csf-post-docker
docker-fail2ban
csf-post-docker | docker-fail2ban | |
---|---|---|
1 | 9 | |
53 | 608 | |
- | - | |
0.0 | 6.5 | |
almost 2 years ago | 6 days ago | |
Shell | Dockerfile | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
csf-post-docker
-
Csf And Docker
Found a solution. This script makes it work perfectly, but for me only together with adding the full path to the docker and iptables commands in it. No need for docker restarts anymore.
docker-fail2ban
-
How to secure my self-hosted website?
It does, but it defaults to nftables from (I think) Ubuntu 21 and onwards. So when you're running fail2ban in a docker container, it run an iptables command to block the IP. However, it errors out because nftables is default in Ubuntu 19 onwards (only for new installs). See https://github.com/crazy-max/docker-fail2ban down the page. You can replace the defaults, but I do not want to mess with my docker box at this point!
-
Newbie looking to get a NAS
Nginx Reverse Proxy Manager Lets you redirect traffic from a single machine to all of your VMs and servers as well as manage SSL certificates, you can also do things like deploy Fail2Ban
- Help securing/exposing self-hosted services
-
A working regex for the fallback_access.log in nginx proxy manager
My setup is all docker on the raspberry pi 4 8gb. I can not seem to find a good regex for this log file. All log entries fail when testing. You wish it will put the client entry IP address in iptables. My regex knowledge is zero so I depend on examples (that don't work). I have no problems with the configuration that works fine. The proxy xx access log has a different format, but if someone has a working regex for that file, please let me know. For fail2ban I use https://github.com/crazy-max/docker-fail2ban For NPM I use https://github.com/jc21/nginx-proxy-manager In fail2ban I use the filter.d dir for the conf file. I can see it's loading in the log but the testing from within the docker image gives no result.
-
Possible to redirect container logs to file
My setup right now includes - Rootless Docker (can read and maybe write to journald, syslog seems to require root but maybe I'm wrong) - Fail2ban in a container crazymax/fail2ban
-
Was my raspberry hacked?
If you are running docker for your stuff, crazy-max dockerized fail2ban works well. Just be sure to export any form of logs out of what you want to protect and into the fail2ban container.
-
fail2ban for reverse proxy inside docker
You can use the following docker image to spawn an instance of fail2ban: https://github.com/crazy-max/docker-fail2ban
-
Is putting fail2ban/ufw in front of Docker+Traefik v2 necessary? How do Docker+Traefik handle the same need?
https://github.com/crazy-max/docker-fail2ban#custom-jails-actions-and-filters
What are some alternatives?
ufw-docker - To fix the Docker and UFW security flaw without disabling iptables
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
iptables-docker - A bash solution for docker and iptables conflict
docker-php-nginx - Docker image with PHP-FPM 8.3 & Nginx 1.24 on Alpine Linux
iptables-nftables-multiroute-firewall - A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.
docker-rtorrent-rutorrent - rTorrent and ruTorrent Docker image
firehol - A firewall for humans...
docker-cloudflared - Cloudflared proxy-dns Docker image
docker-host - A docker sidecar container to forward all traffic to local docker host or any other host
docker-matomo - Matomo (formerly Piwik) Docker image
AnonAddy-docker - AnonAddy Docker image
dockprom - Docker hosts and containers monitoring with Prometheus, Grafana, cAdvisor, NodeExporter and AlertManager