Tutorial - Installation, Configuration and Extension
Download docker-compose file
cd into the downloaded directory
The ThreatPlaybook docker-compose.yml file has been written to get you up and running quickly. However, its not the best/most ideal configuration for running ThreatPlaybook, especially in prod.
Its meant only for experimental deployments on user's local machine
Analyzing the Docker-Compose File
Change the Default Password!
- The value set in the
SUPERUSER_EMAILandSUPERUSER_PASSare the values that ThreatPlaybook uses as the default values for the Superuser Account within ThreatPlaybook.
This is clearly a default password that you SHOULD NOT use as a permanent password to access the super-admin account on ThreatPlaybook.
Please use
playbook change-passwordfeature in the CLI to change your default password. You have been warned!
Logs
There's a single output log that is generated in the /app directory within the container. If you want the logs to persist on a more permanent file-system, you'll need to volume mount a src path on your machine to the /app/logs path within the container.