mirror of https://github.com/grafana/grafana
commit
9a48b67021
@ -0,0 +1,61 @@ |
||||
# Courtesy of https://github.com/sgzijl |
||||
# config.js includes elasticsearch: "https://"+window.location.hostname+":443", |
||||
|
||||
<VirtualHost 1.2.3.4:80> |
||||
ServerName your.domain.tld |
||||
RewriteEngine On |
||||
RewriteCond %{HTTPS} off |
||||
RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} |
||||
</VirtualHost> |
||||
|
||||
<VirtualHost 1.2.3.4:443> |
||||
ServerName your.domain.tld |
||||
|
||||
SSLEngine on |
||||
SSLCertificateFile /path/to/public.crt |
||||
SSLCertificateKeyFile /path/to/private.key |
||||
|
||||
DocumentRoot /path/to/kibana3 |
||||
<Directory /path/to/kibana3> |
||||
Allow from all |
||||
Options -Multiviews |
||||
</Directory> |
||||
|
||||
LogLevel debug |
||||
ErrorLog /path/to/logs/error_log |
||||
CustomLog /path/to/logs/access_log combined |
||||
|
||||
# Set global proxy timeouts |
||||
<Proxy http://127.0.0.1:9200> |
||||
ProxySet connectiontimeout=5 timeout=90 |
||||
</Proxy> |
||||
|
||||
# Proxy for _aliases and .*/_search |
||||
<LocationMatch "^(/_aliases|.*/_search)$"> |
||||
ProxyPass http://127.0.0.1:9200 |
||||
ProxyPassReverse http://127.0.0.1:9200 |
||||
</LocationMatch> |
||||
|
||||
# Proxy for kibana-int/{dashboard,temp} stuff (if you don't want auth on /, then you will want these to be protected) |
||||
<LocationMatch "^(/kibana-int/dashboard/|/kibana-int/temp).*$"> |
||||
ProxyPass http://127.0.0.1:9200 |
||||
ProxyPassReverse http://127.0.0.1:9200 |
||||
</LocationMatch> |
||||
|
||||
# Optional disable auth for a src IP (eg: your monitoring host or subnet) |
||||
<Location /> |
||||
Allow from 5.6.7.8 |
||||
Deny from all |
||||
Satisfy any |
||||
|
||||
AuthLDAPBindDN "CN=_ldapbinduser,OU=Users,DC=example,DC=com" |
||||
AuthLDAPBindPassword "ldapbindpass" |
||||
AuthLDAPURL "ldaps://ldap01.example.com ldap02.example.com/OU=Users,DC=example,DC=com?sAMAccountName?sub?(objectClass=*)" |
||||
AuthType Basic |
||||
AuthBasicProvider ldap |
||||
AuthName "Please authenticate for Example dot com" |
||||
AuthLDAPGroupAttributeIsDN on |
||||
require valid-user |
||||
</Location> |
||||
|
||||
</VirtualHost> |
Loading…
Reference in new issue