Advanced Search
Search Results
163 total results found
Overview
Observability
Getting Started
Configuration
Addons
Getting Started
Getting Started
Troubleshooting
Getting Started
Configure
Overview
Getting Started
Getting Started
Overview
Getting Started
Overview
Overview
Getting Started
Usage
Overview
Set Default Chapter-Toggle
I experienced that it annoys me alot that you always need to Open the Drop-Down from each Chapter. Which looks like this: Enter Custom Code So i found a Way on how to set a Default to always toggle those Chapter open.Basicly you only need to open the ...
Create & Restore Backups Guide
While BookStack does not currently have a built-in way to backup and restore content, it can usually be done via the command line with relative ease. The below commands are based on using Ubuntu. If you are using a different operating system you may have to al...
Setup Email Configuration for Bookstack
BookStack sends out emails for a range of purposes such as email-address confirmation & “forgot password” flows. Both SMTP and Sendmail (Linux Sendmail) are supported email mechanisms. SMTP To get up and running with SMTP you will need to add, or set, th...
Webhooks
https://foss.video/w/xu4T7 mafyLqkLU1VTgNaCV
Step-by-Step Install Guide for Pihole with Traefik on Docker Swarm
This guide will walk you through setting up Pi-hole, a powerful network-wide ad blocker, on a Docker Swarm with Traefik as the reverse proxy. We will use Docker to deploy Pi-hole and Traefik for secure and managed access. Prerequisites A Do...
Configure Adlists
To enhance Pi-hole's ability to block unwanted ads, trackers, and malicious content, you can add custom adlists. Below is a step-by-step guide to add adlists in Pi-hole, followed by a comprehensive list of popular adlists. Step 1: Access Pi-hole's Web Inter...
What is WG-Easy?
Introduction to WG-Easy WG-Easy is an all-in-one solution designed to simplify the deployment, management, and operation of a WireGuard VPN server. It combines a powerful VPN protocol (WireGuard) with a user-friendly web-based interface, making it easy for ...
What is Dockerengine?
Overview Docker Engine is the heart of Docker, a technology that allows you to create and run small, lightweight packages called containers. These containers are like tiny virtual machines but much more efficient. They contain everything an application needs ...
Docker Compose Overview & Usecases
Overview Docker Compose is a tool that simplifies the definition and management of multi-container applications. It allows developers to configure all the services their application requires (such as databases, APIs, web services, etc.) in a single YAML file....
Docker vs. VM
Overview In this article, we'll break down the differences between Docker and Virtual Machines (VMs), providing insights to help you decide which technology might be the better fit for your needs. Both Docker and VMs are essential tools for running applicatio...
How Nodes work
What are Roles? A swarm is a group of Docker hosts (servers running Docker) that are connected and work together to run containerized applications. Each host can play one of two roles: Manager: A node that controls the swarm. It handles the cluster manag...
How Services work
When Docker Engine operates in Swarm mode, services become the fundamental units for deploying and managing applications. A service is essentially a set of instructions for running containerized applications across multiple Docker nodes. This might be part of ...
Understanding Docker Swarm Mode Routing Mesh
Docker Swarm Mode introduces the concept of a routing mesh, a powerful feature that simplifies the process of exposing services to external clients in a swarm cluster. This tutorial provides an overview of how the ingress network and routing mesh work, how to ...
Overview of Traefik Reverse Proxy 3.0 & Key Concepts
Introduction Traefik is an open-source Application Proxy that simplifies the process of exposing and managing services in your infrastructure. It acts as the gateway to your platform, receiving incoming requests and securely routing them to the appropriate se...
Configuration Introduction
Configuration in Traefik can refer to two different things: The fully dynamic routing configuration (referred to as the dynamic configuration) The startup configuration (referred to as the static configuration) Elements in the static configuration s...
Beginner-Guide: Traefik & Docker Swarm
How Traefik Works with Docker Swarm Traefik integrates tightly with Docker Swarm, using the Docker API to automatically discover services. In Swarm Mode, Traefik watches for service-level labels rather than container-level labels (which are used in standalo...
Overview HTTPS & TLS
Traefik supports HTTPS & TLS, which concerns roughly two parts of the configuration: Routers: Define how HTTPS traffic is handled. TLS Connection: Manage certificates and TLS-specific settings. For Automated Certification Check this post: https://wiki...
TLS: How does it Work? & More
Automated Certification via Let’s Encrypt For automated TLS certificate management, Traefik integrates with Let’s Encrypt. See detailed instructions in this Let’s Encrypt Post. If you want to Setup your Own TLS-Challenge go check out this Guide: Docker-c...
Let's Encrypt: How does it Work? & More
Overview Traefik can automatically generate and renew TLS certificates using an ACME provider, such as Let’s Encrypt. This simplifies certificate management while ensuring secure HTTPS connections. How does Let's Encrypt Work? Let's Encrypt is a free,...
Overview Middlewares
Attached to the routers, pieces of middleware are a means of tweaking the requests before they are sent to your service (or before the answer from the services are sent to the clients). There are several available middleware in Traefik, some can modify th...