-
Notifications
You must be signed in to change notification settings - Fork 136
Expand file tree
/
Copy pathdocker-compose.tls.yml
More file actions
117 lines (109 loc) · 2.84 KB
/
docker-compose.tls.yml
File metadata and controls
117 lines (109 loc) · 2.84 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
services:
elasticsearch:
extends:
file: docker-compose.yml
service: elasticsearch
kibana_settings:
depends_on:
elasticsearch:
condition: service_healthy
extends:
file: docker-compose.yml
service: kibana_settings
kibana_certs:
image: alpine/mkcert:latest@sha256:a8f4f5af61908b4c79c2e9d1e5f23e747f29de174649209ebafcab03d4f6d5fd
restart: 'no'
volumes:
- kibana-certs:/certs
environment:
CAROOT: /certs
entrypoint: ash
command: >
-c '
mkcert --cert-file=/certs/kibana.crt --key-file=/certs/kibana.key kibana localhost;
chown 1000:1000 /certs/*;
'
kibana:
depends_on:
kibana_settings:
condition: service_completed_successfully
kibana_certs:
condition: service_completed_successfully
extends:
file: docker-compose.yml
service: kibana
volumes:
- dev-kibana:/usr/share/kibana/data
- ./${KIBANA_CONFIG_FILE:-kibana.yml}:/usr/share/kibana/config/kibana.yml:ro
- kibana-certs:/certs:ro
environment:
SERVER_SSL_CERTIFICATE: /certs/kibana.crt
SERVER_SSL_KEY: /certs/kibana.key
SERVER_SSL_ENABLED: true
healthcheck:
test:
[
"CMD-SHELL",
"curl -s --cacert /certs/rootCA.pem -w \"%{http_code}\" https://kibana:5601 | grep -q '302'",
]
interval: 10s
timeout: 10s
retries: 30
fleet_settings:
depends_on:
kibana:
condition: service_healthy
extends:
file: docker-compose.yml
service: fleet_settings
volumes:
- kibana-certs:/certs:ro
environment:
CACERT: --cacert /certs/rootCA.pem
KIBANA_HOST: https://kibana:5601
fleet:
depends_on:
kibana:
condition: service_healthy
extends:
file: docker-compose.yml
service: fleet
volumes:
- dev-fleet:/usr/share/elastic-agent/data
- kibana-certs:/certs:ro
environment:
KIBANA_HOST: https://kibana:5601
KIBANA_CA: /certs/rootCA.pem
acceptance-tests:
profiles: ["acceptance-tests"]
depends_on:
fleet:
condition: service_started
extends:
file: docker-compose.yml
service: acceptance-tests
volumes:
- ./:/provider
- kibana-certs:/certs:ro
environment:
KIBANA_ENDPOINT: https://kibana:5601
KIBANA_CA_CERTS: /certs/rootCA.pem
token-acceptance-tests:
profiles: ["token-acceptance-tests"]
depends_on:
fleet:
condition: service_started
extends:
service: acceptance-tests
volumes:
- ./:/provider
- kibana-certs:/certs:ro
environment:
ELASTICSEARCH_BEARER_TOKEN: ${ELASTICSEARCH_BEARER_TOKEN:-}
KIBANA_USERNAME: elastic
KIBANA_PASSWORD: ${ELASTICSEARCH_PASSWORD}
volumes:
dev-elasticsearch:
dev-kibana:
dev-fleet:
kibana-certs: