infra/roles/elk/templates/01-kibana.conf.j2

45 lines
1.5 KiB
Django/Jinja

server {
listen 443 ssl;
server_name {{ kibana_url }};
{% if inventory_hostname in wg_clients -%}
listen {{ wg_clients[inventory_hostname].ip }}:443 ssl http2;
{% endif -%}
include /etc/nginx/authelia_internal.conf;
include /etc/nginx/require_auth.conf;
include /etc/nginx/listen-proxy-protocol.conf;
location / {
proxy_pass http://{{ bridgewithdns.kibana }}:{{ kibana_port }}/;
proxy_redirect off;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Host $server_name;
proxy_set_header X-Forwarded-Proto $scheme;
include /etc/nginx/require_auth_proxy.conf;
add_header Content-Security-Policy "upgrade-insecure-requests";
}
access_log /var/log/nginx/access_{{ kibana_url }}.log main;
error_log /var/log/nginx/error_{{ kibana_url }}.log warn;
ssl_session_timeout 5m;
ssl_certificate /usr/local/etc/certs/{{ kibana_url }}/fullchain.pem;
ssl_certificate_key /usr/local/etc/certs/{{ kibana_url }}/privkey.pem;
add_header Referrer-Policy "no-referrer" always;
add_header X-Content-Type-Options "nosniff" always;
add_header X-Download-Options "noopen" always;
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Permitted-Cross-Domain-Policies "none" always;
add_header X-Robots-Tag "none" always;
add_header X-XSS-Protection "1; mode=block" always;
fastcgi_hide_header X-Powered-By;
}