10 Commits

Author SHA1 Message Date
ef21de6739 1.0.12 2019-11-01 22:53:34 +01:00
e217fc48f1 fix(core): update 2019-11-01 22:53:34 +01:00
5d87422fa3 1.0.11 2019-11-01 18:26:03 +01:00
596fd929fa fix(core): update 2019-11-01 18:26:02 +01:00
06bdb924a1 1.0.10 2019-11-01 14:19:35 +01:00
8fc700fd85 fix(core): update 2019-11-01 14:19:34 +01:00
c39acf4a68 1.0.9 2019-11-01 13:15:48 +01:00
e32cf42a65 fix(core): update 2019-11-01 13:15:47 +01:00
6f4bafada1 1.0.8 2019-11-01 13:10:35 +01:00
0e15004997 fix(core): update 2019-11-01 13:10:35 +01:00
4 changed files with 9 additions and 26 deletions

2
package-lock.json generated
View File

@@ -1,5 +1,5 @@
{ {
"name": "ht-docker-elk", "name": "ht-docker-elk",
"version": "1.0.7", "version": "1.0.12",
"lockfileVersion": 1 "lockfileVersion": 1
} }

View File

@@ -1,6 +1,6 @@
{ {
"name": "ht-docker-elk", "name": "ht-docker-elk",
"version": "1.0.7", "version": "1.0.12",
"description": "elastic stack with full basic authentication", "description": "elastic stack with full basic authentication",
"main": "index.js", "main": "index.js",
"scripts": { "scripts": {

View File

@@ -21,7 +21,7 @@ elastic stack with full basic authentication
This image runs the elastic stack and supports full basic authentication This image runs the elastic stack and supports full basic authentication
``` ```
docker run -d --name elstack -p 80:80 -p 443:443 -p 9200:9201 -e SSL=true -e ELSK_USER="anyuser" -e ELSK_PASS="anypass" hosttoday/ht-docker-elk docker run --rm -d --name elstack -p 3000:3000 -p 9200:9201 -e SSL=true -e ELSK_USER="anyuser" -e ELSK_PASS="anypass" registry.gitlab.com/hosttoday/ht-docker-elk
``` ```
## Contribute ## Contribute

View File

@@ -1,25 +1,12 @@
server { server {
listen [::]:80 default_server; listen [::]:3000;
listen 80 default_server; listen 3000;
server_name _; server_name ~.;
return 301 https://$host$request_uri;
}
server {
listen [::]:443 ssl http2;
listen 443 ssl http2;
server_name _;
auth_basic "Restricted Access"; auth_basic "Restricted Access";
auth_basic_user_file /etc/nginx/htpasswd.users; auth_basic_user_file /etc/nginx/htpasswd.users;
ssl on;
ssl_certificate /etc/nginx/ssl/kibana.crt;
ssl_certificate_key /etc/nginx/ssl/kibana.key;
location / { location / {
proxy_pass http://127.0.0.1:5601; proxy_pass http://127.0.0.1:5601;
proxy_http_version 1.1; proxy_http_version 1.1;
@@ -31,18 +18,14 @@ server {
} }
server { server {
listen [::]:9201 ssl http2; listen [::]:3001;
listen 9201 ssl http2; listen 3001;
server_name _; server_name ~.;
auth_basic "Restricted Access"; auth_basic "Restricted Access";
auth_basic_user_file /etc/nginx/htpasswd.users; auth_basic_user_file /etc/nginx/htpasswd.users;
ssl on;
ssl_certificate /etc/nginx/ssl/kibana.crt;
ssl_certificate_key /etc/nginx/ssl/kibana.key;
location / { location / {
proxy_pass http://127.0.0.1:9200; proxy_pass http://127.0.0.1:9200;
proxy_http_version 1.1; proxy_http_version 1.1;