add basic system
This commit is contained in:
parent
91da391f09
commit
82afd54551
29
.env
Normal file
29
.env
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
# Password for the 'elastic' user (at least 6 characters)
|
||||||
|
ELASTIC_PASSWORD=elastic
|
||||||
|
|
||||||
|
# Password for the 'kibana_system' user (at least 6 characters)
|
||||||
|
KIBANA_PASSWORD=kibana
|
||||||
|
|
||||||
|
# Version of Elastic products
|
||||||
|
STACK_VERSION=8.8.2
|
||||||
|
|
||||||
|
# Set the cluster name
|
||||||
|
CLUSTER_NAME=docker-cluster
|
||||||
|
|
||||||
|
# Set to 'basic' or 'trial' to automatically start the 30-day trial
|
||||||
|
LICENSE=basic
|
||||||
|
#LICENSE=trial
|
||||||
|
|
||||||
|
# Port to expose Elasticsearch HTTP API to the host
|
||||||
|
ES_PORT=9200
|
||||||
|
#ES_PORT=127.0.0.1:9200
|
||||||
|
|
||||||
|
# Port to expose Kibana to the host
|
||||||
|
KIBANA_PORT=5601
|
||||||
|
#KIBANA_PORT=80
|
||||||
|
|
||||||
|
# Increase or decrease based on the available host memory (in bytes)
|
||||||
|
MEM_LIMIT=1073741824
|
||||||
|
|
||||||
|
# Project namespace (defaults to the current folder name if not set)
|
||||||
|
#COMPOSE_PROJECT_NAME=myproject
|
5
.gitignore
vendored
Normal file
5
.gitignore
vendored
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
certs/
|
||||||
|
kibanadata/
|
||||||
|
esdata01/
|
||||||
|
esdata02/
|
||||||
|
esdata03/
|
13
Dockerfile
Normal file
13
Dockerfile
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
FROM python:3.9-slim-buster
|
||||||
|
|
||||||
|
WORKDIR /app
|
||||||
|
|
||||||
|
COPY main.py .
|
||||||
|
COPY requirements.txt .
|
||||||
|
|
||||||
|
RUN pip install --no-cache-dir -r requirements.txt
|
||||||
|
|
||||||
|
ENV INPUT_RELAY=wss://relay.nostr.band
|
||||||
|
ENV KINDS=[0,1]
|
||||||
|
|
||||||
|
ENTRYPOINT [ "python", "-u", "./main.py" ]
|
12
README.md
12
README.md
@ -1,2 +1,14 @@
|
|||||||
# search
|
# search
|
||||||
Nostr Search with Elasticsearch and Kibana
|
Nostr Search with Elasticsearch and Kibana
|
||||||
|
|
||||||
|
# Configuration
|
||||||
|
Please configure .env file to your needs! Change the Elasticsearch and Kibana Password for your own safety!
|
||||||
|
|
||||||
|
# Run Docker Compose
|
||||||
|
`docker compose build && docker compose up`
|
||||||
|
|
||||||
|
# Contribute
|
||||||
|
Feel free to contribute!
|
||||||
|
|
||||||
|
# Buy me a coffee
|
||||||
|
⚡️ highperfocused@getalby.com
|
237
compose.yaml
Normal file
237
compose.yaml
Normal file
@ -0,0 +1,237 @@
|
|||||||
|
version: "2.2"
|
||||||
|
|
||||||
|
services:
|
||||||
|
setup:
|
||||||
|
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION}
|
||||||
|
volumes:
|
||||||
|
- ./certs:/usr/share/elasticsearch/config/certs
|
||||||
|
user: "0"
|
||||||
|
command: >
|
||||||
|
bash -c '
|
||||||
|
if [ x${ELASTIC_PASSWORD} == x ]; then
|
||||||
|
echo "Set the ELASTIC_PASSWORD environment variable in the .env file";
|
||||||
|
exit 1;
|
||||||
|
elif [ x${KIBANA_PASSWORD} == x ]; then
|
||||||
|
echo "Set the KIBANA_PASSWORD environment variable in the .env file";
|
||||||
|
exit 1;
|
||||||
|
fi;
|
||||||
|
if [ ! -f config/certs/ca.zip ]; then
|
||||||
|
echo "Creating CA";
|
||||||
|
bin/elasticsearch-certutil ca --silent --pem -out config/certs/ca.zip;
|
||||||
|
unzip config/certs/ca.zip -d config/certs;
|
||||||
|
fi;
|
||||||
|
if [ ! -f config/certs/certs.zip ]; then
|
||||||
|
echo "Creating certs";
|
||||||
|
echo -ne \
|
||||||
|
"instances:\n"\
|
||||||
|
" - name: es01\n"\
|
||||||
|
" dns:\n"\
|
||||||
|
" - es01\n"\
|
||||||
|
" - localhost\n"\
|
||||||
|
" ip:\n"\
|
||||||
|
" - 127.0.0.1\n"\
|
||||||
|
" - name: es02\n"\
|
||||||
|
" dns:\n"\
|
||||||
|
" - es02\n"\
|
||||||
|
" - localhost\n"\
|
||||||
|
" ip:\n"\
|
||||||
|
" - 127.0.0.1\n"\
|
||||||
|
" - name: es03\n"\
|
||||||
|
" dns:\n"\
|
||||||
|
" - es03\n"\
|
||||||
|
" - localhost\n"\
|
||||||
|
" ip:\n"\
|
||||||
|
" - 127.0.0.1\n"\
|
||||||
|
> config/certs/instances.yml;
|
||||||
|
bin/elasticsearch-certutil cert --silent --pem -out config/certs/certs.zip --in config/certs/instances.yml --ca-cert config/certs/ca/ca.crt --ca-key config/certs/ca/ca.key;
|
||||||
|
unzip config/certs/certs.zip -d config/certs;
|
||||||
|
fi;
|
||||||
|
echo "Setting file permissions"
|
||||||
|
chown -R root:root config/certs;
|
||||||
|
find . -type d -exec chmod 750 \{\} \;;
|
||||||
|
find . -type f -exec chmod 640 \{\} \;;
|
||||||
|
echo "Waiting for Elasticsearch availability";
|
||||||
|
until curl -s --cacert config/certs/ca/ca.crt https://es01:9200 | grep -q "missing authentication credentials"; do sleep 30; done;
|
||||||
|
echo "Setting kibana_system password";
|
||||||
|
until curl -s -X POST --cacert config/certs/ca/ca.crt -u "elastic:${ELASTIC_PASSWORD}" -H "Content-Type: application/json" https://es01:9200/_security/user/kibana_system/_password -d "{\"password\":\"${KIBANA_PASSWORD}\"}" | grep -q "^{}"; do sleep 10; done;
|
||||||
|
echo "All done!";
|
||||||
|
'
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD-SHELL", "[ -f config/certs/es01/es01.crt ]"]
|
||||||
|
interval: 1s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 120
|
||||||
|
|
||||||
|
es01:
|
||||||
|
depends_on:
|
||||||
|
setup:
|
||||||
|
condition: service_healthy
|
||||||
|
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION}
|
||||||
|
volumes:
|
||||||
|
- ./certs:/usr/share/elasticsearch/config/certs
|
||||||
|
- ./esdata01:/usr/share/elasticsearch/data
|
||||||
|
ports:
|
||||||
|
- ${ES_PORT}:9200
|
||||||
|
environment:
|
||||||
|
- node.name=es01
|
||||||
|
- cluster.name=${CLUSTER_NAME}
|
||||||
|
- cluster.initial_master_nodes=es01,es02,es03
|
||||||
|
- discovery.seed_hosts=es02,es03
|
||||||
|
- ELASTIC_PASSWORD=${ELASTIC_PASSWORD}
|
||||||
|
- bootstrap.memory_lock=true
|
||||||
|
- xpack.security.enabled=true
|
||||||
|
- xpack.security.http.ssl.enabled=true
|
||||||
|
- xpack.security.http.ssl.key=certs/es01/es01.key
|
||||||
|
- xpack.security.http.ssl.certificate=certs/es01/es01.crt
|
||||||
|
- xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt
|
||||||
|
- xpack.security.transport.ssl.enabled=true
|
||||||
|
- xpack.security.transport.ssl.key=certs/es01/es01.key
|
||||||
|
- xpack.security.transport.ssl.certificate=certs/es01/es01.crt
|
||||||
|
- xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt
|
||||||
|
- xpack.security.transport.ssl.verification_mode=certificate
|
||||||
|
- xpack.license.self_generated.type=${LICENSE}
|
||||||
|
mem_limit: ${MEM_LIMIT}
|
||||||
|
ulimits:
|
||||||
|
memlock:
|
||||||
|
soft: -1
|
||||||
|
hard: -1
|
||||||
|
healthcheck:
|
||||||
|
test:
|
||||||
|
[
|
||||||
|
"CMD-SHELL",
|
||||||
|
"curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'",
|
||||||
|
]
|
||||||
|
interval: 10s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 120
|
||||||
|
|
||||||
|
es02:
|
||||||
|
depends_on:
|
||||||
|
- es01
|
||||||
|
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION}
|
||||||
|
volumes:
|
||||||
|
- ./certs:/usr/share/elasticsearch/config/certs
|
||||||
|
- ./esdata02:/usr/share/elasticsearch/data
|
||||||
|
environment:
|
||||||
|
- node.name=es02
|
||||||
|
- cluster.name=${CLUSTER_NAME}
|
||||||
|
- cluster.initial_master_nodes=es01,es02,es03
|
||||||
|
- discovery.seed_hosts=es01,es03
|
||||||
|
- bootstrap.memory_lock=true
|
||||||
|
- xpack.security.enabled=true
|
||||||
|
- xpack.security.http.ssl.enabled=true
|
||||||
|
- xpack.security.http.ssl.key=certs/es02/es02.key
|
||||||
|
- xpack.security.http.ssl.certificate=certs/es02/es02.crt
|
||||||
|
- xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt
|
||||||
|
- xpack.security.transport.ssl.enabled=true
|
||||||
|
- xpack.security.transport.ssl.key=certs/es02/es02.key
|
||||||
|
- xpack.security.transport.ssl.certificate=certs/es02/es02.crt
|
||||||
|
- xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt
|
||||||
|
- xpack.security.transport.ssl.verification_mode=certificate
|
||||||
|
- xpack.license.self_generated.type=${LICENSE}
|
||||||
|
mem_limit: ${MEM_LIMIT}
|
||||||
|
ulimits:
|
||||||
|
memlock:
|
||||||
|
soft: -1
|
||||||
|
hard: -1
|
||||||
|
healthcheck:
|
||||||
|
test:
|
||||||
|
[
|
||||||
|
"CMD-SHELL",
|
||||||
|
"curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'",
|
||||||
|
]
|
||||||
|
interval: 10s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 120
|
||||||
|
|
||||||
|
es03:
|
||||||
|
depends_on:
|
||||||
|
- es02
|
||||||
|
image: docker.elastic.co/elasticsearch/elasticsearch:${STACK_VERSION}
|
||||||
|
volumes:
|
||||||
|
- ./certs:/usr/share/elasticsearch/config/certs
|
||||||
|
- ./esdata03:/usr/share/elasticsearch/data
|
||||||
|
environment:
|
||||||
|
- node.name=es03
|
||||||
|
- cluster.name=${CLUSTER_NAME}
|
||||||
|
- cluster.initial_master_nodes=es01,es02,es03
|
||||||
|
- discovery.seed_hosts=es01,es02
|
||||||
|
- bootstrap.memory_lock=true
|
||||||
|
- xpack.security.enabled=true
|
||||||
|
- xpack.security.http.ssl.enabled=true
|
||||||
|
- xpack.security.http.ssl.key=certs/es03/es03.key
|
||||||
|
- xpack.security.http.ssl.certificate=certs/es03/es03.crt
|
||||||
|
- xpack.security.http.ssl.certificate_authorities=certs/ca/ca.crt
|
||||||
|
- xpack.security.transport.ssl.enabled=true
|
||||||
|
- xpack.security.transport.ssl.key=certs/es03/es03.key
|
||||||
|
- xpack.security.transport.ssl.certificate=certs/es03/es03.crt
|
||||||
|
- xpack.security.transport.ssl.certificate_authorities=certs/ca/ca.crt
|
||||||
|
- xpack.security.transport.ssl.verification_mode=certificate
|
||||||
|
- xpack.license.self_generated.type=${LICENSE}
|
||||||
|
mem_limit: ${MEM_LIMIT}
|
||||||
|
ulimits:
|
||||||
|
memlock:
|
||||||
|
soft: -1
|
||||||
|
hard: -1
|
||||||
|
healthcheck:
|
||||||
|
test:
|
||||||
|
[
|
||||||
|
"CMD-SHELL",
|
||||||
|
"curl -s --cacert config/certs/ca/ca.crt https://localhost:9200 | grep -q 'missing authentication credentials'",
|
||||||
|
]
|
||||||
|
interval: 10s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 120
|
||||||
|
|
||||||
|
kibana:
|
||||||
|
depends_on:
|
||||||
|
es01:
|
||||||
|
condition: service_healthy
|
||||||
|
es02:
|
||||||
|
condition: service_healthy
|
||||||
|
es03:
|
||||||
|
condition: service_healthy
|
||||||
|
image: docker.elastic.co/kibana/kibana:${STACK_VERSION}
|
||||||
|
volumes:
|
||||||
|
- ./certs:/usr/share/kibana/config/certs
|
||||||
|
- ./kibanadata:/usr/share/kibana/data
|
||||||
|
ports:
|
||||||
|
- ${KIBANA_PORT}:5601
|
||||||
|
environment:
|
||||||
|
- SERVERNAME=kibana
|
||||||
|
- ELASTICSEARCH_HOSTS=https://es01:9200
|
||||||
|
- ELASTICSEARCH_USERNAME=kibana_system
|
||||||
|
- ELASTICSEARCH_PASSWORD=${KIBANA_PASSWORD}
|
||||||
|
- ELASTICSEARCH_SSL_CERTIFICATEAUTHORITIES=config/certs/ca/ca.crt
|
||||||
|
mem_limit: ${MEM_LIMIT}
|
||||||
|
healthcheck:
|
||||||
|
test:
|
||||||
|
[
|
||||||
|
"CMD-SHELL",
|
||||||
|
"curl -s -I http://localhost:5601 | grep -q 'HTTP/1.1 302 Found'",
|
||||||
|
]
|
||||||
|
interval: 10s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 120
|
||||||
|
|
||||||
|
scraper:
|
||||||
|
build: .
|
||||||
|
depends_on:
|
||||||
|
- kibana
|
||||||
|
environment:
|
||||||
|
- INPUT_RELAY=wss://relay.nostr.band
|
||||||
|
- KINDS=[0,1]
|
||||||
|
volumes:
|
||||||
|
- ./certs/ca:/app/certs/ca/
|
||||||
|
|
||||||
|
# volumes:
|
||||||
|
# certs:
|
||||||
|
# driver: local
|
||||||
|
# esdata01:
|
||||||
|
# driver: local
|
||||||
|
# esdata02:
|
||||||
|
# driver: local
|
||||||
|
# esdata03:
|
||||||
|
# driver: local
|
||||||
|
# kibanadata:
|
||||||
|
# driver: local
|
77
main.py
Normal file
77
main.py
Normal file
@ -0,0 +1,77 @@
|
|||||||
|
import asyncio
|
||||||
|
import os
|
||||||
|
import websockets
|
||||||
|
import json
|
||||||
|
from elasticsearch import Elasticsearch
|
||||||
|
|
||||||
|
async def relay_websockets(inputWebsocket, kinds, es):
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
# Wait for an event on websocket 1
|
||||||
|
event = json.loads(await inputWebsocket.recv())
|
||||||
|
try:
|
||||||
|
if(event[0] == "EVENT"):
|
||||||
|
# Remove the event ID from the event
|
||||||
|
del event[1]
|
||||||
|
print("Sending event " + str(event[1]['id']) + " (kind: "+str(event[1]['kind'])+") to elasticsearch")
|
||||||
|
# send event to elasticsearch
|
||||||
|
resp = es.index(index="nostr", id=str(event[1]['id']), document=event[1])
|
||||||
|
if(resp['result'] != "created"):
|
||||||
|
print("Failed to send event to elasticsearch: "+str(resp))
|
||||||
|
elif(event[0] == "EOSE"):
|
||||||
|
print("End of stream")
|
||||||
|
|
||||||
|
except Exception as error:
|
||||||
|
print(f"Failed to relay event: {error}")
|
||||||
|
if("sent 1011" in str(error)):
|
||||||
|
print("Got Code 1011 -> Closing websockets...")
|
||||||
|
websockets.close()
|
||||||
|
continue
|
||||||
|
|
||||||
|
except websockets.ConnectionClosed:
|
||||||
|
# If either websocket is closed, attempt to reconnect
|
||||||
|
print("Connection closed, attempting to reconnect...")
|
||||||
|
await asyncio.sleep(1)
|
||||||
|
try:
|
||||||
|
async with websockets.connect(os.environ.get("INPUT_RELAY")) as inputWebsocket:
|
||||||
|
message = '["REQ", "1337", {"kinds": '+kinds+', "limit": 10}]'
|
||||||
|
await inputWebsocket.send(message)
|
||||||
|
await relay_websockets(inputWebsocket, kinds, es=es)
|
||||||
|
|
||||||
|
except Exception as error:
|
||||||
|
# If the reconnection attempt fails, repeat the loop and try again
|
||||||
|
print(f"Failed to reconnect: {error}")
|
||||||
|
continue
|
||||||
|
|
||||||
|
async def main():
|
||||||
|
print("Scraper started...")
|
||||||
|
# Read the websocket URLs from environment variables
|
||||||
|
inputUrl = os.environ.get("INPUT_RELAY")
|
||||||
|
kinds = os.environ.get("KINDS")
|
||||||
|
ELASTIC_PASSWORD = os.getenv("ELASTIC_PASSWORD", "elastic")
|
||||||
|
|
||||||
|
# Create the client instance
|
||||||
|
client = Elasticsearch(
|
||||||
|
"https://es01:9200",
|
||||||
|
ca_certs="/app/certs/ca/ca.crt",
|
||||||
|
basic_auth=("elastic", ELASTIC_PASSWORD)
|
||||||
|
)
|
||||||
|
|
||||||
|
# If the INPUT_RELAY is missing, raise an error
|
||||||
|
if not inputUrl:
|
||||||
|
raise ValueError("Please set the INPUT_RELAY environment variable")
|
||||||
|
|
||||||
|
try:
|
||||||
|
async with websockets.connect(inputUrl) as inputWebsocket:
|
||||||
|
message = '["REQ", "1337", {"kinds": '+kinds+'}]'
|
||||||
|
await inputWebsocket.send(message)
|
||||||
|
await relay_websockets(inputWebsocket, kinds, es=client)
|
||||||
|
|
||||||
|
except Exception as error:
|
||||||
|
# If the initial connection attempt fails, attempt to reconnect immediately
|
||||||
|
print(f"Failed to connect: {error}")
|
||||||
|
await asyncio.sleep(1)
|
||||||
|
await main()
|
||||||
|
|
||||||
|
# Start the script
|
||||||
|
asyncio.run(main())
|
3
requirements.txt
Normal file
3
requirements.txt
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
websockets
|
||||||
|
asyncio
|
||||||
|
elasticsearch
|
Loading…
x
Reference in New Issue
Block a user