429 lines
9.6 KiB
HCL
429 lines
9.6 KiB
HCL
variable "elastic_version" {
|
|
type = string
|
|
}
|
|
|
|
job "elk" {
|
|
|
|
group "node" {
|
|
|
|
count = 2
|
|
|
|
constraint {
|
|
distinct_hosts = true
|
|
}
|
|
|
|
constraint {
|
|
attribute = "${node.unique.name}"
|
|
operator = "set_contains_any"
|
|
value = "Hestia,Nyx"
|
|
}
|
|
|
|
network {
|
|
mode = "bridge"
|
|
port "http" {
|
|
to = 9200
|
|
}
|
|
port "transport" {
|
|
static = 9300
|
|
}
|
|
port "envoy_metrics" {
|
|
to = 9102
|
|
}
|
|
}
|
|
|
|
service {
|
|
provider = "consul"
|
|
port = "9200"
|
|
|
|
meta {
|
|
envoy_metrics_port = "${NOMAD_HOST_PORT_envoy_metrics}"
|
|
}
|
|
|
|
connect {
|
|
sidecar_service {
|
|
proxy {
|
|
expose {
|
|
path {
|
|
path = "/metrics"
|
|
protocol = "http"
|
|
local_path_port = 9102
|
|
listener_port = "envoy_metrics"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
task "elasticsearch" {
|
|
driver = "docker"
|
|
|
|
config {
|
|
image = "docker.elastic.co/elasticsearch/elasticsearch:${var.elastic_version}"
|
|
|
|
volumes = [
|
|
"/mnt/docker/elastic-${node.unique.name}/config:/usr/share/elasticsearch/config",
|
|
"/mnt/docker/elastic-${node.unique.name}/data:/usr/share/elasticsearch/data",
|
|
]
|
|
|
|
ulimit {
|
|
memlock = "-1:-1"
|
|
}
|
|
|
|
mount {
|
|
type = "bind"
|
|
source = "local/unicast_hosts.txt"
|
|
target = "/usr/share/elasticsearch/config/unicast_hosts.txt"
|
|
}
|
|
|
|
mount {
|
|
type = "bind"
|
|
source = "local/elasticsearch.yml"
|
|
target = "/usr/share/elasticsearch/config/elasticsearch.yml"
|
|
}
|
|
}
|
|
|
|
env {
|
|
ES_PATH_CONF = "/usr/share/elasticsearch/config"
|
|
}
|
|
|
|
resources {
|
|
cpu = 2000
|
|
memory = 2048
|
|
}
|
|
|
|
template {
|
|
data = <<-EOF
|
|
cluster:
|
|
name: "docker-cluster"
|
|
node:
|
|
name: {{ env "node.unique.name" }}
|
|
network:
|
|
host: 0.0.0.0
|
|
publish_host: "{{ env "NOMAD_IP_transport" }}"
|
|
discovery:
|
|
seed_providers: file
|
|
xpack:
|
|
security:
|
|
enrollment:
|
|
enabled: true
|
|
transport:
|
|
ssl:
|
|
enabled: true
|
|
verification_mode: certificate
|
|
client_authentication: required
|
|
keystore:
|
|
path: certs/elastic-certificates.p12
|
|
truststore:
|
|
path: certs/elastic-certificates.p12
|
|
http:
|
|
ssl:
|
|
enabled: true
|
|
keystore:
|
|
path: certs/http.p12
|
|
bootstrap:
|
|
memory_lock: true
|
|
EOF
|
|
|
|
destination = "local/elasticsearch.yml"
|
|
}
|
|
|
|
template {
|
|
data = <<-EOF
|
|
{{ range service "elk-node-elasticsearch-transport" }}
|
|
{{ .Address }}:{{ .Port }}
|
|
{{ end }}
|
|
{{ range service "elk-tiebreaker-elasticsearch-transport" }}
|
|
{{ .Address }}:{{ .Port }}
|
|
{{ end }}
|
|
EOF
|
|
|
|
destination = "local/unicast_hosts.txt"
|
|
change_mode = "noop"
|
|
}
|
|
|
|
service {
|
|
name = "elk-node-elasticsearch-http"
|
|
provider = "consul"
|
|
port = "http"
|
|
}
|
|
|
|
service {
|
|
name = "elk-node-elasticsearch-transport"
|
|
provider = "consul"
|
|
port = "transport"
|
|
}
|
|
}
|
|
}
|
|
|
|
group "node-ingress-group" {
|
|
|
|
network {
|
|
mode = "bridge"
|
|
port "inbound" {
|
|
static = 9200
|
|
}
|
|
}
|
|
|
|
service {
|
|
name = "es-ingress-service"
|
|
port = 9200
|
|
|
|
tags = [
|
|
"traefik.enable=true",
|
|
"traefik.http.routers.es.rule=Host(`es.brmartin.co.uk`)",
|
|
"traefik.http.routers.es.entrypoints=websecure",
|
|
"traefik.http.routers.es.service=es",
|
|
"traefik.http.services.es.loadbalancer.server.scheme=https",
|
|
"traefik.http.services.es.loadbalancer.serversTransport=es@file",
|
|
]
|
|
|
|
connect {
|
|
gateway {
|
|
ingress {
|
|
listener {
|
|
port = 9200
|
|
protocol = "tcp"
|
|
service {
|
|
name = "elk-node"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
group "tiebreaker" {
|
|
|
|
constraint {
|
|
attribute = "${node.unique.name}"
|
|
value = "Neto"
|
|
}
|
|
|
|
network {
|
|
port "http" {
|
|
static = 9200
|
|
}
|
|
port "transport" {
|
|
static = 9300
|
|
}
|
|
port "envoy_metrics" {
|
|
to = 9102
|
|
}
|
|
}
|
|
|
|
task "elasticsearch" {
|
|
driver = "docker"
|
|
|
|
config {
|
|
image = "docker.elastic.co/elasticsearch/elasticsearch:${var.elastic_version}"
|
|
|
|
ports = ["http", "transport"]
|
|
|
|
volumes = [
|
|
"/mnt/docker/elastic-${node.unique.name}/config:/usr/share/elasticsearch/config",
|
|
"/mnt/docker/elastic-${node.unique.name}/data:/usr/share/elasticsearch/data",
|
|
]
|
|
|
|
ulimit {
|
|
memlock = "-1:-1"
|
|
}
|
|
|
|
mount {
|
|
type = "bind"
|
|
source = "local/unicast_hosts.txt"
|
|
target = "/usr/share/elasticsearch/config/unicast_hosts.txt"
|
|
}
|
|
}
|
|
|
|
env {
|
|
ES_PATH_CONF = "/usr/share/elasticsearch/config"
|
|
}
|
|
|
|
resources {
|
|
cpu = 1000
|
|
memory = 1024
|
|
memory_max = 2048
|
|
}
|
|
|
|
template {
|
|
data = <<-EOF
|
|
{{ range service "elk-node-elasticsearch-transport" }}
|
|
{{ .Address }}:{{ .Port }}
|
|
{{ end }}
|
|
{{ range service "elk-tiebreaker-elasticsearch-transport" }}
|
|
{{ .Address }}:{{ .Port }}
|
|
{{ end }}
|
|
EOF
|
|
|
|
destination = "local/unicast_hosts.txt"
|
|
change_mode = "noop"
|
|
}
|
|
|
|
service {
|
|
name = "elk-tiebreaker-elasticsearch-http"
|
|
provider = "consul"
|
|
port = "http"
|
|
}
|
|
|
|
service {
|
|
name = "elk-tiebreaker-elasticsearch-transport"
|
|
provider = "consul"
|
|
port = "transport"
|
|
}
|
|
}
|
|
}
|
|
|
|
group "kibana" {
|
|
|
|
count = 2
|
|
|
|
constraint {
|
|
distinct_hosts = true
|
|
}
|
|
|
|
network {
|
|
mode = "bridge"
|
|
port "web" {
|
|
static = 5601
|
|
}
|
|
port "envoy_metrics" {
|
|
to = 9102
|
|
}
|
|
}
|
|
|
|
service {
|
|
port = "5601"
|
|
provider = "consul"
|
|
|
|
meta {
|
|
envoy_metrics_port = "${NOMAD_HOST_PORT_envoy_metrics}"
|
|
}
|
|
|
|
connect {
|
|
sidecar_service {
|
|
proxy {
|
|
expose {
|
|
path {
|
|
path = "/metrics"
|
|
protocol = "http"
|
|
local_path_port = 9102
|
|
listener_port = "envoy_metrics"
|
|
}
|
|
}
|
|
transparent_proxy {}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
task "kibana" {
|
|
driver = "docker"
|
|
|
|
config {
|
|
image = "docker.elastic.co/kibana/kibana:${var.elastic_version}"
|
|
|
|
volumes = [
|
|
"/mnt/docker/elastic/kibana/config:/usr/share/kibana/config",
|
|
]
|
|
|
|
mount {
|
|
type = "bind"
|
|
source = "local/kibana.yml"
|
|
target = "/usr/share/kibana/config/kibana.yml"
|
|
}
|
|
}
|
|
|
|
resources {
|
|
cpu = 1500
|
|
memory = 1024
|
|
}
|
|
|
|
template {
|
|
data = <<-EOF
|
|
elasticsearch:
|
|
hosts:
|
|
- https://elk-node.virtual.consul
|
|
username: ${ELASTICSEARCH_USERNAME}
|
|
password: ${ELASTICSEARCH_PASSWORD}
|
|
requestTimeout: 600000
|
|
ssl:
|
|
verificationMode: certificate # TODO: Change to full once we have a cert that signs for the ips
|
|
certificateAuthorities:
|
|
- /usr/share/kibana/config/elasticsearch-ca.pem
|
|
server:
|
|
host: 0.0.0.0
|
|
publicBaseUrl: https://kibana.brmartin.co.uk
|
|
ssl:
|
|
enabled: false
|
|
xpack:
|
|
encryptedSavedObjects:
|
|
encryptionKey: ${XPACK_ENCRYPTEDSAVEDOBJECTS_ENCRYPTIONKEY}
|
|
reporting:
|
|
encryptionKey: ${XPACK_REPORTING_ENCRYPTIONKEY}
|
|
security:
|
|
encryptionKey: ${XPACK_SECURITY_ENCRYPTIONKEY}
|
|
alerting:
|
|
rules:
|
|
run:
|
|
alerts:
|
|
max: 10000
|
|
EOF
|
|
|
|
destination = "local/kibana.yml"
|
|
change_mode = "noop"
|
|
}
|
|
|
|
template {
|
|
data = <<-EOF
|
|
{{ with nomadVar "nomad/jobs/elk/kibana/kibana" }}
|
|
ELASTICSEARCH_USERNAME={{.kibana_username}}
|
|
ELASTICSEARCH_PASSWORD={{.kibana_password}}
|
|
XPACK_ENCRYPTEDSAVEDOBJECTS_ENCRYPTIONKEY={{.kibana_encryptedSavedObjects_encryptionKey}}
|
|
XPACK_REPORTING_ENCRYPTIONKEY={{.kibana_reporting_encryptionKey}}
|
|
XPACK_SECURITY_ENCRYPTIONKEY={{.kibana_security_encryptionKey}}
|
|
{{ end }}
|
|
EOF
|
|
|
|
destination = "secrets/file.env"
|
|
env = true
|
|
}
|
|
}
|
|
}
|
|
|
|
group "kibana-ingress-group" {
|
|
|
|
network {
|
|
mode = "bridge"
|
|
port "inbound" {
|
|
to = 8080
|
|
}
|
|
}
|
|
|
|
service {
|
|
name = "kibana-ingress-service"
|
|
port = "inbound"
|
|
|
|
tags = [
|
|
"traefik.enable=true",
|
|
"traefik.http.routers.kibana.rule=Host(`kibana.brmartin.co.uk`)",
|
|
"traefik.http.routers.kibana.entrypoints=websecure",
|
|
]
|
|
|
|
connect {
|
|
gateway {
|
|
ingress {
|
|
listener {
|
|
port = 8080
|
|
protocol = "tcp"
|
|
service {
|
|
name = "elk-kibana"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|