From 7f041c3ac8cfc583b27c5bd561c90f8dfd49d65e Mon Sep 17 00:00:00 2001 From: Roshan Jossy Date: Mon, 1 Jan 2024 17:47:49 +0100 Subject: [PATCH] docs: use GitHub markdown formatting for note in Readme (#2536) --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index e56c330d..cfe2c2a0 100644 --- a/README.md +++ b/README.md @@ -49,7 +49,8 @@ One could put Elk behind popular reverse proxies with SSL Handling like Traefik, 1. adjust permissions of storage dir: ```sudo chown 911:911 ./elk-storage``` 1. start container: ```docker-compose up -d``` -Note: The provided Dockerfile creates a container which will eventually run Elk as non-root user and create a persistent named Docker volume upon first start (if that volume does not yet exist). This volume is always created with root permission. Failing to change the permissions of ```/elk/data``` inside this volume to UID:GID 911 (as specified for Elk in the Dockerfile) will prevent Elk from storing it's config for user accounts. You either have to fix the permission in the created named volume, or mount a directory with the correct permission to ```/elk/data``` into the container. +> [!NOTE] +> The provided Dockerfile creates a container which will eventually run Elk as non-root user and create a persistent named Docker volume upon first start (if that volume does not yet exist). This volume is always created with root permission. Failing to change the permissions of ```/elk/data``` inside this volume to UID:GID 911 (as specified for Elk in the Dockerfile) will prevent Elk from storing it's config for user accounts. You either have to fix the permission in the created named volume, or mount a directory with the correct permission to ```/elk/data``` into the container. ### Ecosystem