Important
You are browsing the documentation for version 4.1 of OroCommerce, OroCRM and OroPlatform, which is no longer maintained. Read version 5.1 (the latest LTS version) of the Oro documentation to get up-to-date information.
See our Release Process documentation for more information on the currently supported and upcoming releases.
Advanced Configuration¶
Deployment and Maintenance Configuration¶
To modify configuration options for maintenance agent, you need to have the orocloud.yaml file placed in the application root. If the application is not yet deployed, modifications can also be made in /mnt/(ocom|ocrm)/app/orocloud.yaml.
Note
Please do not use double quotes for any variables. Use single quotes instead.
Note
Please do not use tabs in orocloud.yaml as indentations as they are treated differently by different editors and tools. Since indentation is crucial for proper interpretation of YAML, use spaces only.
With orocloud.yaml it is possible to override the following nodes:
install_commands
1---
2orocloud_options:
3 deployment:
4 install_commands: # Application commands which run during the installation process
5 - 'oro:install --sample-data=n --user-name=admin --user-email=admin@example.com --user-password=new_password --user-firstname=John --user-lastname=Doe --application-url=https://example.com --organization-name=Oro'
Note
As most of time the deploy operation runs only once, it is recommended to avoid storing any sensitive data (such as email, username, or password) in any files for security purposes. You can omit options like user-name, user-email or user-password. When omitted, they are asked interactively during the deploy operation.
upgrade_commands
1---
2orocloud_options:
3 deployment:
4 upgrade_commands: # Application commands which run during update process
5 - 'oro:platform:update'
git clone configuration
1---
2orocloud_options:
3 deployment:
4 git_clone_recursive: true
Note
Please note that by default, git_clone_recursive: true
. Allowed values: true
, false
.
composer_command
1---
2orocloud_options:
3 deployment:
4 composer_command: '{{composer_cmd}} install --no-dev --optimize-autoloader'
Note
Please note that {{composer_cmd}}
is a reserved variable and in most cases during executions it will be replaced with the composer
value. Please, keep in mind that the command format is IMPORTANT and should take the following form: {environment variables} {{composer_cmd}} {command} {option1 option2 ... option n}
.
For example:
‘{{composer_cmd}} install –no-dev -vvv’
‘COMPOSER=dev.json {{composer_cmd}} install –no-dev -vvv’
Some options may also be omitted as they are added automatically:
The –working-dir (-d) option will be ignored because it is added automatically during the deploy | upgrade command.
The –no-interaction (-n) option will be ignored because it is added automatically during the deploy | upgrade command.
The -v|vv|vvv, –verbose option will be used (if specified) with a higher priority than the same option in the deploy | upgrade command, e.g.
orocloud-cli deploy -vv
.
after_composer_install_commands
1---
2orocloud_options:
3 deployment:
4 after_composer_install_commands:
5 - 'command1'
db_extensions
1---
2orocloud_options:
3 deployment:
4 db_extensions:
5 - 'uuid-ossp'
6 - 'pgcrypto'
before_backup_create_commands
1---
2orocloud_options:
3 deployment:
4 before_backup_create_commands:
5 - 'command1'
6 - 'command2'
after_backup_create_commands
1---
2orocloud_options:
3 deployment:
4 after_backup_create_commands:
5 - 'command1'
6 - 'command2'
Application Configuration¶
Custom maintenance page, web backend prefix, and consumers debug mode can be configured the following way. Keep in mind that the web_backend_prefix parameter should start with “/” and should not end with “/”, for instance ‘/admin’:
1---
2orocloud_options:
3 application:
4 maintenance_page: '/mnt/ocom/app/www/maintenance.html'
5 web_backend_prefix: '/my_admin_console_prefix'
6 consumers_debug_mode: true
Note
/mnt/ocom/app/www
is the application root path for the OroCommerce application type. For OroCRM, use the /mnt/ocrm/app/www
path. The maintenance.html file should be available in application repository in the specified path. When modified, changes are applied after the deploy | upgrade operation in approximately 30 minutes.
Note
Changing the web_backend_prefix
value without notifying the Cloud team can break the back-office of the application. Make sure you create a request to Service Desk before making any change. You can also change the value without creating a request. In this case, you should wait for approximately 30 min and then, run cache:rebuild
to change the value in the application’s parameters.yml file.
Webserver Configuration¶
Webserver configuration can be modified, as illustrated below:
1---
2orocloud_options:
3 webserver:
4 header_x_frame: true
5 redirects_map:
6 '/about_us_old': '/about'
7 '/about_them_old': '/about_them'
8 '/news/new_event' : 'https://corpsite.com/events/newest'
9 locations:
10 'root':
11 type: 'php'
12 satisfy: any # Allow access if all (all) or at least one (any) access directive satisfied
13 location: '~ /index\.php(/|$)'
14 auth_basic_enable: true
15 auth_basic_userlist:
16 user1:
17 ensure: 'present'
18 password: 'password1'
19 user2:
20 ensure: 'absent'
21 password: 'password2'
22 'admin':
23 type: 'php'
24 satisfy: any # Allow access if all (all) or at least one (any) access directive satisfied
25 location: '~ /index\.php(/admin|$)'
26 auth_basic_enable: true
27 auth_basic_userlist:
28 user3:
29 ensure: 'present'
30 password: 'password1'
31 user4:
32 ensure: 'absent'
33 password: 'password2'
34 allow:
35 - '127.0.0.1'
36 - '127.0.0.2'
37 deny:
38 - 'all'
39 'de':
40 type: 'php'
41 location: '/de'
42 fastcgi_param:
43 'WEBSITE': '$host/de'
44 allow:
45 - '127.0.0.1'
46 - '127.0.0.2'
47 deny:
48 - 'all'
49 'en':
50 type: 'php'
51 location: '/en'
52 fastcgi_param:
53 'WEBSITE': '$host/en'
54 allow:
55 - '127.0.0.1'
56 - '127.0.0.2'
57 deny:
58 - 'all'
59 access_policy:
60 'ip':
61 'type' : 'allow'
62 'allow' :
63 - '127.0.0.1'
64 - '192.168.0.1'
65 - '172.16.0.0/16'
66 'deny' :
67 - '10.0.0.1'
68 'country':
69 'type' : 'deny'
70 'allow' :
71 - 'US'
72 - 'CA'
73 'ua':
74 'allow' :
75 - 'GoogleStackdriverMonitoring'
76 - 'Some Custom agent'
77 'deny' :
78 - 'AcoiRobot'
79 - 'Wget'
80 'uri':
81 'allow' :
82 - '~(^/api/(.*))'
83 limit_whitelist:
84 - '8.8.8.8'
85 - '10.1.0.0/22'
86 limit_whitelist_uri:
87 - '~(^/admin/test/(.*))'
88 blackfire_options:
89 agent_enabled : true
90 apm_enabled : 1
91 server_id : '<server-id>'
92 server_token : '<server-token>'
93 log_level : '1'
94 log_path : '/var/log/blackfire/agent.log'
95 newrelic_options:
96 license_key: ‘shaike5fith3ieKahn4zae6iedeiphoo7Phoo1ca’
Redirects Configuration¶
This configuration option enables you to setup redirects to the existing URLs of OroCloud application.
redirects_map — the hash where the key is an old URL, and the value is a new URL.
X Frame Header Configuration¶
header_x_frame: true — is the default value of the flag. In this case, OroCloud WAF adds the “X-Frame-Options: SAMEORIGIN” header when responding to the initial request. It makes it impossible to embed any OroCommerce site into iFrame at any site except itself to fulfill security requirements.
Some business cases require embedding the OroCloud site into the iFrame at other sites. You need to set the value to “false” : header_x_frame: false
.
This prevents WAF from sending the “X-Frame-Options” header which allows embedding into any iFrame.
Locations Configuration¶
This configuration option is used to manage locations.
locations — the hash of hashes. The top key is the location name; the lower keys are:
type — location type. Possible values are
php
,static
,rewrite
.satisfy — defines how conditions are used. Possible values are
all
andany
.all - all conditions must be met for the specific location (logical
and
)any - any condition can be met for the specific location (logical
or
)
location — location URI. The value may have regular expressions and modifiers, as it is used in the Nginx location directive.
fastcgi_param — the hash for php-specific custom variables.
auth_basic_enable — a boolean trigger for HTTP basic authentication.
auth_basic_userlist — the hash of hashes with a user name as a key and mandatory nested keys:
ensure — ensures if the user is present or absent.
password — a plain text user password.
allow — an array of IP addresses or network masks allowed to access location. Use one record per line or
any
to allow access from anywhere.deny — an array of IP addresses or network masks denied to access location. Use one record per line or
any
to deny access from anywhere.
OroCloud WAF Configuration¶
Approach¶
OroCloud provides two ways to protect the application from big amounts of requests which can cause denial of service. There are two layers of protection used by the OroCloud application which are illustrated in the diagram below:
Requests Filtering¶
This layer is responsible for filtering HTTP requests depending on their sources. The requests can come from certain:
IP addresses or networks
Countries
User Agents
The rules used by this firewall are defined in the access_policy
section of the orocloud.yaml file and are explained below. The HTTP request dropped at this layer of protection has HTTP status 451 which is “Unavailable For Legal Reasons”.
Robot Detection¶
The application drops requests from the user agents which do not support JS effectively protecting from the simple robots. Any request from a client (browser, robot, etc.), which do not support cookies and JS, is dropped with HTTP status 451, and this client is redirected to the error page. It is possible to whitelist specific user agents using the rules described below.
Rate Limiting Request¶
On this layer, WAF performs rate limiting to detect crawling robots and excessive HTTP requests using the following mechanisms.
Rate limiting algorithm uses 3 parameters: rate limit
, delay
, and burst
. It groups requests by the source IP and destination URI and throttles them to the rate limit
if there are more than a delay
requests per second for a given group of requests. Nginx drops all consequent requests from a group if their amount is bigger than the burst
value. The exact values of these parameters depend on the grouping factor (IP, URI, etc.).
HTTP request dropped at this layer of protection has HTTP status 451 “Unavailable For Legal Reasons”. It is possible to define exceptions for rate limiting using the limit_whitelist
and limit_whitelist_uri
sections of the orocloud.yaml file.
Rules Definition¶
WAF Rules¶
Rules to manage HTTP requests filtering are defined in the following sections of the orocloud.yaml file.
Before implementing changes in this file on production, you should always test it at the environment stage to avoid issues with live application. Also, you can use the following command to check the correctness of the file syntax afterwards:
1ssh user@main_node_ip 'cat /mnt/ocom/app/orocloud.yaml' | yamllint -
Source filtering rules are defined in the webserver
section. This is the child element of the orocloud_options
data structure. Here is an example of rules definitions:
1access_policy:
2 'ip':
3 'type' : 'allow'
4 'allow' :
5 - '127.0.0.1'
6 - '192.168.0.1'
7 - '172.16.0.0/16'
8 'deny' :
9 - '10.0.0.1'
10 'country':
11 'type' : 'deny'
12 'allow' :
13 - 'US'
14 - 'CA'
15 'ua':
16 'allow' :
17 - 'GoogleStackdriverMonitoring'
18 - 'Some Custom agent'
19 'deny' :
20 - 'AcoiRobot'
21 - 'Wget'
22 'uri':
23 'allow' :
24 - '~(^/api/(.*))'
access_policy
— The hash of hashes provides the ability to manage Oro Web Application Firewall and allow or deny requests depending on the source address, source country, user agent, and URI.
All rejected requests receive status 451.
The following hashes can be used:
ip
— the hash defines the rules for the source IP filtering.country
— the hash defines rules for the originating country filtering. The value of type key defines if the hash contains the allowed or prohibited countries. Country must be defined by ISO 3166 Alpha1 code. GeoIP database is used to define a country from the source IP.
An example of the rule to allow only the defined countries:
1'country':
2 'type' : 'deny'
3 'allow' :
4 - 'US'
5 - 'CA'
In this example, only the requests from the USA and Canada are allowed. All other requests are rejected.
An example of the rule to deny requests from the defined countries:
1'country':
2 'type' : 'allow'
3 'deny' :
4 - 'CN'
5 - 'RU'
In this example, all requests from China and Russia are to be rejected.
ua
— The hash provides the ability to allow or deny requests from the specific user agents. A user agent is defined by the regexp string. There are two possible lists for this hash:allow
anddeny
to allow or deny requests from the listed user agents correspondingly.
An example of the user agent rule:
1'ua':
2 'allow' :
3 - 'GoogleStackdriverMonitoring'
4 - 'Some Custom agent'
5 'deny' :
6 - 'AcoiRobot'
7 - 'Wget'
This example allows requests from the GoogleStackdriverMonitoring
user agent and rejects all requests from AcoiRobot
and Wget
.
uri
— The hash provides the ability to allow requests to the specific URI and override the rules defined by other hashes inaccess_policy
. URI can be defined by standard regexp.
An example of the URI rule:
1'uri':
2 'allow' :
3 - '~(^/api/(.*))'
This example allows any requests to the URI which fits ~(^/api/(.*))
regex overriding any rule defined for IP, country, and/or user agent.
Request Rate Limit Rules¶
There are two lists to allow any rate of requests for the specific IPs or to the specific URIs. They are the child elements of the webserver
data structure.
Here is an example:
1limit_whitelist:
2 - '8.8.8.8'
3 - '10.1.0.0/22'
4limit_whitelist_uri:
5 - '~(^/admin/test/(.*))'
limit_whitelist
— The list contains source IPs and subnets which are allowed to send requests to the application with any rate. This can be used to whitelist some service IPs which need to perform many requests, e.g., for load testing.
An example of the whitelist:
1limit_whitelist:
2 - '8.8.8.8'
3 - '10.1.0.0/22'
This rule allows unlimited rate of requests from IP 127.0.0.1 (local host) and subnet 10.1.0.0/22.
limit_whitelist_uri
— The list contains regular expressions to define URI of the application which must not be limited by request rate. This can be used to whitelist URIs that need to receive many requests, e.g., integration URI.
An example of the whitelist:
1limit_whitelist_uri:
2 - '~(^/admin/test/(.*))'
This rule allows the unlimited rate of requests to URI containing the /admin/test/ string.
Note
Allowing access via WAF does not affect simultaneous connections limits. Use limit_whitelist or limit_whitelist_uri to set unlimited connectios for a client IP or URI on the server.
Profiling Application Console Commands via Blackfire¶
The configuration option enables you to configure Blackfire.
blackfire_options
— The hash is used to configure the Blackfire agent on environment
agent_enabled — a boolean trigger for Blackfire installation
apm_enabled - the option enables (1) or disables (0) the Blackfire APM feature. Please note that you need to have it included into your license.
server_id — a server ID string. Refer your Blackfire account to this value.
server_token — a server token string. Refer your Blackfire account to this value.
log_level — Blackfire agent log verbosity.
log_path — a path to the log file location.
You can then profile the application console commands via configured Blackfire:
1orocloud-cli app:console [command] --blackfire-enable --blackfire-client-id [client-id] --blackfire-client-token [client-token] [--blackfire-env env] [--blackfire-samples count]
Note
Make sure you enable Blackfire via orocloud.yaml before using this functionality.
Profiling Application Using NewRelic¶
The newrelic_options
configuration option allows you to configure NewRelic profiler (must be installed and configured per separate support request). Please, pay attention that the value of the license_key is provided as an example, and you need to use your actual license key there.
Mail Settings¶
To prevent sending test emails accidentally from the staging environment to any real users or customers, add the domains of email recepients that you will be using for testing to your whitelist:
1---
2orocloud_options:
3 mail:
4 whitelist:
5 - 'example.com'
6 - 'examlpe.org'
7 - 'example.net'
Where:
mail is a hash of mail-related settings
whitelist is an array of whitelisted mail domains
Note
In production environments all domains are whitelisted. When you create a whitelist, it blocks sending email to any recipients, except for the ones in the whitelisted email domains.
Sanitizing Configuration¶
Regardless of application type (OroCommerce or OroCRM), each has its own default sanitize rules (sanitize.method.rawsql and sanitize.method.update). However, you can add your own rules, remove a specific default rule, or completely override them.
The sanitize configuration is grouped under the sanitize node and supports the following sanitize methods:
sanitize.rawsql_add_rules — the list of raw SQL queries that helps you to sanitize the existing data, for example, delete data using the TRUNCATE method, UPDATE data to apply any custom modification, etc.
sanitize.rawsql_delete_rules — the list of raw SQL queries, which should be removed from the list in sanitize.method.rawsql. The format is the same as sanitize.rawsql_add.
sanitize.rawsql_override_rules — the list of raw SQL queries, which will be applied to sanitizing data and override default sanitize rule sanitize.method.rawsql. Please note, that if this option is specified, all sanitize.rawsql_add_rules and sanitize.rawsql_delete_rules will be ignored. The format is the same as sanitize.rawsql_add_rules.
sanitize.update_add_rules — the mapping between specific table columns and the sanitizing method that should be used for the values.
sanitize.update_delete_rules — the list of rules which will be deleted from the list in sanitize.method.update. The format is the same as in sanitize.update_add_rules.
sanitize.update_override_rules — the list of rules which will be applied to sanitizing data and overriding the default sanitize rule sanitize.method.update. Please note, that if this option is specified, all sanitize.update_add_rules and sanitize.update_delete_rules will be ignored. The format is the same as sanitize.update_add_rules.
Note
Please keep in mind that ALL values in rawsql_*_rules and update_*_rules MUST be wrapped in SINGLE quotes.
1---
2orocloud_options:
3 deployment:
4 sanitize:
5 rawsql_add_rules:
6 - 'TRUNCATE oro_message_queue_job_unique_test'
7 rawsql_delete_rules:
8 - 'TRUNCATE oro_tracking_visit_event'
9 - 'TRUNCATE oro_tracking_website CASCADE'
10 rawsql_override_rules:
11 - 'TRUNCATE oro_tracking_visit_event'
12 - 'TRUNCATE oro_tracking_website CASCADE'
13 update_add_rules:
14 - '{ table: oro_email_test, columns: [{name: subject, method: md5}, {name: from_name, method: md5}] }'
15 update_delete_rules:
16 - '{ table: oro_integration_transport, columns: [{name: api_key, method: md5},{name: api_user, method: md5},{name: api_token, method: md5}] }'
17 update_override_rules:
18 - '{ table: oro_integration_transport, columns: [{name: api_key, method: md5},{name: api_user, method: md5},{name: api_token, method: md5}] }'
19 custom_email_domain: 'example.com'
General Conventions¶
Please use the following conventions to design your sanitize.update_* strategy:
Provide sanitizing configuration for every table as a new item:
1update_add_rules: 2 - '{ table: oro_address, columns: [{name: street, method: md5}, {name: city, method: md5}, {name: postal_code, method: md5}, {name: last_name, method: md5}] }' 3 - '{ table: oro_business_unit, columns: [{name: email, method: email}, {name: name, method: md5}, {name: phone, method: md5}] }'
Provide the table name in the table node.
In the columns section, provide an array of column name and sanitizing method pairs for all the columns that should be sanitized in the mentioned table.
For example:
1columns: [{name: street, method: md5}, {name: city, method: md5} ]
Provide the column name in the name node. Use the following sanitize methods/strategies (ensure they reasonably match the column type):
md5 — Replaces the original string with the string hash.
email — Replaces the email with the sanitized version of the email. When the sanitize.custom_email_domain configuration parameter is provided in the deployment.yml or orocloud.yaml files, the email strategy replaces the real email domain with the custom one provided as sanitize.custom_email_domain. If the custom domain is not provided, the sanitized email will be generated randomly. For example, example@example.com.
date — Replaces the date values with the current date and time.
attachment — Replaces the attachment file content with a dummy blank image.
Elasticsearch Synonyms Configuration¶
To configure synonyms in Elasticsearch service, use the following field in orocloud.yaml:
1 orocloud_options:
2 elasticsearch:
3 synonyms:
4 'index_name1':
5 - 'foo, bar, baz'
6 - 'spam, eggs, meal'
7 - 'null, void'
8 'index_name2':
9 - 'Alice, Bob, Dave, John'
You can use separate synonym lists for each index, or use ‘*’ as index name in order to apply the same synonyms list to all indices.
1 orocloud_options:
2 elasticsearch:
3 synonyms:
4 '*':
5 - 'foo, bar, baz'
6 - 'spam, eggs, meal'
7 - 'null, void'
8 - 'Alice, Bob, Dave, John'
Note
Please keep in mind that synonyms configuration will be not applied immediately. All changes made in orocloud.yaml require up to 40 minutes to apply. More details for synonyms usage may be found in official Elasticsearch documentation.
Environments Data Synchronization¶
Cloud-based environments may be synchronized by a user without filing a request to the support team.
To retrieve a list of the environments to which you can sync the sanitized data from the current environment, run the following command:
1 orocloud-cli dump:environments
Note
If you have no environments in the output, ask the support team to update your environment settings.
This means that you can push data from the current environment to the linked environment.
1orocloud-cli dump:create --help
1Description:
2 Create application environment data dump and copy it to another environment.
3
4Usage:
5 dump:create [options]
6
7Options:
8 --log=LOG Log to file
9 --downtime-duration[=DOWNTIME-DURATION] (OPTIONAL) Downtime duration, by default 1 hour. Expected format: '{number}d{number}h{number}m'. Usage example: '1d3h15m' means 1 day 3 hours 15 minutes OR '30m' means 30 minutes.
10 --downtime-comment[=DOWNTIME-COMMENT] Comment for provided custom downtime value. Required if [downtime-duration] provided. Wrap with double-quotes if contains spaces.
11 -e, --environment[=ENVIRONMENT] Name of the destination environment where data dump will be copied. To list all available environments, please use dump:environments command.
12 -c, --components[=COMPONENTS] Comma-separated components list (without spaces) to be included in the dump. Allowed: db,ess,media,code. Default: db. Database is sanitized. If media component selected, it may take much time. [default: "db"]
13 -i, --indices[=INDICES] Comma-separated Elastic indices list to be included in the dump. If not set - all indices will be included.
14 -h, --help Display this help message
15 -q, --quiet Do not output any message
16 -V, --version Display this application version
17 --ansi Force ANSI output
18 --no-ansi Disable ANSI output
19 -n, --no-interaction Do not ask any interactive question
20 -v|vv|vvv, --verbose Increase the verbosity of messages: 1 for normal output, 2 for more verbose output and 3 for debug
21
22* **option "--environment"** - Name of the destination environment where data dump will be copied.
23
24* **option "--components"** - Comma-separated components list (without spaces) to be included in the dump. Allowed: db,ess,rpm. Default: db. Database is sanitized.
25
26* **option "--indices"** - Comma-separated Elastic indices list to be included in the dump. If not set - all indices will be included.
Note
GridFS media content and RabbitMQ messages sync is not supported. If media component is selected, sync may take a long time.
When data push is done, you may start with import in the target environment.
To list all available data dumps that can be restored to the current environment, run:
1 orocloud-cli dump:list --help
1 Description:
2 Lists all available data dumps that can be restored to the current environment.
3
4 Usage:
5 dump:list [options]
6
7 Options:
8 --log=LOG Log to file
9 --page=PAGE Page for display (25 items per page) [default: 1]
10 --per-page=PER-PAGE Items per page [default: 25]
11 -h, --help Display this help message
12 -q, --quiet Do not output any message
13 -V, --version Display this application version
14 --ansi Force ANSI output
15 --no-ansi Disable ANSI output
16 -n, --no-interaction Do not ask any interactive question
17 -v|vv|vvv, --verbose Increase the verbosity of messages: 1 for normal output, 2 for more verbose output and 3 for debug
To restore it as is, run the following command in the target environment:
1 orocloud-cli dump:load --help
1Description:
2 Load application data from the dump to the current environment.
3
4Usage:
5 dump:load [options] [--] [<timestamp>]
6
7Arguments:
8 timestamp The timestamp of the exported environment list items to be restored.
9
10Options:
11 --log=LOG Log to file
12 --downtime-duration[=DOWNTIME-DURATION] (OPTIONAL) Downtime duration, by default 1 hour. Expected format: '{number}d{number}h{number}m'. Usage example: '1d3h15m' means 1 day 3 hours 15 minutes OR '30m' means 30 minutes.
13 --downtime-comment[=DOWNTIME-COMMENT] Comment for provided custom downtime value. Required if [downtime-duration] provided. Wrap with double-quotes if contains spaces.
14 --force[=FORCE] Force dump:load operation execution, otherwise the confirmation will be requested. [default: false]
15 --host[=HOST] Stop program(s) on specified job host only [ocom-vdrizheruk-dev2-app1], otherwise [all].
16 -c, --components[=COMPONENTS] Comma-separated list (without spaces) of components for data to be loaded. Allowed: db,ess,media,code. Default: db. Database is sanitized. If media component selected, it may take much time.
17 --skip-purge-media Skip purging media on fetch operation
18 --skip-prepare-app Skip prepare application operations. With this option application will not be usable after finishing operation.
19 --flush-elasticsearch Flush ElasticSearch. All ElasticSearch data will be lost.
20 --run-base-reindex Run command [oro:search:reindex] in background.
21 --run-website-reindex Run command [oro:website-search:reindex] in background.
22 -h, --help Display this help message
23 -q, --quiet Do not output any message
24 -V, --version Display this application version
25 --ansi Force ANSI output
26 --no-ansi Disable ANSI output
27 -n, --no-interaction Do not ask any interactive question
28 -v|vv|vvv, --verbose Increase the verbosity of messages: 1 for normal output, 2 for more verbose output and 3 for debug
29
30* **option "--components"** - Comma-separated list (without spaces) of components for data to be loaded. Allowed: db,ess,rpm. Default: db. Database is sanitized.
31
32* **option "--skip-prepare-app"** - Skip prepare application operations. With this option application will not be usable after finishing operation.
33
34* **option "--flush-elasticsearch"** - Flush ElasticSearch. All ElasticSearch data will be lost.
35
36* **option "--run-base-reindex"** - Run command [oro:search:reindex] in background.
37
38* **option "--run-website-reindex"** - Run command [oro:website-search:reindex] in background.
Note
If during dump:load not all components(db,ess,rpm) are selected, the application may be not working. By default only db will be restored.
Note
During dump:load, the database is always sanitized.