cockpit-file-sharing
traefik
cockpit-file-sharing | traefik | |
---|---|---|
18 | 186 | |
447 | 47,984 | |
5.4% | 1.2% | |
6.0 | 9.4 | |
11 days ago | 2 days ago | |
Vue | Go | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cockpit-file-sharing
- Home Grown NAS
- Best practice for VMs and lots of data
-
Trying to use container as NFS/CIFS server but permissions are totally FUBAR. The permissions shown in the container do not match the permissions shown on the host.
I just build a new Proxmox server, and it has a ZFS pool that I'd like to share via NFS/SMB with other hosts on my network. I want to do as little on the Proxmox host as possible, so I figured I'd mount the ZFS pool in an unprivileged Ubuntu 22.04 LXC container that runs cockpit and cockpit-file-sharing to easily manage NFS and SMB shares. Should be simple, right?
-
Do I need Virtualization/Containerization?
I am a fan of virtualization and run a three-node Proxmox cluster along with a Hyper-V host at home. I avoided Docker for years because I couldn't wrap my head around it. A couple of months ago, I migrated my NAS from being a Proxmox VM to bare-metal. It runs minimal Debian 11 (no desktop GUI) and the Cockpit web UI with the 45Drives Cockpit File Sharing extension for managing the server and file shares, respectively. I also installed Docker Engine and a Portainer container for managing containers. The system, a 2C/4T i3 CPU with 16 GB RAM, easily runs 19 containers.
-
OMV did not work - too complicated for this bear - What can I use instead?
My NAS is simply minimal Debian 11 running the Cockpit web UI (https://cockpit-project.org/) with the 45Drives Cockpit File Sharing application (https://github.com/45Drives/cockpit-file-sharing) for managing SMB and NFS shares. I use MDADM (Linux software RAID), but 45Drives also has a ZFS management Cockpit application as well. Cockpit is in the Debian repository, see https://cockpit-project.org/running#debian. Give Cockpit a look. You can easily “apt remove” if you don’t like it.
-
Management Interface like unRaid für Debian?
https://cockpit-project.org/ https://github.com/cockpit-project/cockpit-machines https://github.com/45Drives/cockpit-navigator https://github.com/45Drives/cockpit-file-sharing
-
Mount Samba network share on Cockpit
Hi, I'm using Cockpit to manage my Ubuntu server and I want to mount a network share (Synology NAS) through the web interface. Under the "Storage" page it is possible to mount a NFS share with options such as auto-mount at boot and such, and this is exactly what I need for Samba. I found a third-party plugin to manage Samba shares (link), but it can only create new and manage shares and not mount existing network shares (I think, I haven't tried it yet). Does anyone know how to mount SMB shares using Cockpit? Thanks in advance.
-
How should I structure my first media server?
45-drives makes a plugin for the web interface for nas features (use the "install from RPM" install option). You'd also need this plugin
-
Most used selfhosted services in 2022?
Some important services for me: 1. Wireguard: I have bypass rules in Authelia since I’m too lazy to login to my services. Wireguard also provides adblock on-the-go. 2. Samba server: use to transfer files between iPhone/iPad/laptop. Didn’t expect I’m depending on it too much. 3. Webtop: aka my lite/fake VM. I mounted my data directory to this container, mostly use it when i need GUI to move/edit files on my server. Accessible through web browser or RDP protocol. 4. Diversion: adblock on Asus router. Easy to setup adblock with vpn. Also no need to setup 2 Adblock instances. Another advantage, asus router can force all dns queries through this, bypass hard coded dns on some devices. 5. Cockpit with file sharing plugin: easily manage samba/nfs share
-
Why can Proxmox reach C10 state, but Truenas Scale and unRaid can not?
there's plugins for cockpit like: https://github.com/45Drives/cockpit-file-sharing
traefik
-
Release Radar · April 2024 Edition: Major updates from the open source community
Pronounced "traffic", Traefik is a modern HTTP reverse proxy and load balancer aimed at making deploying microservices easier. It integrates with your existing infrastructure components such as Docker, Kubernetes, and others, and configures itself automatically and dynamically. The latest version adds lots of new options and enhancements such as adding healthcheck options, support for custom headers, and more. Read the migration guide on how to update to the latest version which is now required due to breaking changes.
- Traefik Proxy v3.0.0 Released
-
How to securely reverse-proxy ASP.NET Core web apps
However, it's very unlikely that .NET developers will directly expose their Kestrel-based web apps to the internet. Typically, we use other popular web servers like Nginx, Traefik, and Caddy to act as a reverse-proxy in front of Kestrel for various reasons:
-
Deploying Web Apps with Caddy: A Beginner's Guide Caddy
Not as good though. Case in point: https://github.com/traefik/traefik/issues/5472#issuecomment-... (that's just from this morning)
I'm speak objectively here. Of course, any built-in auto HTTPS that works (more or less) is better than none. Traefik uses an ACME library that was originally written for Caddy. After the original author left that project, Traefik team started maintaining it. Caddy's users' requirements exceeded what the library was capable of, but unfortunately there was friction in getting it to achieve our requirements. So I ended up writing a new ACME client library in Go and, together with upgrades in CertMagic (Caddy's auto-TLS lib), Caddy has the more flexible, robust, and capable auto-HTTPS functionality.
That is to say, not all auto-HTTPS functionalities are the same.
-
Security Workshop Part 1 - Put up a gate
We'll use Traefik, an open source cloud native gateway that can plug into a Kubernetes cluster. It has the concept of "middleware" that can process API requests before passing them through to a backend. We can configuring a rate limit for all of our API endpoints by matching on the request path:
-
Install plugin in k8s cluster running in Kind
I did the same question here and here
- The Tailscale Universal Docker Mod
-
Set Default Config in traefik.toml and overwrite with specific container config
Sadly there is currently no way of doing so. https://github.com/traefik/traefik/issues/6999
- Istio moved to CNCF Graduation stage
-
Docker Services question
Traefik is another widely used system that has automatic configuration and offers support for more things like swarm/kubernetes/etc.
What are some alternatives?
cockpit-navigator - A Featureful File Browser for Cockpit
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
cockpit-samba-manager - A Cockpit plugin to manage Samba shares and users.
Caddy - Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
cockpit-zfs-manager - Cockpit ZFS Manager is an interactive ZFS on Linux admin package for Cockpit.
ingress-nginx - Ingress-NGINX Controller for Kubernetes
Proxmox - Proxmox VE Helper-Scripts
Squid - Squid Web Proxy Cache
cockpit-benchmark - A Storage Benchmark Utility for Cockpit.
envoy - Cloud-native high-performance edge/middle/service proxy
SFTPGo - Full-featured and highly configurable SFTP, HTTP/S, FTP/S and WebDAV server - S3, Google Cloud Storage, Azure Blob
socks5-proxy-server - SOCKS5 proxy server