Compare commits
4 Commits
1.9.5
...
9f236b6fa5
| Author | SHA1 | Date | |
|---|---|---|---|
| 9f236b6fa5 | |||
| b4a0874deb | |||
| c51216ff9b | |||
| 7debdfcb93 |
@@ -13,7 +13,7 @@ Image=docker.io/gitea/gitea:{{ version['containers']['gitea'] }}
|
|||||||
ContainerName=gitea
|
ContainerName=gitea
|
||||||
HostName=gitea
|
HostName=gitea
|
||||||
|
|
||||||
PublishPort=3000:3000/tcp
|
PublishPort={{ services['gitea']['ports']['http'] }}:3000/tcp
|
||||||
|
|
||||||
Volume=%h/data/containers/gitea:/data:rw
|
Volume=%h/data/containers/gitea:/data:rw
|
||||||
Volume=%h/containers/gitea/ssl:/etc/ssl/gitea:ro
|
Volume=%h/containers/gitea/ssl:/etc/ssl/gitea:ro
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ theme: 'auto'
|
|||||||
# Server configuration
|
# Server configuration
|
||||||
server:
|
server:
|
||||||
# TLS will be applied on caddy
|
# TLS will be applied on caddy
|
||||||
address: 'tcp://:9091/'
|
address: 'tcp://:{{ services['authelia']['ports']['http'] }}/'
|
||||||
|
|
||||||
# Log configuration
|
# Log configuration
|
||||||
log:
|
log:
|
||||||
|
|||||||
@@ -39,7 +39,7 @@
|
|||||||
import crowdsec_log
|
import crowdsec_log
|
||||||
route {
|
route {
|
||||||
crowdsec
|
crowdsec
|
||||||
reverse_proxy host.containers.internal:9091
|
reverse_proxy host.containers.internal:{{ services['authelia']['ports']['http'] }}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
# test.ilnmors.com {
|
# test.ilnmors.com {
|
||||||
|
|||||||
@@ -203,17 +203,11 @@ loki.relabel "caddy_relabel" {
|
|||||||
loki.process "journal_parser" {
|
loki.process "journal_parser" {
|
||||||
forward_to = [loki.write.loki.receiver]
|
forward_to = [loki.write.loki.receiver]
|
||||||
// Severity parsing
|
// Severity parsing
|
||||||
// If content of log includes "level" information, change the level
|
stage.regex {
|
||||||
stage.json {
|
// Regex to extract the log level from the content.
|
||||||
expressions = {
|
expression = "(?i)(?:level[\"\\s:=]+|\\[|\\s|^)(?P<content_level>info|warn|warning|error|debug|fatal|critical|trace)(?:[\"\\]\\s]|$)"
|
||||||
"content_level" = "level",
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage.logfmt {
|
|
||||||
mapping = {
|
|
||||||
"content_level" = "level",
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
stage.labels {
|
stage.labels {
|
||||||
values = {
|
values = {
|
||||||
"level" = "content_level",
|
"level" = "content_level",
|
||||||
|
|||||||
@@ -21,9 +21,9 @@ ProtectHome=tmpfs
|
|||||||
InaccessiblePaths=/boot /root
|
InaccessiblePaths=/boot /root
|
||||||
|
|
||||||
{% if node['name'] == 'infra' %}
|
{% if node['name'] == 'infra' %}
|
||||||
BindReadOnlyPaths=/home/infra/containers/postgresql/backups
|
BindReadOnlyPaths=%h/containers/postgresql/backups
|
||||||
{% elif node['name'] == 'app' %}
|
{% elif node['name'] == 'app' %}
|
||||||
BindReadOnlyPaths=/home/app/data
|
BindReadOnlyPaths=%h/data
|
||||||
{% endif %}
|
{% endif %}
|
||||||
# In root namescope, %u always bring 0
|
# In root namescope, %u always bring 0
|
||||||
BindPaths=/etc/kopia
|
BindPaths=/etc/kopia
|
||||||
|
|||||||
Reference in New Issue
Block a user