diff --git a/compose.yaml b/compose.yaml index 387066a..1471306 100644 --- a/compose.yaml +++ b/compose.yaml @@ -2,12 +2,19 @@ services: api: + depends_on: + - db + - es01 + - es02 + - es03 + # - kibana image: ghcr.io/whiletrue-industries/odds/odds-server:latest ports: - - "8000:80" + - "80:8000" volumes: - ./odds.config.yaml:/srv/odds.config.yaml - ./.caches/:/srv/.caches/ + - certs:/docker/certs command: utils/api_server.sh db: image: postgres:16 @@ -18,4 +25,256 @@ services: ports: - "5432:5432" volumes: - - ./.caches/db/:/var/lib/postgresql/data \ No newline at end of file + - ./.caches/db/:/var/lib/postgresql/data + + + es-setup: + image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} + volumes: + - certs:/usr/share/elasticsearch/config/certs + user: "0" + command: > + bash -c ' + if [ x${ELASTIC_PASSWORD} == x ]; then + echo "Set the ELASTIC_PASSWORD environment variable in the .env file"; + exit 1; + elif [ x${KIBANA_PASSWORD} == x ]; then + echo "Set the KIBANA_PASSWORD environment variable in the .env file"; + exit 1; + fi; + if [ ! -f config/certs/ca.zip ]; then + echo "Creating CA"; + bin/elasticsearch-certutil ca --silent --pem -out config/certs/ca.zip; + unzip config/certs/ca.zip -d config/certs; + fi; + if [ ! -f config/certs/certs.zip ]; then + echo "Creating certs"; + echo -ne \ + "instances:\n"\ + " - name: es01\n"\ + " dns:\n"\ + " - es01\n"\ + " - localhost\n"\ + " ip:\n"\ + " - 127.0.0.1\n"\ + " - name: es02\n"\ + " dns:\n"\ + " - es02\n"\ + " - localhost\n"\ + " ip:\n"\ + " - 127.0.0.1\n"\ + " - name: es03\n"\ + " dns:\n"\ + " - es03\n"\ + " - localhost\n"\ + " ip:\n"\ + " - 127.0.0.1\n"\ + > config/certs/instances.yml; + bin/elasticsearch-certutil cert --silent --pem -out config/certs/certs.zip --in config/certs/instances.yml --ca-cert config/certs/ca/ca.crt --ca-key config/certs/ca/ca.key; + unzip config/certs/certs.zip -d config/certs; + fi; + echo "Setting file permissions" + chown -R root:root config/certs; + find . -type d -exec chmod 750 \{\} \;; + find . -type f -exec chmod 640 \{\} \;; + echo "Waiting for Elasticsearch availability"; + until curl -s --cacert config/certs/ca/ca.crt https://es01:9200 | grep -q "missing authentication credentials"; do sleep 30; done; + echo "Setting kibana_system password"; + until curl -s -X POST --cacert config/certs/ca/ca.crt -u "elastic:${ELASTIC_PASSWORD}" -H "Content-Type: application/json" https://es01:9200/_security/user/kibana_system/_password -d "{\"password\":\"${KIBANA_PASSWORD}\"}" | grep -q "^{}"; do sleep 10; done; + sleep 10; + echo "All done!"; + ' + healthcheck: + test: ["CMD-SHELL", "[ -f config/certs/es01/es01.crt ]"] + interval: 10s + timeout: 50s + retries: 120 + + es01: + depends_on: + es-setup: + condition: service_healthy + image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} + volumes: + - certs:/usr/share/elasticsearch/config/certs + - esdata01:/usr/share/elasticsearch/data + ports: + - ${ES_PORT}:9200 + environment: + - node.name=es01 + - cluster.name=${CLUSTER_NAME} + - cluster.initial_master_nodes=es01,es02,es03 + - discovery.seed_hosts=es02,es03 + - ELASTIC_PASSWORD=${ELASTIC_PASSWORD} + - bootstrap.memory_lock=true + - xpack.security.enabled=true + - xpack.security.http.ssl.enabled=true + - xpack.security.http.ssl.key=certs/es01/es01.key + - xpack.security.http.ssl.certificate=certs/es01/es01.crt + - xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt + - xpack.security.transport.ssl.enabled=true + - xpack.security.transport.ssl.key=certs/es01/es01.key + - xpack.security.transport.ssl.certificate=certs/es01/es01.crt + - xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt + - xpack.security.transport.ssl.verification_mode=certificate + - xpack.license.self_generated.type=${LICENSE} + mem_limit: ${MEM_LIMIT} + ulimits: + memlock: + soft: -1 + hard: -1 + # healthcheck: + # test: + # [ + # "CMD-SHELL", + # "curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'", + # ] + # interval: 60s + # timeout: 60s + # retries: 120 + restart: always + + es02: + depends_on: + - es01 + image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} + volumes: + - certs:/usr/share/elasticsearch/config/certs + - esdata02:/usr/share/elasticsearch/data + environment: + - node.name=es02 + - cluster.name=${CLUSTER_NAME} + - cluster.initial_master_nodes=es01,es02,es03 + - discovery.seed_hosts=es01,es03 + - bootstrap.memory_lock=true + - xpack.security.enabled=true + - xpack.security.http.ssl.enabled=true + - xpack.security.http.ssl.key=certs/es02/es02.key + - xpack.security.http.ssl.certificate=certs/es02/es02.crt + - xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt + - xpack.security.transport.ssl.enabled=true + - xpack.security.transport.ssl.key=certs/es02/es02.key + - xpack.security.transport.ssl.certificate=certs/es02/es02.crt + - xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt + - xpack.security.transport.ssl.verification_mode=certificate + - xpack.license.self_generated.type=${LICENSE} + mem_limit: ${MEM_LIMIT} + ulimits: + memlock: + soft: -1 + hard: -1 + # healthcheck: + # test: + # [ + # "CMD-SHELL", + # "curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'", + # ] + # interval: 60s + # timeout: 60s + # retries: 120 + restart: always + + + es03: + depends_on: + - es02 + image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION} + volumes: + - certs:/usr/share/elasticsearch/config/certs + - esdata03:/usr/share/elasticsearch/data + environment: + - node.name=es03 + - cluster.name=${CLUSTER_NAME} + - cluster.initial_master_nodes=es01,es02,es03 + - discovery.seed_hosts=es01,es02 + - bootstrap.memory_lock=true + - xpack.security.enabled=true + - xpack.security.http.ssl.enabled=true + - xpack.security.http.ssl.key=certs/es03/es03.key + - xpack.security.http.ssl.certificate=certs/es03/es03.crt + - xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt + - xpack.security.transport.ssl.enabled=true + - xpack.security.transport.ssl.key=certs/es03/es03.key + - xpack.security.transport.ssl.certificate=certs/es03/es03.crt + - xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt + - xpack.security.transport.ssl.verification_mode=certificate + - xpack.license.self_generated.type=${LICENSE} + mem_limit: ${MEM_LIMIT} + ulimits: + memlock: + soft: -1 + hard: -1 + # healthcheck: + # test: + # [ + # "CMD-SHELL", + # "curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'", + # ] + # interval: 60s + # timeout: 60s + # retries: 120 + restart: always + + + # kibana: + # depends_on: + # es01: + # condition: service_healthy + # es02: + # condition: service_healthy + # es03: + # condition: service_healthy + # image: docker.elastic.co/kibana/kibana:${STACK_VERSION} + # volumes: + # - certs:/usr/share/kibana/config/certs + # - kibanadata:/usr/share/kibana/data + # ports: + # - ${KIBANA_PORT}:5601 + # environment: + # - SERVERNAME=kibana + # - ELASTICSEARCH_HOSTS=https://es01:9200 + # - ELASTICSEARCH_USERNAME=kibana_system + # - ELASTICSEARCH_PASSWORD=${KIBANA_PASSWORD} + # - ELASTICSEARCH_SSL_CERTIFICATEAUTHORITIES=config/certs/ca/ca.crt + # mem_limit: ${MEM_LIMIT} + # healthcheck: + # test: + # [ + # "CMD-SHELL", + # "curl -s -I http://localhost:5601 | grep -q 'HTTP/1.1 302 Found'", + # ] + # interval: 10s + # timeout: 10s + # retries: 120 + +volumes: + certs: + driver: local + driver_opts: + type: none + o: bind + device: ${PWD}/docker-data/es/certs + esdata01: + driver: local + driver_opts: + type: none + o: bind + device: ${PWD}/docker-data/es/esdata01 + esdata02: + driver: local + driver_opts: + type: none + o: bind + device: ${PWD}/docker-data/es/esdata02 + esdata03: + driver: local + driver_opts: + type: none + o: bind + device: ${PWD}/docker-data/es/esdata03 + kibanadata: + driver: local + driver_opts: + type: none + o: bind + device: ${PWD}/docker-data/es/kibanadata \ No newline at end of file diff --git a/odds/common/select.py b/odds/common/select.py index 6557ed9..1901245 100644 --- a/odds/common/select.py +++ b/odds/common/select.py @@ -1,9 +1,9 @@ CONFIG = { 'Config': 'YAMLConfig', 'CatalogRepo': 'ConfigCatalogRepo', - 'Store': 'FSStore', + # 'Store': 'FSStore', 'MetadataStore': 'ESMetadataStore', - # 'Store': 'S3Store', + 'Store': 'S3Store', 'LLMRunner': 'MistralLLMRunner', 'Embedder': 'OpenAIEmbedder', 'Indexer': 'ESIndexer',