jtschramm

Docker network setup with authelia, caddy, crowdsec, and wg-easy

13
0
100% credibility
Found Mar 08, 2026 at 13 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
AI Summary

A pre-configured setup combining a web gateway, login protection, threat detection, and remote access tunnel to secure self-hosted home applications.

How It Works

1
🔍 Discover secure home setup

You find this guide while looking for an easy way to add login protection and threat watching to your personal apps on your home server.

2
✏️ Add your details

You replace the example website name with yours and create unique secure codes for privacy.

3
🚀 Start your protector

With one easy launch, your secure gateway, login guard, and threat watcher all come alive together.

4
👤 Set up your login

You add your username and a special secure password version to access your protected area.

5
🔗 Link threat protection

You connect the security monitor to your gateway so it can block bad visitors automatically.

6
🌐 Enable remote tunnel

You visit a simple page to create a private tunnel for safe access from phones or outside.

7
📡 Point your router

You update your home router to direct internet traffic to this setup and add local shortcuts.

Secure access everywhere

Now you safely reach your apps from home, phone, or anywhere without worries about intruders.

Sign up to see the full architecture

6 more

Sign Up Free

Star Growth

See how this repo grew from 13 to 13 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is docker-network?

This Docker Compose stack spins up a secure reverse proxy for self-hosted apps using Caddy, with Authelia for 2FA authentication, CrowdSec for real-time intrusion detection on logs, and WG-Easy for easy WireGuard VPN access. It creates a custom Docker network (like docker network create with bridge mode) to isolate services, solving the hassle of piecing together these tools manually—trial-and-error configs are pre-sorted. Clone the docker github repo, tweak domains and secrets via CLI commands like docker run for crypto hashes, then docker compose up -d for a production-ready homelab gateway handling docker network connect, host mode bypasses, and external traffic.

Why is it gaining traction?

It bundles security without complexity—no wrestling docker network drivers, modes, or prune commands solo. The step-by-step README covers edge cases like bouncer API keys, log parsing metrics (cscli metrics), and split DNS for VPN hairpinning, standing out from bare-bones Caddy or Authelia setups. Devs dig the authelia log integration and Caddy admin exposure for dashboards, plus docker network github patterns that play nice with docker github actions runners or registries for CI deploys.

Who should use this?

Homelab tinkerers exposing services via docker network external or host who need quick 2FA and bouncer protection without full Kubernetes overhead. Self-hosters managing multiple apps behind a single HTTPS endpoint, especially those routing WireGuard traffic through docker network types like bridge. Devs prototyping secure stacks before scaling to docker github login-protected registries.

Verdict

Solid starter for secure homelabs at 13 stars and 1.0% credibility—docs are thorough with verification checklists, but low activity means watch for upstream Docker image breaks. Grab it if you're tired of insecure docker network mode host defaults; otherwise, wait for more polish.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.