docker-fail2ban
dockprom
Our great sponsors
docker-fail2ban | dockprom | |
---|---|---|
9 | 33 | |
597 | 5,811 | |
- | - | |
6.6 | 6.9 | |
7 months ago | 16 days ago | |
Dockerfile | ||
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
docker-fail2ban
-
How to secure my self-hosted website?
It does, but it defaults to nftables from (I think) Ubuntu 21 and onwards. So when you're running fail2ban in a docker container, it run an iptables command to block the IP. However, it errors out because nftables is default in Ubuntu 19 onwards (only for new installs). See https://github.com/crazy-max/docker-fail2ban down the page. You can replace the defaults, but I do not want to mess with my docker box at this point!
-
Newbie looking to get a NAS
Nginx Reverse Proxy Manager Lets you redirect traffic from a single machine to all of your VMs and servers as well as manage SSL certificates, you can also do things like deploy Fail2Ban
- Help securing/exposing self-hosted services
-
A working regex for the fallback_access.log in nginx proxy manager
My setup is all docker on the raspberry pi 4 8gb. I can not seem to find a good regex for this log file. All log entries fail when testing. You wish it will put the client entry IP address in iptables. My regex knowledge is zero so I depend on examples (that don't work). I have no problems with the configuration that works fine. The proxy xx access log has a different format, but if someone has a working regex for that file, please let me know. For fail2ban I use https://github.com/crazy-max/docker-fail2ban For NPM I use https://github.com/jc21/nginx-proxy-manager In fail2ban I use the filter.d dir for the conf file. I can see it's loading in the log but the testing from within the docker image gives no result.
-
Possible to redirect container logs to file
My setup right now includes - Rootless Docker (can read and maybe write to journald, syslog seems to require root but maybe I'm wrong) - Fail2ban in a container crazymax/fail2ban
-
Was my raspberry hacked?
If you are running docker for your stuff, crazy-max dockerized fail2ban works well. Just be sure to export any form of logs out of what you want to protect and into the fail2ban container.
-
fail2ban for reverse proxy inside docker
You can use the following docker image to spawn an instance of fail2ban: https://github.com/crazy-max/docker-fail2ban
-
Is putting fail2ban/ufw in front of Docker+Traefik v2 necessary? How do Docker+Traefik handle the same need?
https://github.com/crazy-max/docker-fail2ban#custom-jails-actions-and-filters
dockprom
- Anyway to monitor 20+ server in one single place?
-
Detailed guide on how to use Prometheus, Loki and Grafana to monitor docker host, containers, Caddy reverse proxy with GeoIP map of who is accessing your services.
This guide before was just just kinda streamlined version of of the great stefanprodan/dockprom.
-
Recommended docker-compose for homelab monitoring / observability stack in 2022/2023?
Dockprom is a solid starting point. It gives the essentials and you can tweak it to your liking. For example I forgo Alertmanager (for now) but have added more exporters, data sources, etc.
-
Homelab infrastructure "overview" software
For tracking stats - Grafana, paired with appropriate backends. Dockprom is a nice starting point as it comes with most things preconfigured. You just need to tweak them accordingly.
-
What's a good monitoring tool for small servers like Intel NUC with N3160 processor?
i used Dockprom (https://github.com/stefanprodan/dockprom) at one point, it looks and works well however I found the CPU usage at the time higher than it should be. Your CPU would handle it easily, but it was still causing 10% CPU usage which i didn't like. I don't think this is a widespread common issue it's a very popular project but just a heads up to keep an eye on CPU if you decide to test it out.
-
I feel stupid almost being two years in DevOps
Take a look at https://github.com/stefanprodan/dockprom as a way to work with Docker, docker compose, grafana, prometheus and more.
-
HDD Disk health monitoring
https://github.com/stefanprodan/dockprom Read the YML and remove what you aren’t using.
- Manage Multiple Servers
-
Plex Grafana Dashboard
If you run plex in a docker container I highly recommend this grafana dashboard setup: https://github.com/stefanprodan/dockprom
-
Docker container to monitor server resources
Something like dockerprom can do that for you :) https://github.com/stefanprodan/dockprom
What are some alternatives?
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
swarmprom - Docker Swarm instrumentation with Prometheus, Grafana, cAdvisor, Node Exporter and Alert Manager
docker-php-nginx - Docker image with PHP-FPM 8.3 & Nginx 1.24 on Alpine Linux
uptime-kuma - A fancy self-hosted monitoring tool
docker-cloudflared - Cloudflared proxy-dns Docker image
Portainer - Making Docker and Kubernetes management easy.
docker-rtorrent-rutorrent - rTorrent and ruTorrent Docker image
karma - Alert dashboard for Prometheus Alertmanager
docker-matomo - Matomo (formerly Piwik) Docker image
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
AnonAddy-docker - AnonAddy Docker image
docker-joplin-server - Joplin Server docker image