Update docs for 2.3.2
This commit is contained in:
parent
cd8c4e357c
commit
27df5a5cb3
|
|
@ -84,6 +84,7 @@ The following environment variables are available:
|
|||
- `NEO4J_KEEP_LOGICAL_LOGS`: the retention policy for logical logs, defaults to `100M size`
|
||||
- `NEO4J_AUTH`: controls authentication, set to `none` to disable authentication or `neo4j/<password>` to override the default password (see documentation [here](http://neo4j.com/docs/stable/rest-api-security.html))
|
||||
- `NEO4J_THIRDPARTY_JAXRS_CLASSES`: URI mappings for unmanaged extensions (see below)
|
||||
- `NEO4J_ALLOW_STORE_UPGRADE`: set to `true` to enable upgrades, defaults to `false` (see the [manual](http://neo4j.com/docs/stable/deployment-upgrading.html) for details)
|
||||
|
||||
#### Enterprise Edition
|
||||
|
||||
|
|
@ -125,6 +126,17 @@ For more complex customization of the image you can create a new image based on
|
|||
FROM neo4j
|
||||
```
|
||||
|
||||
If you need to make your own configuration changes, we provide a hook so you can do that in a script:
|
||||
|
||||
COPY extra_conf.sh /extra_conf.sh
|
||||
|
||||
Then you can pass in the `EXTENSION_SCRIPT` environment variable at runtime to source the script:
|
||||
|
||||
docker run -e "EXTENSION_SCRIPT=/extra_conf.sh" cafe12345678
|
||||
|
||||
When the extension script is sourced, the current working directory will be the root of the Neo4j installation.
|
||||
|
||||
|
||||
## Neo4j HA
|
||||
|
||||
(This feature is only available in Neo4j Enterprise Edition.)
|
||||
|
|
@ -169,3 +181,21 @@ The Neo4j shell can be run locally within a container using a command like this:
|
|||
```console
|
||||
$ docker exec --interactive <container> bin/neo4j-shell
|
||||
```
|
||||
|
||||
## AppArmor
|
||||
|
||||
Neo4j currently makes use of `lsof` to ensure the server is running and accepting connections on a given port. Some AppArmor configurations (specifically the default configuration on Linux Mint) prevent `lsof` from working as expected.
|
||||
|
||||
A workaround is to run the docker image in privileged mode, by adding `--privileged=true` to the docker command line. This is a workaround that disables the security provided by AppArmor, and is not recommended for deployments.
|
||||
|
||||
The current best known solution is to enable the use of ptrace in the docker profile of AppArmor. Do this by adding the following line to `/etc/init.d/docker`:
|
||||
|
||||
ptrace peer=docker-default,
|
||||
|
||||
Add this line before the last curly brace, and restart docker.
|
||||
|
||||
## HTTPS support
|
||||
|
||||
To use your own key and certificate, provide an `/ssl` volume with the key and certificate inside. The key filename must end in `.key`, and the certificate in `.cert`. Only one of each file may be present. You must also publish port `7473` to access the HTTPS endpoint.
|
||||
|
||||
docker run --publish 7473:7473 --volume $HOME/neo4j/ssl:/ssl neo4j
|
||||
|
|
|
|||
Loading…
Reference in New Issue