Tutorial - Installation, Configuration and Extension
Download docker-compose file
cd
into the downloaded directory
The ThreatPlaybook docker-compose.yml
file has been written to get you up and running quickly. However, its not the best/most ideal configuration for running ThreatPlaybook, especially in prod.
Its meant only for experimental deployments on user's local machine
Analyzing the Docker-Compose File
Change the Default Password!
- The value set in the
SUPERUSER_EMAIL
andSUPERUSER_PASS
are the values that ThreatPlaybook uses as the default values for the Superuser Account within ThreatPlaybook.
This is clearly a default password that you SHOULD NOT use as a permanent password to access the super-admin account on ThreatPlaybook.
Please use
playbook change-password
feature in the CLI to change your default password. You have been warned!
Logs
There's a single output log that is generated in the /app
directory within the container. If you want the logs to persist on a more permanent file-system, you'll need to volume mount a src path on your machine to the /app/logs
path within the container.