This commit is contained in:
2025-04-21 19:21:06 -05:00
parent a4db3a38d8
commit 113d1cd0fd
307 changed files with 5 additions and 5 deletions

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# dockerfile for an app at tsys

View File

@@ -0,0 +1 @@
# dev environment for an app at tsys

View File

@@ -0,0 +1,5 @@
# app docker compose file for tsys
## app name
## ports
## deps

View File

@@ -0,0 +1 @@
# Cosmos port map

View File

@@ -0,0 +1 @@
Nextcloud is able to utilize a draw.io server. Lets give it one to use

View File

@@ -0,0 +1,3 @@
# TSYS GIS Backend
This folder contains the GIS related backend docker compose files for TSYS GIS stack. HFNOC will own this.

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1,14 @@
API gateway notes
* API gateway (TYK)
<https://tyk.io/>
<https://tyk.io/docs/getting-started/installation/with-tyk-on-premises/docker/>
<https://tyk.io/docs/advanced-configuration/integrate/sso/dashboard-login-ldap-tib/>
(or perhaps..)
https://github.com/apache/apisix

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1,4 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory
https://hub.docker.com/r/apache/apisix

View File

@@ -0,0 +1,25 @@
# Cloud dev at tsys
## Desired architecute
(essentially the lap.dev architecure)
- control plane running as a web app on cosmos
- agent that spins up ephermeral containers on runner hosts
## Contenders
- strong.network
- lap.dev (dont like that it only supports github/gitlab oautg) (also that it doesnt appear to be dockerized)
## Links
- https://github.com/strong-network/images
https://github.com/daytonaio/daytona?tab=readme-ov-file
https://www.daytona.io
https://github.com/gitpod-io/openvscode-server

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1,10 @@
version: '3.3'
services:
easy-gate:
container_name: easy-gate
ports:
- '1002:8080'
volumes:
- '/docker/ConHost/Overhead/easy-gate/easy-gate.json:/etc/easy-gate/easy-gate.json'
restart: unless-stopped
image: r7wx/easy-gate

View File

@@ -0,0 +1,167 @@
{
"addr": "0.0.0.0:1001",
"use_tls": false,
"cert_file": "",
"key_file": "",
"behind_proxy": true,
"title": "TSYS Global IT Dashboard",
"icon": "fa-solid fa-cubes",
"motd": "TSYS Global IT Dashboard - Brought to you by Known Element Enterprises",
"theme": {
"background": "#FFFFFF",
"foreground": "#000000"
},
"groups": [
{
"name": "internal",
"subnet": "10.251.0.0/16"
},
{
"name": "vpn",
"subnet": "10.49.1.0/24"
}
],
"services": [
{
"icon": "fa-brands fa-git-square",
"name": "Git",
"url": "https://git.knownelement.com",
"groups": [
"internal,vpn"
]
},
{
"icon": "fa-brands fa-docker",
"name": "Portainer",
"url": "https://portainer.knownelement.com",
"groups": [
"internal,vpn"
]
},
{
"icon": "fa-solid fa-folder-open",
"name": "Files",
"url": "https://files.example.internal",
"groups": [
"internal"
]
},
{
"icon": "fa-solid fa-box-archive",
"name": "Archive",
"url": "https://archive.example.internal",
"groups": [
"internal"
]
},
{
"icon": "fa-solid fa-chart-line",
"name": "Kibana",
"url": "https://kibana.example.internal",
"groups": [
"internal"
]
},
{
"icon": "fa-solid fa-download",
"name": "Transmission",
"url": "https://transmission.example.internal",
"groups": [
"internal"
]
},
{
"icon": "fa-solid fa-bookmark",
"name": "Bookmarks",
"url": "https://bookmarks.example.internal",
"groups": [
"internal"
]
},
{
"icon": "fa-solid fa-book",
"name": "Calibre",
"url": "https://calibre.example.internal",
"groups": [
"internal"
]
},
{
"icon": "fa-solid fa-comment",
"name": "Webchat",
"url": "https://chat.example.internal",
"groups": []
},
{
"icon": "fa-solid fa-cloud",
"name": "Owncloud",
"url": "https://owncloud.example.internal",
"groups": [
"internal",
"vpn"
]
},
{
"icon": "fa-brands fa-wikipedia-w",
"name": "Wiki",
"url": "https://wiki.example.internal",
"groups": [
"internal",
"vpn"
]
},
{
"icon": "fa-brands fa-mastodon",
"name": "Mastodon",
"url": "https://mastodon.example.internal",
"groups": [
"internal",
"vpn"
]
},
{
"icon": "fa-brands fa-google",
"name": "Google",
"url": "https://www.google.com",
"groups": []
},
{
"icon": "fa-brands fa-youtube",
"name": "Youtube",
"url": "https://www.youtube.com",
"groups": []
},
{
"icon": "fa-brands fa-stack-overflow",
"name": "Stackoverflow",
"url": "https://stackoverflow.com",
"groups": []
}
],
"notes": [
{
"name": "Simple note",
"text": "This is a simple note for vpn users",
"groups": [
"vpn"
]
},
{
"name": "Global note",
"text": "This note will be visible to everyone",
"groups": []
},
{
"name": "How to use our internal services",
"text": "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec nec arcu purus. Maecenas ut erat ut tellus vulputate pellentesque sit amet quis metus. Praesent sollicitudin ultricies leo. Sed ornare libero non vehicula cursus. Aliquam vulputate pulvinar elit, sit amet tempus justo condimentum in. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus",
"groups": []
},
{
"name": "Another note",
"text": "Another note for internal network users only",
"groups": [
"internal"
]
}
]
}

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1,8 @@
## Introduction
Need a serverless / functions as a service runtime
## Options
- https://github.com/adnanh/webhook
- https://github.com/metrue/fx

View File

@@ -0,0 +1 @@
#graylog docker compose for tsys

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1 @@
#mailman docker compose for tsys

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1 @@
netbird can be run behind an existing reverse proxy. so we shall run it on cloudron.

View File

@@ -0,0 +1 @@
#opensearch docker compose file for tsys

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1,236 @@
#openvas docker compose for tsys
#git subtree add --prefix upstream/openvas https://github.com/mikesplain/openvas-docker.git master --squash
# greenbone/vulnerability-tests \
# greenbone/notus-data \
# greenbone/scap-data \
# securecompliance/gvm:debian-master-data-full \
# securecompliance/gvm:debian-master-data \
# securecompliance/gvm:debian-master-full \
# securecompliance/gvm:debian-master \
services:
vulnerability-tests:
image: registry.community.greenbone.net/community/vulnerability-tests
environment:
STORAGE_PATH: /var/lib/openvas/22.04/vt-data/nasl
volumes:
- vt_data_vol:/mnt
notus-data:
image: registry.community.greenbone.net/community/notus-data
volumes:
- notus_data_vol:/mnt
scap-data:
image: registry.community.greenbone.net/community/scap-data
volumes:
- scap_data_vol:/mnt
cert-bund-data:
image: registry.community.greenbone.net/community/cert-bund-data
volumes:
- cert_data_vol:/mnt
dfn-cert-data:
image: registry.community.greenbone.net/community/dfn-cert-data
volumes:
- cert_data_vol:/mnt
depends_on:
- cert-bund-data
data-objects:
image: registry.community.greenbone.net/community/data-objects
volumes:
- data_objects_vol:/mnt
report-formats:
image: registry.community.greenbone.net/community/report-formats
volumes:
- data_objects_vol:/mnt
depends_on:
- data-objects
gpg-data:
image: registry.community.greenbone.net/community/gpg-data
volumes:
- gpg_data_vol:/mnt
redis-server:
image: registry.community.greenbone.net/community/redis-server
restart: on-failure
volumes:
- redis_socket_vol:/run/redis/
pg-gvm:
image: registry.community.greenbone.net/community/pg-gvm:stable
restart: on-failure
volumes:
- psql_data_vol:/var/lib/postgresql
- psql_socket_vol:/var/run/postgresql
gvmd:
image: registry.community.greenbone.net/community/gvmd:stable
restart: on-failure
volumes:
- gvmd_data_vol:/var/lib/gvm
- scap_data_vol:/var/lib/gvm/scap-data/
- cert_data_vol:/var/lib/gvm/cert-data
- data_objects_vol:/var/lib/gvm/data-objects/gvmd
- vt_data_vol:/var/lib/openvas/plugins
- psql_data_vol:/var/lib/postgresql
- gvmd_socket_vol:/run/gvmd
- ospd_openvas_socket_vol:/run/ospd
- psql_socket_vol:/var/run/postgresql
depends_on:
pg-gvm:
condition: service_started
scap-data:
condition: service_completed_successfully
cert-bund-data:
condition: service_completed_successfully
dfn-cert-data:
condition: service_completed_successfully
data-objects:
condition: service_completed_successfully
report-formats:
condition: service_completed_successfully
gsa:
image: registry.community.greenbone.net/community/gsa:stable
restart: on-failure
ports:
- 127.0.0.1:9392:80
volumes:
- gvmd_socket_vol:/run/gvmd
depends_on:
- gvmd
# Sets log level of openvas to the set LOG_LEVEL within the env
# and changes log output to /var/log/openvas instead /var/log/gvm
# to reduce likelyhood of unwanted log interferences
configure-openvas:
image: registry.community.greenbone.net/community/openvas-scanner:stable
volumes:
- openvas_data_vol:/mnt
- openvas_log_data_vol:/var/log/openvas
command:
- /bin/sh
- -c
- |
printf "table_driven_lsc = yes\nopenvasd_server = http://openvasd:80\n" > /mnt/openvas.conf
sed "s/127/128/" /etc/openvas/openvas_log.conf | sed 's/gvm/openvas/' > /mnt/openvas_log.conf
chmod 644 /mnt/openvas.conf
chmod 644 /mnt/openvas_log.conf
touch /var/log/openvas/openvas.log
chmod 666 /var/log/openvas/openvas.log
# shows logs of openvas
openvas:
image: registry.community.greenbone.net/community/openvas-scanner:stable
restart: on-failure
volumes:
- openvas_data_vol:/etc/openvas
- openvas_log_data_vol:/var/log/openvas
command:
- /bin/sh
- -c
- |
cat /etc/openvas/openvas.conf
tail -f /var/log/openvas/openvas.log
depends_on:
configure-openvas:
condition: service_completed_successfully
openvasd:
image: registry.community.greenbone.net/community/openvas-scanner:stable
restart: on-failure
environment:
# `service_notus` is set to disable everything but notus,
# if you want to utilize openvasd directly removed `OPENVASD_MODE`
OPENVASD_MODE: service_notus
GNUPGHOME: /etc/openvas/gnupg
LISTENING: 0.0.0.0:80
volumes:
- openvas_data_vol:/etc/openvas
- openvas_log_data_vol:/var/log/openvas
- gpg_data_vol:/etc/openvas/gnupg
- notus_data_vol:/var/lib/notus
# enable port forwarding when you want to use the http api from your host machine
# ports:
# - 127.0.0.1:3000:80
depends_on:
vulnerability-tests:
condition: service_completed_successfully
configure-openvas:
condition: service_completed_successfully
gpg-data:
condition: service_completed_successfully
networks:
default:
aliases:
- openvasd
ospd-openvas:
image: registry.community.greenbone.net/community/ospd-openvas:stable
restart: on-failure
hostname: ospd-openvas.local
cap_add:
- NET_ADMIN # for capturing packages in promiscuous mode
- NET_RAW # for raw sockets e.g. used for the boreas alive detection
security_opt:
- seccomp=unconfined
- apparmor=unconfined
command:
[
"ospd-openvas",
"-f",
"--config",
"/etc/gvm/ospd-openvas.conf",
"--notus-feed-dir",
"/var/lib/notus/advisories",
"-m",
"666"
]
volumes:
- gpg_data_vol:/etc/openvas/gnupg
- vt_data_vol:/var/lib/openvas/plugins
- notus_data_vol:/var/lib/notus
- ospd_openvas_socket_vol:/run/ospd
- redis_socket_vol:/run/redis/
- openvas_data_vol:/etc/openvas/
- openvas_log_data_vol:/var/log/openvas
depends_on:
redis-server:
condition: service_started
gpg-data:
condition: service_completed_successfully
vulnerability-tests:
condition: service_completed_successfully
configure-openvas:
condition: service_completed_successfully
gvm-tools:
image: registry.community.greenbone.net/community/gvm-tools
volumes:
- gvmd_socket_vol:/run/gvmd
- ospd_openvas_socket_vol:/run/ospd
depends_on:
- gvmd
- ospd-openvas
volumes:
gpg_data_vol:
scap_data_vol:
cert_data_vol:
data_objects_vol:
gvmd_data_vol:
psql_data_vol:
vt_data_vol:
notus_data_vol:
psql_socket_vol:
gvmd_socket_vol:
ospd_openvas_socket_vol:
redis_socket_vol:
openvas_data_vol:
openvas_log_data_vol:

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1,3 @@
We need a production DB SQL proxy.
Ideally it can be integrated into the Cloudron core to increase the security of the database access.

View File

@@ -0,0 +1 @@
#watchtower docker compose for tsys

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1,3 @@
# wazuh docker compose for tsys
# https://documentation.wazuh.com/current/deployment-options/docker/wazuh-container.html

View File

@@ -0,0 +1 @@
This directory contains template files for the application at FQDN indidicated by the parent directory. They will be processed using mo (bash mustache).

View File

@@ -0,0 +1 @@
This directory contains final docker compose files for the application at FQDN indidicated by the parent directory.

View File

@@ -0,0 +1 @@
This directory contains files from the vendor unmodified. They serve as a base for the input-files sibling directory

View File

@@ -0,0 +1,19 @@
# K8S at TSYS
## Introduction
In the near future (by end of 2024) we will need to spin our on premise heavy compute facility back online to run K8S.
This file is where we will document what that looks like. Mostly it will be used by R&D for the entire SDLC.
## Ecosystem
Probably
- https://github.com/spinnaker/spinnaker
as the overall orchestration layer.
Various K8S distributions have emerged.
We are (as of 10/12) a ways out from needing to worry about this in the critical path. We can go a long way with cloudron / cosmos / coolify and off the shelf docker containers (and even making some of our own containers for the tsys line of business application web sites).

View File

@@ -0,0 +1,9 @@
# Non k8s orchestration
## Introduction
Sometimes Subo and RR will want to run large workloads on bare metal. Not using k8s. We need to provide an option for that workload type. Probably managed via slurm.
## Options
- MAAS