backblaze-personal-wine-container
Run the Backblaze personal backup client in a container (by Atemu)
iron-alpine
Hardened alpine linux baseimage for Docker. (by ironpeakservices)
backblaze-personal-wine-container | iron-alpine | |
---|---|---|
2 | 5 | |
57 | 139 | |
- | 1.4% | |
0.0 | 5.1 | |
about 3 years ago | 21 days ago | |
Dockerfile | Dockerfile | |
GNU Affero General Public License v3.0 | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
backblaze-personal-wine-container
Posts with mentions or reviews of backblaze-personal-wine-container.
We have used some of these posts to build our list of alternatives
and similar projects.
iron-alpine
Posts with mentions or reviews of iron-alpine.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-08-11.
- Would I be able to install Iron Alpine docker image on an LXC container in Proxmox?
-
Best Practice for AV on Containers
Look into implementing container vulnerability scanning in your build pipeline. Iron alpine is another possibility to reduce risk. https://github.com/ironpeakservices/iron-alpine
-
Does Alpine needs hardening?
If hardening is needed or not depends on your requirements. For a standard use case running a container based on default Alpine image should be secure enough. If you feel, you need to increase security a bit more - and are open to take the slightly increased risk of incompatibility with your setup aka effort - you may use all / parts of the additional hardening steps. See also https://github.com/ironpeakservices/iron-alpine for an actively maintained repo.
-
Scripts for setting up a fresh install? (disable root, enable sudo, create new user, etc)
I'm looking for something like this, but for ansible. I'v been searching for a ansible hardning script for alpine, but only thing i have found so far is iron-alpine docker container. https://github.com/ironpeakservices/iron-alpine
- Bootstrap Security in Kubernetes Deployments
What are some alternatives?
When comparing backblaze-personal-wine-container and iron-alpine you can also consider the following projects:
swayvnc - Headless wayland desktop vnc sessions in a container
distroless - 🥑 Language focused docker images, minus the operating system.
docker-clamav - Docker antivirus software with monitoring and customizable features
backblaze-personal-wine-container - Run the Backblaze personal backup client in a docker container
alpine-chrome - Chrome Headless docker images built upon alpine official image
docker-db-backup - Backup multiple database types on a scheduled basis with many customizable options