Major accomplishments: - ✅ SELinux policy installed and working - ✅ Core Traefik v2.10 deployment running - ✅ Production configuration ready (v3.1) - ✅ Monitoring stack configured - ✅ Comprehensive documentation created - ✅ Security hardening implemented Current status: - 🟡 Partially deployed (60% complete) - ⚠️ Docker socket access needs resolution - ❌ Monitoring stack not deployed yet - ⚠️ Production migration pending Next steps: 1. Fix Docker socket permissions 2. Deploy monitoring stack 3. Migrate to production config 4. Validate full functionality Files added: - Complete Traefik deployment documentation - Production and test configurations - Monitoring stack configurations - SELinux policy module - Security checklists and guides - Current status documentation
162 lines
5.4 KiB
YAML
162 lines
5.4 KiB
YAML
version: '3.9'
|
|
|
|
services:
|
|
traefik:
|
|
image: traefik:v3.1 # Updated to latest stable version
|
|
user: "0:0" # Run as root for Docker socket access
|
|
command:
|
|
# Swarm provider configuration (v3.1 syntax)
|
|
- --providers.swarm=true
|
|
- --providers.swarm.exposedbydefault=false
|
|
- --providers.swarm.network=traefik-public
|
|
|
|
# Entry points
|
|
- --entrypoints.web.address=:80
|
|
- --entrypoints.websecure.address=:443
|
|
- --entrypoints.traefik.address=:8080
|
|
|
|
# API and Dashboard
|
|
- --api.dashboard=true
|
|
- --api.insecure=false
|
|
|
|
# SSL/TLS Configuration
|
|
- --certificatesresolvers.letsencrypt.acme.email=admin@localhost
|
|
- --certificatesresolvers.letsencrypt.acme.storage=/letsencrypt/acme.json
|
|
- --certificatesresolvers.letsencrypt.acme.httpchallenge=true
|
|
- --certificatesresolvers.letsencrypt.acme.httpchallenge.entrypoint=web
|
|
|
|
# Logging
|
|
- --log.level=INFO
|
|
- --log.format=json
|
|
- --log.filePath=/logs/traefik.log
|
|
- --accesslog=true
|
|
- --accesslog.format=json
|
|
- --accesslog.filePath=/logs/access.log
|
|
- --accesslog.filters.statuscodes=400-599
|
|
|
|
# Metrics
|
|
- --metrics.prometheus=true
|
|
- --metrics.prometheus.addEntryPointsLabels=true
|
|
- --metrics.prometheus.addServicesLabels=true
|
|
- --metrics.prometheus.buckets=0.1,0.3,1.2,5.0
|
|
|
|
# Security headers
|
|
- --global.checknewversion=false
|
|
- --global.sendanonymoususage=false
|
|
|
|
# Rate limiting
|
|
- --entrypoints.web.http.ratelimit.average=100
|
|
- --entrypoints.web.http.ratelimit.burst=200
|
|
- --entrypoints.websecure.http.ratelimit.average=100
|
|
- --entrypoints.websecure.http.ratelimit.burst=200
|
|
|
|
volumes:
|
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
|
- traefik_letsencrypt:/letsencrypt
|
|
- traefik_logs:/logs
|
|
|
|
networks:
|
|
- traefik-public
|
|
|
|
ports:
|
|
- "80:80"
|
|
- "443:443"
|
|
- "8080:8080"
|
|
|
|
deploy:
|
|
mode: replicated
|
|
replicas: 1
|
|
placement:
|
|
constraints:
|
|
- node.role == manager
|
|
preferences:
|
|
- spread: node.id
|
|
|
|
resources:
|
|
limits:
|
|
cpus: '1.0'
|
|
memory: 512M
|
|
reservations:
|
|
cpus: '0.5'
|
|
memory: 256M
|
|
|
|
restart_policy:
|
|
condition: on-failure
|
|
delay: 5s
|
|
max_attempts: 3
|
|
window: 120s
|
|
|
|
update_config:
|
|
parallelism: 1
|
|
delay: 10s
|
|
failure_action: rollback
|
|
order: start-first
|
|
|
|
labels:
|
|
# Enable Traefik for this service
|
|
- traefik.enable=true
|
|
- traefik.docker.network=traefik-public
|
|
|
|
# Dashboard configuration with authentication
|
|
- traefik.http.routers.dashboard.rule=Host(`traefik.${DOMAIN:-localhost}`) && (PathPrefix(`/api`) || PathPrefix(`/dashboard`))
|
|
- traefik.http.routers.dashboard.service=api@internal
|
|
- traefik.http.routers.dashboard.entrypoints=websecure
|
|
- traefik.http.routers.dashboard.tls=true
|
|
- traefik.http.routers.dashboard.tls.certresolver=letsencrypt
|
|
- traefik.http.routers.dashboard.middlewares=dashboard-auth,security-headers
|
|
|
|
# Authentication middleware (bcrypt hash for password: secure_password_2024)
|
|
- traefik.http.middlewares.dashboard-auth.basicauth.users=admin:$$2y$$10$$xvzBkbKKvRX.jGG6F7L.ReEMyEx.7BkqNGQO2rFt/1aBgx8jPElXW
|
|
- traefik.http.middlewares.dashboard-auth.basicauth.realm=Traefik Dashboard
|
|
|
|
# Security headers middleware
|
|
- traefik.http.middlewares.security-headers.headers.framedeny=true
|
|
- traefik.http.middlewares.security-headers.headers.sslredirect=true
|
|
- traefik.http.middlewares.security-headers.headers.browserxssfilter=true
|
|
- traefik.http.middlewares.security-headers.headers.contenttypenosniff=true
|
|
- traefik.http.middlewares.security-headers.headers.forcestsheader=true
|
|
- traefik.http.middlewares.security-headers.headers.stsincludesubdomains=true
|
|
- traefik.http.middlewares.security-headers.headers.stsseconds=63072000
|
|
- traefik.http.middlewares.security-headers.headers.stspreload=true
|
|
|
|
# Global HTTP to HTTPS redirect
|
|
- traefik.http.routers.http-catchall.rule=hostregexp(`{host:.+}`)
|
|
- traefik.http.routers.http-catchall.entrypoints=web
|
|
- traefik.http.routers.http-catchall.middlewares=redirect-to-https
|
|
- traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https
|
|
- traefik.http.middlewares.redirect-to-https.redirectscheme.permanent=true
|
|
|
|
# Dummy service for Swarm compatibility
|
|
- traefik.http.services.dummy-svc.loadbalancer.server.port=9999
|
|
|
|
# Health check
|
|
- traefik.http.routers.ping.rule=Path(`/ping`)
|
|
- traefik.http.routers.ping.service=ping@internal
|
|
- traefik.http.routers.ping.entrypoints=traefik
|
|
|
|
healthcheck:
|
|
test: ["CMD", "wget", "--no-verbose", "--tries=1", "--spider", "http://localhost:8080/ping"]
|
|
interval: 30s
|
|
timeout: 10s
|
|
retries: 3
|
|
start_period: 40s
|
|
|
|
volumes:
|
|
traefik_letsencrypt:
|
|
driver: local
|
|
driver_opts:
|
|
type: none
|
|
o: bind
|
|
device: /opt/traefik/letsencrypt
|
|
traefik_logs:
|
|
driver: local
|
|
driver_opts:
|
|
type: none
|
|
o: bind
|
|
device: /opt/traefik/logs
|
|
|
|
networks:
|
|
traefik-public:
|
|
external: true
|
|
driver: overlay
|
|
attachable: true |