Compare commits

...

31 Commits

Author SHA1 Message Date
c8723c981e update description 2024-05-14 23:08:11 +02:00
2e79bebcc4 1.0.16 2019-11-02 00:18:12 +01:00
9ca2f652d3 fix(core): update 2019-11-02 00:18:11 +01:00
9a26ddc52e 1.0.15 2019-11-01 23:51:38 +01:00
47001d0b27 fix(core): update 2019-11-01 23:51:38 +01:00
1f1e16f471 1.0.14 2019-11-01 23:22:23 +01:00
772c3a10ea fix(core): update 2019-11-01 23:22:23 +01:00
b03c2fb16e 1.0.13 2019-11-01 22:54:49 +01:00
2acd511608 fix(core): update 2019-11-01 22:54:49 +01:00
ef21de6739 1.0.12 2019-11-01 22:53:34 +01:00
e217fc48f1 fix(core): update 2019-11-01 22:53:34 +01:00
5d87422fa3 1.0.11 2019-11-01 18:26:03 +01:00
596fd929fa fix(core): update 2019-11-01 18:26:02 +01:00
06bdb924a1 1.0.10 2019-11-01 14:19:35 +01:00
8fc700fd85 fix(core): update 2019-11-01 14:19:34 +01:00
c39acf4a68 1.0.9 2019-11-01 13:15:48 +01:00
e32cf42a65 fix(core): update 2019-11-01 13:15:47 +01:00
6f4bafada1 1.0.8 2019-11-01 13:10:35 +01:00
0e15004997 fix(core): update 2019-11-01 13:10:35 +01:00
Philipp Kunz
877fd08bae 1.0.7 2019-10-30 19:19:55 +01:00
Philipp Kunz
5fc8b1e769 fix(core): update 2019-10-30 19:19:55 +01:00
Philipp Kunz
5dad6bcfb8 1.0.6 2019-10-30 19:17:42 +01:00
Philipp Kunz
2505abdf7c fix(core): update 2019-10-30 19:17:41 +01:00
Philipp Kunz
c59a176059 1.0.5 2019-10-30 19:16:37 +01:00
Philipp Kunz
52f370931e fix(core): update 2019-10-30 19:16:37 +01:00
Philipp Kunz
53572dc470 1.0.4 2019-10-30 19:15:26 +01:00
Philipp Kunz
0b38e1aebc fix(core): update 2019-10-30 19:15:25 +01:00
2ac09687dc 1.0.3 2019-08-08 13:47:50 +02:00
86358dbb12 fix(core): update 2019-08-08 13:47:49 +02:00
a06882d4f8 1.0.2 2018-01-24 17:12:40 +01:00
5bc8e066c6 fix readme and nginx config 2018-01-24 17:12:27 +01:00
12 changed files with 276 additions and 125 deletions

22
.gitignore vendored Normal file
View File

@ -0,0 +1,22 @@
.nogit/
# artifacts
coverage/
public/
pages/
# installs
node_modules/
# caches
.yarn/
.cache/
.rpt2_cache
# builds
dist/
dist_web/
dist_serve/
dist_ts_web/
# custom

View File

@ -1,71 +1,61 @@
# gitzone docker
image: hosttoday/ht-docker-dbase:npmci
services:
- docker:dind
variables:
DOCKER_DRIVER: overlay
# gitzone ci_docker
image: registry.gitlab.com/hosttoday/ht-docker-node:npmci
cache:
paths:
- .npmci-cache/
key: '$CI_BUILD_STAGE'
before_script:
- npmci npm prepare
stages:
- buildAndTest
- build
- test
- release
- trigger
- pages
before_script:
- yarn global add npmci
- npmci docker login
buildAndTest:
stage: buildAndTest
script:
- npmci docker build
- npmci docker test
except:
- tags
- triggers
tags:
- lossless
- priv
build:
stage: build
script:
- npmci docker build
- npmci docker push registry.gitlab.com test
only:
- tags
- triggers
tags:
- lossless
- priv
test:
testStable:
stage: test
script:
- npmci docker pull registry.gitlab.com test
- npmci docker test
only:
- tags
- triggers
- npmci npm prepare
- npmci node install stable
- npmci npm install
- npmci npm test
coverage: /\d+.?\d+?\%\s*coverage/
tags:
- lossless
- priv
- docker
testBuild:
stage: test
script:
- npmci npm prepare
- npmci node install stable
- npmci npm install
- npmci command npm run build
coverage: /\d+.?\d+?\%\s*coverage/
tags:
- lossless
- docker
- notpriv
release:
image: registry.gitlab.com/hosttoday/ht-docker-dbase:npmci
services:
- docker:stable-dind
stage: release
script:
- npmci docker pull registry.gitlab.com test
- npmci docker push docker.io
- npmci node install stable
- npmci docker login
- npmci docker build
- npmci docker test
- npmci docker push registry.gitlab.com
only:
- tags
- triggers
tags:
- lossless
- docker
- priv
trigger:
@ -74,24 +64,6 @@ trigger:
- npmci trigger
only:
- tags
- triggers
tags:
- lossless
- priv
pages:
before_script:
- 'npmci -v'
image: hosttoday/ht-docker-node:npmci
stage: pages
script:
- npmci command yarn global add npmpage
- npmci command npmpage
only:
- tags
tags:
- docker
artifacts:
expire_in: 1 week
paths:
- public

View File

@ -1,2 +1,2 @@
FROM blacktop/elastic-stack:latest
COPY ./ssl.kibana.conf /etc/nginx/conf.d/
COPY ./nginx.conf /etc/nginx/conf.d/kibana.conf

27
nginx.conf Normal file
View File

@ -0,0 +1,27 @@
server {
listen [::]:3000 default_server;
listen *:3000 default_server;
location / {
proxy_pass http://127.0.0.1:5601;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_cache_bypass $http_upgrade;
}
}
server {
listen [::]:3001 default_server;
listen *:3001 default_server;
location / {
proxy_pass http://127.0.0.1:9200;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_cache_bypass $http_upgrade;
}
}

32
npmextra.json Normal file
View File

@ -0,0 +1,32 @@
{
"gitzone": {
"module": {
"githost": "code.foss.global",
"gitscope": "hosttoday",
"gitrepo": "ht-docker-elk",
"shortDescription": "elastic stack with full basic authentication",
"npmPackagename": "@hosttoday/ht-docker-node",
"license": "MIT",
"description": "A Docker image for running the Elastic Stack with added support for full basic authentication.",
"keywords": [
"Elastic Stack",
"Docker",
"Basic Authentication",
"Security",
"Elasticsearch",
"Logstash",
"Kibana",
"Containerization"
]
}
},
"npmci": {
"dockerRegistries": [
"docker.io",
"registry.gitlab.com"
]
},
"tsdoc": {
"legal": "\n## License and Legal Information\n\nThis repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license) file within this repository. \n\n**Please note:** The MIT License does not grant permission to use the trade names, trademarks, service marks, or product names of the project, except as required for reasonable and customary use in describing the origin of the work and reproducing the content of the NOTICE file.\n\n### Trademarks\n\nThis project is owned and maintained by Task Venture Capital GmbH. The names and logos associated with Task Venture Capital GmbH and any related products or services are trademarks of Task Venture Capital GmbH and are not included within the scope of the MIT license granted herein. Use of these trademarks must comply with Task Venture Capital GmbH's Trademark Guidelines, and any usage must be approved in writing by Task Venture Capital GmbH.\n\n### Company Information\n\nTask Venture Capital GmbH \nRegistered at District court Bremen HRB 35230 HB, Germany\n\nFor any legal inquiries or if you require further information, please contact us via email at hello@task.vc.\n\nBy using this repository, you acknowledge that you have read this section, agree to comply with its terms, and understand that the licensing of the code does not imply endorsement by Task Venture Capital GmbH of any derivative works.\n"
}
}

5
package-lock.json generated Normal file
View File

@ -0,0 +1,5 @@
{
"name": "ht-docker-elk",
"version": "1.0.16",
"lockfileVersion": 1
}

View File

@ -1,10 +1,11 @@
{
"name": "ht-docker-elk",
"version": "1.0.1",
"description": "elastic stack with full basic authentication",
"version": "1.0.16",
"description": "A Docker image for running the Elastic Stack with added support for full basic authentication.",
"main": "index.js",
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
"test": "echo \"Error: no test specified\"",
"build": "echo \"Not needed for now\""
},
"repository": {
"type": "git",
@ -15,5 +16,27 @@
"bugs": {
"url": "https://gitlab.com/hosttoday/ht-docker-elk/issues"
},
"homepage": "https://gitlab.com/hosttoday/ht-docker-elk#README"
}
"homepage": "https://gitlab.com/hosttoday/ht-docker-elk#README",
"private": true,
"files": [
"ts/**/*",
"ts_web/**/*",
"dist/**/*",
"dist_web/**/*",
"dist_ts_web/**/*",
"assets/**/*",
"cli.js",
"npmextra.json",
"readme.md"
],
"keywords": [
"Elastic Stack",
"Docker",
"Basic Authentication",
"Security",
"Elasticsearch",
"Logstash",
"Kibana",
"Containerization"
]
}

1
readme.hints.md Normal file
View File

@ -0,0 +1 @@

92
readme.md Normal file
View File

@ -0,0 +1,92 @@
# ht-docker-elk
elastic stack with full basic authentication
## Install
To use the `ht-docker-elk` in your project, you need Docker installed on your machine. If Docker is not yet installed, follow the installation instructions for your specific operating system on the [official Docker website](https://docs.docker.com/get-docker/).
Once Docker is up and running, you can proceed with the setup of `ht-docker-elk`. Since this project is set to private, and the setup may require access to a proprietary or internal registry, ensure you have the necessary permissions or access tokens to pull the Docker image.
## Usage
The `ht-docker-elk` project provides an easy and secure way to deploy the Elastic Stack with full basic authentication. This section will cover several use cases and show how to utilize the project effectively in different scenarios, ensuring you can leverage the full suite of features offered by the Elastic Stack, securely and efficiently.
### Basic Setup
To get started, you'll need to run the Docker container provided by `ht-docker-elk`. This can be achieved by executing the following command in your terminal:
```typescript
docker run --rm -d --name elstack \
-p 3000:3000 -p 9200:9201 \
-e SSL=true \
-e ELSK_USER="anyuser" \
-e ELSK_PASS="anypass" \
registry.gitlab.com/hosttoday/ht-docker-elk
```
This command accomplishes the following:
- Starts a Docker container in detached mode (`-d`) and names it `elstack`.
- Maps port `3000` on the host to port `3000` on the container, and port `9200` on the host to port `9201` on the container. These ports are essential for accessing Kibana and Elasticsearch, respectively.
- Enables SSL encryption (`SSL=true`) for secure communication.
- Sets up basic authentication with the given username (`ELSK_USER`) and password (`ELSK_PASS`).
### Advanced Configuration
Assuming more advanced configurations are not omitted from this template due to its conciseness, an advanced use case might involve setting up persistent storage for Elasticsearch or configuring custom Kibana plugins. For persistent storage, you would typically use Docker volumes:
```typescript
docker run --rm -d --name elstack \
-p 3000:3000 -p 9200:9201 \
-e SSL=true \
-e ELSK_USER="anyuser" \
-e ELSK_PASS="anypass" \
-v my-elasticsearch-data:/usr/share/elasticsearch/data \
registry.gitlab.com/hosttoday/ht-docker-elk
```
This example attaches a volume named `my-elasticsearch-data` to the Elasticsearch data directory inside the container, ensuring that your data persists across container restarts.
For configuring custom Kibana plugins, one might need to build a custom Docker image based on `ht-docker-elk`, where the Dockerfile includes steps to install additional plugins. This could look something like this:
```Dockerfile
FROM registry.gitlab.com/hosttoday/ht-docker-elk
# Example: Installing a custom Kibana plugin
RUN kibana-plugin install <plugin-url>
```
### Monitoring & Management
Utilizing the capabilities of the Elastic Stack, you may want to enable features like monitoring or alerting to keep an eye on the health and performance of your deployment. Enabling X-Pack monitoring within the Elasticsearch and Kibana can provide deep insights into your stack's operation.
Given the project's setup, specific configuration files would need to be adjusted to enable and configure these features, typically by mounting a custom configuration file into the Docker container.
This could be achieved with an additional volume mount in your `docker run` command:
```typescript
-v ./my_custom_kibana.yml:/usr/share/kibana/config/kibana.yml
```
Here, `my_custom_kibana.yml` contains your specific configurations for Kibana, including the setup for monitoring, alerting, and any other X-Pack features you wish to enable.
## Conclusion
`ht-docker-elk` provides a robust and secure way to deploy the Elastic Stack, catering to both simple and complex use cases with ease. By ensuring secure access through basic authentication and the possibility for SSL encryption, it stands as a solid choice for anyone looking to deploy Elasticsearch, Logstash, and Kibana in a Dockerized environment.
## License and Legal Information
This repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license) file within this repository.
**Please note:** The MIT License does not grant permission to use the trade names, trademarks, service marks, or product names of the project, except as required for reasonable and customary use in describing the origin of the work and reproducing the content of the NOTICE file.
### Trademarks
This project is owned and maintained by Task Venture Capital GmbH. The names and logos associated with Task Venture Capital GmbH and any related products or services are trademarks of Task Venture Capital GmbH and are not included within the scope of the MIT license granted herein. Use of these trademarks must comply with Task Venture Capital GmbH's Trademark Guidelines, and any usage must be approved in writing by Task Venture Capital GmbH.
### Company Information
Task Venture Capital GmbH
Registered at District court Bremen HRB 35230 HB, Germany
For any legal inquiries or if you require further information, please contact us via email at hello@task.vc.
By using this repository, you acknowledge that you have read this section, agree to comply with its terms, and understand that the licensing of the code does not imply endorsement by Task Venture Capital GmbH of any derivative works.

View File

@ -1,54 +0,0 @@
server {
listen [::]:80 default_server;
listen 80 default_server;
server_name _;
return 301 https://$host$request_uri;
}
server {
listen [::]:443 ssl http2;
listen 443 ssl http2;
server_name _;
auth_basic "Restricted Access";
auth_basic_user_file /etc/nginx/htpasswd.users;
ssl on;
ssl_certificate /etc/nginx/ssl/kibana.crt;
ssl_certificate_key /etc/nginx/ssl/kibana.key;
location / {
proxy_pass http://127.0.0.1:5601;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_cache_bypass $http_upgrade;
}
}
server {
listen [::]:9201 ssl http2;
listen 443 ssl http2;
server_name _;
auth_basic "Restricted Access";
auth_basic_user_file /etc/nginx/htpasswd.users;
ssl on;
ssl_certificate /etc/nginx/ssl/kibana.crt;
ssl_certificate_key /etc/nginx/ssl/kibana.key;
location / {
proxy_pass http://127.0.0.1:9200;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_cache_bypass $http_upgrade;
}
}

14
tsconfig.json Normal file
View File

@ -0,0 +1,14 @@
{
"compilerOptions": {
"experimentalDecorators": true,
"useDefineForClassFields": false,
"target": "ES2022",
"module": "NodeNext",
"moduleResolution": "NodeNext",
"esModuleInterop": true,
"verbatimModuleSyntax": true
},
"exclude": [
"dist_*/**/*.d.ts"
]
}

17
tslint.json Normal file
View File

@ -0,0 +1,17 @@
{
"extends": ["tslint:latest", "tslint-config-prettier"],
"rules": {
"semicolon": [true, "always"],
"no-console": false,
"ordered-imports": false,
"object-literal-sort-keys": false,
"member-ordering": {
"options":{
"order": [
"static-method"
]
}
}
},
"defaultSeverity": "warning"
}