Last active
October 11, 2024 00:11
-
-
Save thiagola92/95884deaf511e156a597fea11ef9e8e4 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| services: | |
| mongo: | |
| container_name: mongo | |
| image: mongo | |
| ports: | |
| - 27017:27017 | |
| environment: | |
| - MONGO_INITDB_ROOT_USERNAME=username | |
| - MONGO_INITDB_ROOT_PASSWORD=password | |
| volumes: | |
| - mongo:/data/db | |
| postgres: | |
| container_name: postgres | |
| image: postgres | |
| ports: | |
| - 5432:5432 | |
| environment: | |
| - POSTGRES_USER=username | |
| - POSTGRES_PASSWORD=password | |
| volumes: | |
| - postgres:/var/lib/postgresql/data | |
| pgadmin: | |
| container_name: pgadmin | |
| image: dpage/pgadmin4 | |
| ports: | |
| - 15432:80 | |
| environment: | |
| - PGADMIN_DEFAULT_EMAIL=username@gmail.com | |
| - PGADMIN_DEFAULT_PASSWORD=password | |
| elasticsearch: | |
| container_name: elasticsearch | |
| image: elasticsearch:7.16.2 | |
| ports: | |
| - 9200:9200 | |
| - 9300:9300 | |
| environment: | |
| - discovery.type=single-node | |
| - ELASTIC_USERNAME=username | |
| - ELASTIC_PASSWORD=password | |
| kibana: | |
| container_name: kibana | |
| image: kibana:7.16.2 | |
| ports: | |
| - 5601:5601 | |
| environment: | |
| - ELASTICSEARCH_USERNAME=username | |
| - ELASTICSEARCH_PASSWORD=password | |
| rabbit: | |
| container_name: rabbit | |
| image: rabbitmq:3-management | |
| hostname: "rabbit" | |
| ports: | |
| - 5672:5672 | |
| - 15672:15672 | |
| environment: | |
| - RABBITMQ_DEFAULT_USER=username | |
| - RABBITMQ_DEFAULT_PASS=password | |
| - RABBITMQ_DEFAULT_VHOST=/ | |
| volumes: | |
| - rabbit:/var/lib/rabbitmq | |
| redis: | |
| container_name: redis | |
| image: redis | |
| ports: | |
| - 6379:6379 | |
| volumes: | |
| - redis:/data | |
| meili: | |
| container_name: meili | |
| image: getmeili/meilisearch | |
| ports: | |
| - 7700:7700 | |
| environment: | |
| - MEILI_MASTER_KEY=password | |
| volumes: | |
| - meilisearch:/data.ms | |
| influx: | |
| container_name: influx | |
| image: influxdb | |
| ports: | |
| - 8086:8086 | |
| environment: | |
| - DOCKER_INFLUXDB_INIT_USERNAME=username | |
| - DOCKER_INFLUXDB_INIT_PASSWORD=password | |
| - DOCKER_INFLUXDB_INIT_ORG=fake_org | |
| - DOCKER_INFLUXDB_INIT_BUCKET=first_bucket | |
| volumes: | |
| - influx:/var/lib/influxdb2 | |
| metabase: | |
| container_name: metabase | |
| image: metabase/metabase | |
| ports: | |
| - 3000:3000 | |
| volumes: | |
| - metabase:/metabase-data | |
| vault: | |
| container_name: vault | |
| image: vault | |
| ports: | |
| - 8200:8200 | |
| environment: | |
| - VAULT_DEV_ROOT_TOKEN_ID=password | |
| - VAULT_DEV_LISTEN_ADDRESS=0.0.0.0:8200 | |
| volumes: | |
| - vault_logs:/vault/logs | |
| - vault_file:/vault/file | |
| woodpecker-server: | |
| image: woodpeckerci/woodpecker-server:latest | |
| ports: | |
| - 8000:8000 | |
| volumes: | |
| - woodpecker_server:/var/lib/woodpecker/ | |
| environment: | |
| - WOODPECKER_OPEN=true | |
| - WOODPECKER_HOST=https://127.0.0.1 | |
| - WOODPECKER_GITEA=true | |
| - WOODPECKER_GITEA_URL=https://127.0.0.1 | |
| - WOODPECKER_GITEA_CLIENT=username | |
| - WOODPECKER_GITEA_SECRET=password | |
| - WOODPECKER_AGENT_SECRET=password | |
| woodpecker-agent: | |
| image: woodpeckerci/woodpecker-agent:latest | |
| command: agent | |
| restart: always | |
| depends_on: | |
| - woodpecker-server | |
| volumes: | |
| - woodpecker_agent:/etc/woodpecker | |
| - /var/run/docker.sock:/var/run/docker.sock | |
| environment: | |
| - WOODPECKER_SERVER=woodpecker-server:9000 | |
| - WOODPECKER_AGENT_SECRET=password | |
| rethinkdb: | |
| container_name: rethinkdb | |
| image: rethinkdb | |
| ports: | |
| - 8080:8080 | |
| volumes: | |
| - rethinkdb:/data | |
| volumes: | |
| mongo: | |
| postgres: | |
| rabbit: | |
| redis: | |
| meilisearch: | |
| influx: | |
| metabase: | |
| vault_logs: | |
| vault_file: | |
| woodpecker_server: | |
| woodpecker_agent: | |
| rethinkdb: |
Author
Author
Podman
podman run --name="mongo" --network="local" --env="MONGO_INITDB_ROOT_USERNAME=username" --env="MONGO_INITDB_ROOT_PASSWORD=password" -p 27017:27017 --detach mongo
podman run --name="postgres" --network="local" --env="POSTGRES_USER=username" --env="POSTGRES_PASSWORD=password" -p 5432:5432 --detach postgres
podman run --name="pgadmin" --network="local" --env="PGADMIN_DEFAULT_EMAIL=username@gmail.com" --env="PGADMIN_DEFAULT_PASSWORD=password" -p 15432:80 --detach dpage/pgadmin4
podman run --name="elastic" --network="local" --env="discovery.type=single-node" --env="ELASTIC_USERNAME=username" --env="ELASTIC_PASSWORD=password" -p 9200:9200 -p 9300:9300 --detach elasticsearch:7.14.2
podman run --name="kibana" --network="local" --env="ELASTICSEARCH_USERNAME=username" --env="ELASTICSEARCH_PASSWORD=password" -p 5601:5601 --detach kibana:7.14.2
podman run --name="rabbit" --network="local" --env="RABBITMQ_DEFAULT_VHOST=/" --env="RABBITMQ_DEFAULT_USER=username" --env="RABBITMQ_DEFAULT_PASS=password" -p 15672:15672 -p 5672:5672 --detach rabbitmq:management
podman run --name="redis" --network="local" -p 6379:6379 --detach redis
Ubuntu
Adicionar a seguinte linha no registries.conf
unqualified-search-registries = ['docker.io', 'quay.io', 'registry.fedoraproject.org', registry.access.redhat.com]
Search
Podman requer que defina o registry sempre.
podman search docker.io/mysql
podman pull docker.io/mysql
Author
Network
Os containers estão na mesma rede e podem acessar um ao outro utilizando os nomes deles.
Para você que está fora da rede seria:
mongodb://username:password@127.0.0.1
Para os containers se acessarem entre si:
mongodb://username:password@mongo
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Run
sudo docker-compose upElastic & Kibana
Não incluem username e password pois não pareciam tão simples quanto os outros
Remember
Mude o usuário e senha pois um hacker pode tentar scanear todas as portas IPv4 tentando esse acesso básico