This commit is contained in:
Adrien Audebert 2024-08-14 16:29:20 +02:00
parent 4b82bbbfd1
commit c871a71135
10 changed files with 240 additions and 238 deletions

7
.env
View File

@ -8,10 +8,11 @@ POSTGRES_DB=players_db
POSTGRES_USER=42student POSTGRES_USER=42student
POSTGRES_PASSWORD=qwerty POSTGRES_PASSWORD=qwerty
# Django settings
DB_HOST=db DB_HOST=db
DB_PORT=5432 DB_PORT=5432
PWD_PATH=${PWD}
PROJECT_PATH=${PWD}/pong PROJECT_PATH=${PWD_PATH}/pong
# ElasticSearch settings # ElasticSearch settings
STACK_VERSION=8.14.3 STACK_VERSION=8.14.3
@ -24,5 +25,3 @@ ELASTIC_PASSWORD=qwerty42
# Kibana settings # Kibana settings
KIBANA_PASSWORD=qwerty42 KIBANA_PASSWORD=qwerty42
KIBANA_PORT=5601 KIBANA_PORT=5601
ENCRYPTION_KEY=c34d38b3a14956121ff2170e5030b471551370178f43e5626eec58b04a30fae2

54
config/kibana.yml Normal file
View File

@ -0,0 +1,54 @@
# Kibana's Elasticsearch URL
elasticsearch.hosts: ["https://es01:9200"]
# The name of the Kibana instance
server.name: "kibana"
# The base path for Kibana
#server.basePath: ""
# Serve the Kibana instance at the root path
#server.rewriteBasePath: false
# Enable or disable the Kibana server
server.enabled: true
# The port Kibana will listen on
server.port: 5601
# Enable or disable the xpack features
xpack.enabled: true
# Set the encryption key for encrypted saved objects
#xpack.encryptedSavedObjects.encryptionKey: ""
# Set the key for the kibana security features
#xpack.security.encryptionKey: ""
# Enable or disable the monitoring feature
xpack.monitoring.enabled: true
# Set the URL of the Elasticsearch instance to which Kibana should connect
#xpack.reporting.enabled: true
#xpack.reporting.roles.enabled: false
# Enable the Kibana alerting feature
#xpack.alerting.enabled: false
# Enable or disable the usage collection
#xpack.usageCollection.enabled: true
# Configure the log level for Kibana
#logging.level: info
# Configure the directory where logs will be stored
logging.dest: /var/log/kibana/kibana.log
# Configure security and authentication settings
elasticsearch.username: test
elasticsearch.password: test
# Disable or enable the Kibana plugin
#xpack.license.management.enabled: false

30
config/logstash.conf Normal file
View File

@ -0,0 +1,30 @@
input {
file {
path => "/var/lib/docker/containers/*/*.log"
start_position => "beginning"
sincedb_path => "/dev/null"
type => "docker"
codec => "json"
}
}
filter {
if [log_message] =~ /GET/ {
grok {
match => { "log_message" => "%{IP:client_ip} - - \[%{HTTPDATE:timestamp}\] \"%{WORD:method} %{URIPATH:request_path} HTTP/%{NUMBER:http_version}\" %{NUMBER:response_code} %{NUMBER:response_size}" }
}
date {
match => [ "timestamp", "dd/MMM/yyyy:HH:mm:ss Z" ]
target => "@timestamp"
}
}
}
output {
elasticsearch {
hosts => ["http://es01:9200"]
index => "docker-logs-%{+YYYY.MM.dd}"
user=> "${ELASTIC_USER}"
password=> "${ELASTIC_PASSWORD}"
}
}

View File

@ -25,6 +25,12 @@ services:
DB_PASSWORD: ${POSTGRES_PASSWORD} DB_PASSWORD: ${POSTGRES_PASSWORD}
depends_on: depends_on:
- db - db
healthcheck:
test: ["CMD-SHELL", "curl", "http://localhost:8080"]
interval: 30s
timeout: 10s
retries: 3
start_period: 10s
db: db:
image: postgres:latest image: postgres:latest
@ -40,47 +46,33 @@ services:
POSTGRES_DB: ${POSTGRES_DB} POSTGRES_DB: ${POSTGRES_DB}
POSTGRES_USER: ${POSTGRES_USER} POSTGRES_USER: ${POSTGRES_USER}
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD} POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
#healthcheck: healthcheck:
#test: ["CMD-SHELL", "pg_isready -U $${POSTGRES_USER} -d $${POSTGRES_DB}"] test: ["CMD-SHELL", "pg_isready -U $${POSTGRES_USER} -d $${POSTGRES_DB}"]
#interval: 10s interval: 10s
#timeout: 5s timeout: 5s
#retries: 5 retries: 5
es01: es01:
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION}
container_name: es01 container_name: es01
volumes: volumes:
- pong_logstash_data_01:/usr/share/elasticsearch/data - pong_es_data_01:/usr/share/elasticsearch/data
ports: ports:
- "127.0.0.1:9200:9200" - "9200:9200"
networks: networks:
- app-network - app-network
environment: environment:
- node.name=es01 - node.name=es01
- cluster.name=${CLUSTER_NAME} - cluster.name=${CLUSTER_NAME}
- discovery.type=single-node - discovery.type=single-node
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD} - ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
- xpack.security.enabled=false - bootstrap.memory_lock=true
- xpack.license.self_generated.type=trial - xpack.security.enabled=false
depends_on: healthcheck:
- logstash01 test: ["CMD-SHELL", "curl -s http://localhost:9200/_cluster/health | grep -q '\"status\":\"green\"'"]
interval: 10s
logstash01: timeout: 10s
image: docker.elastic.co/logstash/logstash:${STACK_VERSION} retries: 5
container_name: logstash01
volumes:
- ./logstash.conf:/usr/share/logstash/pipeline/logstash.conf:ro
- /var/lib/docker/containers:/var/lib/docker/containers:ro
- /var/run/docker.sock:/var/run/docker.sock:ro
ports:
- "5044:5044"
networks:
- app-network
environment:
- ELASTIC_HOSTS=http://es01:9200
- ELASTIC_USER=${ELASTIC_USERNAME}
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
- xpack.monitoring.enabled=false
kibana: kibana:
image: docker.elastic.co/kibana/kibana:${STACK_VERSION} image: docker.elastic.co/kibana/kibana:${STACK_VERSION}
@ -99,11 +91,27 @@ services:
- ELASTICSEARCH_PASSWORD=${ELASTIC_PASSWORD} - ELASTICSEARCH_PASSWORD=${ELASTIC_PASSWORD}
depends_on: depends_on:
- es01 - es01
#healthcheck: healthcheck:
#test: ["CMD-SHELL", "curl -s -I http://localhost:5601 | grep -q 'HTTP/1.1 302 Found'"] test: ["CMD-SHELL", "curl -s -I http://localhost:5601 | grep -q '200 OK'"]
#interval: 20s interval: 10s
#timeout: 10s timeout: 20s
#retries: 120 retries: 200
logstash01:
image: docker.elastic.co/logstash/logstash:${STACK_VERSION}
container_name: logstash01
volumes:
- ./config/logstash.conf:/usr/share/logstash/pipeline/logstash.conf:ro
ports:
- "5044:5044"
networks:
- app-network
environment:
- ELASTIC_HOSTS=http://es01:9200
- ELASTIC_USER=${ELASTIC_USERNAME}
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
- xpack.monitoring.enabled=false
volumes: volumes:
pong: pong:
@ -118,10 +126,8 @@ volumes:
driver: local driver: local
pong_kibana: pong_kibana:
driver: local driver: local
pong_logstash_data_01:
driver: local
pong_filebeat_data_01:
driver: local
networks: networks:
app-network: app-network:

View File

@ -1,61 +0,0 @@
services:
backend:
build:
context: .
dockerfile: Dockerfile
image: backend
container_name: backend
restart: always
command: /bin/sh -c "sleep 5 &&
venv/bin/python manage.py makemigrations --noinput &&
venv/bin/python manage.py migrate --noinput &&
venv/bin/python manage.py collectstatic --noinput &&
venv/bin/daphne -b 0.0.0.0 -p 8080 pong.asgi:application"
volumes:
- pong:/transcendence/pong
ports:
- "8080:8080"
networks:
- app-network
environment:
DB_HOST: db
DB_PORT: 5432
DB_NAME: ${POSTGRES_DB}
DB_USER: ${POSTGRES_USER}
DB_PASSWORD: ${POSTGRES_PASSWORD}
depends_on:
- db
db:
image: postgres:latest
container_name: postgres
restart: always
volumes:
- pong_pg_data:/var/lib/postgresql/data
ports:
- "5432:5432"
networks:
- app-network
environment:
POSTGRES_DB: ${POSTGRES_DB}
POSTGRES_USER: ${POSTGRES_USER}
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
healthcheck:
test: ["CMD-SHELL", "pg_isready -U $${POSTGRES_USER} -d $${POSTGRES_DB}"]
interval: 10s
timeout: 5s
retries: 5
volumes:
pong:
driver: local
driver_opts:
type: none
device: ${PROJECT_PATH}
o: bind
pong_pg_data:
driver: local
networks:
app-network:
driver: bridge

View File

@ -1,58 +1,43 @@
services: services:
setup: setup:
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION}
volumes: container_name: setup
- certs:/usr/share/elasticsearch/config/certs user: "0"
user: "0" volumes:
command: > - certs:/usr/share/elasticsearch/config/certs
bash -c ' command: >
if [ x${ELASTIC_PASSWORD} == x ]; then sh -c '
echo "Set the ELASTIC_PASSWORD environment variable in the .env file"; if [ ! -f /usr/share/elasticsearch/config/certs/elastic-certificate.p12 ]; then
exit 1; echo "Creating elastic-certificate.p12...";
elif [ x${KIBANA_PASSWORD} == x ]; then bin/elasticsearch-certutil cert --name elastic-certificate --days 365 --self-signed --out /usr/share/elasticsearch/config/certs/elastic-certificate.p12 --pass "";
echo "Set the KIBANA_PASSWORD environment variable in the .env file"; else
exit 1; echo "elastic-certificate.p12 already exists, skipping certificate creation.";
fi; fi;
if [ ! -f config/certs/ca.zip ]; then
echo "Creating CA"; if [ ! -f /usr/share/elasticsearch/config/certs/instances.yml ]; then
bin/elasticsearch-certutil ca --silent --pem -out config/certs/ca.zip; echo "Creating certs";
unzip config/certs/ca.zip -d config/certs; echo -ne \
fi; "instances:\n"\
if [ ! -f config/certs/certs.zip ]; then " - name: es01\n"\
echo "Creating certs"; " dns:\n"\
echo -ne \ " - es01\n"\
"instances:\n"\ " - localhost\n"\
" - name: es01\n"\ " ip:\n"\
" dns:\n"\ " - 127.0.0.1\n"\
" - es01\n"\ " - name: kibana\n"\
" - localhost\n"\ " dns:\n"\
" ip:\n"\ " - kibana\n"\
" - 127.0.0.1\n"\ " - localhost\n"\
" - name: kibana\n"\ " ip:\n"\
" dns:\n"\ " - 127.0.0.1\n"\
" - kibana\n"\
" - localhost\n"\
" ip:\n"\
" - 127.0.0.1\n"\
> config/certs/instances.yml; > config/certs/instances.yml;
bin/elasticsearch-certutil cert --silent --pem -out config/certs/certs.zip --in config/certs/instances.yml --ca-cert config/certs/ca/ca.crt --ca-key config/certs/ca/ca.key; fi;
unzip config/certs/certs.zip -d config/certs;
fi; echo "Setting file permissions";
echo "Setting file permissions" find /usr/share/elasticsearch/config/certs -type d -exec chmod 750 \{\} \;;
chown -R root:root config/certs; find /usr/share/elasticsearch/config/certs -type f -exec chmod 640 \{\} \;;
find . -type d -exec chmod 750 \{\} \;; tail -f /dev/null;
find . -type f -exec chmod 640 \{\} \;; '
echo "Waiting for Elasticsearch availability";
until curl -s --cacert config/certs/ca/ca.crt https://es01:9200 | grep -q "missing authentication credentials"; do sleep 30; done;
echo "Setting kibana_system password";
until curl -s -X POST --cacert config/certs/ca/ca.crt -u "elastic:${ELASTIC_PASSWORD}" -H "Content-Type: application/json" https://es01:9200/_security/user/kibana_system/_password -d "{\"password\":\"${KIBANA_PASSWORD}\"}" | grep -q "^{}"; do sleep 10; done;
echo "All done!";
'
healthcheck:
test: ["CMD-SHELL", "[ -f config/certs/es01/es01.crt ]"]
interval: 1s
timeout: 5s
retries: 120
backend: backend:
build: build:
@ -80,6 +65,12 @@ services:
DB_PASSWORD: ${POSTGRES_PASSWORD} DB_PASSWORD: ${POSTGRES_PASSWORD}
depends_on: depends_on:
- db - db
healthcheck:
test: ["CMD-SHELL", "curl", "http://localhost:8080"]
interval: 30s
timeout: 10s
retries: 3
start_period: 10s
db: db:
image: postgres:latest image: postgres:latest
@ -95,20 +86,19 @@ services:
POSTGRES_DB: ${POSTGRES_DB} POSTGRES_DB: ${POSTGRES_DB}
POSTGRES_USER: ${POSTGRES_USER} POSTGRES_USER: ${POSTGRES_USER}
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD} POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
#healthcheck: healthcheck:
#test: ["CMD-SHELL", "pg_isready -U $${POSTGRES_USER} -d $${POSTGRES_DB}"] test: ["CMD-SHELL", "pg_isready -U $${POSTGRES_USER} -d $${POSTGRES_DB}"]
#interval: 10s interval: 10s
#timeout: 5s timeout: 5s
#retries: 5 retries: 5
es01: es01:
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION}
container_name: es01 container_name: es01
volumes: volumes:
- certs:/usr/share/elasticsearch/config/certs - certs:/usr/share/elasticsearch/config/certs:ro
- pong_logstash_data_01:/usr/share/elasticsearch/data
ports: ports:
- "127.0.0.1:9200:9200" - "9200:9200"
networks: networks:
- app-network - app-network
environment: environment:
@ -118,38 +108,25 @@ services:
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD} - ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
- bootstrap.memory_lock=true - bootstrap.memory_lock=true
- xpack.security.enabled=true - xpack.security.enabled=true
- xpack.security.http.ssl.enabled=true
- xpack.security.http.ssl.key=certs/es01/es01.key
- xpack.security.http.ssl.certificate=certs/es01/es01.crt
- xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt
- xpack.security.transport.ssl.enabled=true - xpack.security.transport.ssl.enabled=true
- xpack.security.transport.ssl.key=certs/es01/es01.key - xpack.security.transport.ssl.keystore.path=/usr/share/elasticsearch/config/certs/elastic-certificate.p12
- xpack.security.transport.ssl.certificate=certs/es01/es01.crt - xpack.security.transport.ssl.keystore.type=PKCS12
- xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt - xpack.security.transport.ssl.keystore.password=""
- xpack.security.transport.ssl.verification_mode=certificate
- xpack.license.self_generated.type=${LICENSE} - xpack.license.self_generated.type=${LICENSE}
depends_on: depends_on:
- setup
- logstash01 - logstash01
healthcheck:
logstash01: test: ["CMD-SHELL", "curl -s http://localhost:9200/_cluster/health | grep -q '\"status\":\"green\"'"]
image: docker.elastic.co/logstash/logstash:${STACK_VERSION} interval: 10s
container_name: logstash01 timeout: 10s
volumes: retries: 5
- ./logstash.conf:/usr/share/logstash/pipeline/logstash.conf:ro
ports:
- "5044:5044"
networks:
- app-network
environment:
- ELASTIC_HOSTS=http://es01:9200
- ELASTIC_USER=${ELASTIC_USERNAME}
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
- xpack.monitoring.enabled=false
kibana: kibana:
image: docker.elastic.co/kibana/kibana:${STACK_VERSION} image: docker.elastic.co/kibana/kibana:${STACK_VERSION}
container_name: kibana container_name: kibana
volumes: volumes:
- certs:/usr/share/kibana/config/certs:ro
- pong_kibana:/usr/share/kibana/data - pong_kibana:/usr/share/kibana/data
user: "1000:1000" user: "1000:1000"
ports: ports:
@ -163,30 +140,27 @@ services:
- ELASTICSEARCH_PASSWORD=${ELASTIC_PASSWORD} - ELASTICSEARCH_PASSWORD=${ELASTIC_PASSWORD}
depends_on: depends_on:
- es01 - es01
#healthcheck: healthcheck:
#test: ["CMD-SHELL", "curl -s -I http://localhost:5601 | grep -q 'HTTP/1.1 302 Found'"] test: ["CMD-SHELL", "curl -s -I http://localhost:5601 | grep -q 'HTTP/1.1 302 Found'"]
#interval: 20s interval: 10s
#timeout: 10s timeout: 20s
#retries: 120 retries: 200
filebeat01: logstash01:
depends_on: image: docker.elastic.co/logstash/logstash:${STACK_VERSION}
- es01 container_name: logstash01
image: docker.elastic.co/beats/filebeat:${STACK_VERSION}
volumes: volumes:
- pong_filebeat_data_01:/usr/share/filebeat/data - ./config/logstash.conf:/usr/share/logstash/pipeline/logstash.conf:ro
- ./filebeat.yml:/usr/share/filebeat/filebeat.yml:ro ports:
- /var/lib/docker/containers:/var/lib/docker/containers:ro - "5044:5044"
- /var/run/docker.sock:/var/run/docker.sock:ro
environment:
- ELASTIC_USER=elastic
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
- ELASTIC_HOSTS=https://es01:9200
- KIBANA_HOSTS=http://kibana:5601
- LOGSTASH_HOSTS=http://logstash01:9600
networks: networks:
- app-network - app-network
environment:
- ELASTIC_HOSTS=http://es01:9200
- ELASTIC_USER=${ELASTIC_USERNAME}
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
- xpack.monitoring.enabled=false
volumes: volumes:
certs: certs:
driver: local driver: local
@ -202,11 +176,32 @@ volumes:
driver: local driver: local
pong_kibana: pong_kibana:
driver: local driver: local
pong_logstash_data_01:
driver: local
pong_filebeat_data_01:
driver: local
networks: networks:
app-network: app-network:
name: app-network
driver: bridge driver: bridge
#filebeat01:
#depends_on:
#- es01
# image: docker.elastic.co/beats/filebeat:${STACK_VERSION}
# volumes:
# - certs:/usr/share/logstash/certs
# - pong_filebeat_data_01:/usr/share/filebeat/data
# - ./filebeat.yml:/usr/share/filebeat/filebeat.yml:ro
# - /var/lib/docker/containers:/var/lib/docker/containers:ro
# - /var/run/docker.sock:/var/run/docker.sock:ro
# environment:
# - ELASTIC_USER=elastic
# - ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
# - ELASTIC_HOSTS=https://es01:9200
# - KIBANA_HOSTS=http://kibana:5601
# - LOGSTASH_HOSTS=http://logstash01:9600
# - xpack.monitoring.enabled=false
# networks:
# - app-network

View File

@ -1,21 +0,0 @@
input {
file {
path => "/var/lib/docker/containers/*/*.log"
start_position => "beginning"
sincedb_path => "/usr/share/logstash/data/sincedb"
type => "docker"
codec => "json"
}
}
filter {
}
output {
elasticsearch {
hosts => ["http://es01:9200"]
index => "docker-logs-%{+YYYY.MM.dd}"
user=> "${ELASTIC_USER}"
password=> "${ELASTIC_PASSWORD}"
}
}

View File

@ -1,10 +1,10 @@
COMPOSE_FILE=docker-compose.yaml COMPOSE_FILE=docker-compose.yml
COMPOSE=docker compose -f $(COMPOSE_FILE) COMPOSE=docker compose -f $(COMPOSE_FILE)
CONTAINER=$(c) CONTAINER=$(c)
up: up:
$(COMPOSE) build $(COMPOSE) build
$(COMPOSE) up $(COMPOSE) up $(CONTAINER)
build: build:
$(COMPOSE) build $(CONTAINER) $(COMPOSE) build $(CONTAINER)

0
manage.py Executable file → Normal file
View File