shynet/GUIDE.md
2020-07-07 01:38:16 +00:00

16 KiB

Usage Guide

Table of Contents


Staying Updated

If you install Shynet, you should strongly consider enabling notifications when new versions are released. You can do this under the "Watch" tab on GitHub (above). This will ensure that you are notified when new versions are available, some of which may be security updates. (Shynet will never automatically update itself.)

Installation

Installation of Shynet is easy! Follow the Basic Installation guide below if you'd like to run Shynet over HTTP or if you are going to be running it over HTTPS through a reverse proxy. If you'd like to run Shynet over HTTPS without a reverse proxy, skip ahead to Installation with SSL instead.

These commands assume Ubuntu. If you're installing Shynet on a different platform, the process will be different.

Before continuing, please be sure to have the latest version of Docker installed.

Basic Installation

  1. Pull the latest version of Shynet using docker pull milesmcc/shynet:latest. If you don't have Docker installed, install it.

  2. Have a PostgreSQL server ready to go. This can be on the same machine as the deployment, or elsewhere. You'll just need a username, password, host, and port. (For info on how to setup a PostgreSQL server on Ubuntu, follow this guide).

  3. Configure an environment file for Shynet, using this file as a template. (This file is typically named .env.) Make sure you set the database settings, or Shynet won't be able to run.

  4. Launch the Shynet server for the first time by running docker run --env-file=<your env file> milesmcc/shynet:latest. Provided you're using the default environment information (i.e., PERFORM_CHECKS_AND_SETUP is True), you'll see a few warnings about not having an admin user or host setup; these are normal. Don't worry — we'll do this in the next step. You only need to stop if you see a stacktrace about being unable to connect to the database.

  5. Create an admin user by running docker run --env-file=<your env file> milesmcc/shynet:latest ./manage.py registeradmin <your email>. A temporary password will be printed to the console.

  6. Set the hostname of your Shynet instance by running docker run --env-file=<your env file> milesmcc/shynet:latest ./manage.py hostname <your public hostname>, where <your public hostname> is the publicly accessible hostname of your instance, including port. This setting affects the URL that the tracking script sends its results to, so make sure it's correct. (Example hostnames: shynet.example.com or example.com:8000.)

  7. Set the whitelabel of your Shynet instance by running docker run --env-file=<your env file> milesmcc/shynet:latest ./manage.py whitelabel <whitelabel>. While this setting doesn't affect any core operations of Shynet, it lets you rename Shynet to whatever you want. (Example whitelabels: "My Shynet Instance" or "Acme Analytics".)

  8. Launch your webserver by running docker run --env-file=<your env file> milesmcc/shynet:latest. You may need to bind Docker's port 8080 (where Shynet runs) to your local port 80 (http); this can be done using the flag -p 80:8080 after run. Visit your service's homepage, and verify everything looks right! You should see a login prompt. Log in with the credentials from step 5. You'll probably be prompted to "confirm your email"—if you haven't set up an email server, the confirmation email will be printed to the console instead.

  9. Create a service by clicking "+ Create Service" in the top right hand corner. Fill out the options as appropriate. Once you're done, press "create" and you'll be redirected to your new service's analytics page.

  10. Finally, click on "Manage" in the top right of the service's page to get the tracking script code. Inject this script on all pages you'd like the service to track.

Heroku

You may wish to deploy Shynet on Heroku. Note that Heroku's free offerings (namely the free Postgres addon) are unlikely to support running any Shynet instance that records more than a few hundred requests per day — the database will quickly fill up. In most cases, the more cost-effective option for running Shynet is renting a VPS from a full cloud service provider. However, if you're sure Heroku is the right option for you, or you just want to try Shynet out, you can use the Quick Deploy button then follow the steps below.

Deploy

Once you deploy, you'll need to setup an admin user, whitelabel, and hostname before you can use Shynet. Do that with the following commands:

  1. heroku run --app=<your app> ./manage.py registeradmin <your email>
  2. heroku run --app=<your app> ./manage.py hostname <the hostname where you will run Shynet>
  3. heroku run --app=<your app> ./manage.py whitelabel "<your Shynet instance's name>"

Enhancements

Installation with SSL

If you are going to be running Shynet through a reverse proxy, please see Configuring a Reverse Proxy instead.

  1. We'll be cloning this into the home directory to make this installation easier, so run cd ~/ if you need to.

  2. Instead of pulling from Docker, we will be pulling from GitHub and building using Docker in order to easily add SSL certificates. You will want to run git clone https://github.com/milesmcc/shynet.git to clone the GitHub repo to your current working directory.

  3. To install certbot follow the guide here or follow along below

    • Ubuntu 18.04
      • sudo apt-get update
      • sudo apt-get install software-properties-common
      • sudo add-apt-repository universe
      • sudo add-apt-repository ppa:certbot/certbot
      • sudo apt-get update
      • sudo apt-get install certbot
  4. Run sudo certbot certonly --standalone and follow the instructions to generate your SSL certificate.

    • If you registering the certificate to a domain name like example.com, please be sure to point your DNS records to your current server before running certbot.
  5. We are going to move the SSL certificates to the Shynet repo with with command below. Replace <domain> with the domain name you used in step 3.

    • cp /etc/letsencrypt/live/<domain>/{cert,privkey}.pem ~/shynet/shynet/
  6. With that, we are going to replace the webserver.sh with ssl.webserver.sh to enable the use of SSL certificates. The original webserver.sh will be backed up to backup.webserver.sh

    • mv ~/shynet/shynet/webserver.sh ~/shynet/shynet/backup.webserver.sh
    • mv ~/shynet/shynet/ssl.webserver.sh ~/shynet/shynet/webserver.sh
  7. Now we build the image!

    • docker image build shynet -t shynet-ssl:latest
  8. Have a PostgreSQL server ready to go. This can be on the same machine as the deployment, or elsewhere. You'll just need a username, password, host, and port (default is 5432). (For info on how to setup a PostgreSQL server on Ubuntu, follow this guide).

  9. Follow the Basic Installation guide with just one modification: in step #4, change the local bind port from 80 to 443, and use shynet-ssl:latest as your Docker image instead of milesmcc/shynet:latest.

Configuring a Reverse Proxy

A reverse proxy has many benefits. It can be used for DDoS protection, caching files to reduce server load, routing HTTPS and/or HTTP connections, hosting multiple services on a single server, and more!

Cloudflare

Cloudflare is a great reverse proxy option. It's free, automatically configures HTTPs, offers out-of-the-box security features, provides DNS, and requires minimal setup.

  1. Follow Cloudflare's getting started guide.

  2. After setting up Cloudflare, here are a few things you should consider doing:

    • Under the SSL Tab > Overview > Change your SSL/TLS Encryption Mode to Flexible
    • The following will block your admin panel from anyone who isn't on your IP address. This is optional, but great for security.
      • Under the Firewall tab > Overview > + Create Firewall Rule:
      • Name: Admin Panel Restriction
      • Field: URI Path
      • Operator: equals
      • Value: /admin
      • Click AND
      • Field: IP Address
      • Operator: does not equal
      • Value: <your public IP address>
      • Then: Block

Nginx

Nginx is a self hosted, highly configurable webserver. Nginx can be configured to run as a reverse proxy on either the same machine or a remote machine.

These commands assume Ubuntu. If you're installing Nginx on a different platform, the process will be different.

  1. Before starting, shut down your Docker containers (if any are running)

    • Run docker container ls to find the container ID
    • Run docker stop <container id from the last step>
  2. Update your packages and install Nginx

    • sudo apt-get update
    • sudo apt-get install nginx
  3. Disable the default Nginx placeholder

    • sudo unlink /etc/nginx/sites-enabled/default
  4. Create the Nginx reverse proxy config file

    • cd /etc/nginx/sites-available/
    • vi reverse-proxy.conf or nano reverse-proxy.conf
    • Paste the following configuration into that file:
    # Know what you're pasting! Read the Reference!
    # Reference: https://nginx.org/en/docs/
    server {
        listen 80;
        location / {
            proxy_set_header X-Real-IP $remote_addr;
            proxy_pass http://127.0.0.1:8080;
        }
    }
    
    • Save and exit the text editor
      • :wq for vi
      • ctrl+x then y for nano
    • Link Nginx's sites-enabled to read the new config
      • sudo ln -s /etc/nginx/sites-available/reverse-proxy.conf /etc/nginx/sites-enabled/reverse-proxy.conf
    • Make sure the config is working
      • service nginx configtest
      • service nginx restart
  5. Restart your Docker image, but this time use 8080 as the local bind port, as that's where we configured Nginx to look

    • cd ~/
    • docker run -p 8080:8080 --env-file=<your env file> milesmcc/shynet:latest
  6. Finally, time to test!

    • Go to http://<your site>/admin
  7. If everything is working as expected, please read through some of the following links below to customize Nginx

Health Checks

By default, Shynet includes a default health check endpoint at /healthz/. If the instance is running normally, this endpoint will return an HTTP status code of 200; if something is wrong, it will have a non-200 status code. To view the health data as JSON, send your request to /healthz/?format=json.

This feature is helpful when running Shynet with Kubernetes, as it allows you to setup startup readiness probes that prevent traffic from being sent to your Shynet instances before they are ready.

Primary-Key Integration

In some cases, it is useful to associate particular users on your platform with their sessions in Shynet. In Shynet, this is called primary key integration, and is done by adding an additional element to the Shynet script url for each particular user.

If the Shynet script location (for either the pixel or the script) is, for example, //shynet.example.com/ingress/your_service_uuid/pixel.gif and //shynet.example.com/ingress/your_service_uuid/script.js, the URLs for primary-key enabled users would be //shynet.example.com/ingress/your_service_uuid/USER_PRIMARY_KEY/pixel.gif and //shynet.example.com/ingress/your_service_uuid/USER_PRIMARY_KEY/script.js.

Adding this path can be done easily using server-side rendering. For example, here is a Django template that adds users' primary keys to the Shynet tracking script:

{% if request.user.is_authenticated %}
<noscript>
   <img src="//shynet.example.com/ingress/service-uuid/{{request.user.email|urlencode:""}}/pixel.gif">
</noscript>
<script src="//shynet.example.com/ingress/service-uuid/{{request.user.email|urlencode:""}}/script.js"></script>
{% else %}
<noscript>
   <img src="//shynet.example.com/ingress/service-uuid/pixel.gif">
</noscript>
<script src="//shynet.example.com/ingress/service-uuid/script.js"></script>
{% endif %}

Troubleshooting

Here are solutions for some common issues. If your situation isn't described here or the solution didn't work, feel free to create an issue (but be sure to check for duplicate issues first).

The admin panel works, but no page views are showing up!

  • If you are running a single Shynet webserver instance (i.e., you followed the default installation instructions), verify that you haven't set CELERY_TASK_ALWAYS_EAGER to False in your environment file.
  • Verify that your cache is properly configured. In single-instance deployments, this means making sure that you haven't set any REDIS_* or CELERY_* environment variables (those are for more advanced deployments; you'll just want the defaults).
  • If your service is configured to respect Do Not Track (under "Advanced Settings"), verify that your browser isn't sending the DNT=1 header with your requests (or temporarily disable DNT support in Shynet while testing). Sometimes, an adblocker or privacy browser extension will add this header to requests unexpectedly.

Shynet isn't linking different pageviews from the same visitor into a single session!

  • Verify that your cache is properly configured. (See #2 above.) In multi-instance deployments, it's critical that all webservers are using the same cache—so make sure you configure a Redis cache if you're using a non-default installation.
  • This can happen between Shynet restarts if you're not using an external cache provider (like Redis).

I changed the SHYNET_WHITELABEL/SHYNET_HOST environment variable, but nothing happened!

  • Those values only affect how your Shynet instance is setup on first run; once it's configured, they have no effect. See updating your configuration for help on how to update your configuration. (Note: these environment variables are not present in newer Shynet versions; they have been removed from the guide.)

Shynet can't connect to my database running on localhost/127.0.0.1

  • The problem is likely that to Shynet, localhost points to the local network in the container itself, not on the host machine. Try adding the --network='host' option when you run Docker.