vaultwarden/README.md

45 lines
992 B
Markdown
Raw Permalink Normal View History

2021-11-22 11:41:26 +00:00
# vaultwarden
2022-08-16 11:03:07 +00:00
> Open source password manager
2021-11-22 11:41:26 +00:00
<!-- metadata -->
* **Category**: Apps
2022-08-16 11:03:07 +00:00
* **Status**: 2, beta
2022-10-18 21:49:51 +00:00
* **Image**: [`vaultwarden/server`](https://hub.docker.com/vaultwarden/server), 4, upstream
2022-08-16 11:03:07 +00:00
* **Healthcheck**: 3
* **Backups**: No
* **Email**: No
* **Tests**: No
* **SSO**: No
2021-11-22 11:41:26 +00:00
<!-- endmetadata -->
2022-08-16 11:03:07 +00:00
## Quick start
2021-11-22 11:41:26 +00:00
1. Set up Docker Swarm and [`abra`]
2. Deploy [`coop-cloud/traefik`]
2022-08-16 11:03:07 +00:00
3. `abra app new vaultwarden`
4. `abra app config YOURAPPDOMAIN`
5. `abra app deploy YOURAPPDOMAIN`
2021-11-22 11:41:26 +00:00
[`abra`]: https://git.coopcloud.tech/coop-cloud/abra
[`coop-cloud/traefik`]: https://git.coopcloud.tech/coop-cloud/traefik
2022-08-16 11:41:11 +00:00
## Tips & Tricks
### Wiring up `fail2ban`
You need the following logging config:
```
USE_SYSLOG=true
EXTENDED_LOGGING=true
LOG_FILE=/data/vaultwarden.log
LOG_LEVEL=warn
```
Then follow [this guide](https://github.com/dani-garcia/vaultwarden/wiki/Fail2Ban-Setup).
And you must use `COMPOSE_FILE="$COMPOSE_FILE:compose.host.yml"` in your traefik config to get real IPs.