Go to file
2023-02-28 20:34:09 +01:00
arch_linux_host_install update 2022-12-25 13:13:03 +01:00
bookstack update 2023-02-12 19:06:15 +01:00
borg_backup update 2022-04-03 10:50:12 +02:00
caddy_v2 update 2023-02-27 17:58:03 +01:00
ddclient update 2020-05-22 00:06:39 +02:00
dnsmasq update 2020-06-13 18:51:23 +02:00
docker-basics-and-troubleshoot update 2023-02-12 19:45:01 +01:00
esxi update 2023-01-21 21:48:29 +01:00
gotify-ntfy-signal update 2023-02-20 18:52:41 +01:00
homer update 2020-05-22 18:22:45 +02:00
jellyfin update 2022-11-20 00:06:37 +01:00
kopia_backup update 2023-02-07 18:51:43 +01:00
meshcrentral update 2023-01-21 21:48:29 +01:00
minecraft update 2023-01-05 01:56:45 +01:00
network-knowledge-base update 2023-02-05 19:26:14 +01:00
nextcloud update 2023-02-19 11:40:28 +01:00
ofelia update 2021-01-10 21:59:37 +01:00
opnsense update 2023-02-05 19:26:14 +01:00
phpipam update 2021-12-31 01:35:58 +01:00
portainer update 2021-02-22 23:25:12 +01:00
prometheus_grafana update 2023-02-28 20:34:09 +01:00
qbittorrent update 2022-01-17 21:43:12 +01:00
rustdesk update 2022-11-20 00:06:37 +01:00
snipeit update 2022-09-10 00:26:47 +02:00
trueNASscale update 2023-01-30 01:08:28 +01:00
unifi update 2022-11-07 21:37:29 +01:00
vaultwarden update 2023-02-12 19:06:06 +01:00
watchtower update 2020-05-22 18:22:45 +02:00
wg-easy update 2023-02-27 20:18:46 +01:00
wireguard update 2022-10-31 08:54:58 +01:00
zammad update 2023-02-12 19:45:01 +01:00
README.md update 2023-02-12 19:45:01 +01:00

Selfhosted-Apps-Docker

guide-by-example

logo


Can also just check the directories listed at the top for work in progress

Check also StarWhiz / docker_deployment_notes
Repo documents self hosted apps in similar format and also uses caddy for reverse proxy

Core concepts

  • docker-compose.yml do not need any editing to get started, changes are to be done in the .env file.
  • Not using ports directive if theres only web traffic in a container.
    Theres an expectation of running a reverse proxy which makes mapping ports on docker host unnecessary. Instead expose is used which is basically just documentation.
  • For persistent storage bind mount ./whatever_data is used. No volumes, nor static path somewhere... just relative path next to compose file.
  • no version is declared in compose, as the practice was deprecated

Requirements

Basic linux and basic docker-compose knowledge. The shit here is pretty hand holding and detailed, but it still should not be your first time running a docker container.

Some extra info

Kinda the core of the setup is Caddy reverse proxy.
It's described in most details, it's really amazingly simple but robust software.

Compose

When making changes use docker-compose down and docker-compose up -d, not just restart or stop/start.

Often the .env file is used as env_file, which can be a bit difficult concept at a first glance.

env_file: .env

  • .env - actual name of a file that is used only by compose.
    It is used automatically just by being in the directory with the docker-compose.yml
    Variables in it are available during the building of a container, but unless named in the environment: option, they are not available once the container is running.
  • env_file - an option in compose that defines an existing external file.
    Variables in this file will be available in the running container, but not during building of the container.

So a compose file having env_file: .env mixes these two together.

Benefit is that you do not need to make changes at multiple places. Adding variables or changing a name in .env does not require you to also go in to compose to add/change it there... also the compose file looks much cleaner, less cramped.

Only issue is that all variables from the .env file are available in all containers that use this env_file: .env method.
That can lead to potential issues if a container picks up environment variable that is intended for a different container of the stack.

In the setups here it works and is tested, but if you start to use this everywhere without understanding it, you can encounter issues. So first troubleshooting step should be abandoning .env and write out the variables directly in the compose file only under containers that want them.


Docker images latest tag

Most of the time the images are without any tag, which defaults to latest tag being used.
This is frowned upon, and you should put there the current tags once things are going. It will make updates easier when you know you can go back to a working version with backups and knowing image version.


Cloudflare

For managing DNS records. The free tier provides lot of management options and benefits. Like proxy between your domain and your server, so no one can get your public IP just from your domain name. Or 5 firewall rules that allow you to geoblock whole world except your country.

How to move to cloudflare.


ctop

official site

ctop-look

htop like utility for quick containers management.

It is absofuckinglutely amazing in how simple yet effective it is.

  • hardware use overview, so you know which container uses how much cpu, ram, bandwidth, IO,...
  • detailed info on a container, it's IP, published and exposed ports, when it was created,..
  • quick management, quick exec in to a container, check logs, stop it,...

Written in Go, so its super fast and installation is trivial when it is a single binary, as likely your distro does not have it in repos. If you use arch, like I do, its on AUR.


Archlinux as a docker host

My go-to is archlinux as I know it the best. Usually in a virtual machine with snapshots before updates.

For Arch installation I had this notes on how to install and what to do afterwards.
But after archinstall script started to be included with arch ISO I switched to that.
For after the install setup I created Ansible-Arch repo that gets shit done in few minutes without danger of forgetting something.
Ansible is really easy to use and very easy to read and understand playbooks, so it might be worth the time to check out the concept to setup own ansible scripts.

The best aspect of having such repo is that it is a dedicated place where one can write solution to issues encountered, or enable freshly discovered feature for all deployments.


Sendinblue

Services often need ability to send emails, for registration, password reset and such...

Sendinblue offers 300 mails a day and is easy to setup.

EMAIL_HOST=smtp-relay.sendinblue.com
EMAIL_PORT=587
EMAIL_HOST_USER=<registration_email@gmail.com>
EMAIL_HOST_PASSWORD=xs...... S1Rzp
EMAIL_USE_TLS=1