Deploy Mattermost using Containers#
You can deploy Mattermost Server using container technologies for exploring functionality, testing, and development purposes, as it allows you to quickly set up a Mattermost instance without needing to manage the underlying infrastructure. This deployment method shouldn’t be used in production environments as it doesn’t support clustered deployments or High Availability (HA) configurations out-of-the-box.
Choose your preferred container platform below for specific deployment instructions:
This guide provides step-by-step instructions for deploying Mattermost using Docker containers. Docker deployments are officially supported on Linux operating systems, while macOS and Windows Docker deployments are supported for testing and development purposes only.
Step 1: Install Docker
If you don’t have Docker installed, follow the instructions below based on your operating system. You’ll need Docker Engine and Docker Compose (release 1.28 or later).
Warning
Mattermost server deployment using Docker is officially supported on Linux operating systems only.
macOS and Windows Docker deployments are supported for testing and development purposes only.
Step 2: Deploy Mattermost on Docker
This section provides a quick start guide for deploying Mattermost on Docker by leveraging Docker Compose.
Note
The deployment configuration results in two separate containers: a container for the database and a container for the application. An optional third container results when using NGINX for reverse proxy.
Encountering issues with your Docker deployment? See the Docker deployment troubleshooting documentation for details.
In a terminal window, clone the repository and enter the directory.
git clone https://github.com/mattermost/docker cd docker
Create your
.env
file by copying and adjusting theenv.example
file.cp env.example .env
Important
At a minimum, you must edit the
DOMAIN
value in the.env
file to correspond to the domain for your Mattermost server.We recommend configuring the Support Email via
MM_SUPPORTSETTINGS_SUPPORTEMAIL
. This is the email address your users will contact when they need help.
Create the required directories and set their permissions.
mkdir -p ./volumes/app/mattermost/{config,data,logs,plugins,client/plugins,bleve-indexes} sudo chown -R 2000:2000 ./volumes/app/mattermost
(Optional) Configure TLS for NGINX. If you’re not using the included NGINX reverse proxy, you can skip this step.
If creating a new certificate and key:
bash scripts/issue-certificate.sh -d <YOUR_MM_DOMAIN> -o ${PWD}/certs
To include the certificate and key, uncomment the following lines in your
.env
file and ensure they point to the appropriate files.#CERT_PATH=./certs/etc/letsencrypt/live/${DOMAIN}/fullchain.pem #KEY_PATH=./certs/etc/letsencrypt/live/${DOMAIN}/privkey.pem
If using a pre-existing certificate and key:
mkdir -p ./volumes/web/cert cp <PATH-TO-PRE-EXISTING-CERT>.pem ./volumes/web/cert/cert.pem cp <PATH-TO-PRE-EXISTING-KEY>.pem ./volumes/web/cert/key-no-password.pem
To include the certificate and key, ensure the following lines in your
.env
file points to the appropriate files.CERT_PATH=./volumes/web/cert/cert.pem KEY_PATH=./volumes/web/cert/key-no-password.pem
Deploy Mattermost.
Without using the included NGINX:
docker compose -f docker-compose.yml -f docker-compose.without-nginx.yml up -d
To access your new Mattermost deployment, navigate to
http://<YOUR_MM_DOMAIN>:8065/
in your browser.To shut down your deployment:
docker compose -f docker-compose.yml -f docker-compose.without-nginx.yml down
Using the included NGINX:
docker compose -f docker-compose.yml -f docker-compose.nginx.yml up -d
To access your new Mattermost deployment via HTTPS, navigate to
https://<YOUR_MM_DOMAIN>/
in your browser.To shut down your deployment:
docker compose -f docker-compose.yml -f docker-compose.nginx.yml down
Create your first Mattermost system admin user, invite more users, and explore the Mattermost platform.
Configure SSO With GitLab (Optional)
To use SSO with GitLab with a self-signed certificate, you have to add the PKI chain for your authority. This is required to avoid the Token request failed: certificate signed by unknown authority
error.
To add the PKI chain, uncomment the following line in your .env
file, and ensure it points to your pki_chain.pem
file:
#GITLAB_PKI_CHAIN_PATH=<path_to_your_gitlab_pki>/pki_chain.pem
Then uncomment the following line in your docker-compose.yml
file, and ensure it points to the same pki_chain.pem
file:
# - ${GITLAB_PKI_CHAIN_PATH}:/etc/ssl/certs/pki_chain.pem:ro
Upgrade from mattermost-docker
The mattermost-docker GitHub repository is deprecated. Visit the mattermost/docker GitHub repository to access the official Docker deployment solution for Mattermost.
To migrate from an existing mattermost/mattermost-prod-app
image, we recommend migrating to either mattermost/mattermost-enterprise-edition
or mattermost/mattermost-team-edition
images, which are the official images supported by Mattermost. These images support PostgreSQL v11+ databases, which we know has been a long-running challenge for the community, and you will not lose any features or functionality by moving to these new images.
For additional help or questions, please refer to this issue.
Install a different version of Mattermost
Shut down your deployment.
Run
git pull
to fetch any recent changes to the repository, paying attention to any potentialenv.example
changes.Adjust the
MATTERMOST_IMAGE_TAG
in the.env
file to point your desired enterprise or team image version.Redeploy Mattermost.
Troubleshooting your Docker deployment
If deploying on an M1 Mac and encountering permission issues in the Docker container, redo the third step and skip this command:
sudo chown -R 2000:2000 ./volumes/app/mattermost
If having issues deploying on Docker generally, ensure the docker daemon is enabled and running:
sudo systemctl enable --now docker
To remove all data and settings for your Mattermost deployment:
sudo rm -rf ./volumes
Troubleshooting PostgreSQL
For quick start deployments, you can change the Postgres username and/or password (recommended) in the .env
file. If your database is managed externally, you’ll need to change the password in your database management tool. Then, update the .env
file with the new credentials.
Troubleshooting TLS & NGINX
For an in-depth guide to configuring the TLS certificate and key for Nginx, please refer to this document in the repository.
Trial Mattermost using Docker Preview
Looking for a way to evaluate Mattermost on a single local machine using Docker? We recommend using the Mattermost Docker Preview Image to install Mattermost in Preview Mode.
Important
This local image is self-contained (i.e., it has an internal database and works out of the box). Dropping a container using this image removes data and configuration as expected. You can see the configuration settings documentation to learn more about customizing your trial deployment.
Preview Mode shouldn’t be used in a production environment, as it uses a known password string, contains other non-production configuration settings, has email disabled, keeps no persistent data (all data lives inside the container), and doesn’t support upgrades.
If you are planning to use the calling functionality in Preview Mode on a non-local environment, you should ensure that the server is running on a secure (HTTPs) connection and that the network requirements to run calls are met.
Install Docker.
Once you have Docker, run the following command in a terminal window:
docker run --name mattermost-preview -d --publish 8065:8065 --publish 8443:8443 mattermost/mattermost-preview
When Docker is done fetching the image, navigate to
http://localhost:8065/
in your browser to preview Mattermost.Select Don’t have an account in the top right corner of the screen to create an account for your preview instance. If you don’t see this option, ensure that the Enable open server configuration setting is enabled. This setting is disabled for self-hosted Mattermost deployments by default.
Log in to your preview instance with your user credentials.
Troubleshooting your preview deployment
The Preview Mode Docker instance for Mattermost is designed for product evaluation, and sets SendEmailNotifications=false
so the product can function without enabling email. See the Configuration Settings documentation to customize your deployment.
To update your Mattermost preview image and container, you must first stop and delete your existing mattermost-preview container by running the following commands:
docker pull mattermost/mattermost-preview
docker stop mattermost-preview
docker rm mattermost-preview
Once the new image is pulled and the container is stopped and deleted you need to run the docker run
command from above.
Important
On Linux, include sudo
in front of all docker
commands.
To access a shell inside the container, run the following command:
docker exec -ti mattermost-preview /bin/bash
Note
See the deployment troubleshooting documentation for resolutions to common deployment issues.
You can deploy Mattermost server in Preview Mode on AWS Elastic Beanstalk using a Docker container. This is a great option for exploring functionality, testing, and development purposes, as it allows you to quickly set up a Mattermost instance without needing to manage the underlying infrastructure. This deployment method shouldn’t be used in production environments.
The Elastic Beanstalk application creation process below combines Application and Environment creation in a single workflow:
From your AWS console select Elastic Beanstalk.
Select the Create Application button on the Elastic Beanstalk home page.
Enter an Application name for the Elastic Beanstalk application.
(Optional) Specify Application tags.
Select Docker for the Platform.
Choose Docker running on 64bit Amazon Linux 2 for the Platform branch. Note that multi-container Docker is now deprecated.
Leave the platform version preselected as 3.4.8 (Recommended).
For Application code, select Upload your code.
Download the
Dockerrun.aws.json
file from https://raw.githubusercontent.com/mattermost/mattermost-docker-preview/master/Dockerrun.aws.json.Set a unique Version Label, choose Local File, then select Choose file button to browse for the downloaded file in the previous step. You should see a File successfully uploaded message.
Select Create Application. It may take a few minutes for Beanstalk to launch your environment. If the launch is successful, you will see a see a large green checkmark and the Health status displayed in green.
Test your environment by selecting the domain link next to your application name at the top of the dashboard. Alternatively, enter the domain into your browser in the form of
http://<your-ebs-application-url>.elasticbeanstalk.com
. You can also map your own domain if you prefer. When everything is working correctly, the domain navigates you to the Mattermost Login page. Enjoy exploring Mattermost!
(Recommended) Enable Email
The default Docker instance for Mattermost is designed for product evaluation, and sets SendEmailNotifications=false
so the product can function without enabling email. To see the product’s full functionality, we recommend enabling SMTP email.
See Configuration Settings documentation for more configuration and customization options for your deployment.
Secure your Mattermost deployment#
Deploying Mattermost using Docker containers can be made secure with proper configurations for HTTPS and reverse proxying. This guide outlines the steps to set up TLS and an NGINX reverse proxy for your Mattermost deployment, ensuring secure communication between users and your server.
Set Up an NGINX Container to serve as the reverse proxy. You can use NGINX either as a separate container or installed on the host machine.
Bind Volumes for NGINX Configuration and TLS Certificates:
Bind Docker volumes for NGINX configuration files and TLS certificates to ensure persistent and secure storage of these assets.
Use permission restrictions on host directories where sensitive files such as TLS keys are stored.
Create the NGINX Configuration File by designing a robust
nginx.conf
file to configure reverse proxying and HTTPS. Here’s a basic example:server { listen 443 ssl; server_name your-domain.com; ssl_certificate /etc/nginx/certs/fullchain.pem; ssl_certificate_key /etc/nginx/certs/privkey.pem; ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers HIGH:!aNULL:!MD5; location / { proxy_pass http://mattermost:8065; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Proto https; } }
Verify the configuration with nginx -t
before applying.
Obtain TLS Certificates:
Use Let’s Encrypt for free, automated certificates. Tools like Certbot can help automate the process.
Alternatively, purchase certificates from a trusted certificate authority (CA) and ensure proper setup of intermediate and root certificate chains.
Keep private keys secure and avoid storing them directly inside Docker images.
Connect Containers Using Docker Networking:
Use Docker’s networking features to isolate and link containers.
Create a custom Docker bridge network to ensure secure communication. For example:
docker network create mattermost-network
Launch the Mattermost and NGINX containers on the same network:
docker network connect mattermost-network mattermost docker network connect mattermost-network nginx
Point your domain to the server IP address:
Ensure your domain (e.g., your-domain.com) points to the public IP address of your server. If your IP is dynamic, consider setting up Dynamic DNS (DDNS) for seamless connectivity.
After placing the certificates and updating the configuration, restart the NGINX container:
Use logs (docker logs nginx) to troubleshoot and validate the container’s operation.
Verify HTTPS Access by visiting
https://your-domain.com
in a web browser to confirm Mattermost is running securely over HTTPS.Use tools such as SSL Labs : https://www.ssllabs.com/ssltest/ to validate the quality of your TLS setup.
Enable HTTP Strict Transport Security (HSTS) in your NGINX configuration to prevent downgrade attacks.
Use NGINX rate-limiting features to restrict abusive traffic, such as excessive requests:
Additionally, consider:
Use Docker’s security features such as Seccomp profiles and AppArmor to secure your container runtime.
Avoid running containers with elevated privileges
--privileged
and utilize user namespaces.Always use trusted images (e.g., official NGINX and Mattermost images) to prevent exposure to vulnerabilities in third-party images.
Update Mattermost, NGINX, and Docker to their latest versions regularly to ensure patches for known vulnerabilities are applied.
Set up proper firewall rules to restrict unauthorized access and monitor traffic using tools like Fail2Ban or Wazuh.
By following these steps, your Mattermost deployment using Docker containers will be accessible securely over HTTPS with efficient proxying through NGINX. Implementing the additional security recommendations will further protect your environment against evolving threats.