mirror of https://github.com/grafana/grafana
commit
9a48b67021
@ -0,0 +1,61 @@ |
|||||||
|
# Courtesy of https://github.com/sgzijl |
||||||
|
# config.js includes elasticsearch: "https://"+window.location.hostname+":443", |
||||||
|
|
||||||
|
<VirtualHost 1.2.3.4:80> |
||||||
|
ServerName your.domain.tld |
||||||
|
RewriteEngine On |
||||||
|
RewriteCond %{HTTPS} off |
||||||
|
RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} |
||||||
|
</VirtualHost> |
||||||
|
|
||||||
|
<VirtualHost 1.2.3.4:443> |
||||||
|
ServerName your.domain.tld |
||||||
|
|
||||||
|
SSLEngine on |
||||||
|
SSLCertificateFile /path/to/public.crt |
||||||
|
SSLCertificateKeyFile /path/to/private.key |
||||||
|
|
||||||
|
DocumentRoot /path/to/kibana3 |
||||||
|
<Directory /path/to/kibana3> |
||||||
|
Allow from all |
||||||
|
Options -Multiviews |
||||||
|
</Directory> |
||||||
|
|
||||||
|
LogLevel debug |
||||||
|
ErrorLog /path/to/logs/error_log |
||||||
|
CustomLog /path/to/logs/access_log combined |
||||||
|
|
||||||
|
# Set global proxy timeouts |
||||||
|
<Proxy http://127.0.0.1:9200> |
||||||
|
ProxySet connectiontimeout=5 timeout=90 |
||||||
|
</Proxy> |
||||||
|
|
||||||
|
# Proxy for _aliases and .*/_search |
||||||
|
<LocationMatch "^(/_aliases|.*/_search)$"> |
||||||
|
ProxyPass http://127.0.0.1:9200 |
||||||
|
ProxyPassReverse http://127.0.0.1:9200 |
||||||
|
</LocationMatch> |
||||||
|
|
||||||
|
# Proxy for kibana-int/{dashboard,temp} stuff (if you don't want auth on /, then you will want these to be protected) |
||||||
|
<LocationMatch "^(/kibana-int/dashboard/|/kibana-int/temp).*$"> |
||||||
|
ProxyPass http://127.0.0.1:9200 |
||||||
|
ProxyPassReverse http://127.0.0.1:9200 |
||||||
|
</LocationMatch> |
||||||
|
|
||||||
|
# Optional disable auth for a src IP (eg: your monitoring host or subnet) |
||||||
|
<Location /> |
||||||
|
Allow from 5.6.7.8 |
||||||
|
Deny from all |
||||||
|
Satisfy any |
||||||
|
|
||||||
|
AuthLDAPBindDN "CN=_ldapbinduser,OU=Users,DC=example,DC=com" |
||||||
|
AuthLDAPBindPassword "ldapbindpass" |
||||||
|
AuthLDAPURL "ldaps://ldap01.example.com ldap02.example.com/OU=Users,DC=example,DC=com?sAMAccountName?sub?(objectClass=*)" |
||||||
|
AuthType Basic |
||||||
|
AuthBasicProvider ldap |
||||||
|
AuthName "Please authenticate for Example dot com" |
||||||
|
AuthLDAPGroupAttributeIsDN on |
||||||
|
require valid-user |
||||||
|
</Location> |
||||||
|
|
||||||
|
</VirtualHost> |
Loading…
Reference in new issue