docker-fail2ban
docker-unbound
Our great sponsors
docker-fail2ban | docker-unbound | |
---|---|---|
9 | 3 | |
599 | 44 | |
- | - | |
6.6 | 6.6 | |
7 months ago | 5 months ago | |
Dockerfile | Dockerfile | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
docker-fail2ban
-
How to secure my self-hosted website?
It does, but it defaults to nftables from (I think) Ubuntu 21 and onwards. So when you're running fail2ban in a docker container, it run an iptables command to block the IP. However, it errors out because nftables is default in Ubuntu 19 onwards (only for new installs). See https://github.com/crazy-max/docker-fail2ban down the page. You can replace the defaults, but I do not want to mess with my docker box at this point!
-
Newbie looking to get a NAS
Nginx Reverse Proxy Manager Lets you redirect traffic from a single machine to all of your VMs and servers as well as manage SSL certificates, you can also do things like deploy Fail2Ban
- Help securing/exposing self-hosted services
-
A working regex for the fallback_access.log in nginx proxy manager
My setup is all docker on the raspberry pi 4 8gb. I can not seem to find a good regex for this log file. All log entries fail when testing. You wish it will put the client entry IP address in iptables. My regex knowledge is zero so I depend on examples (that don't work). I have no problems with the configuration that works fine. The proxy xx access log has a different format, but if someone has a working regex for that file, please let me know. For fail2ban I use https://github.com/crazy-max/docker-fail2ban For NPM I use https://github.com/jc21/nginx-proxy-manager In fail2ban I use the filter.d dir for the conf file. I can see it's loading in the log but the testing from within the docker image gives no result.
-
Possible to redirect container logs to file
My setup right now includes - Rootless Docker (can read and maybe write to journald, syslog seems to require root but maybe I'm wrong) - Fail2ban in a container crazymax/fail2ban
-
Was my raspberry hacked?
If you are running docker for your stuff, crazy-max dockerized fail2ban works well. Just be sure to export any form of logs out of what you want to protect and into the fail2ban container.
-
fail2ban for reverse proxy inside docker
You can use the following docker image to spawn an instance of fail2ban: https://github.com/crazy-max/docker-fail2ban
-
Is putting fail2ban/ufw in front of Docker+Traefik v2 necessary? How do Docker+Traefik handle the same need?
https://github.com/crazy-max/docker-fail2ban#custom-jails-actions-and-filters
docker-unbound
What are some alternatives?
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
docker-nxfilter - :whale: Run NxFilter in Docker!
docker-php-nginx - Docker image with PHP-FPM 8.3 & Nginx 1.24 on Alpine Linux
docker-rtorrent-rutorrent - rTorrent and ruTorrent Docker image
unbound-docker - 🛡️ This distroless Unbound Docker image is based on Alpine Linux with focus on security, privacy, performance and a small image size. And with Pi-hole in mind.
docker-cloudflared - Cloudflared proxy-dns Docker image
docker-matomo - Matomo (formerly Piwik) Docker image
AnonAddy-docker - AnonAddy Docker image
dockprom - Docker hosts and containers monitoring with Prometheus, Grafana, cAdvisor, NodeExporter and AlertManager
docker-mumble - Docker image for Mumble server.