Add redisinsight
This commit is contained in:
parent
75e5c901af
commit
3dab765238
@ -18,6 +18,7 @@ Available services
|
|||||||
- Grafana
|
- Grafana
|
||||||
- Maildev
|
- Maildev
|
||||||
- cadvisor
|
- cadvisor
|
||||||
|
- Redisinsight
|
||||||
|
|
||||||
Role variables
|
Role variables
|
||||||
---------------
|
---------------
|
||||||
@ -52,11 +53,18 @@ Example variables
|
|||||||
- grafana
|
- grafana
|
||||||
- maildev
|
- maildev
|
||||||
- cadvisor
|
- cadvisor
|
||||||
|
- redisinsight
|
||||||
|
|
||||||
traefik_domain: 'mydomain.com'
|
traefik_domain: 'mydomain.com'
|
||||||
traefik_letsencrypt_email: 'cert@mydomain.com'
|
traefik_letsencrypt_email: 'cert@mydomain.com'
|
||||||
|
|
||||||
maildev_domain: 'maildev.mydomain.com'
|
maildev_domain: 'maildev.mydomain.com'
|
||||||
|
|
||||||
|
redisinsight_domain: 'redisinsight.mydomain.com'
|
||||||
|
redisinsight_whitelist:
|
||||||
|
- 192.168.1.0/24
|
||||||
|
- 31.15.24.XX
|
||||||
|
- 37.58.179.XX
|
||||||
```
|
```
|
||||||
|
|
||||||
TODO
|
TODO
|
||||||
|
@ -26,3 +26,10 @@
|
|||||||
state: restarted
|
state: restarted
|
||||||
ignore_errors: '{{ ansible_check_mode }}'
|
ignore_errors: '{{ ansible_check_mode }}'
|
||||||
tags: ['docker_maildev']
|
tags: ['docker_maildev']
|
||||||
|
|
||||||
|
- name: redisinsight-restart
|
||||||
|
systemd:
|
||||||
|
name: docker-compose@redisinsight
|
||||||
|
state: restarted
|
||||||
|
ignore_errors: '{{ ansible_check_mode }}'
|
||||||
|
tags: ['docker_redisinsight']
|
||||||
|
@ -14,5 +14,6 @@
|
|||||||
- docker_watchtower
|
- docker_watchtower
|
||||||
- docker_grafana
|
- docker_grafana
|
||||||
- docker_maildev
|
- docker_maildev
|
||||||
|
- docker_redisinsight
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ docker_services }}"
|
- "{{ docker_services }}"
|
||||||
|
9
tasks/redisinsight.yml
Normal file
9
tasks/redisinsight.yml
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
---
|
||||||
|
- name: redisinsight | check vars are defined
|
||||||
|
assert:
|
||||||
|
that:
|
||||||
|
- redisinsight_domain is defined
|
||||||
|
tags: ['docker_redisinsight']
|
||||||
|
|
||||||
|
- include_tasks: base.yml
|
||||||
|
tags: ['docker_redisinsight']
|
34
templates/compose/redisinsight.yml.j2
Normal file
34
templates/compose/redisinsight.yml.j2
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
version: '3.7'
|
||||||
|
|
||||||
|
networks:
|
||||||
|
traefik:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
redisinsight__db:
|
||||||
|
|
||||||
|
services:
|
||||||
|
redisinsight:
|
||||||
|
container_name: redisinsight
|
||||||
|
image: git.rznet.fr/docker/redisinsight:latest
|
||||||
|
restart: unless-stopped
|
||||||
|
volumes:
|
||||||
|
- redisinsight__db:/root/.redisinsight-v2/
|
||||||
|
cap_add:
|
||||||
|
- IPC_LOCK
|
||||||
|
labels:
|
||||||
|
traefik.enable: "true"
|
||||||
|
## IP
|
||||||
|
traefik.http.routers.redisinsight.rule: "Host(`{{ redisinsight_domain }}`){% if redisinsight_whitelist is defined %} && ClientIP({% for ip in redisinsight_whitelist %}`{{ ip }}`,{% endfor %}){% endif %}"
|
||||||
|
traefik.http.routers.redisinsight.entrypoints: "websecure"
|
||||||
|
traefik.http.routers.redisinsight.tls.certresolver: "letsencrypt"
|
||||||
|
traefik.http.services.redisinsight.loadbalancer.server.port: "5000"
|
||||||
|
{% if redisinsight_auth is defined %}
|
||||||
|
## AUTH
|
||||||
|
traefik.http.routers.redisinsight-auth.rule: "Host(`{{ redisinsight_domain }}`)"
|
||||||
|
traefik.http.routers.redisinsight-auth.entrypoints: "websecure"
|
||||||
|
traefik.http.routers.redisinsight-auth.tls.certresolver: "letsencrypt"
|
||||||
|
traefik.http.routers.redisinsight-auth.middlewares: "basicauth@file"
|
||||||
|
{% endif %}
|
||||||
|
networks:
|
||||||
|
- traefik
|
Loading…
x
Reference in New Issue
Block a user