Init
sfp server init
sfp server initUSAGE
$ sfp server init -t <value> [--json] [--compose-file <value>] [-f] [-i] [--worker-counts <value>]
[--config-file ./server-config.json] [--base-dir <value>] [-d <value> -m dev|prod] [--no-caddy] [--passphrase
<value> [--identity-file <value> --ssh-connection <value>]] [--infisical-token <value> --secrets-provider
infisical|aws-secretsmanager|custom] [--aws-region <value> ] [--aws-access-key-id <value> ] [--aws-secret-access-key
<value> ] [-g <value>...] [--loglevel trace|debug|info|warn|error|fatal|TRACE|DEBUG|INFO|WARN|ERROR|FATAL]
FLAGS
-d, --domain=<value>
Domain name for the server (required in prod mode)
-f, --force
Force create the tenant even if it already exists
-g, --logsgroupsymbol=<value>...
Symbol used by CICD platform to group/collapse logs in the console. Provide an opening group, and an optional
closing group symbol.
-i, --[no-]interactive
Run in interactive mode to prompt for secrets
-m, --mode=<option>
[default: prod] Mode of the server (development, production)
<options: dev|prod>
-t, --tenant=<value>
(required) Name of the tenant to be used for initialization
--aws-access-key-id=<value>
AWS access key ID. Optional when secrets-provider is "aws-secretsmanager" (can use instance profile).
--aws-region=<value>
AWS region for Secrets Manager. Required only when secrets-provider is "aws-secretsmanager".
--aws-secret-access-key=<value>
AWS secret access key. Optional when secrets-provider is "aws-secretsmanager" (can use instance profile).
--base-dir=<value>
[default: ./sfp-server] Base directory which contains the sfp-server
--compose-file=<value>
Custom docker-compose file to use for the server setup
--config-file=./server-config.json
Path to JSON config file containing server configuration values
--identity-file=<value>
Path to SSH private key file
--infisical-token=<value>
Infisical API token. Required only when secrets-provider is "infisical".
--loglevel=<option>
[default: info] logging level for this command invocation
<options: trace|debug|info|warn|error|fatal|TRACE|DEBUG|INFO|WARN|ERROR|FATAL>
--no-caddy
Disable Caddy reverse proxy (app will be accessible directly on port 3029)
--passphrase=<value>
Passphrase for the SSH private key if required
--secrets-provider=<option>
[default: custom] Secret provider to use for managing secrets. Available options:
- infisical: Use Infisical as secrets provider
- aws-secretsmanager: Use AWS Secrets Manager
- custom: Use environment variables (suitable when using external tools like "infisical run" or AWS CLI)
<options: infisical|aws-secretsmanager|custom>
--ssh-connection=<value>
SSH connection string in the format user@host[:port]
--worker-counts=<value>
Number of workers for critical,normal,batch queues (comma separated)
GLOBAL FLAGS
--json Format output as json.
DESCRIPTION
Initialize a new SFP server instance
Secrets Management:
This command supports multiple options for secrets management:
- infisical: Use Infisical as a dedicated secrets manager
- aws-secretsmanager: Use AWS Secrets Manager
- custom: Use environment variables (recommended when using tools like "infisical run" or AWS CLI)
For custom secrets provider, inject secrets as environment variables before running the command.
Example: infisical run -- sfp server init --tenant my-app --secrets-provider custom
EXAMPLES
$ sfp server init --tenant my-app
$ sfp server init --tenant my-app --mode prod --secrets-provider infisical
$ sfp server init --tenant my-app --mode prod --secrets-provider custom
$ sfp server init --tenant my-app --mode prod --secrets-provider aws-secretsmanager --aws-region us-east-1
$ sfp server init --tenant my-app --force
$ sfp server init --tenant my-app --ssh-host remote-server --ssh-username admin
$ sfp server init --tenant my-app --config-file ./server-config.jsonLast updated
Was this helpful?