Deletion of the SOCTools containers will not delete the data in the volumes, and if the deletion of all data is also required, you should also execute the following command:
The configuration script will guide you through the quick start process
`./configure.sh`
First you need to fill in configuration file `access.ips`, which contains IP addresses and Networks that will be used to build access lists for services accessible from outside.
- If you want to skip over access list creation process and use default access list, on "Do you want to modify/edit this file now?", press [Enter] or type no and press [Enter]
Next, we are going to set Fully Qualified Domain Name for your SOCTools server.
- On "set FQDN which will be used to access the soctools services. (the DNS record should already be in place.)" you should already have set up hostname and DNS record, so type it here and press [Enter]
We also need the name of your chosen domain in the last step.
- On "Organization's top level domain (will be used as organization name and organization domain in different services)", type the name of the domain used for hosting FQDN entered in the previous step and press [Enter]
Following questions help us prepare your username and certificates that will be used to access various Tools in SOCTools. It also configures these parameters in `group_vars/all/variables.yml`.
- On "firstame:" type your name and press [Enter]
- On "lastname:" type your surname and press [Enter]
- On "username:" type the username you want to use and press [Enter]
- On "Enter CN for Certificate [username]:" press [Enter]
- On "Correct? type 'yes' or 'no':", type yes and press [Enter]
After entering 'yes' and pressing [Enter], following files and folders will be modified:
-`access.ips`
-`group_vars/all/variables.yml`
-`roles/haproxy/files/`
Also, firstame, lastname, and username will be used in the future step, while building CA and certificates for user access
# Install and try SOCTools
Following commands will let you configure the host, build docker images and build CA for service and user certificates:
This playbook will generate some errors but this is normal as long as the playbook ignores them and finish without stopping. After the last step you can download and install certificates, doing following steps:
* Download and import the root certificate located in secrets/CA/ca.crt (On windows the CA certificate should be installed in the Trusted Root Certficiation Authorities store)
* Download and import in the browseer user certificate (for the user you have created) found in the directory secrets/certificates. To import user certificate, you will need password find in the directory secrets/passwords
At last you can start SOCTools containers and initialize them using you configuration: