ookla-speedtest-mqtt
Network Services• Other, Tools / Utilities• Utilities
A simple container designed to send Ookla speedtest results over MQTT.
Browse our large and growing catalog of applications to run in your Unraid server.
Network Services• Other, Tools / Utilities• Utilities
A simple container designed to send Ookla speedtest results over MQTT.
Network Services• Web, Tools / Utilities• Utilities
(Formerly Ollama WebUI) ChatGPT-Style Web Interface for various LLM runners, including Ollama and OpenAI-compatible APIs IMPORTANT: Make sure to add the following environment variable to your ollama container - OLLAMA_ORIGINS=* Set your OpenAI API key (not persistant) - OPENAI_API_KEY
Network Services• Other, Tools / Utilities• Utilities
OpenCanary is a multi-protocol network honeypot. It's primary use-case is to catch hackers after they've breached non-public networks. It has extremely low resource requirements and can be tweaked, modified, and extended. !! It is obviously recommended to use a dedicated IP for this container so as not to have port conflicts used. The following services are enabled by default: telnet ssh http https
OpenConnect server is an SSL VPN server. Its purpose is to be a secure, small, fast and configurable VPN server. It implements the OpenConnect SSL VPN protocol, and has also (currently experimental) compatibility with clients using the AnyConnect SSL VPN protocol. The OpenConnect protocol provides a dual TCP/UDP VPN channel, and uses the standard IETF security protocols to secure it. This container is an automated build linked to alpine. The dockerfile was written to always download and compile the latest release of OpenConnect VPN server when built.
Selfhosters Unraid Discord Repository
Home Automation, Network Services• Management, Tools / Utilities• Utilities
A docker image to run OpenLDAP, The container default log level is info. Available levels are: none, error, warning, info, debug and trace. To use this container with phpldapadmin, create a custom network that both containers are on and then link them using --link openldap:PHPLDAPADMIN_LDAP_HOSTS in the extra parameters of the phpldapadmin docker container (which should be equal to HOSTNAME in this container). Any other docker that wants to use LDAP credentials will need the same extra parameter including Let's Encrypt if you are using linuxserver.io's ldap-auth container.
Network Services• Other, Tools / Utilities• Utilities
a simple yet sophisticated log search, infrastructure monitoring, and APM solution. It is a full-fledged observability platform that can reduce your storage costs by ~140x compared to other solutions and requires much lower resource utilization resulting in much lower cost.
Mudislanders Template for mounting OpenRA's dedicated server by rmoriz OpenRA is a project that recreates and modernizes the classic Command & Conquer real time strategy games. We have developed a flexible open source game engine (the OpenRA engine) that provides a common platform for rebuilding and reimagining classic 2D and 2.5D RTS games (the OpenRA mods).
Network Services• Web, Other, Security
An "all-in-one" docker for all your private browsing needs (including OpenVPN client with nftables kill switch ; Socks5 + HTTP proxy to both VPN and TOR (the onion router) ; DNS server to DoT (DNS-over-TLS) services). NOTE: you must place your own OpenVPN configuration to the host path that is mapped to /etc/openvpn (The ovpn file must be named openvpn.ovpn. Credentials + certs can be in the same file or split out into multiple files - the flexibility is yours.) Set DNS_SERVERS to 127.2.2.2 to use DNS-over-TLS (use google and cloudflare services by default). Your DNS query out of the VPN exit will also be encrypted for even more security. Set it to other services IP's will use normal unencrypted services. Set HOST_NETWORK to your Unraid server network in CIDR format e.g. 192.168.1.0/24. For more detailed instructions, refer to the support thread (https://forums.unraid.net/topic/96233-support-testdasi-repo/) or project page (https://github.com/testdasi/openvpn-client-aio).
Network Services• Web, Other, Security
An "all-in-one" docker for all your private browsing needs (including OpenVPN client with nftables kill switch ; Socks5 + HTTP proxy to the VPN ; DNS server to DoT (DNS-over-TLS) services). It's the same as OpenVPN AIO Client docker but without TOR. NOTE: you must place your own OpenVPN configuration to the host path that is mapped to /etc/openvpn (The ovpn file must be named openvpn.ovpn. Credentials + certs can be in the same file or split out into multiple files - the flexibility is yours.) Set DNS_SERVERS to 127.2.2.2 to use DNS-over-TLS (use google and cloudflare services by default). Your DNS query out of the VPN exit will also be encrypted for even more security. Set it to other services IP's will use normal unencrypted services. Set HOST_NETWORK to your Unraid server network in CIDR format e.g. 192.168.1.0/24. For more detailed instructions, refer to the support thread (https://forums.unraid.net/topic/96233-support-testdasi-repo/) or project page (https://github.com/testdasi/openvpn-client-aio).
This OpenVPN container was designed to be started first to provide a connection to other containers (using '--net=container:OpenVPN-Client'), see the documentation for further help here: https://github.com/ich777/docker-openvpn-client The basic steps for a OpenVPN connection that requires a Username and Password are: 1) Rename your *.ovpn to 'vpn.ovpn' and place it in your OpenVPN-Client directory, 2) Create in the same directory a file named 'vpn.auth' and place your Username in the first line and the Password for the connection in the second line and save it 3) Restart the container open the logs and see if the connection to your VPN establishes successfully. To tunnel traffic from another container through this container edit the template from the other container, set the 'Network Type' to: 'None', enable the advanced view in the top right corner and at 'Extra Parameters' add the following: '--net=container:OpenVPN-Client' (replace 'OpenVPN-Client' with the name of this container if you choose a different name for it) and write down the port(s) that you need to connect to. After that go back to edit this containers template and add the port that you have noted in the above step to this container and click 'Apply' now you can connect to the container that you tunneld the traffic though this container. You can route the traffic from multiple containers through this container with the steps above, if you need more ports then simply add more ports in this containers template. DNS: By default this container uses Googles DNS Server: 8.8.8.8 if you want to edit this turn on 'Advanced View' and edit this setting at 'Extra Parameters'. IPv6: By default IPv6 is disabled in this container. If you want to enable it turn on 'Advanced View' and delete the entry: '--sysctl net.ipv6.conf.all.disable_ipv6=1' from the 'Extra Parameters' or simply set it to: '--sysctl net.ipv6.conf.all.disable_ipv6=0'. ADVANCED CONFIG: If you leave the appdata directory for this container empty it will start up and you have to manually configure it with the builtin comand: 'openvpn.sh', see: https://github.com/ich777/docker-openvpn-client
The username is openvpn You can find the auto-generated password in the docker logs with this command: docker logs -f OpenVPNAccessServer
Network Services• Privacy, Tools / Utilities• Utilities
Orbital Sync synchronizes multiple Pi-hole instances for high availability (HA) using the built-in "teleporter". In other words, it performs a "backup" in the Pi-hole admin interface of your primary Pi-hole instance, and then "restores" that backup to any number of "secondary" Pi-holes also via their admin interface. As a result, it supports the synchronization of anything currently supported by Pi-hole's "teleporter". If you have more than one slave instance you can add extra variables for SECONDARY_HOST_2_BASE_URL: SECONDARY_HOST_2_PASSWORD: SECONDARY_HOST_3_BASE_URL: SECONDARY_HOST_3_PASSWORD: If one or all of your pihole instances use a custom path which isn't '/admin' (ie. you are running them behind a reverse proxy) you can specify a custom path with SECONDARY_HOST_X_PATH variable, where X is the slave numer or PRIMARY_HOST_PATH for the primary. There is no web UI for this app, check the logs to see if it has run successfully.
Home Automation, Media Applications• Other, Media Servers• Other, Network Services• Management, Productivity, Tools / Utilities• Utilities
Your Media Server's one-stop shop! HTPC/Homelab services organizer, written in PHP. The new, upgraded official image for Organzir v2.
openvpn with privoxy in docker with cron after docker start check your config folder, add your *.ovpn file(s) and edit logindata.conf LOCAL_NET - CIDR mask of the local IP addresses which will acess the proxy and bypass it, comma seperated OPENVPN_FILE - full path to ovpn file OVPN_SOCKS - set to off if not wanted OVPN_PRIVOXY - set to off if not wanted ONLINECHECK - set to off if not wanted ONLINECHECK_IP - default 8.8.4.4, change if wanted use privoxy on ip:8118 use socks on ip:1080
Cloud, Network Services• Other, Productivity, Tools / Utilities• Utilities
OwnCloud provides universal access to your files via the web, your computer or your mobile devices wherever you are. Mariadb is built into the image. Built with php 7.2, 7.3, and 7.4 (selectable), mariadb 10.4 and nginx 1.18. Configuration: /config - Where ownCloud should store its config files. /data - Where ownCloud should store its data files. Note: Set Network to br0 and assign a static IP address.
Dockerized ownCloud CLI Client (owncloudcmd) to sync from any supported ownCloud-like (e.g. TransIP STACK, NextCloud) enviroment.
Container for running the OpenZWave MQTT Adapter (for Home Assistant via the new Z-Wave Integration) You will need a running MQTT instance and a z-wave controller in order to use this container. For more information see: https://github.com/OpenZWave/qt-openzwave https://www.home-assistant.io/integrations/ozw/ Or visit the unraid forum support thread for more configuration/info
P3R LEMP Stack is an All-In-One container built on Debian with NGINX, MariaDB, and PHP7.3 all pre-loaded.
Residential Proxies Powered By Peer-To-Peer Bandwidth Sharing.
phpIPAM - Open source IP address management.
phpIPAM - Open source IP address management.
Selfhosters Unraid Discord Repository
Network Services• Other, Tools / Utilities• Utilities
A docker image to run phpldapadmin. It provides a user interface to an openldap database. It must be on the same custom network as openldap and must be linked via --link openldap:PHPLDAPADMIN_LDAP_HOSTS e.g. --link openldap:example.org An example config.php can be found here: https://github.com/commandprompt/phpldapadmin/blob/master/config/config.php.example
A Docker container for using WireGuard with PIA. Can output the wiregard conf file to a directory
Host your own images / gifs / mp4s / text / bins and stay in control. Self-hosted imgur/pastebin-like. See https://github.com/HaschekSolutions/pictshare/blob/master/rtfm/DOCKER.md for extra variables that can be added if required.
A Docker Container To Sync Two Piholes. This is the Sender/Master, you will need a receiver/secondary on the host who is running the receiver/secondary Pi-Hole. Note: after starting this container the first time please check the log for the public Key.
Media Applications• Other, Network Services• Messenger, Other, Tools / Utilities• Utilities
A discord bot that synchronizes with Tautulli and Sonarr to deliver tailored notifications. Visit https://discordapp.com/developers/applications/me for Bot Token.
Network Services• Privacy, Other, Productivity, Security, Tools / Utilities• Utilities
A simple OIDC provider that allows users to authenticate with their passkeys to your services.
Pomerium Nginx Proxy - Secure, identity-aware access from anywhere.
Pomerium Verify container
Network Services• Management, Productivity, Tools / Utilities• Utilities
Portainer consists of two elements, the Portainer Server, and the Portainer Agent. Both elements run as lightweight Docker containers on a Docker engine. Portainer uses the Portainer Agent container to communicate with the Portainer Server instance and provide access to the node's resources.