# Configuring Synapse (optional) By default, this playbook configures the [Synapse](https://github.com/matrix-org/synapse) Matrix server, so that it works for the general case. If that's enough for you, you can skip this document. The playbook provides lots of customization variables you could use to change Synapse's settings. Their defaults are defined in [`roles/matrix-synapse/defaults/main.yml`](../roles/matrix-synapse/defaults/main.yml) and they ultimately end up in the generated `/matrix/synapse/config/homeserver.yaml` file (on the server). This file is generated from the [`roles/matrix-synapse/templates/synapse/homeserver.yaml.j2`](../roles/matrix-synapse/templates/synapse/homeserver.yaml.j2) template. **If there's an existing variable** which controls a setting you wish to change, you can simply define that variable in your configuration file (`inventory/host_vars/matrix./vars.yml`) and [re-run the playbook](installing.md) to apply the changes. Alternatively, **if there is no pre-defined variable** for a Synapse setting you wish to change: - you can either **request a variable to be created** (or you can submit such a contribution yourself). Keep in mind that it's **probably not a good idea** to create variables for each one of Synapse's various settings that rarely get used. - or, you can **extend and override the default configuration** ([`homeserver.yaml.j2`](../roles/matrix-synapse/templates/synapse/homeserver.yaml.j2)) by making use of the `matrix_synapse_configuration_extension_yaml` variable. You can find information about this in [`roles/matrix-synapse/defaults/main.yml`](../roles/matrix-synapse/defaults/main.yml). - or, if extending the configuration is still not powerful enough for your needs, you can **override the configuration completely** using `matrix_synapse_configuration` (or `matrix_synapse_configuration_yaml`). You can find information about this in [`roles/matrix-synapse/defaults/main.yml`](../roles/matrix-synapse/defaults/main.yml). ## Load balancing with workers To have Synapse gracefully handle thousands of users, worker support should be enabled. It factors out some homeserver tasks and spreads the load of incoming client and server-to-server traffic between multiple processes. More information can be found in the [official Synapse workers documentation](https://github.com/matrix-org/synapse/blob/master/docs/workers.md). To enable Synapse worker support, update your `inventory/host_vars/matrix.DOMAIN/vars.yml` file: ```yaml matrix_synapse_workers_enabled: true ``` We support a few configuration presets (`matrix_synapse_workers_preset: one-of-each` being the default configuration): - `little-federation-helper` - a very minimal worker configuration to improve federation performance - `one-of-each` - one worker of each supported type If you'd like more customization power, you can start with one of the presets and tweak various `matrix_synapse_workers_*_count` variables manually. If you increase worker counts too much, you may need to increase the maximum number of Postgres connections too (example): ```yaml matrix_postgres_process_extra_arguments: [ "-c 'max_connections=200'" ] ``` If you're using the default setup (the `matrix-nginx-proxy` webserver being enabled) or you're using your own `nginx` server (which imports the configuration files generated by the playbook), you're good to go. If you use some other webserver, you may need to tweak your reverse-proxy setup manually to forward traffic to the various workers. In case any problems occur, make sure to have a look at the [list of synapse issues about workers](https://github.com/matrix-org/synapse/issues?q=workers+in%3Atitle) and your `journalctl --unit 'matrix-*'`. ## Synapse Admin Certain Synapse administration tasks (managing users and rooms, etc.) can be performed via a web user-interace, if you install [Synapse Admin](configuring-playbook-synapse-admin.md). ## Synapse + OpenID Connect for Single-Sign-On If you'd like to use OpenID Connect authentication with Synapse, you'll need some additional reverse-proxy configuration (see [our nginx reverse-proxy doc page](configuring-playbook-nginx.md#synapse-openid-connect-for-single-sign-on)). In case you encounter errors regarding the parsing of the variables, you can try to add `{% raw %}` and `{% endraw %}` blocks around them. For example ; ```yaml - idp_id: keycloak idp_name: "Keycloak" issuer: "https://url.ix/auth/realms/x" client_id: "matrix" client_secret: "{{ vault_synapse_keycloak }}" scopes: ["openid", "profile"] authorization_endpoint: "https://url.ix/auth/realms/x/protocol/openid-connect/auth" token_endpoint: "https://url.ix/auth/realms/x/protocol/openid-connect/token" userinfo_endpoint: "https://url.ix/auth/realms/x/protocol/openid-connect/userinfo" user_mapping_provider: config: display_name_template: "{% raw %}{{ user.given_name }}{% endraw %} {% raw %}{{ user.family_name }}{% endraw %}" email_template: "{% raw %}{{ user.email }}{% endraw %}" ``` ## Synapse S3 Storage Provider If you'd like to use Synapse with [Amazon S3](https://aws.amazon.com/s3/) an other S3-compatible storage backends. This method is implementing the [S3 module for Synapse](https://github.com/matrix-org/synapse-s3-storage-provider) > Enabling the module will force the Synapse Container to [self-build](/docs/self-building.md) because of the S3 module installation. > So it is necessary that you don't set the `matrix_synapse_container_image_self_build` to false! You need to enable S3 support in the config as followed: ```yaml # To enable the Module matrix_synapse_media_storage_provider_s3_enabled: true # Connection information matrix_synapse_media_storage_provider_s3_bucket: "" matrix_synapse_media_storage_provider_s3_access_key_id: "" matrix_synapse_media_storage_provider_s3_secret_access_key: "" ``` For Amazon S3 Users you can set the S3 region with the key: ```yaml # To set the S3 Region. Default value is eu-central-1 matrix_synapse_s3_media_store_region_name: "eu-central-1" ``` To set a custom S3 Endpoint (MinIO): ```yaml # To set the S3 Endpoint URL. Defaults to AmazonS3 matrix_synapse_s3_media_store_endpoint_url: "https://..." ``` To set the S3 Storage Class [a list of Amazons Storage Classes](https://aws.amazon.com/s3/storage-classes/): ```yaml # S3 Storage Classes. Defaults to STANDARD matrix_synapse_s3_media_store_storage_class: "STANDARD" ```