cleanup
This commit is contained in:
1
NonCloudron/RandD/Apps/app.ap4ap.org/Dockerfile
Normal file
1
NonCloudron/RandD/Apps/app.ap4ap.org/Dockerfile
Normal file
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
1
NonCloudron/RandD/Apps/app.ap4ap.org/devcontainer.json
Normal file
1
NonCloudron/RandD/Apps/app.ap4ap.org/devcontainer.json
Normal file
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
5
NonCloudron/RandD/Apps/app.ap4ap.org/docker-compose.yml
Normal file
5
NonCloudron/RandD/Apps/app.ap4ap.org/docker-compose.yml
Normal file
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
1
NonCloudron/RandD/Apps/app.hfnfc.net/Dockerfile
Normal file
1
NonCloudron/RandD/Apps/app.hfnfc.net/Dockerfile
Normal file
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
1
NonCloudron/RandD/Apps/app.hfnfc.net/devcontainer.json
Normal file
1
NonCloudron/RandD/Apps/app.hfnfc.net/devcontainer.json
Normal file
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
5
NonCloudron/RandD/Apps/app.hfnfc.net/docker-compose.yml
Normal file
5
NonCloudron/RandD/Apps/app.hfnfc.net/docker-compose.yml
Normal file
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
1
NonCloudron/RandD/Apps/app.hfnoc.net/Dockerfile
Normal file
1
NonCloudron/RandD/Apps/app.hfnoc.net/Dockerfile
Normal file
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
5
NonCloudron/RandD/Apps/app.hfnoc.net/docker-compose.yml
Normal file
5
NonCloudron/RandD/Apps/app.hfnoc.net/docker-compose.yml
Normal file
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
1
NonCloudron/RandD/Apps/app.rackrental.net/Dockerfile
Normal file
1
NonCloudron/RandD/Apps/app.rackrental.net/Dockerfile
Normal file
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
1
NonCloudron/RandD/Apps/app.sidedoorgroup.org/Dockerfile
Normal file
1
NonCloudron/RandD/Apps/app.sidedoorgroup.org/Dockerfile
Normal file
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
1
NonCloudron/RandD/Apps/app.teamrental.net/Dockerfile
Normal file
1
NonCloudron/RandD/Apps/app.teamrental.net/Dockerfile
Normal file
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
@@ -0,0 +1 @@
|
||||
# dockerfile for an app at tsys
|
@@ -0,0 +1 @@
|
||||
# dev environment for an app at tsys
|
@@ -0,0 +1,5 @@
|
||||
# app docker compose file for tsys
|
||||
|
||||
## app name
|
||||
## ports
|
||||
## deps
|
1
NonCloudron/RandD/portmap.md
Normal file
1
NonCloudron/RandD/portmap.md
Normal file
@@ -0,0 +1 @@
|
||||
# Cosmos port map
|
1
NonCloudron/Techops/DrawIO/drawio-notes.md
Normal file
1
NonCloudron/Techops/DrawIO/drawio-notes.md
Normal file
@@ -0,0 +1 @@
|
||||
Nextcloud is able to utilize a draw.io server. Let’s give it one to use
|
3
NonCloudron/Techops/TBD/GIS-backend/README.md
Normal file
3
NonCloudron/Techops/TBD/GIS-backend/README.md
Normal file
@@ -0,0 +1,3 @@
|
||||
# TSYS GIS Backend
|
||||
|
||||
This folder contains the GIS related backend docker compose files for TSYS GIS stack. HFNOC will own this.
|
1
NonCloudron/Techops/TBD/GIS-backend/input-files/info
Normal file
1
NonCloudron/Techops/TBD/GIS-backend/input-files/info
Normal file
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
1
NonCloudron/Techops/TBD/GIS-backend/output-files/info
Normal file
1
NonCloudron/Techops/TBD/GIS-backend/output-files/info
Normal file
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
1
NonCloudron/Techops/TBD/GIS-backend/vendor-files/info
Normal file
1
NonCloudron/Techops/TBD/GIS-backend/vendor-files/info
Normal file
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
14
NonCloudron/Techops/apigw.knownelement.com/apigw.md
Normal file
14
NonCloudron/Techops/apigw.knownelement.com/apigw.md
Normal file
@@ -0,0 +1,14 @@
|
||||
API gateway notes
|
||||
|
||||
* API gateway (TYK)
|
||||
|
||||
<https://tyk.io/>
|
||||
|
||||
<https://tyk.io/docs/getting-started/installation/with-tyk-on-premises/docker/>
|
||||
|
||||
<https://tyk.io/docs/advanced-configuration/integrate/sso/dashboard-login-ldap-tib/>
|
||||
|
||||
|
||||
(or perhaps..)
|
||||
|
||||
https://github.com/apache/apisix
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1,4 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
||||
|
||||
|
||||
https://hub.docker.com/r/apache/apisix
|
25
NonCloudron/Techops/cde.knownelement.com/README.md
Normal file
25
NonCloudron/Techops/cde.knownelement.com/README.md
Normal file
@@ -0,0 +1,25 @@
|
||||
# Cloud dev at tsys
|
||||
|
||||
## Desired architecute
|
||||
|
||||
(essentially the lap.dev architecure)
|
||||
|
||||
- control plane running as a web app on cosmos
|
||||
- agent that spins up ephermeral containers on runner hosts
|
||||
|
||||
|
||||
## Contenders
|
||||
|
||||
- strong.network
|
||||
- lap.dev (dont like that it only supports github/gitlab oautg) (also that it doesnt appear to be dockerized)
|
||||
|
||||
## Links
|
||||
|
||||
- https://github.com/strong-network/images
|
||||
|
||||
|
||||
|
||||
https://github.com/daytonaio/daytona?tab=readme-ov-file
|
||||
https://www.daytona.io
|
||||
|
||||
https://github.com/gitpod-io/openvscode-server
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
@@ -0,0 +1,10 @@
|
||||
version: '3.3'
|
||||
services:
|
||||
easy-gate:
|
||||
container_name: easy-gate
|
||||
ports:
|
||||
- '1002:8080'
|
||||
volumes:
|
||||
- '/docker/ConHost/Overhead/easy-gate/easy-gate.json:/etc/easy-gate/easy-gate.json'
|
||||
restart: unless-stopped
|
||||
image: r7wx/easy-gate
|
@@ -0,0 +1,167 @@
|
||||
{
|
||||
"addr": "0.0.0.0:1001",
|
||||
"use_tls": false,
|
||||
"cert_file": "",
|
||||
"key_file": "",
|
||||
"behind_proxy": true,
|
||||
"title": "TSYS Global IT Dashboard",
|
||||
"icon": "fa-solid fa-cubes",
|
||||
"motd": "TSYS Global IT Dashboard - Brought to you by Known Element Enterprises",
|
||||
"theme": {
|
||||
"background": "#FFFFFF",
|
||||
"foreground": "#000000"
|
||||
},
|
||||
"groups": [
|
||||
{
|
||||
"name": "internal",
|
||||
"subnet": "10.251.0.0/16"
|
||||
},
|
||||
{
|
||||
"name": "vpn",
|
||||
"subnet": "10.49.1.0/24"
|
||||
}
|
||||
],
|
||||
"services": [
|
||||
{
|
||||
"icon": "fa-brands fa-git-square",
|
||||
"name": "Git",
|
||||
"url": "https://git.knownelement.com",
|
||||
"groups": [
|
||||
"internal,vpn"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-brands fa-docker",
|
||||
"name": "Portainer",
|
||||
"url": "https://portainer.knownelement.com",
|
||||
"groups": [
|
||||
"internal,vpn"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-folder-open",
|
||||
"name": "Files",
|
||||
"url": "https://files.example.internal",
|
||||
"groups": [
|
||||
"internal"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-box-archive",
|
||||
"name": "Archive",
|
||||
"url": "https://archive.example.internal",
|
||||
"groups": [
|
||||
"internal"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-chart-line",
|
||||
"name": "Kibana",
|
||||
"url": "https://kibana.example.internal",
|
||||
"groups": [
|
||||
"internal"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-download",
|
||||
"name": "Transmission",
|
||||
"url": "https://transmission.example.internal",
|
||||
"groups": [
|
||||
"internal"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-bookmark",
|
||||
"name": "Bookmarks",
|
||||
"url": "https://bookmarks.example.internal",
|
||||
"groups": [
|
||||
"internal"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-book",
|
||||
"name": "Calibre",
|
||||
"url": "https://calibre.example.internal",
|
||||
"groups": [
|
||||
"internal"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-comment",
|
||||
"name": "Webchat",
|
||||
"url": "https://chat.example.internal",
|
||||
"groups": []
|
||||
},
|
||||
{
|
||||
"icon": "fa-solid fa-cloud",
|
||||
"name": "Owncloud",
|
||||
"url": "https://owncloud.example.internal",
|
||||
"groups": [
|
||||
"internal",
|
||||
"vpn"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-brands fa-wikipedia-w",
|
||||
"name": "Wiki",
|
||||
"url": "https://wiki.example.internal",
|
||||
"groups": [
|
||||
"internal",
|
||||
"vpn"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-brands fa-mastodon",
|
||||
"name": "Mastodon",
|
||||
"url": "https://mastodon.example.internal",
|
||||
"groups": [
|
||||
"internal",
|
||||
"vpn"
|
||||
]
|
||||
},
|
||||
{
|
||||
"icon": "fa-brands fa-google",
|
||||
"name": "Google",
|
||||
"url": "https://www.google.com",
|
||||
"groups": []
|
||||
},
|
||||
{
|
||||
"icon": "fa-brands fa-youtube",
|
||||
"name": "Youtube",
|
||||
"url": "https://www.youtube.com",
|
||||
"groups": []
|
||||
},
|
||||
{
|
||||
"icon": "fa-brands fa-stack-overflow",
|
||||
"name": "Stackoverflow",
|
||||
"url": "https://stackoverflow.com",
|
||||
"groups": []
|
||||
}
|
||||
],
|
||||
"notes": [
|
||||
{
|
||||
"name": "Simple note",
|
||||
"text": "This is a simple note for vpn users",
|
||||
"groups": [
|
||||
"vpn"
|
||||
]
|
||||
},
|
||||
{
|
||||
"name": "Global note",
|
||||
"text": "This note will be visible to everyone",
|
||||
"groups": []
|
||||
},
|
||||
{
|
||||
"name": "How to use our internal services",
|
||||
"text": "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec nec arcu purus. Maecenas ut erat ut tellus vulputate pellentesque sit amet quis metus. Praesent sollicitudin ultricies leo. Sed ornare libero non vehicula cursus. Aliquam vulputate pulvinar elit, sit amet tempus justo condimentum in. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus",
|
||||
"groups": []
|
||||
},
|
||||
{
|
||||
"name": "Another note",
|
||||
"text": "Another note for internal network users only",
|
||||
"groups": [
|
||||
"internal"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
@@ -0,0 +1,8 @@
|
||||
## Introduction
|
||||
|
||||
Need a serverless / functions as a service runtime
|
||||
|
||||
## Options
|
||||
|
||||
- https://github.com/adnanh/webhook
|
||||
- https://github.com/metrue/fx
|
@@ -0,0 +1 @@
|
||||
#graylog docker compose for tsys
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
@@ -0,0 +1 @@
|
||||
#mailman docker compose for tsys
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
1
NonCloudron/Techops/netbird.knownelement.com/info
Normal file
1
NonCloudron/Techops/netbird.knownelement.com/info
Normal file
@@ -0,0 +1 @@
|
||||
netbird can be run behind an existing reverse proxy. so we shall run it on cloudron.
|
@@ -0,0 +1 @@
|
||||
#opensearch docker compose file for tsys
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
236
NonCloudron/Techops/openvas.knownelement.com/docker-compose.yml
Normal file
236
NonCloudron/Techops/openvas.knownelement.com/docker-compose.yml
Normal file
@@ -0,0 +1,236 @@
|
||||
#openvas docker compose for tsys
|
||||
|
||||
#git subtree add --prefix upstream/openvas https://github.com/mikesplain/openvas-docker.git master --squash
|
||||
|
||||
# greenbone/vulnerability-tests \
|
||||
# greenbone/notus-data \
|
||||
# greenbone/scap-data \
|
||||
# securecompliance/gvm:debian-master-data-full \
|
||||
# securecompliance/gvm:debian-master-data \
|
||||
# securecompliance/gvm:debian-master-full \
|
||||
# securecompliance/gvm:debian-master \
|
||||
|
||||
services:
|
||||
vulnerability-tests:
|
||||
image: registry.community.greenbone.net/community/vulnerability-tests
|
||||
environment:
|
||||
STORAGE_PATH: /var/lib/openvas/22.04/vt-data/nasl
|
||||
volumes:
|
||||
- vt_data_vol:/mnt
|
||||
|
||||
notus-data:
|
||||
image: registry.community.greenbone.net/community/notus-data
|
||||
volumes:
|
||||
- notus_data_vol:/mnt
|
||||
|
||||
scap-data:
|
||||
image: registry.community.greenbone.net/community/scap-data
|
||||
volumes:
|
||||
- scap_data_vol:/mnt
|
||||
|
||||
cert-bund-data:
|
||||
image: registry.community.greenbone.net/community/cert-bund-data
|
||||
volumes:
|
||||
- cert_data_vol:/mnt
|
||||
|
||||
dfn-cert-data:
|
||||
image: registry.community.greenbone.net/community/dfn-cert-data
|
||||
volumes:
|
||||
- cert_data_vol:/mnt
|
||||
depends_on:
|
||||
- cert-bund-data
|
||||
|
||||
data-objects:
|
||||
image: registry.community.greenbone.net/community/data-objects
|
||||
volumes:
|
||||
- data_objects_vol:/mnt
|
||||
|
||||
report-formats:
|
||||
image: registry.community.greenbone.net/community/report-formats
|
||||
volumes:
|
||||
- data_objects_vol:/mnt
|
||||
depends_on:
|
||||
- data-objects
|
||||
|
||||
gpg-data:
|
||||
image: registry.community.greenbone.net/community/gpg-data
|
||||
volumes:
|
||||
- gpg_data_vol:/mnt
|
||||
|
||||
redis-server:
|
||||
image: registry.community.greenbone.net/community/redis-server
|
||||
restart: on-failure
|
||||
volumes:
|
||||
- redis_socket_vol:/run/redis/
|
||||
|
||||
pg-gvm:
|
||||
image: registry.community.greenbone.net/community/pg-gvm:stable
|
||||
restart: on-failure
|
||||
volumes:
|
||||
- psql_data_vol:/var/lib/postgresql
|
||||
- psql_socket_vol:/var/run/postgresql
|
||||
|
||||
gvmd:
|
||||
image: registry.community.greenbone.net/community/gvmd:stable
|
||||
restart: on-failure
|
||||
volumes:
|
||||
- gvmd_data_vol:/var/lib/gvm
|
||||
- scap_data_vol:/var/lib/gvm/scap-data/
|
||||
- cert_data_vol:/var/lib/gvm/cert-data
|
||||
- data_objects_vol:/var/lib/gvm/data-objects/gvmd
|
||||
- vt_data_vol:/var/lib/openvas/plugins
|
||||
- psql_data_vol:/var/lib/postgresql
|
||||
- gvmd_socket_vol:/run/gvmd
|
||||
- ospd_openvas_socket_vol:/run/ospd
|
||||
- psql_socket_vol:/var/run/postgresql
|
||||
depends_on:
|
||||
pg-gvm:
|
||||
condition: service_started
|
||||
scap-data:
|
||||
condition: service_completed_successfully
|
||||
cert-bund-data:
|
||||
condition: service_completed_successfully
|
||||
dfn-cert-data:
|
||||
condition: service_completed_successfully
|
||||
data-objects:
|
||||
condition: service_completed_successfully
|
||||
report-formats:
|
||||
condition: service_completed_successfully
|
||||
|
||||
gsa:
|
||||
image: registry.community.greenbone.net/community/gsa:stable
|
||||
restart: on-failure
|
||||
ports:
|
||||
- 127.0.0.1:9392:80
|
||||
volumes:
|
||||
- gvmd_socket_vol:/run/gvmd
|
||||
depends_on:
|
||||
- gvmd
|
||||
# Sets log level of openvas to the set LOG_LEVEL within the env
|
||||
# and changes log output to /var/log/openvas instead /var/log/gvm
|
||||
# to reduce likelyhood of unwanted log interferences
|
||||
configure-openvas:
|
||||
image: registry.community.greenbone.net/community/openvas-scanner:stable
|
||||
volumes:
|
||||
- openvas_data_vol:/mnt
|
||||
- openvas_log_data_vol:/var/log/openvas
|
||||
command:
|
||||
- /bin/sh
|
||||
- -c
|
||||
- |
|
||||
printf "table_driven_lsc = yes\nopenvasd_server = http://openvasd:80\n" > /mnt/openvas.conf
|
||||
sed "s/127/128/" /etc/openvas/openvas_log.conf | sed 's/gvm/openvas/' > /mnt/openvas_log.conf
|
||||
chmod 644 /mnt/openvas.conf
|
||||
chmod 644 /mnt/openvas_log.conf
|
||||
touch /var/log/openvas/openvas.log
|
||||
chmod 666 /var/log/openvas/openvas.log
|
||||
|
||||
# shows logs of openvas
|
||||
openvas:
|
||||
image: registry.community.greenbone.net/community/openvas-scanner:stable
|
||||
restart: on-failure
|
||||
volumes:
|
||||
- openvas_data_vol:/etc/openvas
|
||||
- openvas_log_data_vol:/var/log/openvas
|
||||
command:
|
||||
- /bin/sh
|
||||
- -c
|
||||
- |
|
||||
cat /etc/openvas/openvas.conf
|
||||
tail -f /var/log/openvas/openvas.log
|
||||
depends_on:
|
||||
configure-openvas:
|
||||
condition: service_completed_successfully
|
||||
|
||||
openvasd:
|
||||
image: registry.community.greenbone.net/community/openvas-scanner:stable
|
||||
restart: on-failure
|
||||
environment:
|
||||
# `service_notus` is set to disable everything but notus,
|
||||
# if you want to utilize openvasd directly removed `OPENVASD_MODE`
|
||||
OPENVASD_MODE: service_notus
|
||||
GNUPGHOME: /etc/openvas/gnupg
|
||||
LISTENING: 0.0.0.0:80
|
||||
volumes:
|
||||
- openvas_data_vol:/etc/openvas
|
||||
- openvas_log_data_vol:/var/log/openvas
|
||||
- gpg_data_vol:/etc/openvas/gnupg
|
||||
- notus_data_vol:/var/lib/notus
|
||||
# enable port forwarding when you want to use the http api from your host machine
|
||||
# ports:
|
||||
# - 127.0.0.1:3000:80
|
||||
depends_on:
|
||||
vulnerability-tests:
|
||||
condition: service_completed_successfully
|
||||
configure-openvas:
|
||||
condition: service_completed_successfully
|
||||
gpg-data:
|
||||
condition: service_completed_successfully
|
||||
networks:
|
||||
default:
|
||||
aliases:
|
||||
- openvasd
|
||||
|
||||
ospd-openvas:
|
||||
image: registry.community.greenbone.net/community/ospd-openvas:stable
|
||||
restart: on-failure
|
||||
hostname: ospd-openvas.local
|
||||
cap_add:
|
||||
- NET_ADMIN # for capturing packages in promiscuous mode
|
||||
- NET_RAW # for raw sockets e.g. used for the boreas alive detection
|
||||
security_opt:
|
||||
- seccomp=unconfined
|
||||
- apparmor=unconfined
|
||||
command:
|
||||
[
|
||||
"ospd-openvas",
|
||||
"-f",
|
||||
"--config",
|
||||
"/etc/gvm/ospd-openvas.conf",
|
||||
"--notus-feed-dir",
|
||||
"/var/lib/notus/advisories",
|
||||
"-m",
|
||||
"666"
|
||||
]
|
||||
volumes:
|
||||
- gpg_data_vol:/etc/openvas/gnupg
|
||||
- vt_data_vol:/var/lib/openvas/plugins
|
||||
- notus_data_vol:/var/lib/notus
|
||||
- ospd_openvas_socket_vol:/run/ospd
|
||||
- redis_socket_vol:/run/redis/
|
||||
- openvas_data_vol:/etc/openvas/
|
||||
- openvas_log_data_vol:/var/log/openvas
|
||||
depends_on:
|
||||
redis-server:
|
||||
condition: service_started
|
||||
gpg-data:
|
||||
condition: service_completed_successfully
|
||||
vulnerability-tests:
|
||||
condition: service_completed_successfully
|
||||
configure-openvas:
|
||||
condition: service_completed_successfully
|
||||
|
||||
gvm-tools:
|
||||
image: registry.community.greenbone.net/community/gvm-tools
|
||||
volumes:
|
||||
- gvmd_socket_vol:/run/gvmd
|
||||
- ospd_openvas_socket_vol:/run/ospd
|
||||
depends_on:
|
||||
- gvmd
|
||||
- ospd-openvas
|
||||
|
||||
volumes:
|
||||
gpg_data_vol:
|
||||
scap_data_vol:
|
||||
cert_data_vol:
|
||||
data_objects_vol:
|
||||
gvmd_data_vol:
|
||||
psql_data_vol:
|
||||
vt_data_vol:
|
||||
notus_data_vol:
|
||||
psql_socket_vol:
|
||||
gvmd_socket_vol:
|
||||
ospd_openvas_socket_vol:
|
||||
redis_socket_vol:
|
||||
openvas_data_vol:
|
||||
openvas_log_data_vol:
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
@@ -0,0 +1,3 @@
|
||||
We need a production DB SQL proxy.
|
||||
|
||||
Ideally it can be integrated into the Cloudron core to increase the security of the database access.
|
1
NonCloudron/Techops/watchtower/docker-compose.yml
Normal file
1
NonCloudron/Techops/watchtower/docker-compose.yml
Normal file
@@ -0,0 +1 @@
|
||||
#watchtower docker compose for tsys
|
1
NonCloudron/Techops/watchtower/input-files/info
Normal file
1
NonCloudron/Techops/watchtower/input-files/info
Normal file
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
1
NonCloudron/Techops/watchtower/output-files/info
Normal file
1
NonCloudron/Techops/watchtower/output-files/info
Normal file
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
1
NonCloudron/Techops/watchtower/vendor-files/info
Normal file
1
NonCloudron/Techops/watchtower/vendor-files/info
Normal file
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
@@ -0,0 +1,3 @@
|
||||
# wazuh docker compose for tsys
|
||||
|
||||
# https://documentation.wazuh.com/current/deployment-options/docker/wazuh-container.html
|
@@ -0,0 +1 @@
|
||||
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).
|
@@ -0,0 +1 @@
|
||||
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.
|
@@ -0,0 +1 @@
|
||||
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
|
19
NonCloudron/orchestration/TSYSK8S/TSYSK8S.md
Normal file
19
NonCloudron/orchestration/TSYSK8S/TSYSK8S.md
Normal file
@@ -0,0 +1,19 @@
|
||||
# K8S at TSYS
|
||||
|
||||
## Introduction
|
||||
|
||||
In the near future (by end of 2024) we will need to spin our on premise heavy compute facility back online to run K8S.
|
||||
|
||||
This file is where we will document what that looks like. Mostly it will be used by R&D for the entire SDLC.
|
||||
|
||||
## Ecosystem
|
||||
|
||||
Probably
|
||||
|
||||
- https://github.com/spinnaker/spinnaker
|
||||
|
||||
as the overall orchestration layer.
|
||||
|
||||
Various K8S distributions have emerged.
|
||||
|
||||
We are (as of 10/12) a ways out from needing to worry about this in the critical path. We can go a long way with cloudron / cosmos / coolify and off the shelf docker containers (and even making some of our own containers for the tsys line of business application web sites).
|
9
NonCloudron/orchestration/nonk8s.md
Normal file
9
NonCloudron/orchestration/nonk8s.md
Normal file
@@ -0,0 +1,9 @@
|
||||
# Non k8s orchestration
|
||||
|
||||
## Introduction
|
||||
|
||||
Sometimes Subo and RR will want to run large workloads on bare metal. Not using k8s. We need to provide an option for that workload type. Probably managed via slurm.
|
||||
|
||||
## Options
|
||||
|
||||
- MAAS
|
Reference in New Issue
Block a user