-
Notifications
You must be signed in to change notification settings - Fork 14
Installation & Setup
adanb13 edited this page Oct 6, 2025
·
1 revision
- Docker 20.10+
- Docker Compose V2 (
docker composeCLI) - 2 CPU cores and 2 GB RAM minimum (4 GB recommended for heavy log throughput)
- Outbound network access for whichever notification channels you plan to use
git clone https://github.com/log-forge/logforge.git
cd logforge
cp .env.example .env # adjust container names, ports, notification secretsKey .env values:
| Variable | Purpose | Default |
|---|---|---|
LOGFORGE_FRONTEND_PORT |
Host port for the core UI | 3008 |
NOTIFIER_WEB_PORT |
Notifier admin/API port | 8087 |
ALERT_ENGINE_FRONTEND_PORT |
Alert Engine UI port | 3033 |
AUTO_UPDATE |
Enables the Watchtower auto-updater | true |
The shipping compose file already binds UI services to loopback so only the host can reach them. If you customise ports or add new services, keep the 127.0.0.1:HOST:CONTAINER pattern (or front them with a secured reverse proxy) before exposing them to other networks.
docker compose up -d --buildThe build step compiles the frontend applications; omit --build when starting from published images or subsequent restarts.
Verify health:
docker compose ps
docker compose logs logforge-backend --followWhen healthy, browse to http://localhost:3008 (or the loopback port you set) to access the UI.
- Discover containers - the backend auto-detects running containers. Use the inventory view to group or ignore services.
-
Add notification channels - open the Notifier UI and configure SMTP, webhooks, or chat connectors. Store secrets in
.envor Docker secrets. - Author rules - visit the Alert Engine UI to create policies from templates (crash detection, log keywords, performance thresholds, etc.).
- Test a notification - send a test alert from the Alert Engine to validate delivery.
- Reverse proxy: Terminate TLS with Traefik, Caddy, or Nginx. Protect the UIs with Basic Auth, OAuth, or your IdP of choice.
- Secrets management: Replace plain-text credentials with Docker secrets or environment variables injected by your orchestrator.
-
Docker socket access: If the backend needs socket access, place a
docker-socket-proxysidecar in front of/var/run/docker.sockand allow only the capabilities you require. - Logging: Persist container logs using a driver (json-file rotation) or forward to an external sink alongside LogForge dashboards.
-
Backups: Persistent data resides in the named volumes
logforge_core_data,logforge_notifier_data, andlogforge_alert_engine_data. Snapshot them regularly.
- Pull the latest repo changes or switch to the desired tag.
- Restart with
docker compose pull && docker compose up -d(or rebuild from source for development installs). - Watch the Alert Engine and backend logs for schema migration messages.
With AUTO_UPDATE=true, Watchtower automatically tracks published container updates. For controlled rollouts, disable auto-update and perform the manual steps above.
- Dive into the Alert Engine Guide to craft effective rules.
- Connect delivery channels via the Notifier & Integrations reference.
- Lock down your deployment using the Security & Hardening checklist.