Skip to main content

Sider Enterprise Configuration

Sider Enterprise depends on other services, such as MySQL, so its configuration is important to ensure working well. This document describes the details about Sider Enterprise configurations.


{tag} on this page is a Docker image tag for Sider Enterprise. Please replace it with the actual value.

Core parameters#

These parameters are not related to other services, like MySQL.

  • RAILS_ENV - (Required) The environment for Ruby on Rails framework. You must set onprem to the parameter.

  • SECRET_KEY_BASE - (Required) The secret for encryption required by Ruby on Rails. You can get the value running the following command:

    python -c 'import secrets; print(secrets.token_hex(64))'

    Or, you can get the value via Ruby:

    ruby -r securerandom -e 'puts(SecureRandom.hex(64))'
  • BASE_URL - (Required) The URL to allow end-users to access Sider. e.g.,

  • ENCRYPTION_SERVICE_KEY - (Required) The random string to encrypt secret data, which can be given by running the following command. Note you cannot change this value once you set up.

    tr -dc '[:alnum:]' < /dev/urandom | head -c 32
  • ENCRYPTION_SERVICE_SALT - (Required) 32 bytes random string to use for ENCRYPTION_SERVICE_KEY as a salt, which can be given by running the following command. Note you cannot change this value once you set up.

    tr -dc '[:alnum:]' < /dev/urandom | head -c 32
  • RESTRICT_SIGN_UP - (Optional) The boolean to control if users can sign up by themselves. If the parameter is true, the administrators of Sider Enterprise will have to register users. See Operation for registering users.

  • SIDECI_TIMEZONE - (Optional) The timezone used for admin console. This does not affect the time formats for Sider Enterprise end-users. See ActiveSupport::TimeZone for more details. e.g., Asia/Tokyo.

  • FORCE_SSL - (Optional) The boolean to control if sideci-web should make end-users always access via HTTPS. The default value is false.

  • PUMA_PERSISTENT_TIMEOUT - (Optional) The integer to control Keep-Alive timeout of sideci-web. If you place a load balancer in front of sideci-web and its idle timeout is huge, you should consider configuring this value. The default value is 75.

  • EXTRA_CERTIFICATE - (Optional) The base64 encoded PEM certificate. Set this parameter if your GitHub Enterprise Server is running with a self-signed certificate or one issued from your own certificate authority.


Sider Enterprise completely depends on MySQL. You should carefully set up the parameters to accord with the actual MySQL configuration. Read MySQL for how to configure a MySQL server.

  • DATABASE_URL - (Required) The URL to connect the MySQL server. See the document about the format.


Sider Enterprise uses Redis for page caching and storing background job data, so the parameters in this section are important. See Redis to get to know how you should set up a Redis server.

  • REDIS_URL - (Required) The URL to connect the Redis server. The format of this parameter must be redis[s]://USER:PASSWORD@REDIS_HOST:REDIS_PORT/DB_NUMBER. e.g., redis://

GitHub Enterprise Server#

You have to configure these parameters to integrate with GitHub Enterprise Server. After setting up your GitHub App, prepare these parameters carefully.

  • GITHUB_ENDPOINT - (Required) The URL which points to the GitHub Enterprise web page. e.g.,

  • GITHUB_API_ENDPOINT - (Required) The URL which points to the GitHub Enterprise API endpoint. Basically, the suffix of this URL must be /api/v3. See Endpoint URLs to learn more about the GitHub Enterprise endpoints. e.g.,

  • GITHUB_APP_ID - (Required) The application ID of the GitHub App. This will be given after setting up your GitHub App. See GitHub Enterprise Server for registering a GitHub App.

  • GITHUB_APP_NAME - (Required) The application name of the GitHub App. You can find the name in the Public link of the GitHub App. For example, when the Public link is, this parameter should be sider-enterprise.

  • GITHUB_APP_PRIVATE_KEY - (Required) The base64 encoded private key of the GitHub App. You can download the private key file from your GitHub App. Note Sider Enterprise requires you to pass the Base64 encoded key; you can get the value running base64(1) like this:

    base64 -w0 downloaded-private-key.pem
  • GITHUB_APP_OAUTH2_CLIENT_ID - (Required) The client ID of the GitHub App. This will be given after setting up your GitHub App.

  • GITHUB_APP_OAUTH2_CLIENT_SECRET - (Required) The client secret of the GitHub App. This will be given after setting up your GitHub App.

  • GITHUB_APP_WEBHOOK_SECRET - (Required) The webhook secret of the GitHub App. You must set the same value with the webhook secret of your GitHub App. If you forget the value, you must regenerate and set the value on your GitHub App settings. Note this secret is supposed to be generated by you. For example, you can get the value executing the command:

    tr -dc '[:alnum:]' < /dev/urandom | head -c 32

Runners and MinIO#

The core component sideci will invoke Runners to perform analyses. The parameters in this section control how Sider should invoke Runners, and how the traces generated by Runners should be stored. See MinIO for the set up of MinIO.

  • RUNNERS_TRACES_S3_BUCKET_NAME - (Required) The bucket name for Runners traces. Runners upload analysis traces to the bucket on MinIO.

  • AWS_REGION_FOR_SIDER - (Optional, but required for Amazon S3) AWS region name, such as "us-east-1." If you want to use an Amazon S3 bucket for Runners traces, you MUST specify this environment variable. The default value is us-east-1.

  • DOCKER_RUNNERS_CONFIG - (Required) The JSON string to specify how to access to Runners and MinIO. The structure of this must be like this:

    {  "docker_host_url": "unix:///var/run/docker.sock",  "s3_endpoint": "",  "aws_access_key_id": "key",  "aws_secret_access_key": "password",  "network_mode": "bridge"}
    • docker_host_url - (Required) The Docker host endpoint. sideci will invoke Runners via this URL. e.g., unix:///var/run/docker.sock, tcp://

    • s3_endpoint - (Optional) The URL of MinIO. sideci and Runners will access to the specified endpoint. If you omit the parameter, Sider Enterprise assumes that the traces should be put on Amazon S3 instead of MinIO. e.g.,

    • aws_access_key_id - (Required) AWS Access Key ID. This is used by Runners to access MinIO or Amazon S3.

    • aws_secret_access_key - (Required) AWS Secret Access Key. This is used by Runners to access MinIO or Amazon S3.

    • network_mode - (Required) This is equivalent to the --network option of docker run. If you provision MinIO server on the instance outside of Runners, you should set bridge to the parameter. However, you must set the container name or the network name of Docker to make sure Runners can access to MinIO within the same network. Learn more Network settings for Docker networking.

    • http_proxy - (Optional) The proxy server domain. You need to set the parameter if your Sider Enterprise is within a proxy environment. See also HTTP proxy.

    • https_proxy - (Optional) The proxy server domain. You need to set the parameter if your Sider Enterprise is within a proxy environment. See also HTTP proxy.

    • no_proxy - (Optional) The list of domains that should be excluded from the proxy targets. If you set the http_proxy and https_proxy parameters above, the no_proxy parameter may also have to be set. For example, s3_endpoint is set with http://minio:9000, then no_proxy should be set with minio if Runners should access to MinIO without a proxy server. See also HTTP proxy.

    • extra_hosts - (Optional) The list of extra hosts. Use this parameter if you want to add extra lines to /etc/hosts in Runners' containers. This parameter is equivalent to the extra_hosts option of Docker Compose. This parameter should be set as a format of ["hostname:IP"] if it's specified.

SMTP - Make Sider Enterprise send emails#

Sider Enterprise supports sending emails. You can get error notifications via Emails with these configurations.

  • ACTION_MAILER_SMTP_ADDRESS - (Optional) The SMTP server address. e.g.,

  • ACTION_MAILER_DEFAULT_FROM_EMAIL - (Optional) The FROM address of emails sent from Sider. e.g.,

  • ACTION_MAILER_SMTP_PORT - (Optional) The SMTP server port number. The default value is 25. e.g., 125.

  • ACTION_MAILER_SMTP_AUTHENTICATION - (Optional) The SMTP server authentication method. The valid value is plain, login, or cram_md5.

  • ACTION_MAILER_SMTP_USER_NAME - (Optional) The user name for SMTP authentication.

  • ACTION_MAILER_SMTP_USER_PASSWORD - (Optional) The user password for SMTP authentication.

  • ACTION_MAILER_SMTP_DOMAIN - (Optional) The domain name for HELO command.

  • ACTION_MAILER_SMTP_ENABLE_STARTSSL_AUTO - (Optional) The boolean to control if Sider Enterprise uses STARTTLS. The default value is true.

  • EXCEPTION_NOTIFIER_RECIPIENT_EMAILS - (Optional) The comma-separated list of recipients for error reporting emails. e.g.,,

Auto-Refresh Pages#

Sider Enterprise can detect events that happened in the server and updates its content automatically. End-users don't have to reload their browser to update their pages. Sider Enterprise uses two mechanisms to implement this: Pusher and polling.

If you want to use Pusher, sign up to Pusher and set up the PUSHER_* variables below.

If you leave the PUSHER_* variables empty, Pusher will be disabled, and Sider Enterprise will work only with polling. You can configure the polling interval with FRONTEND_POLLING_INTERVAL: fine-tune the value for both UI responsiveness and the server load.

  • PUSHER_API_ID - (Optional) The Pusher API ID.

  • PUSHER_API_KEY - (Optional) The Pusher API Key.

  • PUSHER_API_SECRET - (Optional) The Pusher API Secret.

  • PUSHER_CLUSTER - (Optional) The Pusher cluster.

  • FRONTEND_POLLING_INTERVAL - (Optional) The polling interval in seconds. The default value is 30, which means each browser calls Ajax requests every 30 seconds. e.g., 60.

Configuring cron jobs#

Sider Enterprise relies on GitHub Enterprise Server, so you should configure a cron job to synchronize data between them. Also, it is recommended to clean up Docker containers since Runners containers won't be deleted. That's why Sider Enterprise provides a Rake task for the periodic job. For example, you can set this command on each host node.

docker run \  --rm \  --env-file={env_file} \  --volume=/var/run/docker.sock:/var/run/docker.sock \{tag} \  bundle exec rails onprem:batch:daily

HTTP Proxy#

If you have to provision Sider Enterprise within a proxy environment, the HTTP proxy configurations are required. There are two settings to be configured:

  • Configure the Docker client if you run Sider on Docker
  • Set http_proxy, https_proxy, and no_proxy in DOCKER_RUNNERS_CONFIG (See the above configuration for more details)

This is an example of ~/docker/config.json file.

{  "proxies": {    "default": {      "httpProxy": "",      "httpsProxy": "",      "noProxy": ""    }  }}

Also, you should configure http_proxy, https_proxy, and no_proxy in DOCKER_RUNNERS_CONFIG to make sure each runner can access external servers via your HTTP proxy. See also Runners and MinIO for more details.

Domain names you should allow#

Most Runners try to connect to the internet in order to resolve the dependency for the analyses. Consider allowing Runners to access the list of domain names below if you want to use Sider Enterprise fully.

  • *

On top of those, you might have to allow Runners to connect to your Git servers.