docker-compose-stack VS trust-manager

Compare docker-compose-stack vs trust-manager and see what are their differences.

docker-compose-stack

Use docker-compose and watchtower to self-deploy and auto-update a stack (by peterkeen)

trust-manager

trust-manager is an operator for distributing trust bundles across a Kubernetes cluster. (by cert-manager)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
docker-compose-stack trust-manager
4 2
7 221
- 4.5%
3.5 9.2
about 2 months ago 7 days ago
Shell Go
MIT License Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

docker-compose-stack

Posts with mentions or reviews of docker-compose-stack. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-28.
  • What if your Pods need to trust self-signed certificates?
    5 projects | news.ycombinator.com | 28 Jun 2023
    You're right, it's a little weird. I wrote a short essay about my setup[1] but the tl;dr is that I wanted certificates distributed in the same way every other thing on my machines is distributed.

    I wanted my homeprod setup to be as hands off as possible while still allowing easy management. Each physical host is running Alpine. During provisioning I install docker, Tailscale, and manually start a "root" container that runs[2] docker compose and then starts a cron daemon. The compose commands include one or more "stack" files and are generated based on a yaml file listing the stacks for each host. Watchtower runs with a 30 second cycle time to keep everything updated, including the root container. Adding or updating services means committing and pushing a change to the root container repo, then CI builds and pushes a new image. Watchtower picks up the new image and restarts the root container, which re-runs Compose which in turn starts, stops, modifies, etc anything that's changed.

    For certificates, I tried a number of different things but ultimately settled on the method I described earlier. The purpose of the container image is to 1) transport the certificates and install them in the right spot and 2) be updatable automatically with Watchtower.

    Certificate changes are very similar to the root container, except the git repo self-modifies upon renewals (yes I keep private keys committed to git, it's a homelab, it's really not a big deal).

    [1]: https://www.petekeen.net/homeprod-management-with-docker

    [2]: https://github.com/peterkeen/docker-compose-stack/blob/main/...

  • Old School Linux Administration (My Next Homelab Generation)
    2 projects | news.ycombinator.com | 11 Sep 2022
    I really like this article just for the straightforwardness of the setup. Pets not cattle should be the home server mantra.

    My setup is not quite as simple. I have one homeprod server running Proxmox with a number of single task VMs and LXCs. A task, for my purposes, is a set of one or more related services. So I have an internal proxy VM that also runs my dashboard. I have a media VM that runs the *arrs. I have an LXC that runs Jellyfin (GPU pass through is easier with LXC). A VM running Home Assistant OS. Etcetera.

    Most of these VMs are running Docker on top of Alpine and a silly container management scheme I've cooked up[1]. I've found this setup really easy to wrap my head around, vs docker swarm or k8s or what have you. I'm even in the process of stripping dokku out of my stack in favor of this setup.

    [1]: https://github.com/peterkeen/docker-compose-stack

  • docker-compose-stack: a fun little zero-ish dependency docker compose continuous deployment tool
    1 project | /r/homelab | 2 Sep 2022
  • What is everyone using to deploy Docker?
    3 projects | /r/selfhosted | 30 Aug 2022

trust-manager

Posts with mentions or reviews of trust-manager. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-28.
  • What if your Pods need to trust self-signed certificates?
    5 projects | news.ycombinator.com | 28 Jun 2023
    Plug (but it's open source and free!): We've been trying to address this in Kubernetes with trust-manager. [1] Trust bundles need to be a runtime concern and they need to support trusting both the old a new version of a cert to safely allow for rotation. It's pretty simple but it seems to work well!

    trust-manager also supports pulling in the Mozilla trust bundle which most Linux distros (and therefore most containers) use!

    Handling trust of private [2] certificates is done poorly generally across many orgs and platforms, not just Kubernetes. There are lots of ways of shooting yourself in the foot - particularly when it comes to rotating CA certificates. I think there's a lot of space here for new solutions here!

    [1] https://cert-manager.io/docs/projects/trust-manager/

    [2] I try to avoid "self-signed" in this use case because its literal meaning is that the certificate signs itself using its own key, which is what root certificates do. The Let's Encrypt ISRG X1 root certificate is self-signed but it's definitely not what I'd call a 'private CA'; see https://letsencrypt.org/certificates/

What are some alternatives?

When comparing docker-compose-stack and trust-manager you can also consider the following projects:

CasaOS - CasaOS - A simple, easy-to-use, elegant open-source Personal Cloud system.

ssl-proxy - :lock: Simple zero-config SSL reverse proxy with real autogenerated certificates (LetsEncrypt, self-signed, provided)

kubernetes-replicator - Kubernetes controller for synchronizing secrets & config maps across namespaces

ca-injector - Painlessly use off-the-shelf images (and your own) in your k8s cluster, with custom root CAs.

docker_installs - Docker and Docker-Compose install scripts for various linux distros and versions

certmagic - Automatic HTTPS for any Go program: fully-managed TLS certificate issuance and renewal

Caddy - Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS