back to home

Tarow / nix-podman-stacks

Home Manager Modules for integrated Podman Stacks

173 stars
12 forks
12 issues
NixShell

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing Tarow/nix-podman-stacks in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/Tarow/nix-podman-stacks)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

Nix Podman Stacks Collection of opinionated Podman stacks managed by Home Manager. The goal is to easily deploy various self-hosted projects, including a reverse proxy, dashboard and monitoring setup. Under the hood rootless Podman (Quadlets) will be used to run the containers. It works on most Linux distros including Ubuntu, Arch, Mint, Fedora & more and is not limited to NixOS. The projects also contains integrations with Traefik, Homepage, Grafana and more. Some examples include: • Enabling a stack will add the respective containers to Traefik and Homepage • Enabling CrowdSec or Authelia will automatically configure necessary Traefik plugins and middlewares • When stacks support exporting metrics, scrape configs for Prometheus can be automatically set up • Similariy, Grafana dashboards for Traefik, Blocky & others can be automatically added • and more ... While most stacks can be activated by setting a single flag, some stacks require setting mandatory values, especially for secrets. For managing secrets, projects such as sops-nix or agenix can be used, which allow you to store your secrets along with the configuration inside a single Git repository. Example Simple example of how to enable Traefik (including LetsEncrypt certificates & Geoblocking), Paperless & Homepage: Services will be automatially added to Homepage and are available via the Traefik reverse proxy. 📔 Option Documentation Refer to the documentation to get a started and see a list of available options. There is also an Option Search to easily explore existing options. 📦 Available Stacks • Adguard • AdventureLog • AIOStreams • Audiobookshelf • Authelia • Baikal • BentoPDF • Beszel • Blocky • Booklore • ByteStash • Calibre-Web Automated • Changedetection • Changedetection • Sock Puppet Browser • CrowdSec • Davis • DDNS-Updater • DockDNS • Docker Socket Proxy • Donetick • Dozzle • Ephemera • Filebrowser • Filebrowser Quantum • Flaresolverr • Forgejo • Free Games Claimer • FreshRSS • Gatus • Glance • Guacamole • Healthchecks • Home Assistant • Homepage • HortusFox • Immich • IT-Tools • Jotty • Kaneo • Karakeep • Kimai • KitchenOwl • Komga • Leantime • LLDAP • Mazanoke • Mealie • Memos • MicroBin • 🔍 Monitoring • Alloy • Grafana • Loki • Prometheus • Alertmanager • Alertmanager-ntfy • Podman Metrics Exporter • n8n • Navidrome • Networking Toolbox • Norish • ntfy • OmniTools • Outline • Pangolin-Newt • Paperless-ngx • Paperless-ngx • 📂 FTP Server • Papra • RomM • SearXNG • Shelfmark • Sshwifty • Stirling-PDF • Storyteller • 📺 Streaming • Bazarr • Gluetun • Jellyfin • Profilarr • Prowlarr • qBittorrent • qui • Seerr • Radarr • Sonarr • Tandoor • TimeTracker • Traefik • Trip • Uptime-Kuma • <img src="https://cdn.jsdelivr.net/gh/homarr-labs/dashboard-icons/svg/vaultw _...truncated for preview_