16 KiB
Usage Guide
Table of Contents
Staying Updated
If you install Shynet, you should strongly consider enabling notifications when new versions are released. You can do this under the "Watch" tab on GitHub (above). This will ensure that you are notified when new versions are available, some of which may be security updates. (Shynet will never automatically update itself.)
Installation
Installation of Shynet is easy! Follow the Basic Installation guide below if you'd like to run Shynet over HTTP or if you are going to be running it over HTTPS through a reverse proxy. If you'd like to run Shynet over HTTPS without a reverse proxy, skip ahead to Installation with SSL instead.
These commands assume Ubuntu. If you're installing Shynet on a different platform, the process will be different.
Before continuing, please be sure to have the latest version of Docker installed.
Basic Installation
-
Pull the latest version of Shynet using
docker pull milesmcc/shynet:latest
. If you don't have Docker installed, install it. -
Have a PostgreSQL server ready to go. This can be on the same machine as the deployment, or elsewhere. You'll just need a username, password, host, and port. (For info on how to setup a PostgreSQL server on Ubuntu, follow this guide).
-
Configure an environment file for Shynet, using this file as a template. (This file is typically named
.env
.) Make sure you set the database settings, or Shynet won't be able to run. -
Launch the Shynet server for the first time by running
docker run --env-file=<your env file> milesmcc/shynet:latest
. Provided you're using the default environment information (i.e.,PERFORM_CHECKS_AND_SETUP
isTrue
), you'll see a few warnings about not having an admin user or host setup; these are normal. Don't worry — we'll do this in the next step. You only need to stop if you see a stacktrace about being unable to connect to the database. -
Create an admin user by running
docker run --env-file=<your env file> milesmcc/shynet:latest ./manage.py registeradmin <your email>
. A temporary password will be printed to the console. -
Set the hostname of your Shynet instance by running
docker run --env-file=<your env file> milesmcc/shynet:latest ./manage.py hostname <your public hostname>
, where<your public hostname>
is the publicly accessible hostname of your instance, including port. This setting affects the URL that the tracking script sends its results to, so make sure it's correct. (Example hostnames:shynet.example.com
orexample.com:8000
.) -
Set the whitelabel of your Shynet instance by running
docker run --env-file=<your env file> milesmcc/shynet:latest ./manage.py whitelabel <whitelabel>
. While this setting doesn't affect any core operations of Shynet, it lets you rename Shynet to whatever you want. (Example whitelabels:"My Shynet Instance"
or"Acme Analytics"
.) -
Launch your webserver by running
docker run --env-file=<your env file> milesmcc/shynet:latest
. You may need to bind Docker's port 8080 (where Shynet runs) to your local port 80 (http); this can be done using the flag-p 80:8080
afterrun
. Visit your service's homepage, and verify everything looks right! You should see a login prompt. Log in with the credentials from step 5. You'll probably be prompted to "confirm your email"—if you haven't set up an email server, the confirmation email will be printed to the console instead. -
Create a service by clicking "+ Create Service" in the top right hand corner. Fill out the options as appropriate. Once you're done, press "create" and you'll be redirected to your new service's analytics page.
-
Finally, click on "Manage" in the top right of the service's page to get the tracking script code. Inject this script on all pages you'd like the service to track.
Heroku
You may wish to deploy Shynet on Heroku. Note that Heroku's free offerings (namely the free Postgres addon) are unlikely to support running any Shynet instance that records more than a few hundred requests per day — the database will quickly fill up. In most cases, the more cost-effective option for running Shynet is renting a VPS from a full cloud service provider. However, if you're sure Heroku is the right option for you, or you just want to try Shynet out, you can use the Quick Deploy button then follow the steps below.
Once you deploy, you'll need to setup an admin user, whitelabel, and hostname before you can use Shynet. Do that with the following commands:
heroku run --app=<your app> ./manage.py registeradmin <your email>
heroku run --app=<your app> ./manage.py hostname <the hostname where you will run Shynet>
heroku run --app=<your app> ./manage.py whitelabel "<your Shynet instance's name>"
Enhancements
Installation with SSL
If you are going to be running Shynet through a reverse proxy, please see Configuring a Reverse Proxy instead.
-
We'll be cloning this into the home directory to make this installation easier, so run
cd ~/
if you need to. -
Instead of pulling from Docker, we will be pulling from GitHub and building using Docker in order to easily add SSL certificates. You will want to run
git clone https://github.com/milesmcc/shynet.git
to clone the GitHub repo to your current working directory. -
To install
certbot
follow the guide here or follow along below- Ubuntu 18.04
sudo apt-get update
sudo apt-get install software-properties-common
sudo add-apt-repository universe
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update
sudo apt-get install certbot
- Ubuntu 18.04
-
Run
sudo certbot certonly --standalone
and follow the instructions to generate your SSL certificate.- If you registering the certificate to a domain name like
example.com
, please be sure to point your DNS records to your current server before runningcertbot
.
- If you registering the certificate to a domain name like
-
We are going to move the SSL certificates to the Shynet repo with with command below. Replace
<domain>
with the domain name you used in step 3.cp /etc/letsencrypt/live/<domain>/{cert,privkey}.pem ~/shynet/shynet/
-
With that, we are going to replace the
webserver.sh
withssl.webserver.sh
to enable the use of SSL certificates. The originalwebserver.sh
will be backed up tobackup.webserver.sh
mv ~/shynet/shynet/webserver.sh ~/shynet/shynet/backup.webserver.sh
mv ~/shynet/shynet/ssl.webserver.sh ~/shynet/shynet/webserver.sh
-
Now we build the image!
docker image build shynet -t shynet-ssl:latest
-
Have a PostgreSQL server ready to go. This can be on the same machine as the deployment, or elsewhere. You'll just need a username, password, host, and port (default is
5432
). (For info on how to setup a PostgreSQL server on Ubuntu, follow this guide). -
Follow the Basic Installation guide with just one modification: in step #4, change the local bind port from
80
to443
, and useshynet-ssl:latest
as your Docker image instead ofmilesmcc/shynet:latest
.
Configuring a Reverse Proxy
A reverse proxy has many benefits. It can be used for DDoS protection, caching files to reduce server load, routing HTTPS and/or HTTP connections, hosting multiple services on a single server, and more!
Cloudflare
Cloudflare is a great reverse proxy option. It's free, automatically configures HTTPs, offers out-of-the-box security features, provides DNS, and requires minimal setup.
-
Follow Cloudflare's getting started guide.
-
After setting up Cloudflare, here are a few things you should consider doing:
- Under the
SSL
Tab >Overview
> Change yourSSL/TLS Encryption Mode
toFlexible
- The following will block your admin panel from anyone who isn't on your IP address. This is optional, but great for security.
- Under the
Firewall
tab >Overview
>+ Create Firewall Rule
: - Name:
Admin Panel Restriction
- Field:
URI Path
- Operator:
equals
- Value:
/admin
- Click
AND
- Field:
IP Address
- Operator:
does not equal
- Value:
<your public IP address>
- Then:
Block
- Under the
- Under the
Nginx
Nginx is a self hosted, highly configurable webserver. Nginx can be configured to run as a reverse proxy on either the same machine or a remote machine.
These commands assume Ubuntu. If you're installing Nginx on a different platform, the process will be different.
-
Before starting, shut down your Docker containers (if any are running)
- Run
docker container ls
to find the container ID - Run
docker stop <container id from the last step>
- Run
-
Update your packages and install Nginx
sudo apt-get update
sudo apt-get install nginx
-
Disable the default Nginx placeholder
sudo unlink /etc/nginx/sites-enabled/default
-
Create the Nginx reverse proxy config file
cd /etc/nginx/sites-available/
vi reverse-proxy.conf
ornano reverse-proxy.conf
- Paste the following configuration into that file:
# Know what you're pasting! Read the Reference! # Reference: https://nginx.org/en/docs/ server { listen 80; location / { proxy_set_header X-Real-IP $remote_addr; proxy_pass http://127.0.0.1:8080; } }
- Save and exit the text editor
:wq
for victrl+x
theny
for nano
- Link Nginx's
sites-enabled
to read the new configsudo ln -s /etc/nginx/sites-available/reverse-proxy.conf /etc/nginx/sites-enabled/reverse-proxy.conf
- Make sure the config is working
service nginx configtest
service nginx restart
-
Restart your Docker image, but this time use
8080
as the local bind port, as that's where we configured Nginx to lookcd ~/
docker run -p 8080:8080 --env-file=<your env file> milesmcc/shynet:latest
-
Finally, time to test!
- Go to
http://<your site>/admin
- Go to
-
If everything is working as expected, please read through some of the following links below to customize Nginx
Health Checks
By default, Shynet includes a default health check endpoint at /healthz/
. If the instance is running normally, this endpoint will return an HTTP status code of 200; if something is wrong, it will have a non-200 status code. To view the health data as JSON, send your request to /healthz/?format=json
.
This feature is helpful when running Shynet with Kubernetes, as it allows you to setup startup readiness probes that prevent traffic from being sent to your Shynet instances before they are ready.
Primary-Key Integration
In some cases, it is useful to associate particular users on your platform with their sessions in Shynet. In Shynet, this is called primary key integration, and is done by adding an additional element to the Shynet script url for each particular user.
If the Shynet script location (for either the pixel or the script) is, for example, //shynet.example.com/ingress/your_service_uuid/pixel.gif
and //shynet.example.com/ingress/your_service_uuid/script.js
, the URLs for primary-key enabled users would be //shynet.example.com/ingress/your_service_uuid/USER_PRIMARY_KEY/pixel.gif
and //shynet.example.com/ingress/your_service_uuid/USER_PRIMARY_KEY/script.js
.
Adding this path can be done easily using server-side rendering. For example, here is a Django template that adds users' primary keys to the Shynet tracking script:
{% if request.user.is_authenticated %}
<noscript>
<img src="//shynet.example.com/ingress/service-uuid/{{request.user.email|urlencode:""}}/pixel.gif">
</noscript>
<script src="//shynet.example.com/ingress/service-uuid/{{request.user.email|urlencode:""}}/script.js"></script>
{% else %}
<noscript>
<img src="//shynet.example.com/ingress/service-uuid/pixel.gif">
</noscript>
<script src="//shynet.example.com/ingress/service-uuid/script.js"></script>
{% endif %}
Troubleshooting
Here are solutions for some common issues. If your situation isn't described here or the solution didn't work, feel free to create an issue (but be sure to check for duplicate issues first).
The admin panel works, but no page views are showing up!
- If you are running a single Shynet webserver instance (i.e., you followed the default installation instructions), verify that you haven't set
CELERY_TASK_ALWAYS_EAGER
toFalse
in your environment file. - Verify that your cache is properly configured. In single-instance deployments, this means making sure that you haven't set any
REDIS_*
orCELERY_*
environment variables (those are for more advanced deployments; you'll just want the defaults). - If your service is configured to respect Do Not Track (under "Advanced Settings"), verify that your browser isn't sending the
DNT=1
header with your requests (or temporarily disable DNT support in Shynet while testing). Sometimes, an adblocker or privacy browser extension will add this header to requests unexpectedly.
Shynet isn't linking different pageviews from the same visitor into a single session!
- Verify that your cache is properly configured. (See #2 above.) In multi-instance deployments, it's critical that all webservers are using the same cache—so make sure you configure a Redis cache if you're using a non-default installation.
- This can happen between Shynet restarts if you're not using an external cache provider (like Redis).
I changed the SHYNET_WHITELABEL
/SHYNET_HOST
environment variable, but nothing happened!
- Those values only affect how your Shynet instance is setup on first run; once it's configured, they have no effect. See updating your configuration for help on how to update your configuration. (Note: these environment variables are not present in newer Shynet versions; they have been removed from the guide.)
Shynet can't connect to my database running on localhost
/127.0.0.1
- The problem is likely that to Shynet,
localhost
points to the local network in the container itself, not on the host machine. Try adding the--network='host'
option when you run Docker.