mirror of
https://github.com/furyhawk/cloudy.git
synced 2026-05-20 15:11:10 +00:00
Compare commits
81 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| e458e92573 | |||
| 7b2bb828af | |||
| 2e8408fb11 | |||
| d407fcbe1a | |||
| 8df524c9d5 | |||
| bf693e7236 | |||
| b4d5b540c3 | |||
| 5ec576bebf | |||
| e547ae4667 | |||
| 0b164d534c | |||
| 2a8bfd86d0 | |||
| f4b8809853 | |||
| 24265ed8f6 | |||
| 5284bcd5e6 | |||
| 4e696a8fee | |||
| 5d893eafb4 | |||
| 8f1d81e650 | |||
| 16d137ff59 | |||
| 743d5a898c | |||
| 0b9dfc3b3c | |||
| 95850da1b4 | |||
| 39df4583d3 | |||
| 83a36ad4f2 | |||
| a17d0cd2e2 | |||
| 458fe871f4 | |||
| 1e59b91a0e | |||
| 4c79bccd85 | |||
| ff31f5c064 | |||
| 0360e165f4 | |||
| a36f9aebd5 | |||
| 7ed3d9ad64 | |||
| 69059e51df | |||
| 7013e9b26b | |||
| daba05d362 | |||
| c24f5bf91d | |||
| be341414f9 | |||
| c4ec0ad966 | |||
| 3876bd145c | |||
| 5342ed08b3 | |||
| 09934995cb | |||
| 568f9a83f5 | |||
| 3e510c8733 | |||
| c08306ecc2 | |||
| 8da24cf80a | |||
| 374d07f979 | |||
| 5e17ef2ea9 | |||
| 7645dd739e | |||
| 656548d4b0 | |||
| 5d7a350afe | |||
| 2e3099476e | |||
| a05c289aff | |||
| 347b9b9d76 | |||
| 0b06931427 | |||
| afa53aa747 | |||
| 91200fe37e | |||
| 895f1d0aef | |||
| f0a1969e73 | |||
| cd14a1ce23 | |||
| 3ddbbbb255 | |||
| d0483114dc | |||
| 722b942079 | |||
| 86d8b19ae3 | |||
| 63b190ccbd | |||
| 0bb60245dc | |||
| b70e7111ae | |||
| 788ec952fd | |||
| 038bf3e8d9 | |||
| 1cc77c6609 | |||
| dfd071150f | |||
| b55afab109 | |||
| cbbbe695ec | |||
| 6f3d3bbe49 | |||
| 3baf43ad74 | |||
| e2784f41fe | |||
| 1ac98da285 | |||
| 03463c6b88 | |||
| a1112357b8 | |||
| 10676c0754 | |||
| 1e581d71fb | |||
| a345319737 | |||
| f865ba6f16 |
+1
-1
@@ -171,4 +171,4 @@ privatebin-data/
|
|||||||
# postgres-data/
|
# postgres-data/
|
||||||
minio-data/
|
minio-data/
|
||||||
usersfile
|
usersfile
|
||||||
.DS_Store
|
.DS_Store
|
||||||
|
|||||||
@@ -1,6 +0,0 @@
|
|||||||
[submodule "LibreChat"]
|
|
||||||
path = LibreChat
|
|
||||||
url = https://github.com/furyhawk/LibreChat.git
|
|
||||||
[submodule "emqx-docker"]
|
|
||||||
path = emqx-docker
|
|
||||||
url = https://github.com/furyhawk/emqx-docker.git
|
|
||||||
|
|||||||
@@ -20,17 +20,19 @@ This simple project uses Traefik as a reverse proxy to a Streamlit application a
|
|||||||
- Build for ARM64 platform
|
- Build for ARM64 platform
|
||||||
|
|
||||||
## Production Deployment
|
## Production Deployment
|
||||||
1. `git clone
|
1. `git clone https://github.com/furyhawk/cloudy.git`
|
||||||
1. `git submodule update --init --recursive`
|
2. `cd cloudy`
|
||||||
1. In `compose/traefik/traefik.yml`, change `example@test.com` to your email.
|
3. `git submodule update --init --recursive`
|
||||||
2. In `compose/traefik/traefik.yml`, change `example.com` to your domain.
|
4. In `compose/traefik/traefik.yml`, change `example@test.com` to your email.
|
||||||
3. `sudo apt-get install build-essential` (if not already installed) to use makefile.
|
5. In `compose/traefik/traefik.yml`, change `example.com` to your domain.
|
||||||
4. `mdkir ~/st-sync` syncthing folder.
|
6. `sudo apt-get install build-essential` (if not already installed) to use makefile.
|
||||||
5. `cd ~/site` public site folder.
|
7. `mkdir ~/st-sync` syncthing folder.
|
||||||
5. `mkdir ./compose/config` to store config.
|
8. `mkdir ~/site` public site folder.
|
||||||
8. `cp .env.example ./compose/.env`
|
9. `mkdir ./compose/config` to store config.
|
||||||
9. `cp usersfile.example ./compose/usersfile`
|
10. `cp .env.example ./compose/.env && cp .env ~/config/.env`
|
||||||
10. `make serve`
|
11. `cp ./compose/config/conf.php ~/config/conf.php`
|
||||||
|
12. `cp usersfile.example ./compose/usersfile`
|
||||||
|
13. `make serve`
|
||||||
|
|
||||||
### Notes:
|
### Notes:
|
||||||
```yaml
|
```yaml
|
||||||
|
|||||||
+2
-2
@@ -14,5 +14,5 @@ include:
|
|||||||
- compose/base.yml
|
- compose/base.yml
|
||||||
- compose/services.yml
|
- compose/services.yml
|
||||||
- compose/apps.yml
|
- compose/apps.yml
|
||||||
- emqx-docker/docker-compose.yml
|
- compose/deploy-emqx.yml
|
||||||
- LibreChat/docker-compose.yml
|
- compose/deploy-librechat.yml
|
||||||
|
|||||||
Vendored
BIN
Binary file not shown.
+31
-10
@@ -12,6 +12,7 @@ volumes:
|
|||||||
jellyfin_config: {}
|
jellyfin_config: {}
|
||||||
jellyfin_cache: {}
|
jellyfin_cache: {}
|
||||||
pgadmin: {}
|
pgadmin: {}
|
||||||
|
pgadmin_data: {}
|
||||||
privatebin_data: {}
|
privatebin_data: {}
|
||||||
thelounge_data: {}
|
thelounge_data: {}
|
||||||
|
|
||||||
@@ -22,20 +23,17 @@ services:
|
|||||||
environment:
|
environment:
|
||||||
PGADMIN_DEFAULT_EMAIL: ${PGADMIN_DEFAULT_EMAIL}
|
PGADMIN_DEFAULT_EMAIL: ${PGADMIN_DEFAULT_EMAIL}
|
||||||
PGADMIN_DEFAULT_PASSWORD: ${PGADMIN_DEFAULT_PASSWORD}
|
PGADMIN_DEFAULT_PASSWORD: ${PGADMIN_DEFAULT_PASSWORD}
|
||||||
PGID: 1000
|
|
||||||
PUID: 1000
|
|
||||||
PATH: "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
PATH: "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
||||||
PYTHONPATH: "/pgadmin4"
|
PYTHONPATH: "/pgadmin4"
|
||||||
TZ: Asia/Singapore
|
TZ: Asia/Singapore
|
||||||
DOMAINNAME: ${DOMAINNAME}
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
user: "1000:1000"
|
|
||||||
volumes:
|
volumes:
|
||||||
- pgadmin:/var/lib/pgadmin
|
- pgadmin:/var/lib/pgadmin
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
depends_on:
|
depends_on:
|
||||||
- postgres
|
- postgres_db
|
||||||
expose:
|
expose:
|
||||||
- 80
|
- 8080
|
||||||
networks:
|
networks:
|
||||||
- net
|
- net
|
||||||
labels:
|
labels:
|
||||||
@@ -65,7 +63,6 @@ services:
|
|||||||
|
|
||||||
ghost-db:
|
ghost-db:
|
||||||
image: mysql:8
|
image: mysql:8
|
||||||
container_name: ghost-db
|
|
||||||
security_opt:
|
security_opt:
|
||||||
- seccomp:unconfined
|
- seccomp:unconfined
|
||||||
restart: always
|
restart: always
|
||||||
@@ -81,7 +78,6 @@ services:
|
|||||||
|
|
||||||
ghost-server:
|
ghost-server:
|
||||||
image: ghost
|
image: ghost
|
||||||
container_name: ghost_server
|
|
||||||
cap_add:
|
cap_add:
|
||||||
- CAP_SYS_NICE
|
- CAP_SYS_NICE
|
||||||
security_opt:
|
security_opt:
|
||||||
@@ -90,7 +86,7 @@ services:
|
|||||||
depends_on:
|
depends_on:
|
||||||
- ghost-db
|
- ghost-db
|
||||||
environment:
|
environment:
|
||||||
url: https://ghost.furyhawk.lol
|
url: https://ghost.${DOMAINNAME}
|
||||||
database__client: mysql
|
database__client: mysql
|
||||||
database__connection__host: ghost-db
|
database__connection__host: ghost-db
|
||||||
database__connection__user: root
|
database__connection__user: root
|
||||||
@@ -176,14 +172,36 @@ services:
|
|||||||
- "traefik.http.routers.meshtastic.service=meshtastic_app"
|
- "traefik.http.routers.meshtastic.service=meshtastic_app"
|
||||||
- "traefik.http.services.meshtastic_app.loadbalancer.server.port=8080"
|
- "traefik.http.services.meshtastic_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
pgadmin:
|
||||||
|
image: dpage/pgadmin4
|
||||||
|
environment:
|
||||||
|
PGADMIN_DEFAULT_EMAIL: "${PGADMIN_DEFAULT_EMAIL}"
|
||||||
|
PGADMIN_DEFAULT_PASSWORD: "${PGADMIN_DEFAULT_PASSWORD}"
|
||||||
|
volumes:
|
||||||
|
- pgadmin_data:/var/lib/pgadmin
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
expose:
|
||||||
|
- 80
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.pgadmin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.pgadmin.rule=Host(`pgadmin.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.pgadmin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.pgadmin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.pgadmin.service=pgadmin_app"
|
||||||
|
- "traefik.http.services.pgadmin_app.loadbalancer.server.port=80"
|
||||||
|
|
||||||
privatebin:
|
privatebin:
|
||||||
image: privatebin/nginx-fpm-alpine:latest
|
image: privatebin/nginx-fpm-alpine:latest
|
||||||
read_only: true
|
read_only: true
|
||||||
user: "1000:1000"
|
|
||||||
volumes:
|
volumes:
|
||||||
- privatebin_data:/srv/data # data volume for pastes allows pastes
|
- privatebin_data:/srv/data # data volume for pastes allows pastes
|
||||||
# to persist after container stop or restart
|
# to persist after container stop or restart
|
||||||
- './config/conf.php:/srv/cfg/conf.php:ro' # second volume for custom configuration file
|
- "~/config/conf.php:/srv/cfg/conf.php:ro" # second volume for custom configuration file
|
||||||
expose:
|
expose:
|
||||||
- 8080
|
- 8080
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -199,6 +217,9 @@ services:
|
|||||||
- "traefik.http.services.privatebin_app.loadbalancer.server.port=8080"
|
- "traefik.http.services.privatebin_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
redlib:
|
redlib:
|
||||||
|
# disable container temporarily
|
||||||
|
profiles:
|
||||||
|
- donotstart
|
||||||
image: quay.io/redlib/redlib:latest-arm
|
image: quay.io/redlib/redlib:latest-arm
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
user: nobody
|
user: nobody
|
||||||
|
|||||||
@@ -52,6 +52,10 @@ services:
|
|||||||
security_opt:
|
security_opt:
|
||||||
- no-new-privileges:true
|
- no-new-privileges:true
|
||||||
restart: always
|
restart: always
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
volumes:
|
volumes:
|
||||||
- logs:/logs
|
- logs:/logs
|
||||||
- production_traefik:/etc/traefik/acme:z
|
- production_traefik:/etc/traefik/acme:z
|
||||||
|
|||||||
@@ -0,0 +1,144 @@
|
|||||||
|
# For more information, see the Configuration Guide:
|
||||||
|
# https://docs.librechat.ai/install/configuration/custom_config.html
|
||||||
|
|
||||||
|
# Configuration version (required)
|
||||||
|
version: 1.0.6
|
||||||
|
|
||||||
|
# Cache settings: Set to true to enable caching
|
||||||
|
cache: true
|
||||||
|
|
||||||
|
# Custom nterface configuration
|
||||||
|
interface:
|
||||||
|
# Privacy policy settings
|
||||||
|
privacyPolicy:
|
||||||
|
externalUrl: 'https://librechat.ai/privacy-policy'
|
||||||
|
openNewTab: true
|
||||||
|
|
||||||
|
# Terms of service
|
||||||
|
termsOfService:
|
||||||
|
externalUrl: 'https://librechat.ai/tos'
|
||||||
|
openNewTab: true
|
||||||
|
|
||||||
|
# Example Registration Object Structure (optional)
|
||||||
|
registration:
|
||||||
|
socialLogins: ['github', 'google', 'discord', 'openid', 'facebook']
|
||||||
|
# allowedDomains:
|
||||||
|
# - "gmail.com"
|
||||||
|
# rateLimits:
|
||||||
|
# fileUploads:
|
||||||
|
# ipMax: 100
|
||||||
|
# ipWindowInMinutes: 60 # Rate limit window for file uploads per IP
|
||||||
|
# userMax: 50
|
||||||
|
# userWindowInMinutes: 60 # Rate limit window for file uploads per user
|
||||||
|
|
||||||
|
# Definition of custom endpoints
|
||||||
|
endpoints:
|
||||||
|
# assistants:
|
||||||
|
# disableBuilder: false # Disable Assistants Builder Interface by setting to `true`
|
||||||
|
# pollIntervalMs: 750 # Polling interval for checking assistant updates
|
||||||
|
# timeoutMs: 180000 # Timeout for assistant operations
|
||||||
|
# # Should only be one or the other, either `supportedIds` or `excludedIds`
|
||||||
|
# supportedIds: ["asst_supportedAssistantId1", "asst_supportedAssistantId2"]
|
||||||
|
# # excludedIds: ["asst_excludedAssistantId"]
|
||||||
|
# # (optional) Models that support retrieval, will default to latest known OpenAI models that support the feature
|
||||||
|
# retrievalModels: ["gpt-4-turbo-preview"]
|
||||||
|
# # (optional) Assistant Capabilities available to all users. Omit the ones you wish to exclude. Defaults to list below.
|
||||||
|
# capabilities: ["code_interpreter", "retrieval", "actions", "tools", "image_vision"]
|
||||||
|
custom:
|
||||||
|
# Groq Example
|
||||||
|
- name: 'groq'
|
||||||
|
apiKey: '${GROQ_API_KEY}'
|
||||||
|
baseURL: 'https://api.groq.com/openai/v1/'
|
||||||
|
models:
|
||||||
|
default: [
|
||||||
|
"llama3-70b-8192",
|
||||||
|
"llama3-8b-8192",
|
||||||
|
"llama2-70b-4096",
|
||||||
|
"mixtral-8x7b-32768",
|
||||||
|
"gemma-7b-it",
|
||||||
|
]
|
||||||
|
fetch: false
|
||||||
|
titleConvo: true
|
||||||
|
titleModel: 'llama3-70b-8192'
|
||||||
|
modelDisplayLabel: 'groq'
|
||||||
|
|
||||||
|
# # Mistral AI Example
|
||||||
|
# - name: 'Mistral' # Unique name for the endpoint
|
||||||
|
# # For `apiKey` and `baseURL`, you can use environment variables that you define.
|
||||||
|
# # recommended environment variables:
|
||||||
|
# apiKey: '${MISTRAL_API_KEY}'
|
||||||
|
# baseURL: 'https://api.mistral.ai/v1'
|
||||||
|
|
||||||
|
# # Models configuration
|
||||||
|
# models:
|
||||||
|
# # List of default models to use. At least one value is required.
|
||||||
|
# default: ['mistral-tiny', 'mistral-small', 'mistral-medium']
|
||||||
|
# # Fetch option: Set to true to fetch models from API.
|
||||||
|
# fetch: true # Defaults to false.
|
||||||
|
|
||||||
|
# # Optional configurations
|
||||||
|
|
||||||
|
# # Title Conversation setting
|
||||||
|
# titleConvo: true # Set to true to enable title conversation
|
||||||
|
|
||||||
|
# # Title Method: Choose between "completion" or "functions".
|
||||||
|
# # titleMethod: "completion" # Defaults to "completion" if omitted.
|
||||||
|
|
||||||
|
# # Title Model: Specify the model to use for titles.
|
||||||
|
# titleModel: 'mistral-tiny' # Defaults to "gpt-3.5-turbo" if omitted.
|
||||||
|
|
||||||
|
# # Summarize setting: Set to true to enable summarization.
|
||||||
|
# # summarize: false
|
||||||
|
|
||||||
|
# # Summary Model: Specify the model to use if summarization is enabled.
|
||||||
|
# # summaryModel: "mistral-tiny" # Defaults to "gpt-3.5-turbo" if omitted.
|
||||||
|
|
||||||
|
# # Force Prompt setting: If true, sends a `prompt` parameter instead of `messages`.
|
||||||
|
# # forcePrompt: false
|
||||||
|
|
||||||
|
# # The label displayed for the AI model in messages.
|
||||||
|
# modelDisplayLabel: 'Mistral' # Default is "AI" when not set.
|
||||||
|
|
||||||
|
# # Add additional parameters to the request. Default params will be overwritten.
|
||||||
|
# # addParams:
|
||||||
|
# # safe_prompt: true # This field is specific to Mistral AI: https://docs.mistral.ai/api/
|
||||||
|
|
||||||
|
# # Drop Default params parameters from the request. See default params in guide linked below.
|
||||||
|
# # NOTE: For Mistral, it is necessary to drop the following parameters or you will encounter a 422 Error:
|
||||||
|
# dropParams: ['stop', 'user', 'frequency_penalty', 'presence_penalty']
|
||||||
|
|
||||||
|
# # OpenRouter Example
|
||||||
|
# - name: 'OpenRouter'
|
||||||
|
# # For `apiKey` and `baseURL`, you can use environment variables that you define.
|
||||||
|
# # recommended environment variables:
|
||||||
|
# # Known issue: you should not use `OPENROUTER_API_KEY` as it will then override the `openAI` endpoint to use OpenRouter as well.
|
||||||
|
# apiKey: '${OPENROUTER_KEY}'
|
||||||
|
# baseURL: 'https://openrouter.ai/api/v1'
|
||||||
|
# models:
|
||||||
|
# default: ['gpt-3.5-turbo']
|
||||||
|
# fetch: true
|
||||||
|
# titleConvo: true
|
||||||
|
# titleModel: 'gpt-3.5-turbo'
|
||||||
|
# # Recommended: Drop the stop parameter from the request as Openrouter models use a variety of stop tokens.
|
||||||
|
# dropParams: ['stop']
|
||||||
|
# modelDisplayLabel: 'OpenRouter'
|
||||||
|
# fileConfig:
|
||||||
|
# endpoints:
|
||||||
|
# assistants:
|
||||||
|
# fileLimit: 5
|
||||||
|
# fileSizeLimit: 10 # Maximum size for an individual file in MB
|
||||||
|
# totalSizeLimit: 50 # Maximum total size for all files in a single request in MB
|
||||||
|
# supportedMimeTypes:
|
||||||
|
# - "image/.*"
|
||||||
|
# - "application/pdf"
|
||||||
|
# openAI:
|
||||||
|
# disabled: true # Disables file uploading to the OpenAI endpoint
|
||||||
|
# default:
|
||||||
|
# totalSizeLimit: 20
|
||||||
|
# YourCustomEndpointName:
|
||||||
|
# fileLimit: 2
|
||||||
|
# fileSizeLimit: 5
|
||||||
|
# serverFileSizeLimit: 100 # Global server file size limit in MB
|
||||||
|
# avatarSizeLimit: 2 # Limit for user avatar image size in MB
|
||||||
|
# See the Custom Configuration Guide for more information:
|
||||||
|
# https://docs.librechat.ai/install/configuration/custom_config.html
|
||||||
@@ -0,0 +1,81 @@
|
|||||||
|
volumes:
|
||||||
|
vol-emqx-data1:
|
||||||
|
name: foo-emqx-data1
|
||||||
|
external: true
|
||||||
|
# vol-emqx-data2:
|
||||||
|
# name: foo-emqx-data2
|
||||||
|
# external: true
|
||||||
|
|
||||||
|
services:
|
||||||
|
emqx1:
|
||||||
|
image: emqx:latest
|
||||||
|
# environment:
|
||||||
|
# - "EMQX_NODE_NAME=emqx@node1.emqx.io"
|
||||||
|
# - "EMQX_CLUSTER__DISCOVERY_STRATEGY=static"
|
||||||
|
# - "EMQX_CLUSTER__STATIC__SEEDS=[emqx@node1.emqx.io,emqx@node2.emqx.io]"
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "/opt/emqx/bin/emqx", "ctl", "status"]
|
||||||
|
interval: 60s
|
||||||
|
timeout: 25s
|
||||||
|
retries: 5
|
||||||
|
networks:
|
||||||
|
net:
|
||||||
|
# emqx-bridge:
|
||||||
|
# aliases:
|
||||||
|
# - node1.emqx.io
|
||||||
|
ports:
|
||||||
|
- "1883:1883"
|
||||||
|
# - 8083:8083
|
||||||
|
# - 8084:8084
|
||||||
|
# - 8883:8883
|
||||||
|
# - 18083:18083
|
||||||
|
volumes:
|
||||||
|
- vol-emqx-data1:/opt/emqx/data
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.emqx1.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.emqx1.rule=Host(`mqtt.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.emqx1.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.emqx1.service=emqx-dashboard"
|
||||||
|
- "traefik.http.services.emqx-dashboard.loadbalancer.server.port=18083"
|
||||||
|
|
||||||
|
# emqx2:
|
||||||
|
# image: emqx:latest
|
||||||
|
# container_name: emqx2
|
||||||
|
# environment:
|
||||||
|
# - "EMQX_NODE_NAME=emqx@node2.emqx.io"
|
||||||
|
# - "EMQX_CLUSTER__DISCOVERY_STRATEGY=static"
|
||||||
|
# - "EMQX_CLUSTER__STATIC__SEEDS=[emqx@node1.emqx.io,emqx@node2.emqx.io]"
|
||||||
|
# healthcheck:
|
||||||
|
# test: ["CMD", "/opt/emqx/bin/emqx", "ctl", "status"]
|
||||||
|
# interval: 60s
|
||||||
|
# timeout: 25s
|
||||||
|
# retries: 5
|
||||||
|
# networks:
|
||||||
|
# net:
|
||||||
|
# emqx-bridge:
|
||||||
|
# aliases:
|
||||||
|
# - node2.emqx.io
|
||||||
|
# volumes:
|
||||||
|
# - vol-emqx-data2:/opt/emqx/data
|
||||||
|
|
||||||
|
mqttx-web:
|
||||||
|
image: emqx/mqttx-web:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.mqttx-web.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.mqttx-web.rule=Host(`mqttx.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.mqttx-web.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.mqttx-web.service=mqttx-web-service"
|
||||||
|
- "traefik.http.services.mqttx-web-service.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
# emqx-bridge:
|
||||||
|
# driver: bridge
|
||||||
|
net:
|
||||||
|
external: true
|
||||||
|
name: ${NETWORK:-web}
|
||||||
|
|
||||||
@@ -0,0 +1,85 @@
|
|||||||
|
# Do not edit this file directly. Use a ‘docker-compose.override.yaml’ file if you can.
|
||||||
|
# Refer to `docker-compose.override.yaml.example’ for some sample configurations.
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
data-node:
|
||||||
|
pgdata2:
|
||||||
|
libre-images:
|
||||||
|
libre-logs:
|
||||||
|
meili_data:
|
||||||
|
|
||||||
|
services:
|
||||||
|
librechat_api:
|
||||||
|
ports:
|
||||||
|
- "${PORT}:${PORT}"
|
||||||
|
depends_on:
|
||||||
|
- mongodb
|
||||||
|
- rag_api
|
||||||
|
image: ghcr.io/danny-avila/librechat-dev:latest
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
extra_hosts:
|
||||||
|
- "host.docker.internal:host-gateway"
|
||||||
|
environment:
|
||||||
|
- HOST=0.0.0.0
|
||||||
|
- MONGO_URI=mongodb://mongodb:27017/LibreChat
|
||||||
|
- MEILI_HOST=http://meilisearch:7700
|
||||||
|
- RAG_PORT=${RAG_PORT:-8000}
|
||||||
|
- RAG_API_URL=http://rag_api:${RAG_PORT:-8000}
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- type: bind
|
||||||
|
source: ~/config/.env
|
||||||
|
target: /app/.env
|
||||||
|
- libre-images:/app/client/public/images
|
||||||
|
- libre-logs:/app/api/logs
|
||||||
|
- type: bind
|
||||||
|
source: ./config/librechat.yaml
|
||||||
|
target: /app/librechat.yaml
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.librechat.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.librechat.rule=Host(`chat.${DOMAINNAME}`) || Host(`bot.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.librechat.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.librechat.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.librechat.service=librechat_app"
|
||||||
|
- "traefik.http.services.librechat_app.loadbalancer.server.port=${PORT}"
|
||||||
|
mongodb:
|
||||||
|
image: mongo
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
volumes:
|
||||||
|
- data-node:/data/db
|
||||||
|
command: mongod --noauth
|
||||||
|
meilisearch:
|
||||||
|
image: getmeili/meilisearch:v1.7.3
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
environment:
|
||||||
|
- MEILI_HOST=http://meilisearch:7700
|
||||||
|
- MEILI_NO_ANALYTICS=true
|
||||||
|
volumes:
|
||||||
|
- meili_data:/meili_data
|
||||||
|
vectordb:
|
||||||
|
image: ankane/pgvector:latest
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: mydatabase
|
||||||
|
POSTGRES_USER: myuser
|
||||||
|
POSTGRES_PASSWORD: mypassword
|
||||||
|
restart: always
|
||||||
|
volumes:
|
||||||
|
- pgdata2:/var/lib/postgresql/data
|
||||||
|
rag_api:
|
||||||
|
image: ghcr.io/danny-avila/librechat-rag-api-dev:latest
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: mydatabase
|
||||||
|
POSTGRES_USER: myuser
|
||||||
|
POSTGRES_PASSWORD: mypassword
|
||||||
|
DB_HOST: vectordb
|
||||||
|
RAG_PORT: ${RAG_PORT:-8000}
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- vectordb
|
||||||
|
env_file:
|
||||||
|
- ~/config/.env
|
||||||
|
|
||||||
+30
-11
@@ -33,9 +33,8 @@ services:
|
|||||||
- "traefik.http.routers.api_server.service=api_server_service"
|
- "traefik.http.routers.api_server.service=api_server_service"
|
||||||
- "traefik.http.services.api_server_service.loadbalancer.server.port=8000"
|
- "traefik.http.services.api_server_service.loadbalancer.server.port=8000"
|
||||||
|
|
||||||
postgres:
|
postgres_db:
|
||||||
image: postgres
|
image: postgres
|
||||||
container_name: postgres
|
|
||||||
environment:
|
environment:
|
||||||
POSTGRES_DB: ${POSTGRES_DB}
|
POSTGRES_DB: ${POSTGRES_DB}
|
||||||
POSTGRES_USER: ${POSTGRES_USER}
|
POSTGRES_USER: ${POSTGRES_USER}
|
||||||
@@ -61,15 +60,15 @@ services:
|
|||||||
- net
|
- net
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
# - "traefik.tcp.middlewares.test-inflightconn.inflightconn.amount=10"
|
|
||||||
- "traefik.tcp.routers.postgres.entrypoints=postgres-socket"
|
- "traefik.tcp.routers.postgres.entrypoints=postgres-socket"
|
||||||
- "traefik.tcp.routers.postgres.rule=HostSNI(`*`)"
|
- "traefik.tcp.routers.postgres.rule=HostSNI(`*`)"
|
||||||
- "traefik.tcp.routers.postgres.tls=true"
|
|
||||||
- "traefik.tcp.routers.postgres.tls.certresolver=letsencrypt"
|
|
||||||
# - "traefik.tcp.routers.postgres.rule=HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
|
||||||
# - "traefik.tcp.routers.postgres.middlewares=test-inflightconn"
|
|
||||||
- "traefik.tcp.routers.postgres.service=postgres_service"
|
- "traefik.tcp.routers.postgres.service=postgres_service"
|
||||||
- "traefik.tcp.services.postgres_service.loadbalancer.server.port=5432"
|
- "traefik.tcp.services.postgres_service.loadbalancer.server.port=5432"
|
||||||
|
# - "traefik.tcp.middlewares.test-inflightconn.inflightconn.amount=10"
|
||||||
|
# - "traefik.tcp.routers.postgres.rule=HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
||||||
|
# - "traefik.tcp.routers.postgres.tls=true"
|
||||||
|
# - "traefik.tcp.routers.postgres.tls.certresolver=letsencrypt"
|
||||||
|
# - "traefik.tcp.routers.postgres.middlewares=test-inflightconn"
|
||||||
# - "traefik.http.routers.postgres.entrypoints=web-secure"
|
# - "traefik.http.routers.postgres.entrypoints=web-secure"
|
||||||
# - "traefik.http.routers.postgres.rule=Host(`db.${DOMAINNAME}`)"
|
# - "traefik.http.routers.postgres.rule=Host(`db.${DOMAINNAME}`)"
|
||||||
# - "traefik.http.routers.postgres.middlewares=rate-limit@file, csrf@file"
|
# - "traefik.http.routers.postgres.middlewares=rate-limit@file, csrf@file"
|
||||||
@@ -110,7 +109,7 @@ services:
|
|||||||
MINIO_ROOT_USER: "${MINIO_ROOT_USER:-minioadmin}"
|
MINIO_ROOT_USER: "${MINIO_ROOT_USER:-minioadmin}"
|
||||||
MINIO_ROOT_PASSWORD: "${MINIO_ROOT_PASSWORD:-minioadmin}"
|
MINIO_ROOT_PASSWORD: "${MINIO_ROOT_PASSWORD:-minioadmin}"
|
||||||
MINIO_OPTS: "--console-address :9001"
|
MINIO_OPTS: "--console-address :9001"
|
||||||
MINIO_SERVER_URL: https://drive.furyhawk.lol
|
MINIO_SERVER_URL: https://minio.${DOMAINNAME}
|
||||||
DOMAINNAME: ${DOMAINNAME}
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
# user: "1000:1000"
|
# user: "1000:1000"
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -145,19 +144,19 @@ services:
|
|||||||
neo4j_server:
|
neo4j_server:
|
||||||
# Docker image to be used
|
# Docker image to be used
|
||||||
image: ${NEO4J_DOCKER_IMAGE:-neo4j:latest}
|
image: ${NEO4J_DOCKER_IMAGE:-neo4j:latest}
|
||||||
container_name: neo4j_server
|
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
# Environment variables
|
# Environment variables
|
||||||
environment:
|
environment:
|
||||||
NEO4J_AUTH: neo4j/${NEO4J_PASSWORD:-12345678}
|
NEO4J_AUTH: neo4j/${NEO4J_PASSWORD:-12345678}
|
||||||
NEO4J_dbms.default_listen_address: "0.0.0.0"
|
NEO4J_dbms.default_listen_address: "0.0.0.0"
|
||||||
NEO4J_dbms.default_advertised_address: "neo4j.furyhawk.lol"
|
NEO4J_dbms.default_advertised_address: "neo4j.${DOMAINNAME}"
|
||||||
NEO4J_dbms.connector.bolt.advertised_address: ":443"
|
NEO4J_dbms.connector.bolt.advertised_address: ":443"
|
||||||
NEO4J_PLUGINS: '["apoc"]'
|
NEO4J_PLUGINS: '["apoc"]'
|
||||||
NEO4J_dbms_security_procedures_unrestricted: "apoc.*"
|
NEO4J_dbms_security_procedures_unrestricted: "apoc.*"
|
||||||
NEO4J_dbms_security_procedures_allowlist: "apoc.*"
|
NEO4J_dbms_security_procedures_allowlist: "apoc.*"
|
||||||
NEO4J_server_memory_pagecache_size: 512M
|
NEO4J_server_memory_pagecache_size: 512M
|
||||||
NEO4J_server_memory_heap_max__size: 2G
|
NEO4J_server_memory_heap_max__size: 2G
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
user: "1000:1000"
|
user: "1000:1000"
|
||||||
depends_on:
|
depends_on:
|
||||||
- traefik
|
- traefik
|
||||||
@@ -170,6 +169,26 @@ services:
|
|||||||
- 7687
|
- 7687
|
||||||
networks:
|
networks:
|
||||||
- net
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.neo4j-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.neo4j-router.rule=Host(`neo4j.${DOMAINNAME}`) && PathPrefix(`/neo4j`)||PathPrefix(`/browser`)"
|
||||||
|
- "traefik.http.routers.neo4j-router.middlewares=csrf@file, neo4j_strip@file"
|
||||||
|
- "traefik.http.routers.neo4j-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.neo4j-router.service=neo4j_browser"
|
||||||
|
- "traefik.http.services.neo4j_browser.loadbalancer.server.port=7474"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.rule=Host(`neo4j.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.service=neo4j_bolt"
|
||||||
|
- "traefik.http.services.neo4j_bolt.loadbalancer.server.port=7687"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.entrypoints=bolt-socket"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.rule=HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.tls=true"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.service=neo4j_bolt"
|
||||||
|
- "traefik.tcp.services.neo4j_bolt.loadbalancer.server.port=7687"
|
||||||
|
|
||||||
syncthing:
|
syncthing:
|
||||||
image: syncthing/syncthing
|
image: syncthing/syncthing
|
||||||
@@ -265,7 +284,7 @@ services:
|
|||||||
# tasks:
|
# tasks:
|
||||||
# tmp-dir:
|
# tmp-dir:
|
||||||
# path: /tmp/kestra-wd/tmp
|
# path: /tmp/kestra-wd/tmp
|
||||||
# url: http://kestra.furyhawk.lol/
|
# url: http://kestra.${DOMAINNAME}/
|
||||||
# volumes:
|
# volumes:
|
||||||
# - kestra_data:/app/storage
|
# - kestra_data:/app/storage
|
||||||
# - /var/run/docker.sock:/var/run/docker.sock
|
# - /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
|||||||
+56
-140
@@ -46,18 +46,19 @@ certificatesResolvers:
|
|||||||
email: "furyx@hotmail.com"
|
email: "furyx@hotmail.com"
|
||||||
storage: /etc/traefik/acme/acme.json
|
storage: /etc/traefik/acme/acme.json
|
||||||
# https://docs.traefik.io/master/https/acme/#httpchallenge
|
# https://docs.traefik.io/master/https/acme/#httpchallenge
|
||||||
|
tlsChallenge: {}
|
||||||
httpChallenge:
|
httpChallenge:
|
||||||
entryPoint: web
|
entryPoint: web
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
routers:
|
routers:
|
||||||
neo4j-bolt-router:
|
# neo4j-bolt-router:
|
||||||
entryPoints:
|
# entryPoints:
|
||||||
- bolt-socket
|
# - bolt-socket
|
||||||
rule: "HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
# rule: "HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
||||||
tls:
|
# tls:
|
||||||
certResolver: letsencrypt
|
# certResolver: letsencrypt
|
||||||
service: neo4j-bolt
|
# service: neo4j-bolt
|
||||||
|
|
||||||
emqx-web-socket-router:
|
emqx-web-socket-router:
|
||||||
entryPoints:
|
entryPoints:
|
||||||
@@ -76,10 +77,10 @@ tcp:
|
|||||||
# passthrough: true
|
# passthrough: true
|
||||||
|
|
||||||
services:
|
services:
|
||||||
neo4j-bolt:
|
# neo4j-bolt:
|
||||||
loadBalancer:
|
# loadBalancer:
|
||||||
servers:
|
# servers:
|
||||||
- address: "neo4j_server:7687"
|
# - address: "neo4j_server:7687"
|
||||||
emqx-web-socket-service:
|
emqx-web-socket-service:
|
||||||
loadBalancer:
|
loadBalancer:
|
||||||
servers:
|
servers:
|
||||||
@@ -95,16 +96,6 @@ http:
|
|||||||
|
|
||||||
routers:
|
routers:
|
||||||
|
|
||||||
chat-router:
|
|
||||||
entryPoints:
|
|
||||||
- web-secure
|
|
||||||
rule: "Host(`bot.furyhawk.lol`) || Host(`chat.furyhawk.lol`)"
|
|
||||||
middlewares:
|
|
||||||
- csrf
|
|
||||||
tls:
|
|
||||||
certResolver: letsencrypt
|
|
||||||
service: librechat_app
|
|
||||||
|
|
||||||
# forum-router:
|
# forum-router:
|
||||||
# entryPoints:
|
# entryPoints:
|
||||||
# - web-secure
|
# - web-secure
|
||||||
@@ -126,46 +117,35 @@ http:
|
|||||||
# certResolver: letsencrypt
|
# certResolver: letsencrypt
|
||||||
# service: kestra_app
|
# service: kestra_app
|
||||||
|
|
||||||
plane-router:
|
# plane-router:
|
||||||
entryPoints:
|
# entryPoints:
|
||||||
- web-secure
|
# - web-secure
|
||||||
rule: "Host(`plan.furyhawk.lol`) || Host(`plane.furyhawk.lol`)"
|
# rule: "Host(`plan.furyhawk.lol`) || Host(`plane.furyhawk.lol`)"
|
||||||
middlewares:
|
# middlewares:
|
||||||
- csrf
|
# - csrf
|
||||||
tls:
|
# tls:
|
||||||
certResolver: letsencrypt
|
# certResolver: letsencrypt
|
||||||
service: plane_app
|
# service: plane_app
|
||||||
|
|
||||||
neo4j-router:
|
# graph-router:
|
||||||
entryPoints:
|
# entryPoints:
|
||||||
- web-secure
|
# - web-secure
|
||||||
rule: "Host(`neo4j.furyhawk.lol`) && PathPrefix(`/neo4j`)||PathPrefix(`/browser`)"
|
# rule: "Host(`neo4j.furyhawk.lol`)"
|
||||||
middlewares:
|
# middlewares:
|
||||||
- csrf
|
# - csrf
|
||||||
- neo4j_strip
|
# tls:
|
||||||
tls:
|
# certResolver: letsencrypt
|
||||||
certResolver: letsencrypt
|
# service: neo4j-bolt
|
||||||
service: neo4j-browser
|
|
||||||
|
|
||||||
graph-router:
|
# mqtt-http-router:
|
||||||
entryPoints:
|
# entryPoints:
|
||||||
- web-secure
|
# - web-secure
|
||||||
rule: "Host(`neo4j.furyhawk.lol`)"
|
# rule: "Host(`mqtt.furyhawk.lol`)"
|
||||||
middlewares:
|
# middlewares:
|
||||||
- csrf
|
# - csrf
|
||||||
tls:
|
# tls:
|
||||||
certResolver: letsencrypt
|
# certResolver: letsencrypt
|
||||||
service: neo4j-bolt
|
# service: emqx-dashboard
|
||||||
|
|
||||||
mqtt-http-router:
|
|
||||||
entryPoints:
|
|
||||||
- web-secure
|
|
||||||
rule: "Host(`mqtt.furyhawk.lol`)"
|
|
||||||
middlewares:
|
|
||||||
- csrf
|
|
||||||
tls:
|
|
||||||
certResolver: letsencrypt
|
|
||||||
service: emqx-dashboard
|
|
||||||
|
|
||||||
# mqtt-socket-router:
|
# mqtt-socket-router:
|
||||||
# rule: "Host(`mqtt.furyhawk.lol`)"
|
# rule: "Host(`mqtt.furyhawk.lol`)"
|
||||||
@@ -191,50 +171,6 @@ http:
|
|||||||
- csrf
|
- csrf
|
||||||
service: emqx-web-socket-secure
|
service: emqx-web-socket-secure
|
||||||
|
|
||||||
mqttx-router:
|
|
||||||
entryPoints:
|
|
||||||
- web-secure
|
|
||||||
rule: "Host(`mqttx.furyhawk.lol`)"
|
|
||||||
middlewares:
|
|
||||||
- csrf
|
|
||||||
tls:
|
|
||||||
certResolver: letsencrypt
|
|
||||||
service: mqttx-web
|
|
||||||
|
|
||||||
# info-router:
|
|
||||||
# entryPoints:
|
|
||||||
# - web-secure
|
|
||||||
# rule: "Host(`furyhawk.lol`) || Host(`www.furyhawk.lol`) || Host(`info.furyhawk.lol`) || Host(`124c41.furyhawk.lol`)"
|
|
||||||
# middlewares:
|
|
||||||
# - csrf
|
|
||||||
# - no-www
|
|
||||||
# tls:
|
|
||||||
# certResolver: letsencrypt
|
|
||||||
# service: site_server
|
|
||||||
|
|
||||||
# resume-router:
|
|
||||||
# entryPoints:
|
|
||||||
# - web-secure
|
|
||||||
# rule: "Host(`resume.furyhawk.lol`)"
|
|
||||||
# # redirect to resume
|
|
||||||
# middlewares:
|
|
||||||
# - csrf
|
|
||||||
# - redirect-resume
|
|
||||||
# tls:
|
|
||||||
# certResolver: letsencrypt
|
|
||||||
# service: resume_server
|
|
||||||
|
|
||||||
# blog-router:
|
|
||||||
# entryPoints:
|
|
||||||
# - web-secure
|
|
||||||
# rule: "Host(`blog.furyhawk.lol`)"
|
|
||||||
# # redirect to external blog
|
|
||||||
# middlewares:
|
|
||||||
# - redirect-blog
|
|
||||||
# tls:
|
|
||||||
# certResolver: letsencrypt
|
|
||||||
# service: blog
|
|
||||||
|
|
||||||
middlewares:
|
middlewares:
|
||||||
auth:
|
auth:
|
||||||
basicAuth:
|
basicAuth:
|
||||||
@@ -243,7 +179,7 @@ http:
|
|||||||
# https://doc.traefik.io/traefik/middlewares/http/headers/#hostsproxyheaders
|
# https://doc.traefik.io/traefik/middlewares/http/headers/#hostsproxyheaders
|
||||||
# https://docs.djangoproject.com/en/dev/ref/csrf/#ajax
|
# https://docs.djangoproject.com/en/dev/ref/csrf/#ajax
|
||||||
headers:
|
headers:
|
||||||
hostsProxyHeaders: ["X-CSRFToken"]
|
hostsProxyHeaders: ["X-CSRF-Token"]
|
||||||
sslheader:
|
sslheader:
|
||||||
# https://docs.traefik.io/master/middlewares/headers/
|
# https://docs.traefik.io/master/middlewares/headers/
|
||||||
headers:
|
headers:
|
||||||
@@ -313,26 +249,18 @@ http:
|
|||||||
# loadBalancer:
|
# loadBalancer:
|
||||||
# servers:
|
# servers:
|
||||||
# - url: http://kestra:8080
|
# - url: http://kestra:8080
|
||||||
librechat_app:
|
# neo4j-bolt:
|
||||||
loadBalancer:
|
# loadBalancer:
|
||||||
servers:
|
# servers:
|
||||||
- url: http://LibreChat:3080
|
# - url: http://neo4j_server:7687
|
||||||
neo4j-browser:
|
# plane_app:
|
||||||
loadBalancer:
|
# loadBalancer:
|
||||||
servers:
|
# servers:
|
||||||
- url: http://neo4j_server:7474
|
# - url: http://node01:80
|
||||||
neo4j-bolt:
|
# emqx-mqtt-socket:
|
||||||
loadBalancer:
|
# loadBalancer:
|
||||||
servers:
|
# servers:
|
||||||
- url: http://neo4j_server:7687
|
# - url: http://emqx1:1883
|
||||||
plane_app:
|
|
||||||
loadBalancer:
|
|
||||||
servers:
|
|
||||||
- url: http://node01:80
|
|
||||||
emqx-mqtt-socket:
|
|
||||||
loadBalancer:
|
|
||||||
servers:
|
|
||||||
- url: http://emqx1:1883
|
|
||||||
emqx-web-socket:
|
emqx-web-socket:
|
||||||
loadBalancer:
|
loadBalancer:
|
||||||
servers:
|
servers:
|
||||||
@@ -343,22 +271,6 @@ http:
|
|||||||
servers:
|
servers:
|
||||||
- url: http://emqx1:8084
|
- url: http://emqx1:8084
|
||||||
# - url: http://emqx2:8084
|
# - url: http://emqx2:8084
|
||||||
emqx-dashboard:
|
|
||||||
loadBalancer:
|
|
||||||
servers:
|
|
||||||
- url: http://emqx1:18083
|
|
||||||
mqttx-web:
|
|
||||||
loadBalancer:
|
|
||||||
servers:
|
|
||||||
- url: http://mqttx_web:80
|
|
||||||
# resume_server:
|
|
||||||
# loadBalancer:
|
|
||||||
# servers:
|
|
||||||
# - url: http://site_server:80
|
|
||||||
# blog:
|
|
||||||
# loadBalancer:
|
|
||||||
# servers:
|
|
||||||
# - url: https://furyhawk.github.io/124c41/
|
|
||||||
|
|
||||||
providers:
|
providers:
|
||||||
# https://docs.traefik.io/master/providers/file/
|
# https://docs.traefik.io/master/providers/file/
|
||||||
@@ -369,3 +281,7 @@ providers:
|
|||||||
network: web
|
network: web
|
||||||
exposedByDefault: false
|
exposedByDefault: false
|
||||||
endpoint: "unix:///var/run/docker.sock"
|
endpoint: "unix:///var/run/docker.sock"
|
||||||
|
swarm:
|
||||||
|
# network: overwatch
|
||||||
|
exposedByDefault: false
|
||||||
|
endpoint: "unix:///var/run/docker.sock"
|
||||||
|
|||||||
@@ -3,10 +3,9 @@
|
|||||||
# Variables
|
# Variables
|
||||||
|
|
||||||
# Commands
|
# Commands
|
||||||
serve: down
|
serve: pull
|
||||||
@echo "Serving the project..."
|
@echo "Serving the project..."
|
||||||
docker compose -f compose.yml up -d --build traefik
|
docker compose -f compose.yml up -d --build --pull always
|
||||||
docker compose -f compose.yml up -d
|
|
||||||
down: pull
|
down: pull
|
||||||
@echo "Stopping the project..."
|
@echo "Stopping the project..."
|
||||||
docker compose -f compose.yml down --remove-orphans
|
docker compose -f compose.yml down --remove-orphans
|
||||||
@@ -14,4 +13,49 @@ down: pull
|
|||||||
pull:
|
pull:
|
||||||
@echo "Pulling the project..."
|
@echo "Pulling the project..."
|
||||||
git pull
|
git pull
|
||||||
git submodule update --init --recursive
|
|
||||||
|
deploy-core: pull
|
||||||
|
{ \
|
||||||
|
echo "Deploying the core stack..." ;\
|
||||||
|
set -a ;\
|
||||||
|
. ./swarm/.env ;\
|
||||||
|
set +a ;\
|
||||||
|
docker stack deploy --compose-file ./swarm/core.yml core ;\
|
||||||
|
}
|
||||||
|
|
||||||
|
deploy-services: pull
|
||||||
|
{ \
|
||||||
|
echo "Deploying the services stack..." ;\
|
||||||
|
set -a ;\
|
||||||
|
. ./swarm/.env ;\
|
||||||
|
set +a ;\
|
||||||
|
docker stack deploy --compose-file ./swarm/services.yml services ;\
|
||||||
|
}
|
||||||
|
|
||||||
|
deploy-apps: pull
|
||||||
|
{ \
|
||||||
|
echo "Deploying the apps stack..." ;\
|
||||||
|
set -a ;\
|
||||||
|
. ./swarm/.env ;\
|
||||||
|
set +a ;\
|
||||||
|
docker stack deploy --compose-file ./swarm/apps.yml apps ;\
|
||||||
|
}
|
||||||
|
|
||||||
|
deploy-ghost: pull
|
||||||
|
{ \
|
||||||
|
echo "Deploying the ghost stack..." ;\
|
||||||
|
set -a ;\
|
||||||
|
. ./swarm/.env ;\
|
||||||
|
set +a ;\
|
||||||
|
docker stack deploy --compose-file ./swarm/ghost.yml ghost ;\
|
||||||
|
}
|
||||||
|
|
||||||
|
deploy-thelounge: pull
|
||||||
|
{ \
|
||||||
|
echo "Deploying the thelounge stack..." ;\
|
||||||
|
set -a ;\
|
||||||
|
. ./swarm/.env ;\
|
||||||
|
set +a ;\
|
||||||
|
docker stack deploy --compose-file ./swarm/thelounge.yml thelounge ;\
|
||||||
|
}
|
||||||
|
# git submodule update --init --recursive
|
||||||
@@ -0,0 +1,336 @@
|
|||||||
|
x-environment: &app-environment
|
||||||
|
DOMAINNAME: "${DOMAINNAME:-furyhawk.lol}"
|
||||||
|
STREAMLIT_FIN_SERVER_PORT: "8501"
|
||||||
|
GROQ_API_KEY: "${GROQ_API_KEY}"
|
||||||
|
BAI_LOCATION: ""
|
||||||
|
STREAMLIT_BAI_SERVER_PORT: "8502"
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
bai_cache: {}
|
||||||
|
ghost_content: {}
|
||||||
|
ghost_mysql: {}
|
||||||
|
jellyfin_config: {}
|
||||||
|
jellyfin_cache: {}
|
||||||
|
pgadmin: {}
|
||||||
|
pgadmin_data: {}
|
||||||
|
privatebin_data: {}
|
||||||
|
thelounge_data: {}
|
||||||
|
|
||||||
|
services:
|
||||||
|
|
||||||
|
adminer:
|
||||||
|
image: adminer
|
||||||
|
environment:
|
||||||
|
PGADMIN_DEFAULT_EMAIL: ${PGADMIN_DEFAULT_EMAIL}
|
||||||
|
PGADMIN_DEFAULT_PASSWORD: ${PGADMIN_DEFAULT_PASSWORD}
|
||||||
|
PATH: "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
||||||
|
PYTHONPATH: "/pgadmin4"
|
||||||
|
TZ: Asia/Singapore
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- pgadmin:/var/lib/pgadmin
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.adminer.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.adminer.rule=Host(`adminer.${DOMAINNAME}`) || Host(`dbadmin.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.adminer.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.adminer.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.adminer.service=adminer_app"
|
||||||
|
- "traefik.http.services.adminer_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
cheatsheets_app:
|
||||||
|
image: furyhawk/cheatsheets:${CHEATSHEETSTAG:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- 80
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.cheatsheets.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.cheatsheets.rule=Host(`cheat.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.cheatsheets.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.cheatsheets.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.cheatsheets.service=cheatsheets_app"
|
||||||
|
- "traefik.http.services.cheatsheets_app.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
ghost-db:
|
||||||
|
image: mysql:8
|
||||||
|
security_opt:
|
||||||
|
- seccomp:unconfined
|
||||||
|
restart: always
|
||||||
|
command: --mysql-native-password=ON
|
||||||
|
environment:
|
||||||
|
MYSQL_ROOT_PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
volumes:
|
||||||
|
- ghost_mysql:/var/lib/mysql
|
||||||
|
expose:
|
||||||
|
- 3306
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
|
||||||
|
ghost-server:
|
||||||
|
image: ghost
|
||||||
|
cap_add:
|
||||||
|
- CAP_SYS_NICE
|
||||||
|
security_opt:
|
||||||
|
- seccomp:unconfined
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- ghost-db
|
||||||
|
environment:
|
||||||
|
url: https://ghost.${DOMAINNAME}
|
||||||
|
database__client: mysql
|
||||||
|
database__connection__host: ghost-db
|
||||||
|
database__connection__user: root
|
||||||
|
database__connection__password: ${POSTGRES_PASSWORD}
|
||||||
|
database__connection__database: ghost
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- ghost_content:/var/lib/ghost/content
|
||||||
|
expose:
|
||||||
|
- 2368
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.ghost.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.ghost.rule=Host(`ghost.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.ghost.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.ghost.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.ghost.service=ghost_app"
|
||||||
|
- "traefik.http.services.ghost_app.loadbalancer.server.port=2368"
|
||||||
|
|
||||||
|
heynote_app:
|
||||||
|
image: furyhawk/heynote:${HEYNOTETAG:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
environment:
|
||||||
|
NODE_ENV: production
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
expose:
|
||||||
|
- 5173
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.heynote.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.heynote.rule=HostRegexp(`note[0-9]{0,2}.${DOMAINNAME}`) || Host(`pad.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.heynote.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.heynote.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.heynote.service=heynote_app"
|
||||||
|
- "traefik.http.services.heynote_app.loadbalancer.server.port=5173"
|
||||||
|
|
||||||
|
jellyfin:
|
||||||
|
image: jellyfin/jellyfin
|
||||||
|
user: 1000:1000
|
||||||
|
volumes:
|
||||||
|
- jellyfin_config:/config
|
||||||
|
- jellyfin_cache:/cache
|
||||||
|
- type: bind
|
||||||
|
source: ~/media
|
||||||
|
target: /media
|
||||||
|
read_only: false
|
||||||
|
restart: 'unless-stopped'
|
||||||
|
# Optional - alternative address used for autodiscovery
|
||||||
|
environment:
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
- JELLYFIN_PublishedServerUrl=https://media.${DOMAINNAME}
|
||||||
|
expose:
|
||||||
|
- 8096
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.jellyfin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.jellyfin.rule=Host(`media.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.jellyfin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.jellyfin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.jellyfin.service=jellyfin_app"
|
||||||
|
- "traefik.http.services.jellyfin_app.loadbalancer.server.port=8096"
|
||||||
|
|
||||||
|
meshtastic_web:
|
||||||
|
image: ghcr.io/meshtastic/web
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
- 8443
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.meshtastic.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.meshtastic.rule=Host(`mesh.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.meshtastic.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.meshtastic.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.meshtastic.service=meshtastic_app"
|
||||||
|
- "traefik.http.services.meshtastic_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
pgadmin:
|
||||||
|
image: dpage/pgadmin4
|
||||||
|
environment:
|
||||||
|
PGADMIN_DEFAULT_EMAIL: "${PGADMIN_DEFAULT_EMAIL}"
|
||||||
|
PGADMIN_DEFAULT_PASSWORD: "${PGADMIN_DEFAULT_PASSWORD}"
|
||||||
|
volumes:
|
||||||
|
- pgadmin_data:/var/lib/pgadmin
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
expose:
|
||||||
|
- 80
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.pgadmin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.pgadmin.rule=Host(`pgadmin.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.pgadmin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.pgadmin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.pgadmin.service=pgadmin_app"
|
||||||
|
- "traefik.http.services.pgadmin_app.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
privatebin:
|
||||||
|
image: privatebin/nginx-fpm-alpine:latest
|
||||||
|
read_only: true
|
||||||
|
user: "1000:1000"
|
||||||
|
volumes:
|
||||||
|
- privatebin_data:/srv/data # data volume for pastes allows pastes
|
||||||
|
# to persist after container stop or restart
|
||||||
|
- "~/config/conf.php:/srv/cfg/conf.php:ro" # second volume for custom configuration file
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.privatebin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.privatebin.rule=Host(`bin.${DOMAINNAME}`) || Host(`paste.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.privatebin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.privatebin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.privatebin.service=privatebin_app"
|
||||||
|
- "traefik.http.services.privatebin_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
redlib:
|
||||||
|
# disable container temporarily
|
||||||
|
profiles:
|
||||||
|
- donotstart
|
||||||
|
image: quay.io/redlib/redlib:latest-arm
|
||||||
|
restart: unless-stopped
|
||||||
|
user: nobody
|
||||||
|
read_only: true
|
||||||
|
security_opt:
|
||||||
|
- no-new-privileges:true
|
||||||
|
# - seccomp=seccomp-redlib.json
|
||||||
|
cap_drop:
|
||||||
|
- ALL
|
||||||
|
env_file: .env
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "wget", "--spider", "-q", "--tries=1", "http://127.0.0.1:3080/settings"]
|
||||||
|
interval: 5m
|
||||||
|
timeout: 3s
|
||||||
|
expose:
|
||||||
|
- 3080 # Specify `127.0.0.1:8080:3080` instead if using a reverse proxy
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.redlib.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.redlib.rule=Host(`redlib.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.redlib.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.redlib.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.redlib.service=redlib_app"
|
||||||
|
- "traefik.http.services.redlib_app.loadbalancer.server.port=3080"
|
||||||
|
|
||||||
|
thelounge:
|
||||||
|
image: ghcr.io/thelounge/thelounge:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- thelounge_data:/var/opt/thelounge # bind lounge config from the host's file system
|
||||||
|
expose:
|
||||||
|
- 9000
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.thelounge.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.thelounge.rule=Host(`irc.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.thelounge.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.thelounge.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.thelounge.service=thelounge_app"
|
||||||
|
- "traefik.http.services.thelounge_app.loadbalancer.server.port=9000"
|
||||||
|
|
||||||
|
streamlit-bai:
|
||||||
|
environment:
|
||||||
|
<<: *app-environment
|
||||||
|
image: furyhawk/beyondallinfo:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
command: streamlit run --server.port=$STREAMLIT_BAI_SERVER_PORT --server.address=0.0.0.0 --server.baseUrlPath=$BAI_LOCATION src/app.py
|
||||||
|
volumes:
|
||||||
|
- bai_cache:/app/cache
|
||||||
|
expose:
|
||||||
|
- ${STREAMLIT_BAI_SERVER_PORT}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.streamlit-bai.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.streamlit-bai.rule=Host(`bai.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.streamlit-bai.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.streamlit-bai.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.streamlit-bai.service=streamlit_bai_app"
|
||||||
|
- "traefik.http.services.streamlit_bai_app.loadbalancer.server.port=${STREAMLIT_BAI_SERVER_PORT}"
|
||||||
|
|
||||||
|
streamlit-fin:
|
||||||
|
environment:
|
||||||
|
<<: *app-environment
|
||||||
|
image: furyhawk/llama3toolsfin:main
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- ${STREAMLIT_FIN_SERVER_PORT}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.streamlit-fin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.streamlit-fin.rule=Host(`fin.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.streamlit-fin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.streamlit-fin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.streamlit-fin.service=streamlit_fin_app"
|
||||||
|
- "traefik.http.services.streamlit_fin_app.loadbalancer.server.port=${STREAMLIT_FIN_SERVER_PORT}"
|
||||||
|
|
||||||
|
site_server:
|
||||||
|
image: nginx:alpine
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- ~/site:/usr/share/nginx/html:ro
|
||||||
|
expose:
|
||||||
|
- 80
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.site_server.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.site_server.rule=Host(`${DOMAINNAME}`) || Host(`www.${DOMAINNAME}`) || Host(`info.${DOMAINNAME}`) || Host(`124c41.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.site_server.middlewares=csrf@file, no-www@file"
|
||||||
|
- "traefik.http.routers.site_server.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.site_server.service=site_server_app"
|
||||||
|
- "traefik.http.services.site_server_app.loadbalancer.server.port=80"
|
||||||
|
- "traefik.http.routers.resume_router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.resume_router.rule=Host(`resume.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.resume_router.middlewares=csrf@file, redirect-resume@file"
|
||||||
|
- "traefik.http.routers.resume_router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.resume_router.service=resume_server"
|
||||||
|
- "traefik.http.services.resume_server.loadbalancer.server.port=80"
|
||||||
|
- "traefik.http.routers.blog_router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.blog_router.rule=Host(`blog.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.blog_router.middlewares=redirect-blog@file"
|
||||||
|
- "traefik.http.routers.blog_router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.blog_router.service=blog_server"
|
||||||
|
- "traefik.http.services.blog_server.loadbalancer.server.port=80"
|
||||||
+231
@@ -0,0 +1,231 @@
|
|||||||
|
x-environment: &app-environment
|
||||||
|
DOMAIN: "${DOMAIN:-furyhawk.lol}"
|
||||||
|
STREAMLIT_FIN_SERVER_PORT: 8501
|
||||||
|
BAI_LOCATION: ""
|
||||||
|
STREAMLIT_BAI_SERVER_PORT: 8502
|
||||||
|
GROQ_API_KEY: "${GROQ_API_KEY}"
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
# bai_cache: {}
|
||||||
|
jellyfin_config: {}
|
||||||
|
# jellyfin_cache: {}
|
||||||
|
# adminer_data: {}
|
||||||
|
# privatebin_data: {}
|
||||||
|
|
||||||
|
networks:
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
services:
|
||||||
|
|
||||||
|
adminer:
|
||||||
|
image: adminer
|
||||||
|
environment:
|
||||||
|
PGADMIN_DEFAULT_EMAIL: ${PGADMIN_DEFAULT_EMAIL}
|
||||||
|
PGADMIN_DEFAULT_PASSWORD: ${PGADMIN_DEFAULT_PASSWORD}
|
||||||
|
PATH: "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
||||||
|
PYTHONPATH: "/pgadmin4"
|
||||||
|
TZ: Asia/Singapore
|
||||||
|
DOMAIN: ${DOMAIN}
|
||||||
|
volumes:
|
||||||
|
- /var/data/adminer_data:/var/lib/pgadmin
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
# placement:
|
||||||
|
# constraints:
|
||||||
|
# - node.labels.adminer.pgadmin == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.adminer.entrypoints=https
|
||||||
|
- traefik.http.routers.adminer.rule=Host(`adminer.${DOMAIN}`) || Host(`dbadmin.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.adminer.tls.certresolver=le
|
||||||
|
- traefik.http.routers.adminer.service=adminer_app
|
||||||
|
- traefik.http.services.adminer_app.loadbalancer.server.port=8080
|
||||||
|
|
||||||
|
cheatsheets_app:
|
||||||
|
image: furyhawk/cheatsheets:${CHEATSHEETSTAG:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.cheatsheets.entrypoints=https
|
||||||
|
- traefik.http.routers.cheatsheets.rule=Host(`cheat.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.cheatsheets.tls.certresolver=le
|
||||||
|
- traefik.http.routers.cheatsheets.service=cheatsheets_app
|
||||||
|
- traefik.http.services.cheatsheets_app.loadbalancer.server.port=80
|
||||||
|
|
||||||
|
heynote_app:
|
||||||
|
image: furyhawk/heynote:${HEYNOTETAG:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
environment:
|
||||||
|
NODE_ENV: production
|
||||||
|
DOMAIN: ${DOMAIN}
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.heynote.entrypoints=https
|
||||||
|
- traefik.http.routers.heynote.rule=HostRegexp(`note[0-9]{0,2}.${DOMAIN}`) || Host(`pad.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.heynote.tls.certresolver=le
|
||||||
|
- traefik.http.routers.heynote.service=heynote_app
|
||||||
|
- traefik.http.services.heynote_app.loadbalancer.server.port=5173
|
||||||
|
|
||||||
|
jellyfin:
|
||||||
|
image: jellyfin/jellyfin
|
||||||
|
restart: 'unless-stopped'
|
||||||
|
environment:
|
||||||
|
- DOMAIN=${DOMAIN}
|
||||||
|
- JELLYFIN_PublishedServerUrl=https://media.${DOMAIN}
|
||||||
|
volumes:
|
||||||
|
- jellyfin_config:/config
|
||||||
|
- /var/data/jellyfin_cache:/cache
|
||||||
|
- type: bind
|
||||||
|
source: ~/media
|
||||||
|
target: /media
|
||||||
|
read_only: false
|
||||||
|
# Optional - alternative address used for autodiscovery
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.jellyfin.jellyfin_config == true
|
||||||
|
# - node.labels.jellyfin.jellyfin_cache == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.jellyfin.entrypoints=https
|
||||||
|
- traefik.http.routers.jellyfin.rule=Host(`media.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.jellyfin.tls.certresolver=le
|
||||||
|
- traefik.http.routers.jellyfin.service=jellyfin_app
|
||||||
|
- traefik.http.services.jellyfin_app.loadbalancer.server.port=8096
|
||||||
|
|
||||||
|
meshtastic_web:
|
||||||
|
image: ghcr.io/meshtastic/web
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
- 8443
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.meshtastic.entrypoints=https
|
||||||
|
- traefik.http.routers.meshtastic.rule=Host(`mesh.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.meshtastic.tls.certresolver=le
|
||||||
|
- traefik.http.routers.meshtastic.service=meshtastic_app
|
||||||
|
- traefik.http.services.meshtastic_app.loadbalancer.server.port=8080
|
||||||
|
|
||||||
|
privatebin:
|
||||||
|
image: privatebin/nginx-fpm-alpine:latest
|
||||||
|
read_only: true
|
||||||
|
volumes:
|
||||||
|
- /var/data/privatebin_data:/srv/data # data volume for pastes allows pastes
|
||||||
|
# to persist after container stop or restart
|
||||||
|
- "/var/data/config/conf.php:/srv/cfg/conf.php:ro" # second volume for custom configuration file
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
# placement:
|
||||||
|
# constraints:
|
||||||
|
# - node.labels.privatebin.privatebin_data == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.privatebin.entrypoints=https
|
||||||
|
- traefik.http.routers.privatebin.rule=Host(`bin.${DOMAIN}`) || Host(`paste.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.privatebin.tls.certresolver=le
|
||||||
|
- traefik.http.routers.privatebin.service=privatebin_app
|
||||||
|
- traefik.http.services.privatebin_app.loadbalancer.server.port=8080
|
||||||
|
|
||||||
|
streamlit-bai:
|
||||||
|
environment:
|
||||||
|
<<: *app-environment
|
||||||
|
image: furyhawk/beyondallinfo:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
command: streamlit run --server.port=$STREAMLIT_BAI_SERVER_PORT --server.address=0.0.0.0 --server.baseUrlPath=$BAI_LOCATION src/app.py
|
||||||
|
volumes:
|
||||||
|
- /var/data/bai_cache:/app/cache
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.streamlit-bai.entrypoints=https
|
||||||
|
- traefik.http.routers.streamlit-bai.rule=Host(`bai.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.streamlit-bai.tls.certresolver=le
|
||||||
|
- traefik.http.routers.streamlit-bai.service=streamlit_bai_app
|
||||||
|
- traefik.http.services.streamlit_bai_app.loadbalancer.server.port=${STREAMLIT_BAI_SERVER_PORT}
|
||||||
|
|
||||||
|
streamlit-fin:
|
||||||
|
environment:
|
||||||
|
<<: *app-environment
|
||||||
|
image: furyhawk/llama3toolsfin:main
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.streamlit-fin.entrypoints=https
|
||||||
|
- traefik.http.routers.streamlit-fin.rule=Host(`fin.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.streamlit-fin.tls.certresolver=le
|
||||||
|
- traefik.http.routers.streamlit-fin.service=streamlit_fin_app
|
||||||
|
- traefik.http.services.streamlit_fin_app.loadbalancer.server.port=${STREAMLIT_FIN_SERVER_PORT}
|
||||||
|
|
||||||
|
site_server:
|
||||||
|
image: nginx:alpine
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- /var/data/site:/usr/share/nginx/html:ro
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
# placement:
|
||||||
|
# constraints:
|
||||||
|
# - node.labels.site.site_server == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.site_server.entrypoints=https
|
||||||
|
- traefik.http.routers.site_server.rule=Host(`${DOMAIN}`) || Host(`www.${DOMAIN}`) || Host(`info.${DOMAIN}`) || Host(`124c41.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.site_server.middlewares=no-www
|
||||||
|
- traefik.http.routers.site_server.tls.certresolver=le
|
||||||
|
- traefik.http.routers.site_server.service=site_server_app
|
||||||
|
- traefik.http.services.site_server_app.loadbalancer.server.port=80
|
||||||
|
- "traefik.http.routers.resume_router.entrypoints=https"
|
||||||
|
- "traefik.http.routers.resume_router.rule=Host(`resume.${DOMAIN}`)"
|
||||||
|
- "traefik.http.routers.resume_router.middlewares=redirect-resume"
|
||||||
|
- "traefik.http.routers.resume_router.tls.certresolver=le"
|
||||||
|
- "traefik.http.routers.resume_router.service=resume_server"
|
||||||
|
- "traefik.http.services.resume_server.loadbalancer.server.port=80"
|
||||||
|
- "traefik.http.routers.blog_router.entrypoints=https"
|
||||||
|
- "traefik.http.routers.blog_router.rule=Host(`blog.${DOMAIN}`)"
|
||||||
|
- "traefik.http.routers.blog_router.middlewares=redirect-blog"
|
||||||
|
- "traefik.http.routers.blog_router.tls.certresolver=le"
|
||||||
|
- "traefik.http.routers.blog_router.service=blog_server"
|
||||||
|
- "traefik.http.services.blog_server.loadbalancer.server.port=80"
|
||||||
+136
@@ -0,0 +1,136 @@
|
|||||||
|
services:
|
||||||
|
|
||||||
|
traefik:
|
||||||
|
# Use the latest v3.0.x Traefik image available
|
||||||
|
image: traefik:latest
|
||||||
|
ports:
|
||||||
|
- target: 80
|
||||||
|
published: 80
|
||||||
|
mode: host
|
||||||
|
- target: 443
|
||||||
|
published: 443
|
||||||
|
mode: host
|
||||||
|
- target: 1883
|
||||||
|
published: 1883
|
||||||
|
mode: host
|
||||||
|
- target: 5432
|
||||||
|
published: 5432
|
||||||
|
mode: host
|
||||||
|
- target: 8083
|
||||||
|
published: 8083
|
||||||
|
mode: host
|
||||||
|
- target: 8084
|
||||||
|
published: 8084
|
||||||
|
mode: host
|
||||||
|
# - target: 8883
|
||||||
|
# published: 8883
|
||||||
|
# mode: host
|
||||||
|
# - "8083:8083"
|
||||||
|
# - "8084:8084"
|
||||||
|
# - "7687:7687"
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
# Make the traefik service run only on the node with this label
|
||||||
|
# as the node with it has the volume for the certificates
|
||||||
|
- node.labels.traefik-public.traefik-public-certificates == true
|
||||||
|
labels:
|
||||||
|
# Enable Traefik for this service, to make it available in the public network
|
||||||
|
- traefik.enable=true
|
||||||
|
# Use the traefik-public network (declared below)
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
# Use the custom label "traefik.constraint-label=traefik-public"
|
||||||
|
# This public Traefik will only use services with this label
|
||||||
|
# That way you can add other internal Traefik instances per stack if needed
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
# admin-auth middleware with HTTP Basic auth
|
||||||
|
# Using the environment variables USERNAME and HASHED_PASSWORD
|
||||||
|
- traefik.http.middlewares.admin-auth.basicauth.users=${USERNAME?Variable not set}:${HASHED_PASSWORD?Variable not set}
|
||||||
|
- traefik.http.middlewares.csrf.headers.hostsProxyHeaders=["X-CSRF-Token"]
|
||||||
|
- traefik.http.middlewares.no-www.redirectregex.regex=^https://www.(.*)$$
|
||||||
|
- traefik.http.middlewares.no-www.redirectregex.replacement=https://$$1
|
||||||
|
- traefik.http.middlewares.no-www.redirectregex.permanent=true
|
||||||
|
- traefik.http.middlewares.sslheader.headers.sslProxyHeaders.X-Forwarded-Proto="https,wss"
|
||||||
|
- traefik.http.middlewares.sslheader.headers.sslRedirect=true
|
||||||
|
- traefik.http.middlewares.redirect-resume.redirectregex.regex=^https://resume.${DOMAIN?Variable not set}/(.*)
|
||||||
|
- traefik.http.middlewares.redirect-resume.redirectregex.replacement=https://info.${DOMAIN?Variable not set}/resume/$$1
|
||||||
|
- traefik.http.middlewares.redirect-resume.redirectregex.permanent=true
|
||||||
|
- traefik.http.middlewares.redirect-blog.redirectregex.regex=^https://blog.${DOMAIN?Variable not set}/(.*)
|
||||||
|
- traefik.http.middlewares.redirect-blog.redirectregex.replacement=https://furyhawk.github.io/124c41/$$1
|
||||||
|
- traefik.http.middlewares.redirect-blog.redirectregex.permanent=true
|
||||||
|
- traefik.http.middlewares.rate-limit.ratelimit.average=384
|
||||||
|
- traefik.http.middlewares.rate-limit.ratelimit.burst=128
|
||||||
|
- traefik.http.middlewares.rate-limit.ratelimit.period=10s
|
||||||
|
- treafik.http.middlewares.neo4j_strip.stripprefix.prefixes=/neo4j
|
||||||
|
# traefik-https the actual router using HTTPS
|
||||||
|
- traefik.http.routers.traefik-public-https.rule=Host(`dashboard.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.traefik-public-https.entrypoints=https
|
||||||
|
- traefik.http.routers.traefik-public-https.tls=true
|
||||||
|
# Use the special Traefik service api@internal with the web UI/Dashboard
|
||||||
|
- traefik.http.routers.traefik-public-https.service=api@internal
|
||||||
|
# Use the "le" (Let's Encrypt) resolver created below
|
||||||
|
- traefik.http.routers.traefik-public-https.tls.certresolver=le
|
||||||
|
# Enable HTTP Basic auth, using the middleware created above
|
||||||
|
- traefik.http.routers.traefik-public-https.middlewares=admin-auth
|
||||||
|
# Define the port inside of the Docker service to use
|
||||||
|
- traefik.http.services.traefik-public.loadbalancer.server.port=8080
|
||||||
|
volumes:
|
||||||
|
# Add Docker as a mounted volume, so that Traefik can read the labels of other services
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
# Mount the volume to store the certificates
|
||||||
|
- traefik-public-certificates:/certificates
|
||||||
|
command:
|
||||||
|
# Enable Docker in Traefik, so that it reads labels from Docker services
|
||||||
|
- --providers.docker
|
||||||
|
# Add a constraint to only use services with the label "traefik.constraint-label=traefik-public"
|
||||||
|
- --providers.docker.constraints=Label(`traefik.constraint-label`, `traefik-public`)
|
||||||
|
# Do not expose all Docker services, only the ones explicitly exposed
|
||||||
|
- --providers.docker.exposedbydefault=false
|
||||||
|
- --providers.docker.endpoint=unix:///var/run/docker.sock
|
||||||
|
# Enable Docker Swarm mode
|
||||||
|
- --providers.swarm.exposedbydefault=false
|
||||||
|
- --providers.swarm.endpoint=unix:///var/run/docker.sock
|
||||||
|
# Create an entrypoint "http" listening on port 80
|
||||||
|
- --entrypoints.http.address=:80
|
||||||
|
# Create an entrypoint "https" listening on port 443
|
||||||
|
- --entrypoints.https.address=:443
|
||||||
|
# Redirect HTTP to HTTPS
|
||||||
|
- --entrypoints.http.http.redirections.entrypoint.to=https
|
||||||
|
- --entrypoints.http.http.redirections.entrypoint.scheme=https
|
||||||
|
- --entrypoints.http.http.redirections.entrypoint.permanent=true
|
||||||
|
# Create an entrypoint "postgres-socket" listening on port 5432
|
||||||
|
- --entrypoints.postgres-socket.address=:5432
|
||||||
|
# Others entrypoints can be created, like a TCP entrypoint
|
||||||
|
- --entrypoints.mqtt.address=:1883
|
||||||
|
- --entrypoints.web-socket.address=:8083
|
||||||
|
- --entrypoints.web-socket-secure.address=:8084
|
||||||
|
- --entrypoints.bolt-socket.address=:7687
|
||||||
|
# Create the certificate resolver "le" for Let's Encrypt, uses the environment variable EMAIL
|
||||||
|
- --certificatesresolvers.le.acme.email=${EMAIL?Variable not set}
|
||||||
|
# Store the Let's Encrypt certificates in the mounted volume
|
||||||
|
- --certificatesresolvers.le.acme.storage=/certificates/acme.json
|
||||||
|
# Use the TLS Challenge for Let's Encrypt
|
||||||
|
- --certificatesresolvers.le.acme.tlschallenge=true
|
||||||
|
# Enable the access log, with HTTP requests
|
||||||
|
- --accesslog=true
|
||||||
|
# Enable the Traefik log, for configurations and errors
|
||||||
|
- --log=true
|
||||||
|
- --log.level=INFO
|
||||||
|
# Enable the Dashboard and API
|
||||||
|
- --api=true
|
||||||
|
networks:
|
||||||
|
# Use the public network created to be shared between Traefik and
|
||||||
|
# any other service that needs to be publicly available with HTTPS
|
||||||
|
- traefik-public
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
# Create a volume to store the certificates, there is a constraint to make sure
|
||||||
|
# Traefik is always deployed to the same Docker node with the same volume containing
|
||||||
|
# the HTTPS certificates
|
||||||
|
traefik-public-certificates:
|
||||||
|
|
||||||
|
networks:
|
||||||
|
# Use the previously created public network "traefik-public", shared with other
|
||||||
|
# services that need to be publicly available via this Traefik
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
@@ -0,0 +1,839 @@
|
|||||||
|
networks:
|
||||||
|
default:
|
||||||
|
external: true
|
||||||
|
name: ${NETWORK:-web}
|
||||||
|
net:
|
||||||
|
external: true
|
||||||
|
name: ${NETWORK:-web}
|
||||||
|
|
||||||
|
x-environment: &default-environment
|
||||||
|
LOG_LEVEL: "INFO"
|
||||||
|
ACME_PATH: "./acme.json"
|
||||||
|
NETWORK: "${NETWORK:-web}"
|
||||||
|
DOMAINNAME: "${DOMAINNAME:-furyhawk.lol}"
|
||||||
|
TZ: "${TZ:-Asia/Singapore}"
|
||||||
|
FIN_LOCATION: ""
|
||||||
|
STREAMLIT_FIN_SERVER_PORT: "8501"
|
||||||
|
GROQ_API_KEY: "${GROQ_API_KEY}"
|
||||||
|
BAI_LOCATION: ""
|
||||||
|
STREAMLIT_BAI_SERVER_PORT: "8502"
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
bai_cache: {}
|
||||||
|
ghost_content: {}
|
||||||
|
ghost_mysql: {}
|
||||||
|
jellyfin_config: {}
|
||||||
|
jellyfin_cache: {}
|
||||||
|
pgadmin: {}
|
||||||
|
pgadmin_data: {}
|
||||||
|
privatebin_data: {}
|
||||||
|
thelounge_data: {}
|
||||||
|
minio_data: {}
|
||||||
|
neo4j_data: {}
|
||||||
|
neo4j_logs: {}
|
||||||
|
postgres_data: {}
|
||||||
|
logs: {}
|
||||||
|
production_traefik: {}
|
||||||
|
portainer_data: {}
|
||||||
|
data-node:
|
||||||
|
pgdata2:
|
||||||
|
libre-images:
|
||||||
|
libre-logs:
|
||||||
|
meili_data:
|
||||||
|
vol-emqx-data1:
|
||||||
|
name: foo-emqx-data1
|
||||||
|
external: true
|
||||||
|
|
||||||
|
services:
|
||||||
|
|
||||||
|
portainer:
|
||||||
|
image: portainer/portainer-ce:sts
|
||||||
|
command: -H unix:///var/run/docker.sock
|
||||||
|
security_opt:
|
||||||
|
- no-new-privileges:true
|
||||||
|
environment:
|
||||||
|
<<: *default-environment
|
||||||
|
restart: always
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
- portainer_data:/data
|
||||||
|
expose:
|
||||||
|
- 8000
|
||||||
|
- 9000
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.portainer.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.portainer.rule=Host(`portainer.${DOMAINNAME}`) || Host(`port.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.portainer.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.portainer.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.portainer.service=portainer_service"
|
||||||
|
- "traefik.http.services.portainer_service.loadbalancer.server.port=9000"
|
||||||
|
|
||||||
|
traefik:
|
||||||
|
environment:
|
||||||
|
<<: *default-environment
|
||||||
|
build:
|
||||||
|
context: .
|
||||||
|
dockerfile: ./traefik/Dockerfile
|
||||||
|
image: traefik_production
|
||||||
|
security_opt:
|
||||||
|
- no-new-privileges:true
|
||||||
|
restart: always
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
volumes:
|
||||||
|
- logs:/logs
|
||||||
|
- production_traefik:/etc/traefik/acme:z
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
extra_hosts:
|
||||||
|
- "host.docker.internal:host-gateway"
|
||||||
|
ports:
|
||||||
|
- target: 80
|
||||||
|
published: 80
|
||||||
|
protocol: tcp
|
||||||
|
mode: host
|
||||||
|
- target: 443
|
||||||
|
published: 443
|
||||||
|
protocol: tcp
|
||||||
|
mode: host
|
||||||
|
- "7687:7687"
|
||||||
|
- "8083:8083"
|
||||||
|
- "8084:8084"
|
||||||
|
- "8883:8883"
|
||||||
|
- "5432:5432"
|
||||||
|
# - "8080:8080"
|
||||||
|
# - "1883:1883"
|
||||||
|
# - 18083:18083
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.traefik.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.traefik.rule=Host(`dashboard.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.traefik.middlewares=auth@file"
|
||||||
|
- "traefik.http.routers.traefik.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.traefik.service=api@internal"
|
||||||
|
|
||||||
|
api_server:
|
||||||
|
image: furyhawk/listen:latest
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
environment:
|
||||||
|
DATABASE__HOSTNAME: ${DATABASE__HOSTNAME}
|
||||||
|
DATABASE__USERNAME: ${POSTGRES_USER}
|
||||||
|
DATABASE__PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
DATABASE__PORT: ${DATABASE__PORT}
|
||||||
|
DATABASE__DB: ${DATABASE__DB}
|
||||||
|
SECURITY__JWT_SECRET_KEY: ${SECURITY__JWT_SECRET_KEY}
|
||||||
|
SECURITY__BACKEND_CORS_ORIGINS: ${SECURITY__BACKEND_CORS_ORIGINS}
|
||||||
|
SECURITY__ALLOWED_HOSTS: ${SECURITY__ALLOWED_HOSTS}
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
ports:
|
||||||
|
- "8000:8000"
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.api_server.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.api_server.rule=Host(`api.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.api_server.middlewares=csrf@file, rate-limit@file"
|
||||||
|
- "traefik.http.routers.api_server.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.api_server.service=api_server_service"
|
||||||
|
- "traefik.http.services.api_server_service.loadbalancer.server.port=8000"
|
||||||
|
|
||||||
|
postgres_db:
|
||||||
|
image: postgres
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: ${POSTGRES_DB}
|
||||||
|
POSTGRES_USER: ${POSTGRES_USER}
|
||||||
|
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
PGDATA: "/var/lib/postgresql/data"
|
||||||
|
LANG: en_US.utf8
|
||||||
|
TZ: Asia/Singapore
|
||||||
|
# DOMAINNAME: ${DOMAINNAME}
|
||||||
|
command: ["postgres", "-c", "log_connections=on"]
|
||||||
|
volumes:
|
||||||
|
- postgres_data:/var/lib/postgresql/data
|
||||||
|
# - ./config/postgresql.conf:/etc/postgresql.conf
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD-SHELL", "pg_isready -d $${POSTGRES_DB} -U $${POSTGRES_USER}"]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 10
|
||||||
|
# ports:
|
||||||
|
# - "5432:5432"
|
||||||
|
expose:
|
||||||
|
- 5432
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.tcp.routers.postgres.entrypoints=postgres-socket"
|
||||||
|
- "traefik.tcp.routers.postgres.rule=HostSNI(`*`)"
|
||||||
|
- "traefik.tcp.routers.postgres.service=postgres_service"
|
||||||
|
- "traefik.tcp.services.postgres_service.loadbalancer.server.port=5432"
|
||||||
|
# - "traefik.tcp.middlewares.test-inflightconn.inflightconn.amount=10"
|
||||||
|
# - "traefik.tcp.routers.postgres.rule=HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
||||||
|
# - "traefik.tcp.routers.postgres.tls=true"
|
||||||
|
# - "traefik.tcp.routers.postgres.tls.certresolver=letsencrypt"
|
||||||
|
# - "traefik.tcp.routers.postgres.middlewares=test-inflightconn"
|
||||||
|
# - "traefik.http.routers.postgres.entrypoints=web-secure"
|
||||||
|
# - "traefik.http.routers.postgres.rule=Host(`db.${DOMAINNAME}`)"
|
||||||
|
# - "traefik.http.routers.postgres.middlewares=rate-limit@file, csrf@file"
|
||||||
|
# - "traefik.http.routers.postgres.tls.certresolver=letsencrypt"
|
||||||
|
# - "traefik.http.routers.postgres.service=postgres_service"
|
||||||
|
# - "traefik.http.services.postgres_service.loadbalancer.server.port=5432"
|
||||||
|
|
||||||
|
osrm-backend:
|
||||||
|
environment:
|
||||||
|
# OSRM manager setup
|
||||||
|
- OSRM_ALGORITHM=mld
|
||||||
|
- OSRM_THREADS=2
|
||||||
|
- OSRM_PORT=${OSRM_PORT:-5000}
|
||||||
|
- OSRM_PROFILE=/opt/car.lua
|
||||||
|
- OSRM_MAP_NAME=${OSRM_MAP_NAME}
|
||||||
|
- OSRM_GEOFABRIK_PATH=${OSRM_GEOFABRIK_PATH}
|
||||||
|
# Notify OSRM Manager to restart without stopping container
|
||||||
|
- OSRM_NOTIFY_FILEPATH=/data/osrm_notify.txt
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
image: furyhawk/osrm-backend:${OSRM_VERSION:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- ${OSRM_PORT:-5000}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.osrm-backend.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.osrm-backend.rule=Host(`osrm.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.osrm-backend.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.osrm-backend.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.osrm-backend.service=osrm_backend_service"
|
||||||
|
- "traefik.http.services.osrm_backend_service.loadbalancer.server.port=${OSRM_PORT:-5000}"
|
||||||
|
|
||||||
|
minio-common:
|
||||||
|
image: minio/minio:latest
|
||||||
|
environment:
|
||||||
|
MINIO_ROOT_USER: "${MINIO_ROOT_USER:-minioadmin}"
|
||||||
|
MINIO_ROOT_PASSWORD: "${MINIO_ROOT_PASSWORD:-minioadmin}"
|
||||||
|
MINIO_OPTS: "--console-address :9001"
|
||||||
|
MINIO_SERVER_URL: https://minio.${DOMAINNAME}
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
# user: "1000:1000"
|
||||||
|
restart: unless-stopped
|
||||||
|
command: server /data --address :9000 --console-address :9001
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "mc", "ready", "local"]
|
||||||
|
interval: 60s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 5
|
||||||
|
volumes:
|
||||||
|
- minio_data:/data
|
||||||
|
expose:
|
||||||
|
- 9000
|
||||||
|
- 9001
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.minio-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.minio-router.rule=Host(`drive.${DOMAINNAME}`) || Host(`storage.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.minio-router.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.minio-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.minio-router.service=minio_common_service"
|
||||||
|
- "traefik.http.services.minio_common_service.loadbalancer.server.port=9001"
|
||||||
|
- "traefik.http.routers.minio-api-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.minio-api-router.rule=Host(`minio.${DOMAINNAME}`) || Host(`s3.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.minio-api-router.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.minio-api-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.minio-api-router.service=minio_api_service"
|
||||||
|
- "traefik.http.services.minio_api_service.loadbalancer.server.port=9000"
|
||||||
|
|
||||||
|
neo4j_server:
|
||||||
|
# Docker image to be used
|
||||||
|
image: ${NEO4J_DOCKER_IMAGE:-neo4j:latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
# Environment variables
|
||||||
|
environment:
|
||||||
|
NEO4J_AUTH: neo4j/${NEO4J_PASSWORD:-12345678}
|
||||||
|
NEO4J_dbms.default_listen_address: "0.0.0.0"
|
||||||
|
NEO4J_dbms.default_advertised_address: "neo4j.${DOMAINNAME}"
|
||||||
|
NEO4J_dbms.connector.bolt.advertised_address: ":443"
|
||||||
|
NEO4J_PLUGINS: '["apoc"]'
|
||||||
|
NEO4J_dbms_security_procedures_unrestricted: "apoc.*"
|
||||||
|
NEO4J_dbms_security_procedures_allowlist: "apoc.*"
|
||||||
|
NEO4J_server_memory_pagecache_size: 512M
|
||||||
|
NEO4J_server_memory_heap_max__size: 2G
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
user: "1000:1000"
|
||||||
|
depends_on:
|
||||||
|
- traefik
|
||||||
|
volumes:
|
||||||
|
- neo4j_data:/data
|
||||||
|
- neo4j_logs:/logs
|
||||||
|
# Expose ports
|
||||||
|
expose:
|
||||||
|
- 7474
|
||||||
|
- 7687
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.neo4j-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.neo4j-router.rule=Host(`neo4j.${DOMAINNAME}`) && PathPrefix(`/neo4j`)||PathPrefix(`/browser`)"
|
||||||
|
- "traefik.http.routers.neo4j-router.middlewares=csrf@file, neo4j_strip@file"
|
||||||
|
- "traefik.http.routers.neo4j-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.neo4j-router.service=neo4j_browser"
|
||||||
|
- "traefik.http.services.neo4j_browser.loadbalancer.server.port=7474"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.rule=Host(`neo4j.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.service=neo4j_bolt"
|
||||||
|
- "traefik.http.services.neo4j_bolt.loadbalancer.server.port=7687"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.entrypoints=bolt-socket"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.rule=HostSNIRegexp(`^.+\\.furyhawk\\.lol$$`)"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.tls=true"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.service=neo4j_bolt"
|
||||||
|
- "traefik.tcp.services.neo4j_bolt.loadbalancer.server.port=7687"
|
||||||
|
|
||||||
|
syncthing:
|
||||||
|
image: syncthing/syncthing
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- ~/st-sync:/var/syncthing
|
||||||
|
ports:
|
||||||
|
- "8384:8384" # Web UI
|
||||||
|
- "22000:22000/tcp" # TCP file transfers
|
||||||
|
- "22000:22000/udp" # QUIC file transfers
|
||||||
|
- "21027:21027/udp" # Receive local discovery broadcasts
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.syncthing.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.syncthing.rule=Host(`sync.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.syncthing.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.syncthing.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.syncthing.service=syncthing_service"
|
||||||
|
- "traefik.http.services.syncthing_service.loadbalancer.server.port=8384"
|
||||||
|
|
||||||
|
dozzle:
|
||||||
|
image: amir20/dozzle:latest
|
||||||
|
restart: always
|
||||||
|
environment:
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.dozzle.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.dozzle.rule=Host(`log.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.dozzle.middlewares=auth@file, csrf@file"
|
||||||
|
- "traefik.http.routers.dozzle.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.dozzle.service=dozzle_service"
|
||||||
|
- "traefik.http.services.dozzle_service.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
# WhoAmI - For Testing and Troubleshooting
|
||||||
|
whoami:
|
||||||
|
image: traefik/whoami
|
||||||
|
security_opt:
|
||||||
|
- no-new-privileges:true
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.whoami-rtr.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.whoami-rtr.rule=Host(`whoami.$DOMAINNAME`)"
|
||||||
|
- "traefik.http.routers.whoami-rtr.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.whoami-rtr.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.whoami-rtr.service=whoami-svc"
|
||||||
|
- "traefik.http.services.whoami-svc.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
# kestra:
|
||||||
|
# image: kestra/kestra:latest-full
|
||||||
|
# container_name: kestra
|
||||||
|
# # pull_policy: always
|
||||||
|
# # Note that this is meant for development only. Refer to the documentation for production deployments of Kestra which runs without a root user.
|
||||||
|
# user: "root"
|
||||||
|
# command: server standalone --worker-thread=128
|
||||||
|
# environment:
|
||||||
|
# KESTRA_CONFIGURATION: |
|
||||||
|
# datasources:
|
||||||
|
# postgres:
|
||||||
|
# url: jdbc:postgresql://postgres:5432/kestra
|
||||||
|
# driverClassName: org.postgresql.Driver
|
||||||
|
# username: ${POSTGRES_USER}
|
||||||
|
# password: ${POSTGRES_PASSWORD}
|
||||||
|
# kestra:
|
||||||
|
# server:
|
||||||
|
# basic-auth:
|
||||||
|
# enabled: true
|
||||||
|
# username: ${EMAIL_FROM} # it must be a valid email address
|
||||||
|
# password: ${EMAIL_PASSWORD}
|
||||||
|
# repository:
|
||||||
|
# type: postgres
|
||||||
|
# storage:
|
||||||
|
# type: local
|
||||||
|
# local:
|
||||||
|
# base-path: "/app/storage"
|
||||||
|
# queue:
|
||||||
|
# type: postgres
|
||||||
|
# tasks:
|
||||||
|
# tmp-dir:
|
||||||
|
# path: /tmp/kestra-wd/tmp
|
||||||
|
# url: http://kestra.${DOMAINNAME}/
|
||||||
|
# volumes:
|
||||||
|
# - kestra_data:/app/storage
|
||||||
|
# - /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
# # - /tmp/kestra-wd:/tmp/kestra-wd
|
||||||
|
# depends_on:
|
||||||
|
# - postgres
|
||||||
|
# expose:
|
||||||
|
# - "8080"
|
||||||
|
# - "8081"
|
||||||
|
# networks:
|
||||||
|
# - net
|
||||||
|
|
||||||
|
adminer:
|
||||||
|
image: adminer
|
||||||
|
environment:
|
||||||
|
PGADMIN_DEFAULT_EMAIL: ${PGADMIN_DEFAULT_EMAIL}
|
||||||
|
PGADMIN_DEFAULT_PASSWORD: ${PGADMIN_DEFAULT_PASSWORD}
|
||||||
|
PATH: "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
||||||
|
PYTHONPATH: "/pgadmin4"
|
||||||
|
TZ: Asia/Singapore
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- pgadmin:/var/lib/pgadmin
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.adminer.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.adminer.rule=Host(`adminer.${DOMAINNAME}`) || Host(`dbadmin.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.adminer.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.adminer.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.adminer.service=adminer_app"
|
||||||
|
- "traefik.http.services.adminer_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
cheatsheets_app:
|
||||||
|
image: furyhawk/cheatsheets:${CHEATSHEETSTAG:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- 80
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.cheatsheets.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.cheatsheets.rule=Host(`cheat.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.cheatsheets.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.cheatsheets.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.cheatsheets.service=cheatsheets_app"
|
||||||
|
- "traefik.http.services.cheatsheets_app.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
ghost-db:
|
||||||
|
image: mysql:8
|
||||||
|
security_opt:
|
||||||
|
- seccomp:unconfined
|
||||||
|
restart: always
|
||||||
|
command: --mysql-native-password=ON
|
||||||
|
environment:
|
||||||
|
MYSQL_ROOT_PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
volumes:
|
||||||
|
- ghost_mysql:/var/lib/mysql
|
||||||
|
expose:
|
||||||
|
- 3306
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
|
||||||
|
ghost-server:
|
||||||
|
image: ghost
|
||||||
|
cap_add:
|
||||||
|
- CAP_SYS_NICE
|
||||||
|
security_opt:
|
||||||
|
- seccomp:unconfined
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- ghost-db
|
||||||
|
environment:
|
||||||
|
url: https://ghost.${DOMAINNAME}
|
||||||
|
database__client: mysql
|
||||||
|
database__connection__host: ghost-db
|
||||||
|
database__connection__user: root
|
||||||
|
database__connection__password: ${POSTGRES_PASSWORD}
|
||||||
|
database__connection__database: ghost
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- ghost_content:/var/lib/ghost/content
|
||||||
|
expose:
|
||||||
|
- 2368
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.ghost.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.ghost.rule=Host(`ghost.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.ghost.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.ghost.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.ghost.service=ghost_app"
|
||||||
|
- "traefik.http.services.ghost_app.loadbalancer.server.port=2368"
|
||||||
|
|
||||||
|
heynote_app:
|
||||||
|
image: furyhawk/heynote:${HEYNOTETAG:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
environment:
|
||||||
|
NODE_ENV: production
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
expose:
|
||||||
|
- 5173
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.heynote.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.heynote.rule=HostRegexp(`note[0-9]{0,2}.${DOMAINNAME}`) || Host(`pad.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.heynote.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.heynote.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.heynote.service=heynote_app"
|
||||||
|
- "traefik.http.services.heynote_app.loadbalancer.server.port=5173"
|
||||||
|
|
||||||
|
jellyfin:
|
||||||
|
image: jellyfin/jellyfin
|
||||||
|
user: 1000:1000
|
||||||
|
volumes:
|
||||||
|
- jellyfin_config:/config
|
||||||
|
- jellyfin_cache:/cache
|
||||||
|
- type: bind
|
||||||
|
source: ~/media
|
||||||
|
target: /media
|
||||||
|
read_only: false
|
||||||
|
restart: 'unless-stopped'
|
||||||
|
# Optional - alternative address used for autodiscovery
|
||||||
|
environment:
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
- JELLYFIN_PublishedServerUrl=https://media.${DOMAINNAME}
|
||||||
|
expose:
|
||||||
|
- 8096
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.jellyfin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.jellyfin.rule=Host(`media.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.jellyfin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.jellyfin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.jellyfin.service=jellyfin_app"
|
||||||
|
- "traefik.http.services.jellyfin_app.loadbalancer.server.port=8096"
|
||||||
|
|
||||||
|
meshtastic_web:
|
||||||
|
image: ghcr.io/meshtastic/web
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
- 8443
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.meshtastic.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.meshtastic.rule=Host(`mesh.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.meshtastic.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.meshtastic.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.meshtastic.service=meshtastic_app"
|
||||||
|
- "traefik.http.services.meshtastic_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
pgadmin:
|
||||||
|
image: dpage/pgadmin4
|
||||||
|
environment:
|
||||||
|
PGADMIN_DEFAULT_EMAIL: "${PGADMIN_DEFAULT_EMAIL}"
|
||||||
|
PGADMIN_DEFAULT_PASSWORD: "${PGADMIN_DEFAULT_PASSWORD}"
|
||||||
|
volumes:
|
||||||
|
- pgadmin_data:/var/lib/pgadmin
|
||||||
|
restart: unless-stopped
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
expose:
|
||||||
|
- 80
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.pgadmin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.pgadmin.rule=Host(`pgadmin.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.pgadmin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.pgadmin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.pgadmin.service=pgadmin_app"
|
||||||
|
- "traefik.http.services.pgadmin_app.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
privatebin:
|
||||||
|
image: privatebin/nginx-fpm-alpine:latest
|
||||||
|
read_only: true
|
||||||
|
user: "1000:1000"
|
||||||
|
volumes:
|
||||||
|
- privatebin_data:/srv/data # data volume for pastes allows pastes
|
||||||
|
# to persist after container stop or restart
|
||||||
|
- "~/config/conf.php:/srv/cfg/conf.php:ro" # second volume for custom configuration file
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.privatebin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.privatebin.rule=Host(`bin.${DOMAINNAME}`) || Host(`paste.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.privatebin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.privatebin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.privatebin.service=privatebin_app"
|
||||||
|
- "traefik.http.services.privatebin_app.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
thelounge:
|
||||||
|
image: ghcr.io/thelounge/thelounge:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- thelounge_data:/var/opt/thelounge # bind lounge config from the host's file system
|
||||||
|
expose:
|
||||||
|
- 9000
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.thelounge.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.thelounge.rule=Host(`irc.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.thelounge.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.thelounge.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.thelounge.service=thelounge_app"
|
||||||
|
- "traefik.http.services.thelounge_app.loadbalancer.server.port=9000"
|
||||||
|
|
||||||
|
streamlit-bai:
|
||||||
|
environment:
|
||||||
|
<<: *default-environment
|
||||||
|
image: furyhawk/beyondallinfo:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
command: streamlit run --server.port=$STREAMLIT_BAI_SERVER_PORT --server.address=0.0.0.0 --server.baseUrlPath=$BAI_LOCATION src/app.py
|
||||||
|
volumes:
|
||||||
|
- bai_cache:/app/cache
|
||||||
|
expose:
|
||||||
|
- ${STREAMLIT_BAI_SERVER_PORT}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.streamlit-bai.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.streamlit-bai.rule=Host(`bai.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.streamlit-bai.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.streamlit-bai.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.streamlit-bai.service=streamlit_bai_app"
|
||||||
|
- "traefik.http.services.streamlit_bai_app.loadbalancer.server.port=${STREAMLIT_BAI_SERVER_PORT}"
|
||||||
|
|
||||||
|
streamlit-fin:
|
||||||
|
environment:
|
||||||
|
<<: *default-environment
|
||||||
|
image: furyhawk/llama3toolsfin:main
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- ${STREAMLIT_FIN_SERVER_PORT}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.streamlit-fin.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.streamlit-fin.rule=Host(`fin.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.streamlit-fin.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.streamlit-fin.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.streamlit-fin.service=streamlit_fin_app"
|
||||||
|
- "traefik.http.services.streamlit_fin_app.loadbalancer.server.port=${STREAMLIT_FIN_SERVER_PORT}"
|
||||||
|
|
||||||
|
site_server:
|
||||||
|
image: nginx:alpine
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- ~/site:/usr/share/nginx/html:ro
|
||||||
|
expose:
|
||||||
|
- 80
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.site_server.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.site_server.rule=Host(`${DOMAINNAME}`) || Host(`www.${DOMAINNAME}`) || Host(`info.${DOMAINNAME}`) || Host(`124c41.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.site_server.middlewares=csrf@file, no-www@file"
|
||||||
|
- "traefik.http.routers.site_server.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.site_server.service=site_server_app"
|
||||||
|
- "traefik.http.services.site_server_app.loadbalancer.server.port=80"
|
||||||
|
- "traefik.http.routers.resume_router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.resume_router.rule=Host(`resume.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.resume_router.middlewares=csrf@file, redirect-resume@file"
|
||||||
|
- "traefik.http.routers.resume_router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.resume_router.service=resume_server"
|
||||||
|
- "traefik.http.services.resume_server.loadbalancer.server.port=80"
|
||||||
|
- "traefik.http.routers.blog_router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.blog_router.rule=Host(`blog.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.blog_router.middlewares=redirect-blog@file"
|
||||||
|
- "traefik.http.routers.blog_router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.blog_router.service=blog_server"
|
||||||
|
- "traefik.http.services.blog_server.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
emqx1:
|
||||||
|
image: emqx:latest
|
||||||
|
# environment:
|
||||||
|
# - "EMQX_NODE_NAME=emqx@node1.emqx.io"
|
||||||
|
# - "EMQX_CLUSTER__DISCOVERY_STRATEGY=static"
|
||||||
|
# - "EMQX_CLUSTER__STATIC__SEEDS=[emqx@node1.emqx.io,emqx@node2.emqx.io]"
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "/opt/emqx/bin/emqx", "ctl", "status"]
|
||||||
|
interval: 60s
|
||||||
|
timeout: 25s
|
||||||
|
retries: 5
|
||||||
|
networks:
|
||||||
|
net:
|
||||||
|
# emqx-bridge:
|
||||||
|
# aliases:
|
||||||
|
# - node1.emqx.io
|
||||||
|
ports:
|
||||||
|
- "1883:1883"
|
||||||
|
# - 8083:8083
|
||||||
|
# - 8084:8084
|
||||||
|
# - 8883:8883
|
||||||
|
# - 18083:18083
|
||||||
|
volumes:
|
||||||
|
- vol-emqx-data1:/opt/emqx/data
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.emqx1.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.emqx1.rule=Host(`mqtt.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.emqx1.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.emqx1.service=emqx-dashboard"
|
||||||
|
- "traefik.http.services.emqx-dashboard.loadbalancer.server.port=18083"
|
||||||
|
|
||||||
|
# emqx2:
|
||||||
|
# image: emqx:latest
|
||||||
|
# container_name: emqx2
|
||||||
|
# environment:
|
||||||
|
# - "EMQX_NODE_NAME=emqx@node2.emqx.io"
|
||||||
|
# - "EMQX_CLUSTER__DISCOVERY_STRATEGY=static"
|
||||||
|
# - "EMQX_CLUSTER__STATIC__SEEDS=[emqx@node1.emqx.io,emqx@node2.emqx.io]"
|
||||||
|
# healthcheck:
|
||||||
|
# test: ["CMD", "/opt/emqx/bin/emqx", "ctl", "status"]
|
||||||
|
# interval: 60s
|
||||||
|
# timeout: 25s
|
||||||
|
# retries: 5
|
||||||
|
# networks:
|
||||||
|
# net:
|
||||||
|
# emqx-bridge:
|
||||||
|
# aliases:
|
||||||
|
# - node2.emqx.io
|
||||||
|
# volumes:
|
||||||
|
# - vol-emqx-data2:/opt/emqx/data
|
||||||
|
|
||||||
|
mqttx-web:
|
||||||
|
image: emqx/mqttx-web:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.mqttx-web.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.mqttx-web.rule=Host(`mqttx.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.mqttx-web.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.mqttx-web.service=mqttx-web-service"
|
||||||
|
- "traefik.http.services.mqttx-web-service.loadbalancer.server.port=80"
|
||||||
|
|
||||||
|
librechat_api:
|
||||||
|
ports:
|
||||||
|
- "${PORT:-3080}:${PORT:-3080}"
|
||||||
|
depends_on:
|
||||||
|
- mongodb
|
||||||
|
- rag_api
|
||||||
|
image: ghcr.io/danny-avila/librechat-dev:latest
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
extra_hosts:
|
||||||
|
- "host.docker.internal:host-gateway"
|
||||||
|
environment:
|
||||||
|
- HOST=0.0.0.0
|
||||||
|
- MONGO_URI=mongodb://mongodb:27017/LibreChat
|
||||||
|
- MEILI_HOST=http://meilisearch:7700
|
||||||
|
- RAG_PORT=${RAG_PORT:-8000}
|
||||||
|
- RAG_API_URL=http://rag_api:${RAG_PORT:-8000}
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- type: bind
|
||||||
|
source: ~/config/.env
|
||||||
|
target: /app/.env
|
||||||
|
- libre-images:/app/client/public/images
|
||||||
|
- libre-logs:/app/api/logs
|
||||||
|
- type: bind
|
||||||
|
source: ./config/librechat.yaml
|
||||||
|
target: /app/librechat.yaml
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.librechat.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.librechat.rule=Host(`chat.${DOMAINNAME}`) || Host(`bot.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.librechat.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.librechat.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.librechat.service=librechat_app"
|
||||||
|
- "traefik.http.services.librechat_app.loadbalancer.server.port=${PORT:-3080}"
|
||||||
|
mongodb:
|
||||||
|
image: mongo
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
volumes:
|
||||||
|
- data-node:/data/db
|
||||||
|
command: mongod --noauth
|
||||||
|
meilisearch:
|
||||||
|
image: getmeili/meilisearch:v1.7.3
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
environment:
|
||||||
|
- MEILI_HOST=http://meilisearch:7700
|
||||||
|
- MEILI_NO_ANALYTICS=true
|
||||||
|
volumes:
|
||||||
|
- meili_data:/meili_data
|
||||||
|
vectordb:
|
||||||
|
image: ankane/pgvector:latest
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: mydatabase
|
||||||
|
POSTGRES_USER: myuser
|
||||||
|
POSTGRES_PASSWORD: mypassword
|
||||||
|
restart: always
|
||||||
|
volumes:
|
||||||
|
- pgdata2:/var/lib/postgresql/data
|
||||||
|
rag_api:
|
||||||
|
image: ghcr.io/danny-avila/librechat-rag-api-dev:latest
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: mydatabase
|
||||||
|
POSTGRES_USER: myuser
|
||||||
|
POSTGRES_PASSWORD: mypassword
|
||||||
|
DB_HOST: vectordb
|
||||||
|
RAG_PORT: ${RAG_PORT:-8000}
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- vectordb
|
||||||
|
env_file:
|
||||||
|
- .env
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -0,0 +1,81 @@
|
|||||||
|
services:
|
||||||
|
emqx1:
|
||||||
|
image: emqx:latest
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "/opt/emqx/bin/emqx", "ctl", "status"]
|
||||||
|
interval: 60s
|
||||||
|
timeout: 25s
|
||||||
|
retries: 5
|
||||||
|
volumes:
|
||||||
|
- emqx-data1:/opt/emqx/data
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
# ports:
|
||||||
|
# - target: 1883
|
||||||
|
# published: 1883
|
||||||
|
# mode: host
|
||||||
|
# - "1883:1883"
|
||||||
|
# - 8083:8083
|
||||||
|
# - 8084:8084
|
||||||
|
# - 8883:8883
|
||||||
|
# - 18083:18083
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.emqx1.emqx-data1 == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-mqtt.entrypoints=mqtt
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-mqtt.rule=HostSNI(`*`)
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-mqtt.service=emqx1-tcp-mqtt
|
||||||
|
- traefik.tcp.services.emqx1-tcp-mqtt.loadbalancer.server.port=1883
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-ws.entrypoints=web-socket
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-ws.rule=HostSNI(`*`)
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-ws.service=emqx1-tcp-ws
|
||||||
|
- traefik.tcp.services.emqx1-tcp-ws.loadbalancer.server.port=8083
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-wss.entrypoints=web-socket-secure
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-wss.rule=HostSNIRegexp(`^.+\\.${DOMAIN}$$`)
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-wss.tls.certresolver=le
|
||||||
|
- traefik.tcp.routers.emqx1-tcp-wss.service=emqx1-tcp-wss
|
||||||
|
- traefik.tcp.services.emqx1-tcp-wss.loadbalancer.server.port=8084
|
||||||
|
- traefik.http.routers.emqx1.entrypoints=https
|
||||||
|
- traefik.http.routers.emqx1.rule=Host(`mqtt.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.emqx1.tls.certresolver=le
|
||||||
|
- traefik.http.routers.emqx1.service=emqx-dashboard
|
||||||
|
- traefik.http.services.emqx-dashboard.loadbalancer.server.port=18083
|
||||||
|
- traefik.http.routers.emqx1-web.entrypoints=web-socket
|
||||||
|
- traefik.http.routers.emqx1-web.rule=Host(`broker.${DOMAIN}`) || Host(`mqtt.${DOMAIN}`) || Host(`mqttx.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.emqx1-web.tls.certresolver=le
|
||||||
|
- traefik.http.routers.emqx1-web.service=emqx1-web
|
||||||
|
- traefik.http.services.emqx1-web.loadbalancer.server.port=8083
|
||||||
|
- traefik.http.routers.emqx1-wss.entrypoints=web-socket-secure
|
||||||
|
- traefik.http.routers.emqx1-wss.rule=Host(`broker.${DOMAIN}`) || Host(`mqtt.${DOMAIN}`) || Host(`mqttx.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.emqx1-wss.tls.certresolver=le
|
||||||
|
- traefik.http.routers.emqx1-wss.service=emqx1-wss
|
||||||
|
- traefik.http.services.emqx1-wss.loadbalancer.server.port=8084
|
||||||
|
|
||||||
|
mqttx-web:
|
||||||
|
image: emqx/mqttx-web:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.mqttx-web.entrypoints=https
|
||||||
|
- traefik.http.routers.mqttx-web.rule=Host(`mqttx.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.mqttx-web.tls.certresolver=le
|
||||||
|
- traefik.http.routers.mqttx-web.service=mqttx-web-service
|
||||||
|
- traefik.http.services.mqttx-web-service.loadbalancer.server.port=80
|
||||||
|
|
||||||
|
networks:
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
emqx-data1:
|
||||||
|
driver: local
|
||||||
@@ -0,0 +1,57 @@
|
|||||||
|
networks:
|
||||||
|
ghost:
|
||||||
|
driver: overlay
|
||||||
|
attachable: true
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
services:
|
||||||
|
ghost-db:
|
||||||
|
image: mysql:8
|
||||||
|
security_opt:
|
||||||
|
- seccomp:unconfined
|
||||||
|
restart: always
|
||||||
|
command: --mysql-native-password=ON
|
||||||
|
environment:
|
||||||
|
MYSQL_ROOT_PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
volumes:
|
||||||
|
- /var/data/ghost_mysql:/var/lib/mysql
|
||||||
|
expose:
|
||||||
|
- 3306
|
||||||
|
networks:
|
||||||
|
- ghost
|
||||||
|
|
||||||
|
ghost-server:
|
||||||
|
image: ghost
|
||||||
|
cap_add:
|
||||||
|
- CAP_SYS_NICE
|
||||||
|
security_opt:
|
||||||
|
- seccomp:unconfined
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- ghost-db
|
||||||
|
environment:
|
||||||
|
url: https://ghost.${DOMAIN}
|
||||||
|
database__client: mysql
|
||||||
|
database__connection__host: ghost-db
|
||||||
|
database__connection__user: root
|
||||||
|
database__connection__password: ${POSTGRES_PASSWORD}
|
||||||
|
database__connection__database: ghost
|
||||||
|
DOMAIN: ${DOMAIN}
|
||||||
|
volumes:
|
||||||
|
- /var/data/ghost_content:/var/lib/ghost/content
|
||||||
|
expose:
|
||||||
|
- 2368
|
||||||
|
networks:
|
||||||
|
- ghost
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.ghost.entrypoints=https
|
||||||
|
- traefik.http.routers.ghost.rule=Host(`ghost.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.ghost.tls.certresolver=le
|
||||||
|
- traefik.http.routers.ghost.service=ghost_app
|
||||||
|
- traefik.http.services.ghost_app.loadbalancer.server.port=2368
|
||||||
@@ -0,0 +1,119 @@
|
|||||||
|
# Do not edit this file directly. Use a ‘docker-compose.override.yaml’ file if you can.
|
||||||
|
# Refer to `docker-compose.override.yaml.example’ for some sample configurations.
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
mongodb-data-node:
|
||||||
|
pgdata2:
|
||||||
|
libre-images:
|
||||||
|
libre-logs:
|
||||||
|
meili_data:
|
||||||
|
|
||||||
|
networks:
|
||||||
|
net:
|
||||||
|
driver: overlay
|
||||||
|
attachable: true
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
services:
|
||||||
|
librechat_api:
|
||||||
|
depends_on:
|
||||||
|
- mongodb
|
||||||
|
- rag_api
|
||||||
|
image: ghcr.io/danny-avila/librechat-dev:latest
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
extra_hosts:
|
||||||
|
- "host.docker.internal:host-gateway"
|
||||||
|
environment:
|
||||||
|
- HOST=0.0.0.0
|
||||||
|
- MONGO_URI=mongodb://mongodb:27017/LibreChat
|
||||||
|
- MEILI_HOST=http://meilisearch:7700
|
||||||
|
- RAG_PORT=${RAG_PORT:-8000}
|
||||||
|
- RAG_API_URL=http://rag_api:${RAG_PORT:-8000}
|
||||||
|
- DOMAIN=${DOMAIN}
|
||||||
|
volumes:
|
||||||
|
- type: bind
|
||||||
|
source: ~/config/.env
|
||||||
|
target: /app/.env
|
||||||
|
- libre-images:/app/client/public/images
|
||||||
|
- libre-logs:/app/api/logs
|
||||||
|
- type: bind
|
||||||
|
source: ~/config/librechat.yaml
|
||||||
|
target: /app/librechat.yaml
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.librechat.libre-images == true
|
||||||
|
- node.labels.librechat.libre-logs == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.librechat.entrypoints=https
|
||||||
|
- traefik.http.routers.librechat.rule=Host(`chat.${DOMAIN}`) || Host(`bot.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.librechat.tls.certresolver=le
|
||||||
|
- traefik.http.routers.librechat.service=librechat_app
|
||||||
|
- traefik.http.services.librechat_app.loadbalancer.server.port=${PORT}
|
||||||
|
mongodb:
|
||||||
|
image: mongo
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
command: mongod --noauth
|
||||||
|
volumes:
|
||||||
|
- mongodb-data-node:/data/db
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.librechat.mongodb-data-node == true
|
||||||
|
meilisearch:
|
||||||
|
image: getmeili/meilisearch:v1.7.3
|
||||||
|
restart: always
|
||||||
|
user: "${UID}:${GID}"
|
||||||
|
environment:
|
||||||
|
- MEILI_HOST=http://meilisearch:7700
|
||||||
|
- MEILI_NO_ANALYTICS=true
|
||||||
|
volumes:
|
||||||
|
- meili_data:/meili_data
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.librechat.meili_data == true
|
||||||
|
vectordb:
|
||||||
|
image: ankane/pgvector:latest
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: mydatabase
|
||||||
|
POSTGRES_USER: myuser
|
||||||
|
POSTGRES_PASSWORD: mypassword
|
||||||
|
restart: always
|
||||||
|
volumes:
|
||||||
|
- pgdata2:/var/lib/postgresql/data
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.librechat.pgdata2 == true
|
||||||
|
rag_api:
|
||||||
|
image: ghcr.io/danny-avila/librechat-rag-api-dev:latest
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: mydatabase
|
||||||
|
POSTGRES_USER: myuser
|
||||||
|
POSTGRES_PASSWORD: mypassword
|
||||||
|
DB_HOST: vectordb
|
||||||
|
RAG_PORT: ${RAG_PORT:-8000}
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- vectordb
|
||||||
|
env_file:
|
||||||
|
- .env
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
|
||||||
@@ -0,0 +1,48 @@
|
|||||||
|
services:
|
||||||
|
agent:
|
||||||
|
image: portainer/agent
|
||||||
|
environment:
|
||||||
|
AGENT_CLUSTER_ADDR: tasks.agent
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
- /var/lib/docker/volumes:/var/lib/docker/volumes
|
||||||
|
networks:
|
||||||
|
- agent-network
|
||||||
|
deploy:
|
||||||
|
mode: global
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.platform.os == linux
|
||||||
|
|
||||||
|
portainer:
|
||||||
|
image: portainer/portainer-ce
|
||||||
|
command: -H tcp://tasks.agent:9001 --tlsskipverify
|
||||||
|
volumes:
|
||||||
|
- portainer-data:/data
|
||||||
|
networks:
|
||||||
|
- agent-network
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
- node.labels.portainer.portainer-data == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.portainer-https.rule=Host(`port.${DOMAIN?Variable not set}`) || Host(`portainer.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.portainer-https.entrypoints=https
|
||||||
|
- traefik.http.routers.portainer-https.tls=true
|
||||||
|
- traefik.http.routers.portainer-https.tls.certresolver=le
|
||||||
|
- traefik.http.routers.portainer-https.service=portainer_service
|
||||||
|
- traefik.http.services.portainer_service.loadbalancer.server.port=9000
|
||||||
|
|
||||||
|
networks:
|
||||||
|
agent-network:
|
||||||
|
attachable: true
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
portainer-data:
|
||||||
@@ -0,0 +1,253 @@
|
|||||||
|
volumes:
|
||||||
|
minio_data: {}
|
||||||
|
neo4j_data: {}
|
||||||
|
neo4j_logs: {}
|
||||||
|
postgres_data: {}
|
||||||
|
|
||||||
|
services:
|
||||||
|
api_server:
|
||||||
|
image: furyhawk/listen:latest
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
environment:
|
||||||
|
DATABASE__HOSTNAME: ${DATABASE__HOSTNAME}
|
||||||
|
DATABASE__USERNAME: ${POSTGRES_USER}
|
||||||
|
DATABASE__PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
DATABASE__PORT: ${DATABASE__PORT}
|
||||||
|
DATABASE__DB: ${DATABASE__DB}
|
||||||
|
SECURITY__JWT_SECRET_KEY: ${SECURITY__JWT_SECRET_KEY}
|
||||||
|
SECURITY__BACKEND_CORS_ORIGINS: ${SECURITY__BACKEND_CORS_ORIGINS}
|
||||||
|
SECURITY__ALLOWED_HOSTS: ${SECURITY__ALLOWED_HOSTS}
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
ports:
|
||||||
|
- "8000:8000"
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.api_server.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.api_server.rule=Host(`api.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.api_server.middlewares=csrf@file, rate-limit@file"
|
||||||
|
- "traefik.http.routers.api_server.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.api_server.service=api_server_service"
|
||||||
|
- "traefik.http.services.api_server_service.loadbalancer.server.port=8000"
|
||||||
|
|
||||||
|
postgres_db:
|
||||||
|
image: postgres
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: ${POSTGRES_DB}
|
||||||
|
POSTGRES_USER: ${POSTGRES_USER}
|
||||||
|
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
PGDATA: "/var/lib/postgresql/data"
|
||||||
|
LANG: en_US.utf8
|
||||||
|
TZ: Asia/Singapore
|
||||||
|
# DOMAINNAME: ${DOMAINNAME}
|
||||||
|
command: ["postgres", "-c", "log_connections=on"]
|
||||||
|
volumes:
|
||||||
|
- postgres_data:/var/lib/postgresql/data
|
||||||
|
# - ./config/postgresql.conf:/etc/postgresql.conf
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD-SHELL", "pg_isready -d $${POSTGRES_DB} -U $${POSTGRES_USER}"]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 10
|
||||||
|
# ports:
|
||||||
|
# - "5432:5432"
|
||||||
|
expose:
|
||||||
|
- 5432
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.tcp.routers.postgres.entrypoints=postgres-socket"
|
||||||
|
- "traefik.tcp.routers.postgres.rule=HostSNI(`*`)"
|
||||||
|
- "traefik.tcp.routers.postgres.service=postgres_service"
|
||||||
|
- "traefik.tcp.services.postgres_service.loadbalancer.server.port=5432"
|
||||||
|
# - "traefik.tcp.middlewares.test-inflightconn.inflightconn.amount=10"
|
||||||
|
# - "traefik.tcp.routers.postgres.rule=HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
||||||
|
# - "traefik.tcp.routers.postgres.tls=true"
|
||||||
|
# - "traefik.tcp.routers.postgres.tls.certresolver=letsencrypt"
|
||||||
|
# - "traefik.tcp.routers.postgres.middlewares=test-inflightconn"
|
||||||
|
# - "traefik.http.routers.postgres.entrypoints=web-secure"
|
||||||
|
# - "traefik.http.routers.postgres.rule=Host(`db.${DOMAINNAME}`)"
|
||||||
|
# - "traefik.http.routers.postgres.middlewares=rate-limit@file, csrf@file"
|
||||||
|
# - "traefik.http.routers.postgres.tls.certresolver=letsencrypt"
|
||||||
|
# - "traefik.http.routers.postgres.service=postgres_service"
|
||||||
|
# - "traefik.http.services.postgres_service.loadbalancer.server.port=5432"
|
||||||
|
|
||||||
|
osrm-backend:
|
||||||
|
environment:
|
||||||
|
# OSRM manager setup
|
||||||
|
- OSRM_ALGORITHM=mld
|
||||||
|
- OSRM_THREADS=2
|
||||||
|
- OSRM_PORT=${OSRM_PORT:-5000}
|
||||||
|
- OSRM_PROFILE=/opt/car.lua
|
||||||
|
- OSRM_MAP_NAME=${OSRM_MAP_NAME}
|
||||||
|
- OSRM_GEOFABRIK_PATH=${OSRM_GEOFABRIK_PATH}
|
||||||
|
# Notify OSRM Manager to restart without stopping container
|
||||||
|
- OSRM_NOTIFY_FILEPATH=/data/osrm_notify.txt
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
image: furyhawk/osrm-backend:${OSRM_VERSION:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
expose:
|
||||||
|
- ${OSRM_PORT:-5000}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.osrm-backend.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.osrm-backend.rule=Host(`osrm.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.osrm-backend.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.osrm-backend.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.osrm-backend.service=osrm_backend_service"
|
||||||
|
- "traefik.http.services.osrm_backend_service.loadbalancer.server.port=${OSRM_PORT:-5000}"
|
||||||
|
|
||||||
|
minio-common:
|
||||||
|
image: minio/minio:latest
|
||||||
|
environment:
|
||||||
|
MINIO_ROOT_USER: "${MINIO_ROOT_USER:-minioadmin}"
|
||||||
|
MINIO_ROOT_PASSWORD: "${MINIO_ROOT_PASSWORD:-minioadmin}"
|
||||||
|
MINIO_OPTS: "--console-address :9001"
|
||||||
|
MINIO_SERVER_URL: https://minio.${DOMAINNAME}
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
# user: "1000:1000"
|
||||||
|
restart: unless-stopped
|
||||||
|
command: server /data --address :9000 --console-address :9001
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "mc", "ready", "local"]
|
||||||
|
interval: 60s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 5
|
||||||
|
volumes:
|
||||||
|
- minio_data:/data
|
||||||
|
expose:
|
||||||
|
- 9000
|
||||||
|
- 9001
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.minio-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.minio-router.rule=Host(`drive.${DOMAINNAME}`) || Host(`storage.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.minio-router.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.minio-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.minio-router.service=minio_common_service"
|
||||||
|
- "traefik.http.services.minio_common_service.loadbalancer.server.port=9001"
|
||||||
|
- "traefik.http.routers.minio-api-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.minio-api-router.rule=Host(`minio.${DOMAINNAME}`) || Host(`s3.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.minio-api-router.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.minio-api-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.minio-api-router.service=minio_api_service"
|
||||||
|
- "traefik.http.services.minio_api_service.loadbalancer.server.port=9000"
|
||||||
|
|
||||||
|
neo4j_server:
|
||||||
|
# Docker image to be used
|
||||||
|
image: ${NEO4J_DOCKER_IMAGE:-neo4j:latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
# Environment variables
|
||||||
|
environment:
|
||||||
|
NEO4J_AUTH: neo4j/${NEO4J_PASSWORD:-12345678}
|
||||||
|
NEO4J_dbms.default_listen_address: "0.0.0.0"
|
||||||
|
NEO4J_dbms.default_advertised_address: "neo4j.${DOMAINNAME}"
|
||||||
|
NEO4J_dbms.connector.bolt.advertised_address: ":443"
|
||||||
|
NEO4J_PLUGINS: '["apoc"]'
|
||||||
|
NEO4J_dbms_security_procedures_unrestricted: "apoc.*"
|
||||||
|
NEO4J_dbms_security_procedures_allowlist: "apoc.*"
|
||||||
|
NEO4J_server_memory_pagecache_size: 512M
|
||||||
|
NEO4J_server_memory_heap_max__size: 2G
|
||||||
|
DOMAINNAME: ${DOMAINNAME}
|
||||||
|
user: "1000:1000"
|
||||||
|
depends_on:
|
||||||
|
- traefik
|
||||||
|
volumes:
|
||||||
|
- neo4j_data:/data
|
||||||
|
- neo4j_logs:/logs
|
||||||
|
# Expose ports
|
||||||
|
expose:
|
||||||
|
- 7474
|
||||||
|
- 7687
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.neo4j-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.neo4j-router.rule=Host(`neo4j.${DOMAINNAME}`) && PathPrefix(`/neo4j`)||PathPrefix(`/browser`)"
|
||||||
|
- "traefik.http.routers.neo4j-router.middlewares=csrf@file, neo4j_strip@file"
|
||||||
|
- "traefik.http.routers.neo4j-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.neo4j-router.service=neo4j_browser"
|
||||||
|
- "traefik.http.services.neo4j_browser.loadbalancer.server.port=7474"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.rule=Host(`neo4j.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.neo4j-bolt-router.service=neo4j_bolt"
|
||||||
|
- "traefik.http.services.neo4j_bolt.loadbalancer.server.port=7687"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.entrypoints=bolt-socket"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.rule=HostSNIRegexp(`^.+\\.furyhawk\\.lol$`)"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.tls=true"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.tcp.routers.neo4j-bolt-router.service=neo4j_bolt"
|
||||||
|
- "traefik.tcp.services.neo4j_bolt.loadbalancer.server.port=7687"
|
||||||
|
|
||||||
|
syncthing:
|
||||||
|
image: syncthing/syncthing
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- ~/st-sync:/var/syncthing
|
||||||
|
ports:
|
||||||
|
- "8384:8384" # Web UI
|
||||||
|
- "22000:22000/tcp" # TCP file transfers
|
||||||
|
- "22000:22000/udp" # QUIC file transfers
|
||||||
|
- "21027:21027/udp" # Receive local discovery broadcasts
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.syncthing.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.syncthing.rule=Host(`sync.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.syncthing.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.syncthing.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.syncthing.service=syncthing_service"
|
||||||
|
- "traefik.http.services.syncthing_service.loadbalancer.server.port=8384"
|
||||||
|
|
||||||
|
dozzle:
|
||||||
|
image: amir20/dozzle:latest
|
||||||
|
restart: always
|
||||||
|
environment:
|
||||||
|
- DOMAINNAME=${DOMAINNAME}
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
expose:
|
||||||
|
- 8080
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.dozzle.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.dozzle.rule=Host(`log.${DOMAINNAME}`)"
|
||||||
|
- "traefik.http.routers.dozzle.middlewares=auth@file, csrf@file"
|
||||||
|
- "traefik.http.routers.dozzle.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.dozzle.service=dozzle_service"
|
||||||
|
- "traefik.http.services.dozzle_service.loadbalancer.server.port=8080"
|
||||||
|
|
||||||
|
# WhoAmI - For Testing and Troubleshooting
|
||||||
|
whoami:
|
||||||
|
image: traefik/whoami
|
||||||
|
security_opt:
|
||||||
|
- no-new-privileges:true
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.whoami-rtr.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.whoami-rtr.rule=Host(`whoami.$DOMAINNAME`)"
|
||||||
|
- "traefik.http.routers.whoami-rtr.middlewares=csrf@file"
|
||||||
|
- "traefik.http.routers.whoami-rtr.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.whoami-rtr.service=whoami-svc"
|
||||||
|
- "traefik.http.services.whoami-svc.loadbalancer.server.port=80"
|
||||||
@@ -0,0 +1,185 @@
|
|||||||
|
services:
|
||||||
|
|
||||||
|
api_server:
|
||||||
|
image: furyhawk/listen:v0.1.13
|
||||||
|
restart: always
|
||||||
|
depends_on:
|
||||||
|
- postgres_db
|
||||||
|
environment:
|
||||||
|
DATABASE__HOSTNAME: ${DATABASE__HOSTNAME}
|
||||||
|
DATABASE__USERNAME: ${POSTGRES_USER}
|
||||||
|
DATABASE__PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
DATABASE__PORT: ${DATABASE__PORT}
|
||||||
|
DATABASE__DB: ${DATABASE__DB}
|
||||||
|
SECURITY__JWT_SECRET_KEY: ${SECURITY__JWT_SECRET_KEY}
|
||||||
|
SECURITY__BACKEND_CORS_ORIGINS: ${SECURITY__BACKEND_CORS_ORIGINS}
|
||||||
|
SECURITY__ALLOWED_HOSTS: ${SECURITY__ALLOWED_HOSTS}
|
||||||
|
DOMAIN: ${DOMAIN}
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.api_server.entrypoints=https
|
||||||
|
- traefik.http.routers.api_server.rule=Host(`api.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.api_server.tls.certresolver=le
|
||||||
|
- traefik.http.routers.api_server.service=api_server_service
|
||||||
|
- traefik.http.services.api_server_service.loadbalancer.server.port=8000
|
||||||
|
|
||||||
|
dozzle:
|
||||||
|
image: amir20/dozzle:latest
|
||||||
|
restart: always
|
||||||
|
environment:
|
||||||
|
- DOMAIN=${DOMAIN}
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.dozzle.entrypoints=https
|
||||||
|
- traefik.http.routers.dozzle.rule=Host(`log.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.dozzle.middlewares=admin-auth
|
||||||
|
- traefik.http.routers.dozzle.tls.certresolver=le
|
||||||
|
- traefik.http.routers.dozzle.service=dozzle_service
|
||||||
|
- traefik.http.services.dozzle_service.loadbalancer.server.port=8080
|
||||||
|
|
||||||
|
minio-common:
|
||||||
|
image: minio/minio:latest
|
||||||
|
environment:
|
||||||
|
MINIO_ROOT_USER: "${MINIO_ROOT_USER:-minioadmin}"
|
||||||
|
MINIO_ROOT_PASSWORD: "${MINIO_ROOT_PASSWORD:-minioadmin}"
|
||||||
|
MINIO_OPTS: "--console-address :9001"
|
||||||
|
MINIO_SERVER_URL: https://minio.${DOMAIN}
|
||||||
|
DOMAIN: ${DOMAIN}
|
||||||
|
restart: unless-stopped
|
||||||
|
command: server /data --address :9000 --console-address :9001
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "mc", "ready", "local"]
|
||||||
|
interval: 60s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 5
|
||||||
|
volumes:
|
||||||
|
- /var/data/minio_data:/data
|
||||||
|
expose:
|
||||||
|
- 9000
|
||||||
|
- 9001
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.minio-router.entrypoints=https
|
||||||
|
- traefik.http.routers.minio-router.rule=Host(`drive.${DOMAIN}`) || Host(`storage.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.minio-router.tls.certresolver=le
|
||||||
|
- traefik.http.routers.minio-router.service=minio_common_service
|
||||||
|
- traefik.http.services.minio_common_service.loadbalancer.server.port=9001
|
||||||
|
- traefik.http.routers.minio-api-router.entrypoints=https
|
||||||
|
- traefik.http.routers.minio-api-router.rule=Host(`minio.${DOMAIN}`) || Host(`s3.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.minio-api-router.tls.certresolver=le
|
||||||
|
- traefik.http.routers.minio-api-router.service=minio_api_service
|
||||||
|
- traefik.http.services.minio_api_service.loadbalancer.server.port=9000
|
||||||
|
|
||||||
|
osrm-backend:
|
||||||
|
environment:
|
||||||
|
# OSRM manager setup
|
||||||
|
- OSRM_ALGORITHM=mld
|
||||||
|
- OSRM_THREADS=2
|
||||||
|
- OSRM_PORT=${OSRM_PORT:-5000}
|
||||||
|
- OSRM_PROFILE=/opt/car.lua
|
||||||
|
- OSRM_MAP_NAME=${OSRM_MAP_NAME}
|
||||||
|
- OSRM_GEOFABRIK_PATH=${OSRM_GEOFABRIK_PATH}
|
||||||
|
# Notify OSRM Manager to restart without stopping container
|
||||||
|
- OSRM_NOTIFY_FILEPATH=/data/osrm_notify.txt
|
||||||
|
- DOMAIN=${DOMAIN}
|
||||||
|
image: furyhawk/osrm-backend:${OSRM_VERSION:-latest}
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.osrm-backend.entrypoints=https
|
||||||
|
- traefik.http.routers.osrm-backend.rule=Host(`osrm.${DOMAIN}`)
|
||||||
|
- traefik.http.routers.osrm-backend.middlewares=rate-limit
|
||||||
|
- traefik.http.routers.osrm-backend.tls.certresolver=le
|
||||||
|
- traefik.http.routers.osrm-backend.service=osrm_backend_service
|
||||||
|
- traefik.http.services.osrm_backend_service.loadbalancer.server.port=${OSRM_PORT:-5000}
|
||||||
|
|
||||||
|
postgres_db:
|
||||||
|
image: postgres
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: ${POSTGRES_DB}
|
||||||
|
POSTGRES_USER: ${POSTGRES_USER}
|
||||||
|
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
|
||||||
|
PGDATA: "/var/lib/postgresql/data"
|
||||||
|
LANG: en_US.utf8
|
||||||
|
TZ: Asia/Singapore
|
||||||
|
command: ["postgres", "-c", "log_connections=on"]
|
||||||
|
volumes:
|
||||||
|
- postgres_data:/var/lib/postgresql/data
|
||||||
|
# - ./config/postgresql.conf:/etc/postgresql.conf
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD-SHELL", "pg_isready -d $${POSTGRES_DB} -U $${POSTGRES_USER}"]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 10
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.postgres.postgres_data == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.tcp.routers.postgres.entrypoints=postgres-socket
|
||||||
|
- traefik.tcp.routers.postgres.rule=HostSNI(`*`)
|
||||||
|
- traefik.tcp.routers.postgres.service=postgres_service
|
||||||
|
- traefik.tcp.services.postgres_service.loadbalancer.server.port=5432
|
||||||
|
|
||||||
|
# WhoAmI - For Testing and Troubleshooting
|
||||||
|
whoami:
|
||||||
|
image: traefik/whoami
|
||||||
|
security_opt:
|
||||||
|
- no-new-privileges:true
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.whoami-rtr.entrypoints=https
|
||||||
|
- traefik.http.routers.whoami-rtr.rule=Host(`whoami.$DOMAIN`)
|
||||||
|
- traefik.http.routers.whoami-rtr.tls.certresolver=le
|
||||||
|
- traefik.http.routers.whoami-rtr.service=whoami-svc
|
||||||
|
- traefik.http.services.whoami-svc.loadbalancer.server.port=80
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
# minio_data: {}
|
||||||
|
# neo4j_data: {}
|
||||||
|
# neo4j_logs: {}
|
||||||
|
postgres_data: {}
|
||||||
|
networks:
|
||||||
|
net:
|
||||||
|
driver: overlay
|
||||||
|
attachable: true
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
@@ -0,0 +1,96 @@
|
|||||||
|
services:
|
||||||
|
app:
|
||||||
|
image: swarmpit/swarmpit:latest
|
||||||
|
environment:
|
||||||
|
- SWARMPIT_DB=http://db:5984
|
||||||
|
- SWARMPIT_INFLUXDB=http://influxdb:8086
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.50'
|
||||||
|
memory: 1024M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.25'
|
||||||
|
memory: 512M
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.swarmpit-https.rule=Host(`swarmpit.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.swarmpit-https.entrypoints=https
|
||||||
|
- traefik.http.routers.swarmpit-https.tls=true
|
||||||
|
- traefik.http.routers.swarmpit-https.tls.certresolver=le
|
||||||
|
- traefik.http.services.swarmpit.loadbalancer.server.port=8080
|
||||||
|
|
||||||
|
db:
|
||||||
|
image: couchdb:2.3
|
||||||
|
volumes:
|
||||||
|
- db-data:/opt/couchdb/data
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.30'
|
||||||
|
memory: 512M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.15'
|
||||||
|
memory: 256M
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.swarmpit.db-data == true
|
||||||
|
influxdb:
|
||||||
|
image: influxdb:1.7
|
||||||
|
volumes:
|
||||||
|
- influx-data:/var/lib/influxdb
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
reservations:
|
||||||
|
cpus: '0.3'
|
||||||
|
memory: 128M
|
||||||
|
limits:
|
||||||
|
cpus: '0.6'
|
||||||
|
memory: 512M
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.swarmpit.influx-data == true
|
||||||
|
agent:
|
||||||
|
image: swarmpit/agent:latest
|
||||||
|
environment:
|
||||||
|
- DOCKER_API_VERSION=1.35
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
deploy:
|
||||||
|
mode: global
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.10'
|
||||||
|
memory: 64M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.05'
|
||||||
|
memory: 32M
|
||||||
|
|
||||||
|
networks:
|
||||||
|
net:
|
||||||
|
driver: overlay
|
||||||
|
attachable: true
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
db-data:
|
||||||
|
driver: local
|
||||||
|
influx-data:
|
||||||
|
driver: local
|
||||||
@@ -0,0 +1,222 @@
|
|||||||
|
networks:
|
||||||
|
net:
|
||||||
|
driver: overlay
|
||||||
|
attachable: true
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
prometheus: {}
|
||||||
|
grafana: {}
|
||||||
|
alertmanager: {}
|
||||||
|
|
||||||
|
configs:
|
||||||
|
dockerd_config:
|
||||||
|
file: ./dockerd-exporter/Caddyfile
|
||||||
|
node_rules:
|
||||||
|
file: ./prometheus/rules/swarm_node.rules.yml
|
||||||
|
task_rules:
|
||||||
|
file: ./prometheus/rules/swarm_task.rules.yml
|
||||||
|
|
||||||
|
services:
|
||||||
|
dockerd-exporter:
|
||||||
|
image: stefanprodan/caddy
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
environment:
|
||||||
|
- DOCKER_GWBRIDGE_IP=172.18.0.1
|
||||||
|
configs:
|
||||||
|
- source: dockerd_config
|
||||||
|
target: /etc/caddy/Caddyfile
|
||||||
|
deploy:
|
||||||
|
mode: global
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 128M
|
||||||
|
reservations:
|
||||||
|
memory: 64M
|
||||||
|
|
||||||
|
cadvisor:
|
||||||
|
image: gcr.io/cadvisor/cadvisor
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
command: -logtostderr -docker_only
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
|
- /:/rootfs:ro
|
||||||
|
- /var/run:/var/run
|
||||||
|
- /sys:/sys:ro
|
||||||
|
- /var/lib/docker/:/var/lib/docker:ro
|
||||||
|
deploy:
|
||||||
|
mode: global
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 128M
|
||||||
|
reservations:
|
||||||
|
memory: 64M
|
||||||
|
|
||||||
|
grafana:
|
||||||
|
image: stefanprodan/swarmprom-grafana:5.3.4
|
||||||
|
networks:
|
||||||
|
- default
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
environment:
|
||||||
|
- GF_SECURITY_ADMIN_USER=${ADMIN_USER:-admin}
|
||||||
|
- GF_SECURITY_ADMIN_PASSWORD=${ADMIN_PASSWORD:-admin}
|
||||||
|
- GF_USERS_ALLOW_SIGN_UP=false
|
||||||
|
#- GF_SERVER_ROOT_URL=${GF_SERVER_ROOT_URL:-localhost}
|
||||||
|
#- GF_SMTP_ENABLED=${GF_SMTP_ENABLED:-false}
|
||||||
|
#- GF_SMTP_FROM_ADDRESS=${GF_SMTP_FROM_ADDRESS:-grafana@test.com}
|
||||||
|
#- GF_SMTP_FROM_NAME=${GF_SMTP_FROM_NAME:-Grafana}
|
||||||
|
#- GF_SMTP_HOST=${GF_SMTP_HOST:-smtp:25}
|
||||||
|
#- GF_SMTP_USER=${GF_SMTP_USER}
|
||||||
|
#- GF_SMTP_PASSWORD=${GF_SMTP_PASSWORD}
|
||||||
|
volumes:
|
||||||
|
- grafana:/var/lib/grafana
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 128M
|
||||||
|
reservations:
|
||||||
|
memory: 64M
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.swarmprom-grafana-https.rule=Host(`grafana.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.swarmprom-grafana-https.entrypoints=https
|
||||||
|
- traefik.http.routers.swarmprom-grafana-https.tls=true
|
||||||
|
- traefik.http.routers.swarmprom-grafana-https.tls.certresolver=le
|
||||||
|
- traefik.http.services.swarmprom-grafana.loadbalancer.server.port=3000
|
||||||
|
|
||||||
|
alertmanager:
|
||||||
|
image: stefanprodan/swarmprom-alertmanager:v0.14.0
|
||||||
|
networks:
|
||||||
|
- default
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
environment:
|
||||||
|
- SLACK_URL=${SLACK_URL:-https://hooks.slack.com/services/TOKEN}
|
||||||
|
- SLACK_CHANNEL=${SLACK_CHANNEL:-general}
|
||||||
|
- SLACK_USER=${SLACK_USER:-alertmanager}
|
||||||
|
command:
|
||||||
|
- '--config.file=/etc/alertmanager/alertmanager.yml'
|
||||||
|
- '--storage.path=/alertmanager'
|
||||||
|
volumes:
|
||||||
|
- alertmanager:/alertmanager
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 128M
|
||||||
|
reservations:
|
||||||
|
memory: 64M
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.swarmprom-alertmanager-https.rule=Host(`alertmanager.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.swarmprom-alertmanager-https.entrypoints=https
|
||||||
|
- traefik.http.routers.swarmprom-alertmanager-https.tls=true
|
||||||
|
- traefik.http.routers.swarmprom-alertmanager-https.tls.certresolver=le
|
||||||
|
- traefik.http.services.swarmprom-alertmanager.loadbalancer.server.port=9093
|
||||||
|
- traefik.http.middlewares.swarmprom-alertmanager-auth.basicauth.users=${ADMIN_USER?Variable not set}:${HASHED_PASSWORD?Variable not set}
|
||||||
|
- traefik.http.routers.swarmprom-alertmanager-https.middlewares=swarmprom-alertmanager-auth
|
||||||
|
|
||||||
|
unsee:
|
||||||
|
image: cloudflare/unsee:v0.8.0
|
||||||
|
networks:
|
||||||
|
- default
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
environment:
|
||||||
|
- "ALERTMANAGER_URIS=default:http://alertmanager:9093"
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.swarmprom-unsee-https.rule=Host(`unsee.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.swarmprom-unsee-https.entrypoints=https
|
||||||
|
- traefik.http.routers.swarmprom-unsee-https.tls=true
|
||||||
|
- traefik.http.routers.swarmprom-unsee-https.tls.certresolver=le
|
||||||
|
- traefik.http.services.swarmprom-unsee.loadbalancer.server.port=8080
|
||||||
|
- traefik.http.middlewares.swarmprom-unsee-auth.basicauth.users=${ADMIN_USER?Variable not set}:${HASHED_PASSWORD?Variable not set}
|
||||||
|
- traefik.http.routers.swarmprom-unsee-https.middlewares=swarmprom-unsee-auth
|
||||||
|
|
||||||
|
node-exporter:
|
||||||
|
image: stefanprodan/swarmprom-node-exporter:v0.16.0
|
||||||
|
networks:
|
||||||
|
- net
|
||||||
|
environment:
|
||||||
|
- NODE_ID={{.Node.ID}}
|
||||||
|
volumes:
|
||||||
|
- /proc:/host/proc:ro
|
||||||
|
- /sys:/host/sys:ro
|
||||||
|
- /:/rootfs:ro
|
||||||
|
- /etc/hostname:/etc/nodename
|
||||||
|
command:
|
||||||
|
- '--path.sysfs=/host/sys'
|
||||||
|
- '--path.procfs=/host/proc'
|
||||||
|
- '--collector.textfile.directory=/etc/node-exporter/'
|
||||||
|
- '--collector.filesystem.ignored-mount-points=^/(sys|proc|dev|host|etc)($$|/)'
|
||||||
|
- '--no-collector.ipvs'
|
||||||
|
deploy:
|
||||||
|
mode: global
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 128M
|
||||||
|
reservations:
|
||||||
|
memory: 64M
|
||||||
|
|
||||||
|
prometheus:
|
||||||
|
image: stefanprodan/swarmprom-prometheus:v2.5.0
|
||||||
|
networks:
|
||||||
|
- default
|
||||||
|
- net
|
||||||
|
- traefik-public
|
||||||
|
command:
|
||||||
|
- '--config.file=/etc/prometheus/prometheus.yml'
|
||||||
|
- '--storage.tsdb.path=/prometheus'
|
||||||
|
- '--storage.tsdb.retention=${PROMETHEUS_RETENTION:-24h}'
|
||||||
|
volumes:
|
||||||
|
- prometheus:/prometheus
|
||||||
|
configs:
|
||||||
|
- source: node_rules
|
||||||
|
target: /etc/prometheus/swarm_node.rules.yml
|
||||||
|
- source: task_rules
|
||||||
|
target: /etc/prometheus/swarm_task.rules.yml
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 2048M
|
||||||
|
reservations:
|
||||||
|
memory: 128M
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.swarmprom-prometheus-https.rule=Host(`prometheus.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.swarmprom-prometheus-https.entrypoints=https
|
||||||
|
- traefik.http.routers.swarmprom-prometheus-https.tls=true
|
||||||
|
- traefik.http.routers.swarmprom-prometheus-https.tls.certresolver=le
|
||||||
|
- traefik.http.services.swarmprom-prometheus.loadbalancer.server.port=9090
|
||||||
|
- traefik.http.middlewares.swarmprom-prometheus-auth.basicauth.users=${ADMIN_USER?Variable not set}:${HASHED_PASSWORD?Variable not set}
|
||||||
|
- traefik.http.routers.swarmprom-prometheus-https.middlewares=swarmprom-prometheus-auth
|
||||||
@@ -0,0 +1,27 @@
|
|||||||
|
services:
|
||||||
|
thelounge:
|
||||||
|
image: thelounge/thelounge:latest
|
||||||
|
volumes:
|
||||||
|
- thelounge-data:/var/opt/thelounge
|
||||||
|
networks:
|
||||||
|
- traefik-public
|
||||||
|
deploy:
|
||||||
|
# placement:
|
||||||
|
# constraints:
|
||||||
|
# - node.labels.thelounge.thelounge-data == true
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network=traefik-public
|
||||||
|
- traefik.constraint-label=traefik-public
|
||||||
|
- traefik.http.routers.thelounge-https.rule=Host(`irc.${DOMAIN?Variable not set}`)
|
||||||
|
- traefik.http.routers.thelounge-https.entrypoints=https
|
||||||
|
- traefik.http.routers.thelounge-https.tls=true
|
||||||
|
- traefik.http.routers.thelounge-https.tls.certresolver=le
|
||||||
|
- traefik.http.services.thelounge.loadbalancer.server.port=9000
|
||||||
|
|
||||||
|
networks:
|
||||||
|
traefik-public:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
thelounge-data:
|
||||||
Reference in New Issue
Block a user