|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Rocket.chat||35,055||7 hours ago||5||August 18, 2022||3,503||other||TypeScript|
|The communications platform that puts data protection first.|
|Appwrite||29,966||8 hours ago||49||September 14, 2022||655||bsd-3-clause||TypeScript|
|Secure Backend Server for Web, Mobile & Flutter Developers 🚀 AKA the 100% open-source Firebase alternative.|
|Hydra||13,872||8||3 days ago||1||May 08, 2019||73||apache-2.0||Go|
|OpenID Certified™ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Works with Hardware Security Modules. Compatible with MITREid.|
|Caprover||10,121||7 days ago||100||other||TypeScript|
|Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids|
|Rap2 Delos||7,400||5 months ago||73||mit||TypeScript|
|Jupyterhub||7,105||255||115||14 hours ago||66||June 06, 2022||182||other||Python|
|Multi-user server for Jupyter notebooks|
|Nakama||6,936||1||10 hours ago||72||November 28, 2020||102||apache-2.0||Go|
|Distributed server for social and realtime games and apps.|
|Dockercraft||6,300||2 years ago||July 12, 2022||18||apache-2.0||Lua|
|Docker + Minecraft = Dockercraft|
|Heimdall||5,678||12 days ago||23||mit||PHP|
|An Application dashboard and launcher|
|Docker Ipsec Vpn Server||5,316||22 days ago||2||other||Shell|
|Docker image to run an IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2|
An ossec-server image with the ability to separate the ossec configuration/data from the container, meaning easy container replacements. This image is designed to be as turn key as possible, supporting out of the box:
The following directories are externalized under
/var/ossec/data which allow the container to be replaced without configuration or data loss:
queue. In addition to those directories, the
bin/.process_list file is symlink'ed to
process_list in the data volume.
To get an up and running ossec server that supports auto-enrollment and sends HIDS notifications a syslog server, use.
docker run --name ossec-server -d -p 1514:1514/udp -p 1515:1515\ -e SYSLOG_FORWADING_ENABLED=true -e SYSLOG_FORWARDING_SERVER_IP=X.X.X.X\ -v /somepath/ossec_mnt:/var/ossec/data xetusoss/ossec-server
Once the system starts up, you can execute the standard ossec commands using docker. For example, to list active agents.
docker exec -ti ossec-server /var/ossec/bin/list_agents -a
trueif ALERTS_TO_EMAIL is specified, otherwise
Please note: All the SMTP and SYSLOG configuration variables are only applicable to the first time setup. Once the container's data volume has been initialized, all the configuration options for OSSEC can be changed.
Since this is a docker container, ossec-execd really isn't a great idea anyway. Having a log server, such as graylog, react based on log entries is the recommended approach.
On first launch, the ossec server will not start up properly and bind to port 1514, unless at least one agent to be present in the client.keys file. To avoid that issue, a local agent is setup by default. See this bug with OSSEC.
The osxfs integration used for volume binding on Mac OS X causes an issue resolving symlinks in the container. To work around this issue, just don't bind
/var/ossec/data to a host directory. Instead, use a regular docker volume and execute a shell in the container to inspect the data. All the typical docker volume management tricks apply, of course.
# To start the container on OS X docker run --name ossec-server -d -p 1514:1514/udp -p 1515:1515\ -e SYSLOG_FORWADING_ENABLED=true -e SYSLOG_FORWARDING_SERVER_IP=X.X.X.X\ -v /var/ossec/data xetusoss/ossec-server
Since this image has become the de-facto standard for OSSEC on docker hub, I wanted to be very clear that we intend to maintain this image with the interest of the community in mind. If you have issues, please file them. If you have made changes you'd like to see included, pull requests are welcome!