Changes for page Software Stacks
Last modified by chrisby on 2024/08/29 14:47
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -2,16 +2,16 @@ 2 2 === Introduction === 3 3 4 4 (% style="text-align: justify;" %) 5 -I love open source software, especially when it can be deployed seamlessly via Docker. I often combine deployments with Traefik, which greatly simplifies the reverse proxying process and certificate generation.However, individual projects often have unique nuances and configurations. So I've created this section to show you how to deploy the software I'm working on with no more than two commands.5 +I love open source software, especially when it can be deployed seamlessly via Docker. However, individual projects often have unique nuances and configurations. So I've created this section to show you how to deploy the software I'm working on with no more than two commands. To get a working deployment of a software stack, simply copy the {{code language="none"}}docker-compose.yml{{/code}} from the article, replace any variables with the format {{code language="none"}}<some-variable>{{/code}} with an actual value, and follow the instructions. 6 6 7 7 (% style="text-align: justify;" %) 8 -All the configurations described in the subsections use Traefik as areverse proxy. It's also possible to combine all the stacksbelow on a single device behind a single Traefik container. Just copy the service configurationinone docker-compose.yml to anotherdocker-compose.ymland runup -d" too therest.8 +All the configurations described in the subsections use Traefik, which greatly simplifies the reverse proxying process and certificate generation. It's also possible to combine all the stacks on a single device behind a single Traefik container. Just copy the service configuration from one {{code language="none"}}docker-compose.yml{{/code}} to another {{code language="none"}}docker-compose.yml{{/code}}. 9 9 10 10 (% style="text-align: justify;" %) 11 -Traefik will automatically generate an appropriate LetsEncrypt certificate on startup. It's worth noting that there is currently a limit of 5 LetsEncrypt certificates per 24 hour period. However, there's an option in the Traefik settings in docker-compose.yml to manually disable this and use dummy certificates instead. This comes in handy if you're in the experimental phase and are initiating multiple deployments per day. If you want to get rid of the dummy certificates, just shut down Traefik, delete its volume and restart it. 11 +Traefik will automatically generate an appropriate LetsEncrypt certificate on startup. It's worth noting that there is currently a limit of 5 LetsEncrypt certificates per 24 hour period. However, there's an option in the Traefik settings in {{code language="none"}}docker-compose.yml{{/code}} to manually disable this and use dummy certificates instead. This comes in handy if you're in the experimental phase and are initiating multiple deployments per day. If you want to get rid of the dummy certificates, just shut down Traefik, delete its volume and restart it. 12 12 13 13 (% style="text-align: justify;" %) 14 -In each docker-compose.yml, unambiguous docker image tags are set. The reason for this is to keep the deployment stable. Nothing ismorefrustrating thanhavingbugs during deploymentandhavingtofindworkingsetofimage versions when you justwantto test the software. If you intend to use the software in production, I recommend deploying the latest version ofthecontainers to avoid unnecessary security vulnerabilities andtogetthe latest features.14 +In each {{code language="none"}}docker-compose.yml{{/code}}, unambiguous docker image tags are set. The reason for this is to keep the deployment stable. It's frustrating to encounter bugs during deployment due to outdated configurations or incompatible container versions, especially when you're just testing the software. If you intend to use the software in production, I recommend reading the documentation or experimenting with the latest version of containers to get a stable set. This will avoid unnecessary security vulnerabilities and give you the latest features. 15 15 16 16 17 17 (% style="text-align: justify;" %)