Configuration¶
maintenant is configured entirely through environment variables. No configuration files required.
Environment Variables¶
| Variable | Default | Description |
|---|---|---|
MAINTENANT_ADDR |
127.0.0.1:8080 |
HTTP bind address. Use 0.0.0.0:8080 inside containers. |
MAINTENANT_DB |
./maintenant.db |
SQLite database file path. |
MAINTENANT_BASE_URL |
http://localhost:8080 |
Public base URL. Used for heartbeat ping URLs and status page links. |
MAINTENANT_CORS_ORIGINS |
same-origin | CORS allowed origins (comma-separated). Empty means same-origin only. Set to * for wildcard. |
MAINTENANT_RUNTIME |
auto-detect | Force container runtime: docker or kubernetes. Auto-detected by default. |
MAINTENANT_MAX_BODY_SIZE |
1048576 |
Maximum request body size in bytes for POST/PUT requests (default: 1 MB). |
MAINTENANT_UPDATE_INTERVAL |
24h |
Update intelligence scan interval. Accepts Go duration format (e.g., 12h, 30m). |
MAINTENANT_K8S_NAMESPACES |
all | Kubernetes namespace allowlist (comma-separated). Empty monitors all namespaces. |
MAINTENANT_K8S_EXCLUDE_NAMESPACES |
none | Kubernetes namespace blocklist (comma-separated). |
MAINTENANT_LICENSE_KEY |
— | Pro license key. Enables Pro features when set to a valid key. |
MAINTENANT_MCP |
false |
Enable the MCP server on /mcp (Streamable HTTP transport). |
MAINTENANT_MCP_ALLOWED_EMAIL |
— | Restrict MCP access to JWTs matching this email. |
Example .env File¶
# Listen address (use 0.0.0.0 inside containers, 127.0.0.1 on host)
MAINTENANT_ADDR=127.0.0.1:8080
# SQLite database path
MAINTENANT_DB=./maintenant.db
# Public base URL (used for heartbeat ping URLs and status page links)
MAINTENANT_BASE_URL=https://maintenant.example.com
# CORS allowed origins (comma-separated, empty = same-origin only)
# MAINTENANT_CORS_ORIGINS=http://localhost:5173
# Container runtime override (auto-detected by default: docker or kubernetes)
# maintenant_RUNTIME=docker
# Max request body size in bytes (default: 1MB)
# maintenant_MAX_BODY_SIZE=1048576
# Update intelligence scan interval (Go duration, default: 24h)
# maintenant_UPDATE_INTERVAL=24h
# Kubernetes namespaces to monitor (comma-separated, empty = all)
# maintenant_K8S_NAMESPACES=default,production
# Kubernetes namespaces to exclude (comma-separated)
# maintenant_K8S_EXCLUDE_NAMESPACES=kube-system
# MCP Server (Model Context Protocol for AI assistants)
# maintenant_MCP=true
# maintenant_MCP_ALLOWED_EMAIL=you@example.com
Pro License¶
To enable Pro features (Slack/Teams/Email channels, CVE enrichment, incident management, maintenance windows, subscriber notifications, and more), set the MAINTENANT_LICENSE_KEY environment variable:
services:
maintenant:
image: ghcr.io/kolapsis/maintenant-pro:latest
environment:
MAINTENANT_LICENSE_KEY: "your-license-key"
The license is verified periodically against the license server. If the server is temporarily unreachable, Pro features remain active from cache with a graceful degradation window.
You can check the current license status via the API:
Security Model¶
maintenant does not include built-in authentication — by design.
Like Dozzle, Prometheus, and most self-hosted monitoring tools, maintenant is designed to sit behind your existing reverse proxy and auth middleware. No need to manage yet another set of user accounts.
Internet -> Reverse Proxy (Traefik / Caddy / nginx)
-> Auth (Authelia / Authentik / OAuth2 Proxy)
-> maintenant
Example: Traefik + Authelia¶
services:
maintenant:
image: ghcr.io/kolapsis/maintenant:latest
labels:
traefik.enable: "true"
traefik.http.routers.maintenant.rule: "Host(`now.example.com`)"
traefik.http.routers.maintenant.middlewares: "authelia@docker"
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro
- maintenant-data:/data
environment:
maintenant_DB: "/data/maintenant.db"
maintenant_BASE_URL: "https://now.example.com"
Public Routes¶
Two route prefixes are designed to be publicly accessible and should bypass your authentication middleware:
| Route | Purpose |
|---|---|
/ping/{uuid} |
Heartbeat ping endpoint. Called by cron jobs and external services. |
/status/ |
Public status page. Visible to your end users. |
Proxy configuration
Make sure your reverse proxy rules allow unauthenticated access to /ping/ and /status/ paths.
If MCP is enabled, /mcp requires long-lived connections (SSE) — disable response buffering and timeouts for this path.
All other routes (especially /api/v1/) should require authentication.
Traefik Example: Bypassing Auth for Public Routes¶
labels:
# Main router with auth
traefik.http.routers.maintenant.rule: "Host(`now.example.com`)"
traefik.http.routers.maintenant.middlewares: "authelia@docker"
# Public routes without auth
traefik.http.routers.maintenant-public.rule: >
Host(`now.example.com`) &&
(PathPrefix(`/ping/`) || PathPrefix(`/status/`))
traefik.http.routers.maintenant-public.priority: "100"
Database¶
maintenant uses SQLite in WAL (Write-Ahead Logging) mode with a single-writer pattern. This provides excellent read performance while maintaining data integrity.
- The database file is created automatically on first startup.
- Migrations run automatically — no manual steps required.
- Back up the database by copying the
.db,.db-wal, and.db-shmfiles while maintenant is stopped, or usesqlite3 backupwhile running.