Skip to content

Commit 9049378

Browse files
committed
Add Letsencrypt automatic cert generation for monitoring packages
1 parent 0882027 commit 9049378

File tree

3 files changed

+37
-7
lines changed

3 files changed

+37
-7
lines changed

.env.traefik.remote

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,3 +51,10 @@ OPENHIM_API_HOST=https://c9a4-41-90-68-240.ngrok-free.app/openhimcomms
5151
OPENHIM_API_PORT=443/openhimcomms
5252
OPENHIM_HOST_NAME=c9a4-41-90-68-240.ngrok-free.app
5353
CERT_RESOLVER=le
54+
CA_SERVER=https://acme-v02.api.letsencrypt.org/directory
55+
OPENHIM_CORE_IMAGE=jembi/openhim-core:prerelease
56+
OPENHIM_CONSOLE_IMAGE=jembi/openhim-console:poc-microfrontend-prelease
57+
GF_SERVER_ROOT_URL=https://<domain>/grafana
58+
GF_SERVER_DOMAIN=<domain>
59+
MINIO_BROWSER_REDIRECT_URL=https://<domain>/minio
60+
DOMAIN_NAME_HOST_TRAEFIK=<domain>

identity-access-manager-keycloak/docker-compose.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ services:
88
"start",
99
"--proxy=edge",
1010
"--hostname-url=${KC_FRONTEND_URL}",
11-
"--import-realm",
11+
"--import-realm"
1212
]
1313
hostname: identity-access-manager-keycloak
1414
healthcheck:
@@ -49,17 +49,20 @@ services:
4949
- traefik.enable=true
5050
- traefik.docker.network=reverse-proxy-traefik_public
5151
- traefik.http.routers.identity-access-manager-keycloak.service=identity-access-manager-keycloak
52+
- traefik.http.services.identity-access-manager-keycloak.loadbalancer.server.scheme=http
5253
- traefik.http.services.identity-access-manager-keycloak.loadbalancer.server.port=8080
5354
- traefik.http.routers.identity-access-manager-keycloak.rule=Host(`${KC_TRAEFIK_SUBDOMAIN}.${DOMAIN_NAME_HOST_TRAEFIK}`)
5455
- traefik.http.routers.identity-access-manager-keycloak.tls=true
5556
- traefik.http.routers.identity-access-manager-keycloak.tls.certresolver=${CERT_RESOLVER}
57+
- traefik.http.routers.identity-access-manager-keycloak.entrypoints=websecure
5658
networks:
5759
reverse-proxy:
5860
public:
5961
traefik:
6062
default:
6163
postgres:
6264

65+
6366
configs:
6467
realm.json:
6568
file: ./config/realm.json

monitoring/docker-compose.yml

Lines changed: 26 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,13 @@ services:
1010
- traefik.enable=true
1111
- traefik.docker.network=reverse-proxy-traefik_public
1212
- traefik.http.routers.grafana.service=grafana
13-
- traefik.http.services.grafana.loadbalancer.server.port=3000
14-
- traefik.http.routers.grafana.rule=Host(${DOMAIN_NAME_HOST_TRAEFIK} && PathPrefix(`/grafana`)
13+
- traefik.http.routers.grafana.rule=Host(`${DOMAIN_NAME_HOST_TRAEFIK}`) && PathPrefix(`/grafana`)
14+
- traefik.http.routers.grafana.tls=true
15+
- traefik.http.services.grafana.loadbalancer.server.scheme=http
16+
- traefik.http.routers.grafana.entrypoints=websecure
17+
- traefik.http.routers.grafana.tls.certresolver=le
18+
- traefik.http.middlewares.grafana-stripprefix.stripprefix.prefixes=/grafana
19+
- traefik.http.routers.grafana.middlewares=grafana-stripprefix
1520
environment:
1621
GF_SECURITY_ADMIN_USER: ${GF_SECURITY_ADMIN_USER}
1722
GF_SECURITY_ADMIN_PASSWORD: ${GF_SECURITY_ADMIN_PASSWORD}
@@ -37,8 +42,8 @@ services:
3742
GF_AUTH_GENERIC_OAUTH_TOKEN_URL: "${KC_API_URL}/realms/${KC_REALM_NAME}/protocol/openid-connect/token"
3843
GF_AUTH_GENERIC_OAUTH_API_URL: "${KC_API_URL}/realms/${KC_REALM_NAME}/protocol/openid-connect/userinfo"
3944
GF_AUTH_GENERIC_OAUTH_ROLE_ATTRIBUTE_PATH: "contains(roles[*], 'admin') && 'Admin' || contains(roles[*], 'editor') && 'Editor' || 'Viewer'"
40-
GF_SERVER_DOMAIN: ${GF_SERVER_DOMAIN}
41-
GF_SERVER_ROOT_URL: ${KC_GRAFANA_ROOT_URL}
45+
GF_SERVER_DOMAIN: ${DOMAIN_NAME_HOST_TRAEFIK}
46+
GF_SERVER_ROOT_URL: ${DOMAIN_NAME_HOST_TRAEFIK}
4247
GF_SERVER_SERVE_FROM_SUB_PATH: ${GF_SERVER_SERVE_FROM_SUB_PATH}
4348
GF_AUTH_SIGNOUT_REDIRECT_URL: "${KC_FRONTEND_URL}/realms/${KC_REALM_NAME}/protocol/openid-connect/logout?client_id=${KC_GRAFANA_CLIENT_ID}&post_logout_redirect_uri=${KC_GRAFANA_ROOT_URL}/login"
4449
configs:
@@ -72,6 +77,7 @@ services:
7277
traefik:
7378
default:
7479

80+
7581
prometheus:
7682
image: prom/prometheus:v2.38.0
7783
user: root
@@ -92,6 +98,7 @@ services:
9298
public:
9399
default:
94100

101+
95102
cadvisor:
96103
image: gcr.io/cadvisor/cadvisor:v0.45.0
97104
command: -docker_only
@@ -152,7 +159,13 @@ services:
152159
MINIO_BROWSER_REDIRECT_URL: ${MINIO_BROWSER_REDIRECT_URL}
153160
MINIO_SERVER_URL: http://localhost:9000
154161
healthcheck:
155-
test: ["CMD", "curl", "-f", "http://localhost:9000/minio/health/live"]
162+
test:
163+
[
164+
"CMD",
165+
"curl",
166+
"-f",
167+
"http://localhost:9000/minio/health/live"
168+
]
156169
interval: 30s
157170
timeout: 20s
158171
retries: 3
@@ -165,15 +178,21 @@ services:
165178
labels:
166179
- traefik.enable=true
167180
- traefik.docker.network=reverse-proxy-traefik_public
168-
- traefik.http.routers.minio.rule=${DOMAIN_NAME_HOST_TRAEFIK} && PathPrefix(`/minio`)
181+
- traefik.http.routers.minio.service=minio
182+
- traefik.http.routers.minio.rule=Host(`${DOMAIN_NAME_HOST_TRAEFIK}`) && PathPrefix(`/minio`)
169183
- traefik.http.services.minio.loadbalancer.server.port=9001
184+
- traefik.http.routers.minio.tls=true
185+
- traefik.http.services.minio.loadbalancer.server.scheme=http
186+
- traefik.http.routers.minio.entrypoints=websecure
187+
- traefik.http.routers.minio.tls.certresolver=le
170188
- traefik.http.middlewares.minio-stripprefix.stripprefix.prefixes=/minio
171189
- traefik.http.routers.minio.middlewares=minio-stripprefix
172190
networks:
173191
reverse-proxy:
174192
traefik:
175193
default:
176194

195+
177196
configs:
178197
grafana.ini:
179198
file: ./grafana/grafana.ini
@@ -258,6 +277,7 @@ volumes:
258277
minio-01-data1:
259278
minio-01-data2:
260279

280+
261281
networks:
262282
keycloak:
263283
name: keycloak_public

0 commit comments

Comments
 (0)