This topic provides guidance on the following actions:
The installer provides a single-node installation process.
The following tools and components are required in order to install Anaconda Team Edition:
Any Linux variant capable of supporting Docker (RHEL 7.x/CentOS)
Docker Engine 1.13.1+ or Docker CE/EE 17.04+ (Supports Compose format 3.1)
Docker Compose 1.11.0+ (Supports Compose format 3.1)
If SELinux is enabled, it cannot be in enforcing mode
Optional: TLS/SSL certs and DNS are ready (more information below)
The installer is a self-extracting binary (ate-x.x.x-installer.sh, where x.x.x is the version number) that contains the necessary components to run Anaconda Teams services. The basic requirements prior to installation are:
A host Linux operating system that can run the installer binary
Docker running on the host
Docker Compose installed and available on the command line
500GB storage space
Optional: TLS/SSL certificate requirements
Team Edition can use certificates to provide transport layer security for the cluster. It is required to have your TLS/SSL certs prior to installation, otherwise self-signed certificates can be generated during the initial installation. You can configure the platform to use organizational TLS/SSL certificates after completing the installation.
You may purchase certificates commercially, use Let’s Encrypt, or generate them using your organization’s internal public key infrastructure (PKI) system. When using an internal PKI-signed setup, the CA certificate is stored on the file system. You will need to make sure that the root certificate of your certificate authority is trusted by the server running the application and the workstations used by users of the application.
In either case, the configuration will include the following:
A certificate for the root certificate authority (CA)
An intermediate certificate chain
A server certificate
A private server key
Optional: DNS requirements
Web browsers use domain names and web origins to separate sites, so they cannot tamper with each other. If you want to use DNS, you must have it ready prior to installation. This DNS name is what users will use to access the application.
External — accessible outside of server
It is important to protect all services running on the node from outside access. The exceptions are as shown below:
:80nginx - only if you are using HTTP
:443nginx - only if you are using HTTPS
:22ssh - optional; only if you need SSH
Internal — accessible only within server
This is only necessary in a multi-node install. Please contact your implementation representative for more information.
Anaconda Team Edition uses several ports for internal communication between components. These ports do not need to be open to the end user.
:5000repo - Team Edition API
:5002repo-proxy - Team Edition file serving API proxy
:5000repo-dispatcher - Team Edition event dispatcher/handler (exposed only for prometheus metrics)
:5000repo-worker - Team Edition scheduled jobs worker (exposed only for prometheus metrics)
:8080keycloak - keycloak’s
/auth/*endpoints are proxied in Nginx
:5432postgres - Postgresql database used by Team Edition and Keycloak
:6379redis - Redis instance used by Team Edition services
:9090prometheus - Prometheus is proxied in Nginx at
By default, Anaconda Team Edition will install internal instances of Postgres and Redis databases.
To change the
postgres user password, run
\password postgres when in the shell of the postgres container.
To change the
redis user password, follow the instructions under Troubleshooting.
If you are providing your own Postgres and/or Redis databases running on host(s) separate from Anaconda Team Edition, you can connect on the ports above. For example, if you already have a Postgres database, it can connect over port 5432. The port numbers for Postgres and Redis are also configurable during installation to suit your existing environment.