-
-
Save matteyeux/31b27fd6017e2c079d512913966f7acf to your computer and use it in GitHub Desktop.
docker-compose version 3.8 for Elasticsearch and Kibana
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Password for the 'elastic' user (at least 6 characters) | |
ELASTIC_PASSWORD=pouet | |
# Password for the 'kibana_system' user (at least 6 characters) | |
KIBANA_PASSWORD=pouetpouet | |
# Version of Elastic products | |
STACK_VERSION=8.3.2 | |
# Set the cluster name | |
CLUSTER_NAME=docker-cluster | |
# Set to 'basic' or 'trial' to automatically start the 30-day trial | |
LICENSE=basic | |
#LICENSE=trial | |
# Port to expose Elasticsearch HTTP API to the host | |
ES_PORT=127.0.0.1:9200 | |
# Port to expose Kibana to the host | |
KIBANA_PORT=5601 | |
#KIBANA_PORT=80 | |
# Increase or decrease based on the available host memory (in bytes) | |
MEM_LIMIT=1073741824 | |
# Project namespace (defaults to the current folder name if not set) | |
#COMPOSE_PROJECT_NAME=myproject |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
version: "3.8" | |
services: | |
setup: | |
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} | |
volumes: | |
- ./certs:/usr/share/elasticsearch/config/certs | |
#- ./es_certs/:/usr/share/elasticsearch/config/certs/ | |
user: "0" | |
command: > | |
bash -c ' | |
if [ x${ELASTIC_PASSWORD} == x ]; then | |
echo "Set the ELASTIC_PASSWORD environment variable in the .env file"; | |
exit 1; | |
elif [ x${KIBANA_PASSWORD} == x ]; then | |
echo "Set the KIBANA_PASSWORD environment variable in the .env file"; | |
exit 1; | |
fi; | |
if [ ! -f config/certs/ca.zip ]; then | |
echo "Creating CA"; | |
bin/elasticsearch-certutil ca --silent --pem -out config/certs/ca.zip; | |
unzip config/certs/ca.zip -d config/certs; | |
fi; | |
if [ ! -f config/certs/certs.zip ]; then | |
echo "Creating certs"; | |
echo -ne \ | |
"instances:\n"\ | |
" - name: es01\n"\ | |
" dns:\n"\ | |
" - es01\n"\ | |
" - localhost\n"\ | |
" ip:\n"\ | |
" - 127.0.0.1\n"\ | |
" - name: es02\n"\ | |
" dns:\n"\ | |
" - es02\n"\ | |
" - localhost\n"\ | |
" ip:\n"\ | |
" - 127.0.0.1\n"\ | |
" - name: es03\n"\ | |
" dns:\n"\ | |
" - es03\n"\ | |
" - localhost\n"\ | |
" ip:\n"\ | |
" - 127.0.0.1\n"\ | |
> config/certs/instances.yml; | |
bin/elasticsearch-certutil cert --silent --pem -out config/certs/certs.zip --in config/certs/instances.yml --ca-cert config/certs/ca/ca.crt --ca-key config/certs/ca/ca.key; | |
unzip config/certs/certs.zip -d config/certs; | |
cat config/certs/ca/ca.crt config/certs/ca/ca.key > config/certs/ca/ca.pem | |
fi; | |
echo "Setting file permissions" | |
#chown -R root:root config/certs; | |
#find . -type d -exec chmod 750 \{\} \;; | |
#find . -type f -exec chmod 640 \{\} \;; | |
echo "Waiting for Elasticsearch availability"; | |
until curl -s --cacert config/certs/ca/ca.crt https://es01:9200 | grep -q "missing authentication credentials"; do sleep 30; done; | |
echo "Setting kibana_system password"; | |
until curl -s -X POST --cacert config/certs/ca/ca.crt -u elastic:${ELASTIC_PASSWORD} -H "Content-Type: application/json" https://es01:9200/_security/user/kibana_system/_password -d "{\"password\":\"${KIBANA_PASSWORD}\"}" | grep -q "^{}"; do sleep 10; done; | |
echo "All done!"; | |
' | |
healthcheck: | |
test: ["CMD-SHELL", "[ -f config/certs/es01/es01.crt ]"] | |
interval: 1s | |
timeout: 5s | |
retries: 120 | |
es01: | |
restart: unless-stopped | |
depends_on: | |
- setup | |
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} | |
volumes: | |
#- certs:/usr/share/elasticsearch/config/certs | |
- esdata01:/usr/share/elasticsearch/data | |
#- ./es_certs/:/usr/share/elasticsearch/config/certs/ca/ | |
- ./certs:/usr/share/elasticsearch/config/certs | |
ports: | |
- ${ES_PORT}:9200 | |
environment: | |
- node.name=es01 | |
- cluster.name=${CLUSTER_NAME} | |
- cluster.initial_master_nodes=es01,es02,es03 | |
- discovery.seed_hosts=es02,es03 | |
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD} | |
- bootstrap.memory_lock=true | |
- xpack.security.enabled=true | |
- xpack.security.http.ssl.enabled=true | |
- xpack.security.http.ssl.key=certs/es01/es01.key | |
- xpack.security.http.ssl.certificate=certs/es01/es01.crt | |
- xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt | |
- xpack.security.http.ssl.verification_mode=certificate | |
- xpack.security.transport.ssl.enabled=true | |
- xpack.security.transport.ssl.key=certs/es01/es01.key | |
- xpack.security.transport.ssl.certificate=certs/es01/es01.crt | |
- xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt | |
- xpack.security.transport.ssl.verification_mode=certificate | |
- xpack.license.self_generated.type=${LICENSE} | |
deploy: | |
resources: | |
limits: | |
#cpus: '0.50' | |
memory: ${MEM_LIMIT} | |
reservations: | |
#cpus: '0.25' | |
memory: 20M | |
ulimits: | |
memlock: | |
soft: -1 | |
hard: -1 | |
healthcheck: | |
test: | |
[ | |
"CMD-SHELL", | |
"curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'", | |
] | |
interval: 10s | |
timeout: 10s | |
retries: 120 | |
es02: | |
restart: unless-stopped | |
depends_on: | |
- es01 | |
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} | |
volumes: | |
#- certs:/usr/share/elasticsearch/config/certs | |
- ./certs:/usr/share/elasticsearch/config/certs | |
- esdata02:/usr/share/elasticsearch/data | |
environment: | |
- node.name=es02 | |
- cluster.name=${CLUSTER_NAME} | |
- cluster.initial_master_nodes=es01,es02,es03 | |
- discovery.seed_hosts=es01,es03 | |
- bootstrap.memory_lock=true | |
- xpack.security.enabled=true | |
- xpack.security.http.ssl.enabled=true | |
- xpack.security.http.ssl.key=certs/es02/es02.key | |
- xpack.security.http.ssl.certificate=certs/es02/es02.crt | |
- xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt | |
- xpack.security.http.ssl.verification_mode=certificate | |
- xpack.security.transport.ssl.enabled=true | |
- xpack.security.transport.ssl.key=certs/es02/es02.key | |
- xpack.security.transport.ssl.certificate=certs/es02/es02.crt | |
- xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt | |
- xpack.security.transport.ssl.verification_mode=certificate | |
- xpack.license.self_generated.type=${LICENSE} | |
deploy: | |
resources: | |
limits: | |
#cpus: '0.50' | |
memory: ${MEM_LIMIT} | |
reservations: | |
#cpus: '0.25' | |
memory: 20M | |
ulimits: | |
memlock: | |
soft: -1 | |
hard: -1 | |
healthcheck: | |
test: | |
[ | |
"CMD-SHELL", | |
"curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'", | |
] | |
interval: 10s | |
timeout: 10s | |
retries: 120 | |
es03: | |
restart: unless-stopped | |
depends_on: | |
- es02 | |
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} | |
volumes: | |
#- certs:/usr/share/elasticsearch/config/certs | |
- ./certs:/usr/share/elasticsearch/config/certs | |
- esdata03:/usr/share/elasticsearch/data | |
environment: | |
- node.name=es03 | |
- cluster.name=${CLUSTER_NAME} | |
- cluster.initial_master_nodes=es01,es02,es03 | |
- discovery.seed_hosts=es01,es02 | |
- bootstrap.memory_lock=true | |
- xpack.security.enabled=true | |
- xpack.security.http.ssl.enabled=true | |
- xpack.security.http.ssl.key=certs/es03/es03.key | |
- xpack.security.http.ssl.certificate=certs/es03/es03.crt | |
- xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt | |
- xpack.security.http.ssl.verification_mode=certificate | |
- xpack.security.transport.ssl.enabled=true | |
- xpack.security.transport.ssl.key=certs/es03/es03.key | |
- xpack.security.transport.ssl.certificate=certs/es03/es03.crt | |
- xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt | |
- xpack.security.transport.ssl.verification_mode=certificate | |
- xpack.license.self_generated.type=${LICENSE} | |
deploy: | |
resources: | |
limits: | |
#cpus: '0.50' | |
memory: ${MEM_LIMIT} | |
reservations: | |
#cpus: '0.25' | |
memory: 20M | |
ulimits: | |
memlock: | |
soft: -1 | |
hard: -1 | |
healthcheck: | |
test: | |
[ | |
"CMD-SHELL", | |
"curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'", | |
] | |
interval: 10s | |
timeout: 10s | |
retries: 120 | |
kibana: | |
restart: unless-stopped | |
depends_on: | |
- es01 | |
- es02 | |
- es03 | |
image: docker.elastic.co/kibana/kibana:${STACK_VERSION} | |
volumes: | |
#- certs:/usr/share/kibana/config/certs | |
- ./certs:/usr/share/kibana/config/certs | |
- kibanadata:/usr/share/kibana/data | |
ports: | |
- ${KIBANA_PORT}:5601 | |
environment: | |
- SERVERNAME=kibana | |
- ELASTICSEARCH_HOSTS=https://es01:9200 | |
- ELASTICSEARCH_USERNAME=kibana_system | |
- ELASTICSEARCH_PASSWORD=${KIBANA_PASSWORD} | |
- ELASTICSEARCH_SSL_CERTIFICATEAUTHORITIES=config/certs/ca/ca.crt | |
deploy: | |
resources: | |
limits: | |
#cpus: '0.50' | |
memory: ${MEM_LIMIT} | |
reservations: | |
#cpus: '0.25' | |
memory: 20M | |
healthcheck: | |
test: | |
[ | |
"CMD-SHELL", | |
"curl -s -I http://localhost:5601 | grep -q 'HTTP/1.1 302 Found'", | |
] | |
interval: 10s | |
timeout: 10s | |
retries: 120 | |
volumes: | |
certs: | |
driver: local | |
esdata01: | |
driver: local | |
esdata02: | |
driver: local | |
esdata03: | |
driver: local | |
kibanadata: | |
driver: local |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment