Important

You are browsing the documentation for version 4.1 of OroCommerce, OroCRM and OroPlatform, which is no longer maintained. Read version 5.1 (the latest LTS version) of the Oro documentation to get up-to-date information.

See our Release Process documentation for more information on the currently supported and upcoming releases.

Advanced Configuration

Deployment and Maintenance Configuration

To modify configuration options for maintenance agent, you need to have the orocloud.yaml file placed in the application root. If the application is not yet deployed, modifications can also be made in /mnt/(ocom|ocrm)/app/orocloud.yaml.

Note

Please do not use double quotes for any variables. Use single quotes instead.

Note

Please do not use tabs in orocloud.yaml as indentations as they are treated differently by different editors and tools. Since indentation is crucial for proper interpretation of YAML, use spaces only.

With orocloud.yaml it is possible to override the following nodes:

install_commands

1---
2orocloud_options:
3  deployment:
4    install_commands: # Application commands which run during the installation process
5      - 'oro:install --sample-data=n --user-name=admin --user-email=admin@example.com --user-password=new_password --user-firstname=John --user-lastname=Doe --application-url=https://example.com --organization-name=Oro'

Note

As most of time the deploy operation runs only once, it is recommended to avoid storing any sensitive data (such as email, username, or password) in any files for security purposes. You can omit options like user-name, user-email or user-password. When omitted, they are asked interactively during the deploy operation.

upgrade_commands

1---
2orocloud_options:
3  deployment:
4    upgrade_commands: # Application commands which run during update process
5      - 'oro:platform:update'

git clone configuration

1---
2orocloud_options:
3  deployment:
4    git_clone_recursive: true

Note

Please note that by default, git_clone_recursive: true. Allowed values: true, false.

composer_command

1---
2orocloud_options:
3  deployment:
4    composer_command: '{{composer_cmd}} install --no-dev --optimize-autoloader'

Note

Please note that {{composer_cmd}} is a reserved variable and in most cases during executions it will be replaced with the composer value. Please, keep in mind that the command format is IMPORTANT and should take the following form: {environment variables} {{composer_cmd}} {command} {option1 option2 ... option n}.

For example:

  • ‘{{composer_cmd}} install –no-dev -vvv’

  • ‘COMPOSER=dev.json {{composer_cmd}} install –no-dev -vvv’

Some options may also be omitted as they are added automatically:

  • The –working-dir (-d) option will be ignored because it is added automatically during the deploy | upgrade command.

  • The –no-interaction (-n) option will be ignored because it is added automatically during the deploy | upgrade command.

  • The -v|vv|vvv, –verbose option will be used (if specified) with a higher priority than the same option in the deploy | upgrade command, e.g. orocloud-cli deploy -vv.

after_composer_install_commands

1---
2orocloud_options:
3  deployment:
4    after_composer_install_commands:
5      - 'command1'

db_extensions

1---
2orocloud_options:
3  deployment:
4    db_extensions:
5      - 'uuid-ossp'
6      - 'pgcrypto'

before_backup_create_commands

1---
2orocloud_options:
3  deployment:
4    before_backup_create_commands:
5      - 'command1'
6      - 'command2'

after_backup_create_commands

1---
2orocloud_options:
3  deployment:
4    after_backup_create_commands:
5      - 'command1'
6      - 'command2'

Application Configuration

Custom maintenance page, web backend prefix, and consumers debug mode can be configured the following way. Keep in mind that the web_backend_prefix parameter should start with “/” and should not end with “/”, for instance ‘/admin’:

1---
2orocloud_options:
3  application:
4    maintenance_page: '/mnt/ocom/app/www/maintenance.html'
5    web_backend_prefix: '/my_admin_console_prefix'
6    consumers_debug_mode: true

Note

/mnt/ocom/app/www is the application root path for the OroCommerce application type. For OroCRM, use the /mnt/ocrm/app/www path. The maintenance.html file should be available in application repository in the specified path. When modified, changes are applied after the deploy | upgrade operation in approximately 30 minutes.

Note

Changing the web_backend_prefix value without notifying the Cloud team can break the back-office of the application. Make sure you create a request to Service Desk before making any change. You can also change the value without creating a request. In this case, you should wait for approximately 30 min and then, run cache:rebuild to change the value in the application’s parameters.yml file.

Webserver Configuration

Webserver configuration can be modified, as illustrated below:

 1---
 2orocloud_options:
 3  webserver:
 4    header_x_frame: true
 5    redirects_map:
 6      '/about_us_old': '/about'
 7      '/about_them_old': '/about_them'
 8      '/news/new_event' : 'https://corpsite.com/events/newest'
 9    locations:
10      'root':
11        type: 'php'
12        satisfy: any # Allow access if all (all) or at least one (any) access directive satisfied
13        location: '~ /index\.php(/|$)'
14        auth_basic_enable: true
15        auth_basic_userlist:
16          user1:
17            ensure: 'present'
18            password: 'password1'
19          user2:
20            ensure: 'absent'
21            password: 'password2'
22      'admin':
23        type: 'php'
24        satisfy: any # Allow access if all (all) or at least one (any) access directive satisfied
25        location: '~ /index\.php(/admin|$)'
26        auth_basic_enable: true
27        auth_basic_userlist:
28          user3:
29            ensure: 'present'
30            password: 'password1'
31          user4:
32            ensure: 'absent'
33            password: 'password2'
34        allow:
35          - '127.0.0.1'
36          - '127.0.0.2'
37        deny:
38          - 'all'
39      'de':
40        type: 'php'
41        location: '/de'
42        fastcgi_param:
43          'WEBSITE': '$host/de'
44        allow:
45          - '127.0.0.1'
46          - '127.0.0.2'
47        deny:
48          - 'all'
49      'en':
50        type: 'php'
51        location: '/en'
52        fastcgi_param:
53          'WEBSITE': '$host/en'
54        allow:
55          - '127.0.0.1'
56          - '127.0.0.2'
57        deny:
58          - 'all'
59    access_policy:
60      'ip':
61        'type'  : 'allow'
62        'allow' :
63          - '127.0.0.1'
64          - '192.168.0.1'
65          - '172.16.0.0/16'
66        'deny'  :
67          - '10.0.0.1'
68      'country':
69        'type'  : 'deny'
70        'allow' :
71          - 'US'
72          - 'CA'
73      'ua':
74        'allow' :
75          - 'GoogleStackdriverMonitoring'
76          - 'Some Custom agent'
77        'deny'  :
78          - 'AcoiRobot'
79          - 'Wget'
80      'uri':
81        'allow' :
82          - '~(^/api/(.*))'
83    limit_whitelist:
84      - '8.8.8.8'
85      - '10.1.0.0/22'
86    limit_whitelist_uri:
87      - '~(^/admin/test/(.*))'
88    blackfire_options:
89      agent_enabled : true
90      apm_enabled   : 1
91      server_id     : '<server-id>'
92      server_token  : '<server-token>'
93      log_level     : '1'
94      log_path      : '/var/log/blackfire/agent.log'
95    newrelic_options:
96      license_key: ‘shaike5fith3ieKahn4zae6iedeiphoo7Phoo1ca’

Redirects Configuration

This configuration option enables you to setup redirects to the existing URLs of OroCloud application.

  • redirects_map — the hash where the key is an old URL, and the value is a new URL.

X Frame Header Configuration

  • header_x_frame: true — is the default value of the flag. In this case, OroCloud WAF adds the “X-Frame-Options: SAMEORIGIN” header when responding to the initial request. It makes it impossible to embed any OroCommerce site into iFrame at any site except itself to fulfill security requirements.

Some business cases require embedding the OroCloud site into the iFrame at other sites. You need to set the value to “false” : header_x_frame: false. This prevents WAF from sending the “X-Frame-Options” header which allows embedding into any iFrame.

Locations Configuration

This configuration option is used to manage locations.

  • locations — the hash of hashes. The top key is the location name; the lower keys are:

    • type — location type. Possible values are php, static, rewrite.

    • satisfy — defines how conditions are used. Possible values are all and any.

      • all - all conditions must be met for the specific location (logical and)

      • any - any condition can be met for the specific location (logical or)

    • location — location URI. The value may have regular expressions and modifiers, as it is used in the Nginx location directive.

    • fastcgi_param — the hash for php-specific custom variables.

    • auth_basic_enable — a boolean trigger for HTTP basic authentication.

      • auth_basic_userlist — the hash of hashes with a user name as a key and mandatory nested keys:

        • ensure — ensures if the user is present or absent.

        • password — a plain text user password.

    • allow — an array of IP addresses or network masks allowed to access location. Use one record per line or any to allow access from anywhere.

    • deny — an array of IP addresses or network masks denied to access location. Use one record per line or any to deny access from anywhere.

OroCloud WAF Configuration

Approach

OroCloud provides two ways to protect the application from big amounts of requests which can cause denial of service. There are two layers of protection used by the OroCloud application which are illustrated in the diagram below:

Protection layers used by the OroCloud application

Requests Filtering

This layer is responsible for filtering HTTP requests depending on their sources. The requests can come from certain:

  • IP addresses or networks

  • Countries

  • User Agents

The rules used by this firewall are defined in the access_policy section of the orocloud.yaml file and are explained below. The HTTP request dropped at this layer of protection has HTTP status 451 which is “Unavailable For Legal Reasons”.

Robot Detection

The application drops requests from the user agents which do not support JS effectively protecting from the simple robots. Any request from a client (browser, robot, etc.), which do not support cookies and JS, is dropped with HTTP status 451, and this client is redirected to the error page. It is possible to whitelist specific user agents using the rules described below.

Rate Limiting Request

On this layer, WAF performs rate limiting to detect crawling robots and excessive HTTP requests using the following mechanisms.

Rate limiting algorithm uses 3 parameters: rate limit, delay, and burst. It groups requests by the source IP and destination URI and throttles them to the rate limit if there are more than a delay requests per second for a given group of requests. Nginx drops all consequent requests from a group if their amount is bigger than the burst value. The exact values of these parameters depend on the grouping factor (IP, URI, etc.).

HTTP request dropped at this layer of protection has HTTP status 451 “Unavailable For Legal Reasons”. It is possible to define exceptions for rate limiting using the limit_whitelist and limit_whitelist_uri sections of the orocloud.yaml file.

Rules Definition

WAF Rules

Rules to manage HTTP requests filtering are defined in the following sections of the orocloud.yaml file.

Before implementing changes in this file on production, you should always test it at the environment stage to avoid issues with live application. Also, you can use the following command to check the correctness of the file syntax afterwards:

1ssh user@main_node_ip 'cat /mnt/ocom/app/orocloud.yaml' | yamllint -

Source filtering rules are defined in the webserver section. This is the child element of the orocloud_options data structure. Here is an example of rules definitions:

 1access_policy:
 2      'ip':
 3        'type'  : 'allow'
 4        'allow' :
 5          - '127.0.0.1'
 6          - '192.168.0.1'
 7          - '172.16.0.0/16'
 8        'deny'  :
 9          - '10.0.0.1'
10      'country':
11        'type'  : 'deny'
12        'allow' :
13          - 'US'
14          - 'CA'
15      'ua':
16        'allow' :
17          - 'GoogleStackdriverMonitoring'
18          - 'Some Custom agent'
19        'deny'  :
20          - 'AcoiRobot'
21          - 'Wget'
22      'uri':
23        'allow' :
24          - '~(^/api/(.*))'

access_policy — The hash of hashes provides the ability to manage Oro Web Application Firewall and allow or deny requests depending on the source address, source country, user agent, and URI.

All rejected requests receive status 451.

The following hashes can be used:

  • ip — the hash defines the rules for the source IP filtering.

  • country — the hash defines rules for the originating country filtering. The value of type key defines if the hash contains the allowed or prohibited countries. Country must be defined by ISO 3166 Alpha1 code. GeoIP database is used to define a country from the source IP.

An example of the rule to allow only the defined countries:

1'country':
2  'type'  : 'deny'
3  'allow' :
4    - 'US'
5    - 'CA'

In this example, only the requests from the USA and Canada are allowed. All other requests are rejected.

An example of the rule to deny requests from the defined countries:

1'country':
2  'type'  : 'allow'
3  'deny' :
4    - 'CN'
5    - 'RU'

In this example, all requests from China and Russia are to be rejected.

  • ua — The hash provides the ability to allow or deny requests from the specific user agents. A user agent is defined by the regexp string. There are two possible lists for this hash: allow and deny to allow or deny requests from the listed user agents correspondingly.

An example of the user agent rule:

1'ua':
2  'allow' :
3    - 'GoogleStackdriverMonitoring'
4    - 'Some Custom agent'
5  'deny'  :
6    - 'AcoiRobot'
7    - 'Wget'

This example allows requests from the GoogleStackdriverMonitoring user agent and rejects all requests from AcoiRobot and Wget.

  • uri — The hash provides the ability to allow requests to the specific URI and override the rules defined by other hashes in access_policy. URI can be defined by standard regexp.

An example of the URI rule:

1'uri':
2  'allow' :
3    - '~(^/api/(.*))'

This example allows any requests to the URI which fits ~(^/api/(.*)) regex overriding any rule defined for IP, country, and/or user agent.

Request Rate Limit Rules

There are two lists to allow any rate of requests for the specific IPs or to the specific URIs. They are the child elements of the webserver data structure.

Here is an example:

1limit_whitelist:
2  - '8.8.8.8'
3  - '10.1.0.0/22'
4limit_whitelist_uri:
5  - '~(^/admin/test/(.*))'

limit_whitelist — The list contains source IPs and subnets which are allowed to send requests to the application with any rate. This can be used to whitelist some service IPs which need to perform many requests, e.g., for load testing.

An example of the whitelist:

1limit_whitelist:
2  - '8.8.8.8'
3  - '10.1.0.0/22'

This rule allows unlimited rate of requests from IP 127.0.0.1 (local host) and subnet 10.1.0.0/22.

limit_whitelist_uri — The list contains regular expressions to define URI of the application which must not be limited by request rate. This can be used to whitelist URIs that need to receive many requests, e.g., integration URI.

An example of the whitelist:

1limit_whitelist_uri:
2  - '~(^/admin/test/(.*))'

This rule allows the unlimited rate of requests to URI containing the /admin/test/ string.

Note

Allowing access via WAF does not affect simultaneous connections limits. Use limit_whitelist or limit_whitelist_uri to set unlimited connectios for a client IP or URI on the server.

Profiling Application Console Commands via Blackfire

The configuration option enables you to configure Blackfire.

blackfire_options — The hash is used to configure the Blackfire agent on environment

  • agent_enabled — a boolean trigger for Blackfire installation

  • apm_enabled - the option enables (1) or disables (0) the Blackfire APM feature. Please note that you need to have it included into your license.

  • server_id — a server ID string. Refer your Blackfire account to this value.

  • server_token — a server token string. Refer your Blackfire account to this value.

  • log_level — Blackfire agent log verbosity.

  • log_path — a path to the log file location.

You can then profile the application console commands via configured Blackfire:

1orocloud-cli app:console [command] --blackfire-enable --blackfire-client-id [client-id] --blackfire-client-token [client-token] [--blackfire-env env] [--blackfire-samples count]

Note

Make sure you enable Blackfire via orocloud.yaml before using this functionality.

Profiling Application Using NewRelic

The newrelic_options configuration option allows you to configure NewRelic profiler (must be installed and configured per separate support request). Please, pay attention that the value of the license_key is provided as an example, and you need to use your actual license key there.

Mail Settings

To prevent sending test emails accidentally from the staging environment to any real users or customers, add the domains of email recepients that you will be using for testing to your whitelist:

1---
2orocloud_options:
3  mail:
4    whitelist:
5      - 'example.com'
6      - 'examlpe.org'
7      - 'example.net'

Where:

  • mail is a hash of mail-related settings

  • whitelist is an array of whitelisted mail domains

Note

In production environments all domains are whitelisted. When you create a whitelist, it blocks sending email to any recipients, except for the ones in the whitelisted email domains.

Sanitizing Configuration

Regardless of application type (OroCommerce or OroCRM), each has its own default sanitize rules (sanitize.method.rawsql and sanitize.method.update). However, you can add your own rules, remove a specific default rule, or completely override them.

The sanitize configuration is grouped under the sanitize node and supports the following sanitize methods:

  • sanitize.rawsql_add_rules — the list of raw SQL queries that helps you to sanitize the existing data, for example, delete data using the TRUNCATE method, UPDATE data to apply any custom modification, etc.

  • sanitize.rawsql_delete_rules — the list of raw SQL queries, which should be removed from the list in sanitize.method.rawsql. The format is the same as sanitize.rawsql_add.

  • sanitize.rawsql_override_rules — the list of raw SQL queries, which will be applied to sanitizing data and override default sanitize rule sanitize.method.rawsql. Please note, that if this option is specified, all sanitize.rawsql_add_rules and sanitize.rawsql_delete_rules will be ignored. The format is the same as sanitize.rawsql_add_rules.

  • sanitize.update_add_rules — the mapping between specific table columns and the sanitizing method that should be used for the values.

  • sanitize.update_delete_rules — the list of rules which will be deleted from the list in sanitize.method.update. The format is the same as in sanitize.update_add_rules.

  • sanitize.update_override_rules — the list of rules which will be applied to sanitizing data and overriding the default sanitize rule sanitize.method.update. Please note, that if this option is specified, all sanitize.update_add_rules and sanitize.update_delete_rules will be ignored. The format is the same as sanitize.update_add_rules.

Note

Please keep in mind that ALL values in rawsql_*_rules and update_*_rules MUST be wrapped in SINGLE quotes.

 1---
 2orocloud_options:
 3  deployment:
 4    sanitize:
 5      rawsql_add_rules:
 6        - 'TRUNCATE oro_message_queue_job_unique_test'
 7      rawsql_delete_rules:
 8        - 'TRUNCATE oro_tracking_visit_event'
 9        - 'TRUNCATE oro_tracking_website CASCADE'
10      rawsql_override_rules:
11        - 'TRUNCATE oro_tracking_visit_event'
12        - 'TRUNCATE oro_tracking_website CASCADE'
13      update_add_rules:
14        - '{ table: oro_email_test, columns: [{name: subject, method: md5}, {name: from_name, method: md5}] }'
15      update_delete_rules:
16        - '{ table: oro_integration_transport, columns: [{name: api_key, method: md5},{name: api_user, method: md5},{name: api_token, method: md5}] }'
17      update_override_rules:
18        - '{ table: oro_integration_transport, columns: [{name: api_key, method: md5},{name: api_user, method: md5},{name: api_token, method: md5}] }'
19      custom_email_domain: 'example.com'

General Conventions

Please use the following conventions to design your sanitize.update_* strategy:

  • Provide sanitizing configuration for every table as a new item:

    1update_add_rules:
    2      - '{ table: oro_address, columns: [{name: street, method: md5}, {name: city, method: md5}, {name: postal_code, method: md5}, {name: last_name, method: md5}] }'
    3      - '{ table: oro_business_unit, columns: [{name: email, method: email}, {name: name, method: md5}, {name: phone, method: md5}] }'
    
  • Provide the table name in the table node.

  • In the columns section, provide an array of column name and sanitizing method pairs for all the columns that should be sanitized in the mentioned table.

    For example:

    1columns: [{name: street, method: md5}, {name: city, method: md5} ]
    
  • Provide the column name in the name node. Use the following sanitize methods/strategies (ensure they reasonably match the column type):

    • md5 — Replaces the original string with the string hash.

    • email — Replaces the email with the sanitized version of the email. When the sanitize.custom_email_domain configuration parameter is provided in the deployment.yml or orocloud.yaml files, the email strategy replaces the real email domain with the custom one provided as sanitize.custom_email_domain. If the custom domain is not provided, the sanitized email will be generated randomly. For example, example@example.com.

    • date — Replaces the date values with the current date and time.

    • attachment — Replaces the attachment file content with a dummy blank image.

Elasticsearch Synonyms Configuration

To configure synonyms in Elasticsearch service, use the following field in orocloud.yaml:

1 orocloud_options:
2   elasticsearch:
3     synonyms:
4       'index_name1':
5         - 'foo, bar, baz'
6         - 'spam, eggs, meal'
7         - 'null, void'
8       'index_name2':
9         - 'Alice, Bob, Dave, John'

You can use separate synonym lists for each index, or use ‘*’ as index name in order to apply the same synonyms list to all indices.

1 orocloud_options:
2   elasticsearch:
3     synonyms:
4       '*':
5         - 'foo, bar, baz'
6         - 'spam, eggs, meal'
7         - 'null, void'
8         - 'Alice, Bob, Dave, John'

Note

Please keep in mind that synonyms configuration will be not applied immediately. All changes made in orocloud.yaml require up to 40 minutes to apply. More details for synonyms usage may be found in official Elasticsearch documentation.

Environments Data Synchronization

Cloud-based environments may be synchronized by a user without filing a request to the support team.

To retrieve a list of the environments to which you can sync the sanitized data from the current environment, run the following command:

1 orocloud-cli dump:environments

Note

If you have no environments in the output, ask the support team to update your environment settings.

This means that you can push data from the current environment to the linked environment.

1orocloud-cli dump:create --help
 1Description:
 2  Create application environment data dump and copy it to another environment.
 3
 4Usage:
 5  dump:create [options]
 6
 7Options:
 8      --log=LOG                                Log to file
 9      --downtime-duration[=DOWNTIME-DURATION]  (OPTIONAL) Downtime duration, by default 1 hour. Expected format: '{number}d{number}h{number}m'. Usage example: '1d3h15m' means 1 day 3 hours 15 minutes OR '30m' means 30 minutes.
10      --downtime-comment[=DOWNTIME-COMMENT]    Comment for provided custom downtime value. Required if [downtime-duration] provided. Wrap with double-quotes if contains spaces.
11  -e, --environment[=ENVIRONMENT]              Name of the destination environment where data dump will be copied. To list all available environments, please use dump:environments command.
12  -c, --components[=COMPONENTS]                Comma-separated components list (without spaces) to be included in the dump. Allowed: db,ess,media,code. Default: db. Database is sanitized. If media component selected, it may take much time. [default: "db"]
13  -i, --indices[=INDICES]                      Comma-separated Elastic indices list to be included in the dump. If not set - all indices will be included.
14  -h, --help                                   Display this help message
15  -q, --quiet                                  Do not output any message
16  -V, --version                                Display this application version
17      --ansi                                   Force ANSI output
18      --no-ansi                                Disable ANSI output
19  -n, --no-interaction                         Do not ask any interactive question
20  -v|vv|vvv, --verbose                         Increase the verbosity of messages: 1 for normal output, 2 for more verbose output and 3 for debug
21
22* **option "--environment"** - Name of the destination environment where data dump will be copied.
23
24* **option "--components"** - Comma-separated components list (without spaces) to be included in the dump. Allowed: db,ess,rpm. Default: db. Database is sanitized.
25
26* **option "--indices"** - Comma-separated Elastic indices list to be included in the dump. If not set - all indices will be included.

Note

GridFS media content and RabbitMQ messages sync is not supported. If media component is selected, sync may take a long time.

When data push is done, you may start with import in the target environment.

To list all available data dumps that can be restored to the current environment, run:

1 orocloud-cli dump:list --help
 1 Description:
 2   Lists all available data dumps that can be restored to the current environment.
 3
 4 Usage:
 5   dump:list [options]
 6
 7 Options:
 8       --log=LOG            Log to file
 9       --page=PAGE          Page for display (25 items per page) [default: 1]
10       --per-page=PER-PAGE  Items per page [default: 25]
11   -h, --help               Display this help message
12   -q, --quiet              Do not output any message
13   -V, --version            Display this application version
14       --ansi               Force ANSI output
15       --no-ansi            Disable ANSI output
16   -n, --no-interaction     Do not ask any interactive question
17   -v|vv|vvv, --verbose     Increase the verbosity of messages: 1 for normal output, 2 for more verbose output and 3 for debug

To restore it as is, run the following command in the target environment:

1 orocloud-cli dump:load --help
 1Description:
 2  Load application data from the dump to the current environment.
 3
 4Usage:
 5  dump:load [options] [--] [<timestamp>]
 6
 7Arguments:
 8  timestamp                                    The timestamp of the exported environment list items to be restored.
 9
10Options:
11      --log=LOG                                Log to file
12      --downtime-duration[=DOWNTIME-DURATION]  (OPTIONAL) Downtime duration, by default 1 hour. Expected format: '{number}d{number}h{number}m'. Usage example: '1d3h15m' means 1 day 3 hours 15 minutes OR '30m' means 30 minutes.
13      --downtime-comment[=DOWNTIME-COMMENT]    Comment for provided custom downtime value. Required if [downtime-duration] provided. Wrap with double-quotes if contains spaces.
14      --force[=FORCE]                          Force dump:load operation execution, otherwise the confirmation will be requested. [default: false]
15      --host[=HOST]                            Stop program(s) on specified job host only [ocom-vdrizheruk-dev2-app1], otherwise [all].
16  -c, --components[=COMPONENTS]                Comma-separated list (without spaces) of components for data to be loaded. Allowed: db,ess,media,code. Default: db. Database is sanitized. If media component selected, it may take much time.
17      --skip-purge-media                       Skip purging media on fetch operation
18      --skip-prepare-app                       Skip prepare application operations. With this option application will not be usable after finishing operation.
19      --flush-elasticsearch                    Flush ElasticSearch. All ElasticSearch data will be lost.
20      --run-base-reindex                       Run command [oro:search:reindex] in background.
21      --run-website-reindex                    Run command [oro:website-search:reindex] in background.
22  -h, --help                                   Display this help message
23  -q, --quiet                                  Do not output any message
24  -V, --version                                Display this application version
25      --ansi                                   Force ANSI output
26      --no-ansi                                Disable ANSI output
27  -n, --no-interaction                         Do not ask any interactive question
28  -v|vv|vvv, --verbose                         Increase the verbosity of messages: 1 for normal output, 2 for more verbose output and 3 for debug
29
30* **option "--components"** - Comma-separated list (without spaces) of components for data to be loaded. Allowed: db,ess,rpm. Default: db. Database is sanitized.
31
32* **option "--skip-prepare-app"** - Skip prepare application operations. With this option application will not be usable after finishing operation.
33
34* **option "--flush-elasticsearch"** - Flush ElasticSearch. All ElasticSearch data will be lost.
35
36* **option "--run-base-reindex"** - Run command [oro:search:reindex] in background.
37
38* **option "--run-website-reindex"** - Run command [oro:website-search:reindex] in background.

Note

If during dump:load not all components(db,ess,rpm) are selected, the application may be not working. By default only db will be restored.

Note

During dump:load, the database is always sanitized.