DockFlare simplifies Cloudflare Tunnel and Zero Trust Access policy management using Docker labels for automated configuration. It provides a web UI for service definitions and policy overrides, enabling secure access to both Docker and non-Docker applications.
DockFlare simplifies Cloudflare Tunnel and Zero Trust Access policy management by using Docker labels for automated configuration, while also providing a powerful web UI for manual service definitions and policy overrides. It enables secure, hassle-free public access to both Dockerized and non-Dockerized applications with minimal direct interaction with Cloudflare. Acting as a dynamic, self-hosted ingress controller, DockFlare offers persistent, UI-driven control over access policies centralizing and streamlining your access management.
cloudflare.tunnel.hostname
, service
) by monitoring container events.Before you begin, ensure you have the necessary Cloudflare API credentials and permissions.
docker-compose.yml
file:version: "3.8"
services:
dockflare:
image: alplat/dockflare:stable # Or :unstable for the latest features
container_name: dockflare
restart: unless-stopped
ports:
- "5000:5000"
env_file:
- .env
environment:
- STATE_FILE_PATH=/app/data/state.json
- TZ=Europe/Zurich # Set your timezone
volumes:
- /var/run/docker.sock:/var/run/docker.sock:ro
- dockflare_data:/app/data
networks:
- cloudflare-net
# Optional labels to expose DockFlare itself via DockFlare
# labels:
# - cloudflare.tunnel.enable=true
# - cloudflare.tunnel.hostname=dockflare.yourdomain.tld
# - cloudflare.tunnel.service=http://dockflare:5000
# - cloudflare.tunnel.access.policy=authenticate # Example: require login
volumes:
dockflare_data:
networks:
cloudflare-net:
name: cloudflare-net
Create a .env
file by copying env.example
and filling in your details.
Run DockFlare:
docker compose up -d
http://your-server-ip:5000
in your browser.DockFlare listens for Docker container events.
Similar projects based on shared tags