Skip to content
This repository has been archived by the owner on Jun 27, 2024. It is now read-only.

Latest commit

 

History

History
55 lines (40 loc) · 2.65 KB

README.md

File metadata and controls

55 lines (40 loc) · 2.65 KB

Project status

CI/CD on master Regular Docker image vulnerability scan

HomeCentr - grafana

Repack of Grafana with the usual Homecentr bells and whistles.

Usage

version: "3.7"
services:
  grafana:
    build: .
    image: homecentr/grafana
    ports:
      - 3000:3000
    volumes:
      - ./example:/config

Environment variables

Name Default value Description
PUID 7077 UID of the user grafana should be running as.
PGID 7077 GID of the user grafana should be running as.

|

Exposed ports

Port Protocol Description
3000 TCP Web UI and API.

Volumes

Container path Description
/config Grafana configuration. This should container the grafana.ini configuration file. If you want to use provisioning, put the related files to /config/provisioning.
/grafana Grafana state. Make sure the volume is writable for PUID/PGID.
/logs Log files produced by Grafana if configured to. Make sure the volume is writable for PUID/PGID.

Security

The container is regularly scanned for vulnerabilities and updated. Further info can be found in the Security tab.

Container user

The container supports privilege drop. Even though the container starts as root, it will use the permissions only to perform the initial set up. The grafana process runs as UID/GID provided in the PUID and PGID environment variables.

⚠️ Do not change the container user directly using the user Docker compose property or using the --user argument. This would break the privilege drop logic.