forked from swimlane/elk-tls-docker
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdocker-compose.production.yml
224 lines (215 loc) · 5.69 KB
/
docker-compose.production.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
version: '3.5'
# will contain all elasticsearch data.
volumes:
data:
secrets:
elasticsearch.keystore:
file: ./secrets/elasticsearch.keystore
ca.crt:
file: ./secrets/ca/ca.crt
ca.key:
file: ./secrets/ca/ca.key
elasticsearch.key:
file: ./secrets/elasticsearch/elasticsearch.key
elasticsearch.cert:
file: ./secrets/elasticsearch/elasticsearch.crt
logstash.key:
file: ./secrets/logstash/logstash.key
logstash.pkcs8:
file: ./secrets/logstash/logstash.pkcs8.key
logstash.cert:
file: ./secrets/logstash/logstash.crt
kibana.key:
file: ./secrets/kibana/kibana.key
kibana.cert:
file: ./secrets/kibana/kibana.crt
filebeat.key:
file: ./secrets/filebeat/filebeat.key
filebeat.cert:
file: ./secrets/filebeat/filebeat.crt
services:
swag:
image: linuxserver/swag
container_name: swag
cap_add:
- NET_ADMIN
environment:
- PUID=2000
- PGID=2000
- TZ=${TIMEZONE}
- URL=${DOMAIN}
- SUBDOMAINS=${SUBDOMAIN}
- VALIDATION=http
- EMAIL=${EMAIL}
- STAGING=false
volumes:
- ./swag:/config
ports:
- 443:443
- 80:80
restart: unless-stopped
networks:
- elk
depends_on:
- elasticsearch
- kibana
elasticsearch:
container_name: elasticsearch
hostname: elasticsearch
build:
context: elasticsearch/
args:
ELK_VERSION: ${ELK_VERSION}
restart: unless-stopped
environment:
CONFIG_DIR: ${ELASTIC_DIR}/config
ELASTIC_USERNAME: ${ELASTIC_USERNAME}
ELASTIC_PASSWORD: ${ELASTIC_PASSWORD}
ES_JAVA_OPTS: -Xmx${ELASTICSEARCH_HEAP} -Xms${ELASTICSEARCH_HEAP}
bootstrap.memory_lock: "true"
discovery.type: single-node
volumes:
- data:${ELASTIC_DIR}
- ./elasticsearch/config/elasticsearch.yml:${ELASTIC_DIR}/config/elasticsearch.yml:ro
secrets:
- source: elasticsearch.keystore
target: ${ELASTIC_DIR}/config/elasticsearch.keystore
- source: ca.crt
target: ${ELASTIC_DIR}/config/ca.crt
- source: elasticsearch.cert
target: ${ELASTIC_DIR}/config/elasticsearch.crt
- source: elasticsearch.key
target: ${ELASTIC_DIR}/config/elasticsearch.key
expose:
- 9200
- 9300
ulimits:
memlock:
soft: -1
hard: -1
nofile:
soft: 200000
hard: 200000
networks:
- elk
kibana:
container_name: kibana
hostname: kibana
build:
context: kibana/
args:
ELK_VERSION: $ELK_VERSION
restart: unless-stopped
volumes:
- ./kibana/config/kibana.yml:${KIBANA_DIR}/config/kibana.yml:ro
environment:
CONFIG_DIR: ${KIBANA_DIR}/config
ELASTIC_USERNAME: ${ELASTIC_USERNAME}
ELASTIC_PASSWORD: ${ELASTIC_PASSWORD}
ENCRYPTION_KEY: ${XPACK_ENCRYPTION_KEY}
secrets:
- source: ca.crt
target: ${KIBANA_DIR}/config/ca.crt
- source: kibana.cert
target: ${KIBANA_DIR}/config/kibana.crt
- source: kibana.key
target: ${KIBANA_DIR}/config/kibana.key
ports:
- "5601:5601"
networks:
- elk
depends_on:
- elasticsearch
logstash:
container_name: logstash
hostname: logstash
build:
context: logstash/
args:
ELK_VERSION: $ELK_VERSION
restart: unless-stopped
volumes:
- ./logstash/config/logstash.yml:${LOGSTASH_DIR}/config/logstash.yml:ro
- ./logstash/pipeline/logstash.conf:${LOGSTASH_DIR}/config/logstash.conf:ro
environment:
CONFIG_DIR: ${LOGSTASH_DIR}/config
ELASTIC_USERNAME: ${ELASTIC_USERNAME}
ELASTIC_PASSWORD: ${ELASTIC_PASSWORD}
LS_JAVA_OPTS: "-Xmx${LOGSTASH_HEAP} -Xms${LOGSTASH_HEAP}"
secrets:
- source: ca.crt
target: ${LOGSTASH_DIR}/config/ca.crt
- source: logstash.cert
target: ${LOGSTASH_DIR}/config/logstash.crt
- source: logstash.key
target: ${LOGSTASH_DIR}/config/logstash.key
- source: logstash.pkcs8
target: ${LOGSTASH_DIR}/config/logstash.pkcs8.key
networks:
- elk
expose:
- 12201/udp
- 5044
- 9600
- 5000/tcp
- 5000/udp
depends_on:
- elasticsearch
packetbeat:
container_name: packetbeat
hostname: packetbeat
user: root
build:
context: packetbeat/
args:
ELK_VERSION: $ELK_VERSION
restart: unless-stopped
cap_add:
- NET_ADMIN
- NET_RAW
command: packetbeat -e -strict.perms=false
volumes:
- ./packetbeat/config/packetbeat.yml:${PACKETBEAT_DIR}/packetbeat.yml:ro
- /var/run/docker.sock:/var/run/docker.sock
environment:
CONFIG_DIR: ${PACKETBEAT_DIR}/config
ELASTIC_USERNAME: ${ELASTIC_USERNAME}
ELASTIC_PASSWORD: ${ELASTIC_PASSWORD}
LS_JAVA_OPTS: "-Xmx${PACKETBEAT_HEAP} -Xms${PACKETBEAT_HEAP}"
secrets:
- source: ca.crt
target: ${PACKETBEAT_DIR}/config/ca.crt
networks:
- elk
depends_on:
- logstash
filebeat:
container_name: filebeat
hostname: filebeat
build:
context: filebeat/
args:
ELK_VERSION: $ELK_VERSION
restart: unless-stopped
command: filebeat -e -strict.perms=false
volumes:
- ./filebeat/config/filebeat.yml:${FILEBEAT_DIR}/filebeat.yml:ro
environment:
CONFIG_DIR: ${FILEBEAT_DIR}/config
LS_JAVA_OPTS: "-Xmx${FILEBEAT_HEAP} -Xms${FILEBEAT_HEAP}"
secrets:
- source: ca.crt
target: ${FILEBEAT_DIR}/config/ca.crt
- source: filebeat.cert
target: ${FILEBEAT_DIR}/config/filebeat.crt
- source: filebeat.key
target: ${FILEBEAT_DIR}/config/filebeat.key
expose:
- 9000
networks:
- elk
depends_on:
- logstash
networks:
elk:
driver: bridge