., using a path-based proxy server to forward connections to shell hosts:
130 # https://webshell.uuid_prefix.arvadosapi.com
132 # E.g., using a name-based proxy server to forward connections to shell hosts:
133 # https://*.webshell.uuid_prefix.arvadosapi.com
149 # max concurrent connections per arvados server daemon
152 # All parameters here are passed to the PG client library in a connection string;
153 # see https://www.postgresql.org/docs/current/static/libpq-connect.html#LIBPQ-PARAMKEYWORDS
161 # Maximum size (in bytes) allowed for a single API request. This
162 # limit is published in the discovery document for use by clients.
163 # Note: You must separately configure the upstream web server or
164 # proxy to actually enforce the desired maximum request size on the
166 MaxRequestSize: 134217728
168 # Limit the number of bytes read from the database during an index
169 # request (by retrieving and returning fewer rows than would
170 # normally be returned in a single response).
171 # Note 1: This setting never reduces the number of returned rows to
172 # zero, no matter how big the first data row is.
173 # Note 2: Currently, this is only checked against a specific set of
174 # columns that tend to get large (collections.manifest_text,
175 # containers.mounts, workflows.definition). Other fields (e.g.,
176 # "properties" hashes) are not counted against this limit.
177 MaxIndexDatabaseRead: 134217728
179 # Maximum number of items to return when responding to a APIs that
180 # can return partial result sets using limit and offset parameters
181 # (e.g., *.index, groups.contents). If a request specifies a "limit"
182 # parameter higher than this value, this value is used instead.
183 MaxItemsPerResponse: 1000
185 # API methods to disable. Disabled methods are not listed in the
186 # discovery document, and respond 404 to all requests.
187 # Example: {"jobs.create":{}, "pipeline_instances.create": {}}
190 # Interval (seconds) between asynchronous permission view updates. Any
191 # permission-updating API called with the 'async' parameter schedules a an
192 # update on the permission view in the future, if not already scheduled.
193 AsyncPermissionsUpdateInterval: 20s
195 # Maximum number of concurrent outgoing requests to make while
196 # serving a single incoming multi-cluster (federated) request.
197 MaxRequestAmplification: 4
199 # RailsSessionSecretToken is a string of alphanumeric characters
200 # used by Rails to sign session tokens. IMPORTANT: This is a
201 # site secret. It should be at least 50 characters.
202 RailsSessionSecretToken: ""
204 # Maximum wall clock time to spend handling an incoming request.
207 # Websocket will send a periodic empty event after 'SendTimeout'
208 # if there is no other activity to maintain the connection /
209 # detect dropped connections.
212 WebsocketClientEventQueue: 64
213 WebsocketServerEventQueue: 4
215 # Timeout on requests to internal Keep services.
216 KeepServiceRequestTimeout: 15s
219 # Config parameters to automatically setup new users. If enabled,
220 # this users will be able to self-activate. Enable this if you want
221 # to run an open instance where anyone can create an account and use
222 # the system without requiring manual approval.
224 # The params AutoSetupNewUsersWith* are meaningful only when AutoSetupNewUsers is turned on.
225 # AutoSetupUsernameBlacklist is a list of usernames to be blacklisted for auto setup.
226 AutoSetupNewUsers: false
227 AutoSetupNewUsersWithVmUUID: ""
228 AutoSetupNewUsersWithRepository: false
229 AutoSetupUsernameBlacklist:
238 # When NewUsersAreActive is set to true, new users will be active
239 # immediately. This skips the "self-activate" step which enforces
240 # user agreements. Should only be enabled for development.
241 NewUsersAreActive: false
243 # The e-mail address of the user you would like to become marked as an admin
244 # user on their first login.
245 # In the default configuration, authentication happens through the Arvados SSO
246 # server, which uses OAuth2 against Google's servers, so in that case this
247 # should be an address associated with a Google account.
248 AutoAdminUserWithEmail: ""
250 # If AutoAdminFirstUser is set to true, the first user to log in when no
251 # other admin users exist will automatically become an admin user.
252 AutoAdminFirstUser: false
254 # Email address to notify whenever a user creates a profile for the
256 UserProfileNotificationAddress: ""
257 AdminNotifierEmailFrom: arvados@example.com
258 EmailSubjectPrefix: "[ARVADOS] "
259 UserNotifierEmailFrom: arvados@example.com
260 NewUserNotificationRecipients: {}
261 NewInactiveUserNotificationRecipients: {}
263 # Set AnonymousUserToken to enable anonymous user access. You can get
264 # the token by running "bundle exec ./script/get_anonymous_user_token.rb"
265 # in the directory where your API server is running.
266 AnonymousUserToken: ""
269 # Time to keep audit logs, in seconds. (An audit log is a row added
270 # to the "logs" table in the PostgreSQL database each time an
271 # Arvados object is created, modified, or deleted.)
273 # Currently, websocket event notifications rely on audit logs, so
274 # this should not be set lower than 300 (5 minutes).
277 # Maximum number of log rows to delete in a single SQL transaction.
279 # If MaxDeleteBatch is 0, log entries will never be
280 # deleted by Arvados. Cleanup can be done by an external process
281 # without affecting any Arvados system processes, as long as very
282 # recent (<5 minutes old) logs are not deleted.
284 # 100000 is a reasonable batch size for most sites.
287 # Attributes to suppress in events and audit logs. Notably,
288 # specifying {"manifest_text": {}} here typically makes the database
289 # smaller and faster.
291 # Warning: Using any non-empty value here can have undesirable side
292 # effects for any client or component that relies on event logs.
293 # Use at your own risk.
294 UnloggedAttributes: {}
298 # Logging threshold: panic, fatal, error, warn, info, debug, or
302 # Logging format: json or text
305 # Maximum characters of (JSON-encoded) query parameters to include
306 # in each request log entry. When params exceed this size, they will
307 # be JSON-encoded, truncated to this size, and logged as
309 MaxRequestLogParamsSize: 2000
312 # Allow clients to create collections by providing a manifest with
313 # unsigned data blob locators. IMPORTANT: This effectively disables
314 # access controls for data stored in Keep: a client who knows a hash
315 # can write a manifest that references the hash, pass it to
316 # collections.create (which will create a permission link), use
317 # collections.get to obtain a signature for that data locator, and
318 # use that signed locator to retrieve the data from Keep. Therefore,
319 # do not turn this on if your users expect to keep data private from
323 # BlobSigningKey is a string of alphanumeric characters used to
324 # generate permission signatures for Keep locators. It must be
325 # identical to the permission key given to Keep. IMPORTANT: This is
326 # a site secret. It should be at least 50 characters.
328 # Modifying BlobSigningKey will invalidate all existing
329 # signatures, which can cause programs to fail (e.g., arv-put,
330 # arv-get, and Crunch jobs). To avoid errors, rotate keys only when
331 # no such processes are running.
334 # Default replication level for collections. This is used when a
335 # collection's replication_desired attribute is nil.
336 DefaultReplication: 2
338 # Lifetime (in seconds) of blob permission signatures generated by
339 # the API server. This determines how long a client can take (after
340 # retrieving a collection record) to retrieve the collection data
341 # from Keep. If the client needs more time than that (assuming the
342 # collection still has the same content and the relevant user/token
343 # still has permission) the client can retrieve the collection again
344 # to get fresh signatures.
346 # This must be exactly equal to the -blob-signature-ttl flag used by
347 # keepstore servers. Otherwise, reading data blocks and saving
348 # collections will fail with HTTP 403 permission errors.
350 # Modifying BlobSigningTTL invalidates existing signatures; see
351 # BlobSigningKey note above.
353 # The default is 2 weeks.
356 # Default lifetime for ephemeral collections: 2 weeks. This must not
357 # be less than BlobSigningTTL.
358 DefaultTrashLifetime: 336h
360 # Interval (seconds) between trash sweeps. During a trash sweep,
361 # collections are marked as trash if their trash_at time has
362 # arrived, and deleted if their delete_at time has arrived.
363 TrashSweepInterval: 60s
365 # If true, enable collection versioning.
366 # When a collection's preserve_version field is true or the current version
367 # is older than the amount of seconds defined on PreserveVersionIfIdle,
368 # a snapshot of the collection's previous state is created and linked to
369 # the current collection.
370 CollectionVersioning: false
372 # 0s = auto-create a new version on every update.
373 # -1s = never auto-create new versions.
374 # > 0s = auto-create a new version when older than the specified number of seconds.
375 PreserveVersionIfIdle: -1s
377 # Managed collection properties. At creation time, if the client didn't
378 # provide the listed keys, they will be automatically populated following
379 # one of the following behaviors:
381 # * UUID of the user who owns the containing project.
382 # responsible_person_uuid: {Function: original_owner, Protected: true}
384 # * Default concrete value.
385 # foo_bar: {Value: baz, Protected: false}
387 # If Protected is true, only an admin user can modify its value.
389 SAMPLE: {Function: original_owner, Protected: true}
391 # In "trust all content" mode, Workbench will redirect download
392 # requests to WebDAV preview link, even in the cases when
393 # WebDAV would have to expose XSS vulnerabilities in order to
394 # handle the redirect (see discussion on Services.WebDAV).
396 # This setting has no effect in the recommended configuration,
397 # where the WebDAV is configured to have a separate domain for
398 # every collection; in this case XSS protection is provided by
399 # browsers' same-origin policy.
401 # The default setting (false) is appropriate for a multi-user site.
402 TrustAllContent: false
404 # Cache parameters for WebDAV content serving:
405 # * TTL: Maximum time to cache manifests and permission checks.
406 # * UUIDTTL: Maximum time to cache collection state.
407 # * MaxBlockEntries: Maximum number of block cache entries.
408 # * MaxCollectionEntries: Maximum number of collection cache entries.
409 # * MaxCollectionBytes: Approximate memory limit for collection cache.
410 # * MaxPermissionEntries: Maximum number of permission cache entries.
411 # * MaxUUIDEntries: Maximum number of UUID cache entries.
416 MaxCollectionEntries: 1000
417 MaxCollectionBytes: 100000000
418 MaxPermissionEntries: 1000
422 # These settings are provided by your OAuth2 provider (e.g.,
424 ProviderAppSecret: ""
428 # Path to git or gitolite-shell executable. Each authenticated
429 # request will execute this program with the single argument http-backend"
430 GitCommand: /usr/bin/git
432 # Path to Gitolite's home directory. If a non-empty path is given,
433 # the CGI environment will be set up to support the use of
434 # gitolite-shell as a GitCommand: for example, if GitoliteHome is
435 # "/gh", then the CGI environment will have GITOLITE_HTTP_HOME=/gh,
436 # PATH=$PATH:/gh/bin, and GL_BYPASS_ACCESS_CHECKS=1.
439 # Git repositories must be readable by api server, or you won't be
440 # able to submit crunch jobs. To pass the test suites, put a clone
441 # of the arvados tree in {git_repositories_dir}/arvados.git or
442 # {git_repositories_dir}/arvados/.git
443 Repositories: /var/lib/arvados/git/repositories
451 # List of supported Docker Registry image formats that compute nodes
452 # are able to use. ` + "`" + `arv keep docker` + "`" + ` will error out if a user tries
453 # to store an image with an unsupported format. Use an empty array
454 # to skip the compatibility check (and display a warning message to
457 # Example for sites running docker < 1.10: {"v1": {}}
458 # Example for sites running docker >= 1.10: {"v2": {}}
459 # Example for disabling check: {}
460 SupportedDockerImageFormats:
464 # Include details about job reuse decisions in the server log. This
465 # causes additional database queries to run, so it should not be
466 # enabled unless you expect to examine the resulting logs for
467 # troubleshooting purposes.
468 LogReuseDecisions: false
470 # Default value for keep_cache_ram of a container's runtime_constraints.
471 DefaultKeepCacheRAM: 268435456
473 # Number of times a container can be unlocked before being
474 # automatically cancelled.
475 MaxDispatchAttempts: 5
477 # Default value for container_count_max for container requests. This is the
478 # number of times Arvados will create a new container to satisfy a container
479 # request. If a container is cancelled it will retry a new container if
480 # container_count < container_count_max on any container requests associated
481 # with the cancelled container.
484 # The maximum number of compute nodes that can be in use simultaneously
485 # If this limit is reduced, any existing nodes with slot number >= new limit
486 # will not be counted against the new limit. In other words, the new limit
487 # won't be strictly enforced until those nodes with higher slot numbers
491 # Preemptible instance support (e.g. AWS Spot Instances)
492 # When true, child containers will get created with the preemptible
493 # scheduling parameter parameter set.
494 UsePreemptibleInstances: false
496 # PEM encoded SSH key (RSA, DSA, or ECDSA) used by the
497 # (experimental) cloud dispatcher for executing containers on
498 # worker VMs. Begins with "-----BEGIN RSA PRIVATE KEY-----\n"
499 # and ends with "\n-----END RSA PRIVATE KEY-----\n".
500 DispatchPrivateKey: none
502 # Maximum time to wait for workers to come up before abandoning
503 # stale locks from a previous dispatch process.
506 # The crunch-run command to manage the container on a node
507 CrunchRunCommand: "crunch-run"
509 # Extra arguments to add to crunch-run invocation
510 # Example: ["--cgroup-parent-subsystem=memory"]
511 CrunchRunArgumentsList: []
513 # Extra RAM to reserve on the node, in addition to
514 # the amount specified in the container's RuntimeConstraints
515 ReserveExtraRAM: 256MiB
517 # Minimum time between two attempts to run the same container
521 # When you run the db:delete_old_container_logs task, it will find
522 # containers that have been finished for at least this many seconds,
523 # and delete their stdout, stderr, arv-mount, crunch-run, and
524 # crunchstat logs from the logs table.
527 # These two settings control how frequently log events are flushed to the
528 # database. Log lines are buffered until either crunch_log_bytes_per_event
529 # has been reached or crunch_log_seconds_between_events has elapsed since
531 LogBytesPerEvent: 4096
532 LogSecondsBetweenEvents: 1
534 # The sample period for throttling logs.
535 LogThrottlePeriod: 60s
537 # Maximum number of bytes that job can log over crunch_log_throttle_period
538 # before being silenced until the end of the period.
539 LogThrottleBytes: 65536
541 # Maximum number of lines that job can log over crunch_log_throttle_period
542 # before being silenced until the end of the period.
543 LogThrottleLines: 1024
545 # Maximum bytes that may be logged by a single job. Log bytes that are
546 # silenced by throttling are not counted against this total.
547 LimitLogBytesPerJob: 67108864
549 LogPartialLineThrottlePeriod: 5s
551 # Container logs are written to Keep and saved in a
552 # collection, which is updated periodically while the
553 # container runs. This value sets the interval between
554 # collection updates.
557 # The log collection is also updated when the specified amount of
558 # log data (given in bytes) is produced in less than one update
564 SbatchArgumentsList: []
565 SbatchEnvironmentVariables:
568 # Path to dns server configuration directory
569 # (e.g. /etc/unbound.d/conf.d). If false, do not write any config
570 # files or touch restart.txt (see below).
573 # Template file for the dns server host snippets. See
574 # unbound.template in this directory for an example. If false, do
575 # not write any config files.
576 DNSServerConfTemplate: ""
578 # String to write to {dns_server_conf_dir}/restart.txt (with a
579 # trailing newline) after updating local data. If false, do not
580 # open or write the restart.txt file.
581 DNSServerReloadCommand: ""
583 # Command to run after each DNS update. Template variables will be
584 # substituted; see the "unbound" example below. If false, do not run
586 DNSServerUpdateCommand: ""
588 ComputeNodeDomain: ""
589 ComputeNodeNameservers:
593 # Hostname to assign to a compute node when it sends a "ping" and the
594 # hostname in its Node record is nil.
595 # During bootstrapping, the "ping" script is expected to notice the
596 # hostname given in the ping response, and update its unix hostname
598 # If false, leave the hostname alone (this is appropriate if your compute
599 # nodes' hostnames are already assigned by some other mechanism).
601 # One way or another, the hostnames of your node records should agree
602 # with your DNS records and your /etc/slurm-llnl/slurm.conf files.
604 # Example for compute0000, compute0001, ....:
605 # assign_node_hostname: compute%<slot_number>04d
606 # (See http://ruby-doc.org/core-2.2.2/Kernel.html#method-i-format for more.)
607 AssignNodeHostname: "compute%<slot_number>d"
610 # Enable the legacy 'jobs' API (crunch v1). This value must be a string.
612 # Note: this only enables read-only access, creating new
613 # legacy jobs and pipelines is not supported.
615 # 'auto' -- (default) enable the Jobs API only if it has been used before
616 # (i.e., there are job records in the database)
617 # 'true' -- enable the Jobs API despite lack of existing records.
618 # 'false' -- disable the Jobs API despite presence of existing records.
621 # Git repositories must be readable by api server, or you won't be
622 # able to submit crunch jobs. To pass the test suites, put a clone
623 # of the arvados tree in {git_repositories_dir}/arvados.git or
624 # {git_repositories_dir}/arvados/.git
625 GitInternalDir: /var/lib/arvados/internal.git
628 # Enable the cloud scheduler (experimental).
631 # Name/number of port where workers' SSH services listen.
634 # Interval between queue polls.
637 # Shell command to execute on each worker to determine whether
638 # the worker is booted and ready to run containers. It should
639 # exit zero if the worker is ready.
640 BootProbeCommand: "docker ps -q"
642 # Minimum interval between consecutive probes to a single
646 # Maximum probes per second, across all workers in a pool.
647 MaxProbesPerSecond: 10
649 # Time before repeating SIGTERM when killing a container.
652 # Time to give up on SIGTERM and write off the worker.
655 # Maximum create/destroy-instance operations per second (0 =
657 MaxCloudOpsPerSecond: 0
659 # Interval between cloud provider syncs/updates ("list all
663 # Time to leave an idle worker running (in case new containers
664 # appear in the queue that it can run) before shutting it
668 # Time to wait for a new worker to boot (i.e., pass
669 # BootProbeCommand) before giving up and shutting it down.
672 # Maximum time a worker can stay alive with no successful
673 # probes before being automatically shut down.
676 # Time after shutting down a worker to retry the
677 # shutdown/destroy operation.
680 # Worker VM image ID.
683 # Tags to add on all resources (VMs, NICs, disks) created by
684 # the container dispatcher. (Arvados's own tags --
685 # InstanceType, IdleBehavior, and InstanceSecret -- will also
690 # Prefix for predefined tags used by Arvados (InstanceSetID,
691 # InstanceType, InstanceSecret, IdleBehavior). With the
692 # default value "Arvados", tags are "ArvadosInstanceSetID",
693 # "ArvadosInstanceSecret", etc.
695 # This should only be changed while no cloud resources are in
696 # use and the cloud dispatcher is not running. Otherwise,
697 # VMs/resources that were added using the old tag prefix will
698 # need to be detected and cleaned up manually.
699 TagKeyPrefix: Arvados
701 # Cloud driver: "azure" (Microsoft Azure) or "ec2" (Amazon AWS).
704 # Cloud-specific driver parameters.
711 # (ec2) Instance configuration.
717 AdminUsername: debian
719 # (azure) Credentials.
725 # (azure) Instance configuration.
726 CloudEnvironment: AzurePublicCloud
733 DeleteDanglingResourcesAfter: 20s
734 AdminUsername: arvados
738 # Use the instance type name as the key (in place of "SAMPLE" in
739 # this sample entry).
741 # Cloud provider's instance type. Defaults to the configured type name.
745 IncludedScratch: 16GB
753 SendUserSetupNotificationEmail: true
755 # Bug/issue report notification to and from addresses
756 IssueReporterEmailFrom: "arvados@example.com"
757 IssueReporterEmailTo: "arvados@example.com"
758 SupportEmailAddress: "arvados@example.com"
760 # Generic issue email from
761 EmailFrom: "arvados@example.com"
770 # API endpoint host or host:port; default is {id}.arvadosapi.com
771 Host: sample.arvadosapi.com
773 # Perform a proxy request when a local client requests an
774 # object belonging to this remote.
777 # Default "https". Can be set to "http" for testing.
780 # Disable TLS verify. Can be set to true for testing.
783 # When users present tokens issued by this remote cluster, and
784 # their accounts are active on the remote cluster, activate
785 # them on this cluster too.
791 ActivationContactLink: mailto:info@arvados.org
792 ArvadosDocsite: https://doc.arvados.org
793 ArvadosPublicDataDocURL: https://playground.arvados.org/projects/public
794 ShowUserAgreementInline: false
797 # Scratch directory used by the remote repository browsing
798 # feature. If it doesn't exist, it (and any missing parents) will be
799 # created using mkdir_p.
800 RepositoryCache: /var/www/arvados-workbench/current/tmp/git
802 # Below is a sample setting of user_profile_form_fields config parameter.
803 # This configuration parameter should be set to either false (to disable) or
804 # to a map as shown below.
805 # Configure the map of input fields to be displayed in the profile page
806 # using the attribute "key" for each of the input fields.
807 # This sample shows configuration with one required and one optional form fields.
808 # For each of these input fields:
809 # You can specify "Type" as "text" or "select".
810 # List the "Options" to be displayed for each of the "select" menu.
811 # Set "Required" as "true" for any of these fields to make them required.
812 # If any of the required fields are missing in the user's profile, the user will be
813 # redirected to the profile page before they can access any Workbench features.
814 UserProfileFormFields:
817 FormFieldTitle: Best color
818 FormFieldDescription: your favorite color
827 # exampleTextValue: # key that will be set in properties
830 # FormFieldDescription: ""
833 # exampleOptionsValue:
836 # FormFieldDescription: ""
844 # Use "UserProfileFormMessage to configure the message you want
845 # to display on the profile page.
846 UserProfileFormMessage: 'Welcome to Arvados. All <span style="color:red">required fields</span> must be completed before you can proceed.'
848 # Mimetypes of applications for which the view icon
849 # would be enabled in a collection's show page.
850 # It is sufficient to list only applications here.
851 # No need to list text and image types.
852 ApplicationMimetypesWithViewIcon:
870 # The maximum number of bytes to load in the log viewer
871 LogViewerMaxBytes: 1M
873 # When anonymous_user_token is configured, show public projects page
874 EnablePublicProjectsPage: true
876 # By default, disable the "Getting Started" popup which is specific to Arvados playground
877 EnableGettingStartedPopup: false
879 # Ask Arvados API server to compress its response payloads.
880 APIResponseCompression: true
882 # Timeouts for API requests.
883 APIClientConnectTimeout: 2m
884 APIClientReceiveTimeout: 5m
886 # Maximum number of historic log records of a running job to fetch
887 # and display in the Log tab, while subscribing to web sockets.
888 RunningJobLogRecordsToFetch: 2000
890 # In systems with many shared projects, loading of dashboard and topnav
891 # cab be slow due to collections indexing; use the following parameters
892 # to suppress these properties
893 ShowRecentCollectionsOnDashboard: true
894 ShowUserNotifications: true
896 # Enable/disable "multi-site search" in top nav ("true"/"false"), or
897 # a link to the multi-site search page on a "home" Workbench site.
900 # https://workbench.qr1hi.arvadosapi.com/collections/multisite
903 # Should workbench allow management of local git repositories? Set to false if
904 # the jobs api is disabled and there are no local git repositories.
907 SiteName: Arvados Workbench
908 ProfilingEnabled: false
910 # This is related to obsolete Google OpenID 1.0 login
911 # but some workbench stuff still expects it to be set.
912 DefaultOpenIdPrefix: "https://www.google.com/accounts/o8/id"
916 FileViewersConfigURL: ""
918 # Use experimental controller code (see https://dev.arvados.org/issues/14287)
919 EnableBetaController14287: false