Files
sablier/docs/getting-started.md
semantic-release-bot 2515771ce1
Some checks failed
Build / Build (push) Has been cancelled
Docker / Build Sablier Docker image (linux/amd64) (push) Has been cancelled
Docker / Build Sablier Docker image (linux/arm/v7) (push) Has been cancelled
Docker / Build Sablier Docker image (linux/arm64) (push) Has been cancelled
Build Sablier plugins / Build Sablier docker image once and share it to E2E jobs (push) Has been cancelled
Build Sablier plugins / Build Traefik Sablier Plugin (push) Has been cancelled
Build Sablier plugins / Build Caddy Sablier Plugin (push) Has been cancelled
Build Sablier plugins / Build Caddy docker image once and share it to Caddy E2E jobs (push) Has been cancelled
Build Sablier plugins / Build ProxyWasm Plugin once and share it to ProxyWasm E2E jobs (push) Has been cancelled
Release / Release (push) Has been cancelled
Docker / Merge and Publish multiarch (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Traefik middleware (docker) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Traefik middleware (docker_swarm) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Traefik middleware (kubernetes) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Nginx NJS module with Sablier (docker) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Nginx NJS module with Sablier (docker_swarm) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Caddy middleware (docker) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Caddy middleware (docker_swarm) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Proxywasm middleware on Apache APISIX (docker) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Proxywasm middleware on Envoy (docker) (push) Has been cancelled
Build Sablier plugins / Run Sablier E2E tests for Proxywasm middleware on Nginx (docker) (push) Has been cancelled
Close stale issues and PRs / stale (push) Has been cancelled
docs(release): update doc version from 1.8.1 to 1.8.2
2025-01-14 22:09:16 +00:00

179 lines
4.2 KiB
Markdown

# Getting started
This Getting Started will get you through what you need to understand how to use Sablier as a scale to zero middleware with a reverse proxy.
![integration](/assets/img/integration.png)
## Identify your provider
The first thing you need to do is to identify your [Provider](providers/overview).
?> A Provider is how Sablier can interact with your instances and scale them up and down to zero.
You can check the available providers [here](providers/overview?id=available-providers).
## Identify your reverse proxy
Once you've identified you're [Provider](providers/overview), you'll want to identify your [Reverse Proxy](plugins/overview).
?> Because Sablier is designed as an API that can be used on its own, reverse proxy integrations acts as a client of that API.
You can check the available reverse proxy plugins [here](plugins/overview?id=available-reverse-proxies)
## Connect it all together
- Let's say we're using the [Docker Provider](providers/docker).
- Let's say we're using the [Caddy Reverse Proxy Plugin](plugins/caddy).
### 1. Initial setup with Caddy
Suppose this is your initial setup with Caddy. You have your reverse proxy with a Caddyfile that does a simple reverse proxy on `/whoami`.
<!-- tabs:start -->
#### **docker-compose.yaml**
```yaml
services:
proxy:
image: caddy:2.8.4
ports:
- "8080:80"
volumes:
- ./Caddyfile:/etc/caddy/Caddyfile:ro
whoami:
image: acouvreur/whoami:v1.10.2
```
#### **Caddyfile**
```Caddyfile
:80 {
route /whoami {
reverse_proxy whoami:80
}
}
```
<!-- tabs:end -->
At this point you can run `docker compose up` and go to `http://localhost:8080/whoami` and you will see your service.
### 2. Install Sablier with the Docker Provider
Add the Sablier container in the `docker-compose.yaml` file.
```yaml
services:
proxy:
image: caddy:2.8.4
ports:
- "8080:80"
volumes:
- ./Caddyfile:/etc/caddy/Caddyfile:ro
whoami:
image: acouvreur/whoami:v1.10.2
sablier:
image: sablierapp/sablier:1.8.2
command:
- start
- --provider.name=docker
volumes:
- '/var/run/docker.sock:/var/run/docker.sock'
```
### 3. Add the Sablier Caddy Plugin to Caddy
Because Caddy does not provide any runtime evaluation for the plugins, we need to build Caddy with this specific plugin.
I'll use the provided Dockerfile to build the custom Caddy image.
```bash
docker build https://github.com/sablierapp/sablier.git#v1.8.1:plugins/caddy
--build-arg=CADDY_VERSION=2.8.4
-t caddy:2.8.4-with-sablier
```
Then change the image to from `caddy:2.8.4` to `caddy:2.8.4-with-sablier`
```yaml
services:
proxy:
image: caddy:2.8.4-with-sablier
ports:
- "8080:80"
volumes:
- ./Caddyfile:/etc/caddy/Caddyfile:ro
whoami:
image: acouvreur/whoami:v1.10.2
sablier:
image: sablierapp/sablier:1.8.2
command:
- start
- --provider.name=docker
volumes:
- '/var/run/docker.sock:/var/run/docker.sock'
```
### 4. Configure Caddy to use the Sablier Caddy Plugin on the `whoami` service
This is how you opt in your services and link them with the plugin.
<!-- tabs:start -->
#### **docker-compose.yaml**
```yaml
services:
proxy:
image: caddy:local
ports:
- "8080:80"
volumes:
- ./Caddyfile:/etc/caddy/Caddyfile:ro
whoami:
image: acouvreur/whoami:v1.10.2
labels:
- sablier.enable=true
- sablier.group=demo
sablier:
image: sablierapp/sablier:1.8.2
volumes:
- '/var/run/docker.sock:/var/run/docker.sock'
```
#### **Caddyfile**
```Caddyfile
:80 {
route /whoami {
sablier http://sablier:10000 {
group demo
session_duration 1m
dynamic {
display_name My Whoami Service
}
}
reverse_proxy whoami:80
}
}
```
Here we've configured the following things when we're accessing the service on `http://localhost:8080/whoami`:
- The containers that have the label `sablier.group=demo` will be started on demand
- The period of innactivity after which the containers should be shut down is one minute
- It uses the dynamic configuration and configures the title with `My Whoami Service`
<!-- tabs:end -->
?> We've assigned the group `demo` to the service, and we use this to identify the workload i