$ version: '3.8'
services: tapmap: image: tapmap/tapmap:latest ports: - "8080:8080" volumes: # persist your maps and config between restarts - tapmap_data:/app/data environment: - TAPMAP_SCAN_INTERVAL=300 # scan every 5 minutes - TAPMAP_LOG_LEVEL=info -weight: 500;">restart: unless-stopped volumes: tapmap_data:
version: '3.8'
services: tapmap: image: tapmap/tapmap:latest ports: - "8080:8080" volumes: # persist your maps and config between restarts - tapmap_data:/app/data environment: - TAPMAP_SCAN_INTERVAL=300 # scan every 5 minutes - TAPMAP_LOG_LEVEL=info -weight: 500;">restart: unless-stopped volumes: tapmap_data:
version: '3.8'
services: tapmap: image: tapmap/tapmap:latest ports: - "8080:8080" volumes: # persist your maps and config between restarts - tapmap_data:/app/data environment: - TAPMAP_SCAN_INTERVAL=300 # scan every 5 minutes - TAPMAP_LOG_LEVEL=info -weight: 500;">restart: unless-stopped volumes: tapmap_data:
# Debian/Ubuntu
-weight: 500;">curl -fsSL https://get.tapmap.dev/-weight: 500;">install.sh | -weight: 600;">sudo bash
-weight: 600;">sudo -weight: 500;">systemctl -weight: 500;">enable tapmap
-weight: 600;">sudo -weight: 500;">systemctl -weight: 500;">start tapmap # Or if you prefer manual control
tapmap serve --host 0.0.0.0 --port 8080
# Debian/Ubuntu
-weight: 500;">curl -fsSL https://get.tapmap.dev/-weight: 500;">install.sh | -weight: 600;">sudo bash
-weight: 600;">sudo -weight: 500;">systemctl -weight: 500;">enable tapmap
-weight: 600;">sudo -weight: 500;">systemctl -weight: 500;">start tapmap # Or if you prefer manual control
tapmap serve --host 0.0.0.0 --port 8080
# Debian/Ubuntu
-weight: 500;">curl -fsSL https://get.tapmap.dev/-weight: 500;">install.sh | -weight: 600;">sudo bash
-weight: 600;">sudo -weight: 500;">systemctl -weight: 500;">enable tapmap
-weight: 600;">sudo -weight: 500;">systemctl -weight: 500;">start tapmap # Or if you prefer manual control
tapmap serve --host 0.0.0.0 --port 8080
server { listen 443 ssl; server_name tapmap.internal.example.com; # your SSL certs here ssl_certificate /etc/ssl/certs/tapmap.pem; ssl_certificate_key /etc/ssl/private/tapmap.key; location / { proxy_pass http://localhost:8080; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; # websocket support for live updates proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "-weight: 500;">upgrade"; }
}
server { listen 443 ssl; server_name tapmap.internal.example.com; # your SSL certs here ssl_certificate /etc/ssl/certs/tapmap.pem; ssl_certificate_key /etc/ssl/private/tapmap.key; location / { proxy_pass http://localhost:8080; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; # websocket support for live updates proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "-weight: 500;">upgrade"; }
}
server { listen 443 ssl; server_name tapmap.internal.example.com; # your SSL certs here ssl_certificate /etc/ssl/certs/tapmap.pem; ssl_certificate_key /etc/ssl/private/tapmap.key; location / { proxy_pass http://localhost:8080; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; # websocket support for live updates proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "-weight: 500;">upgrade"; }
} - CI/CD pipelines — spin up TapMap temporarily to generate architecture snapshots as part of your build artifacts
- Multi-environment mapping — run separate instances per environment and compare topologies
- Security audits — map your network before and after changes to catch unintended exposure