Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content

App Wishlist

1.8k Topics 15.9k Posts

Propose and vote for apps to be packaged

  • Please use this template to make an App Wishlist request

    Pinned app wishlist template
    13
    6 Votes
    13 Posts
    4k Views
    jamesJ
    Hello @baris Again, just wow and huge thanks!
  • Please search & upvote before opening a new topic

    Pinned
    9
    11 Votes
    9 Posts
    12k Views
    jdaviescoatesJ
    @nottheend personally I think no need to delete it
  • SEO Toaster OSS CMS/CRM & Ecommerce - alternative to WordPress, Ghost

    37
    2
    3 Votes
    37 Posts
    7k Views
    L
    @robi https://forum.cloudron.io/topic/12472/please-use-this-template-to-make-an-app-wishlist-request/13 Where is the github for this application?
  • Tymeslot - Better Meeting Scheduling than cal.com

    16
    10 Votes
    16 Posts
    634 Views
    L
    WanderingMonster packaging report: Verdict: Moderate. https://paste.wanderingmonster.dev/?968a273a702c96da#BheknpBPP1aTHG9TTBntKPht3fXBwBTJ1GXzLehfnPCg
  • Payload CMS Next-Gen

    7
    5 Votes
    7 Posts
    1k Views
    L
    WanderingMonster packaging report: Verdict: Not packageable. Wrong category of software What do you think about this, @micmc ? https://paste.wanderingmonster.dev/?bc5011f47c0f96c7#9ok3GazxUvUHGwNHb8pxyPiSKmdvwtaNdxt92mwBSBwy
  • Fluxer.app

    6
    6 Votes
    6 Posts
    612 Views
    L
    WanderingMonster packaging report: Hard, and you're looking at the wrong fork. https://paste.wanderingmonster.dev/?bb7abb92580b93ad#EG6vaUrc1uXu7FSSSynSmoLFWds71AXMAj7mznGh8Nmv
  • 7 Votes
    8 Posts
    3k Views
    L
    WanderingMonster packaging report: wrong repo and hard in any case: https://paste.wanderingmonster.dev/?85971e7ed9384334#FHmpJXTnBaDJVgGXEEUiKZk5Y1PUFnKk2kpi5HBzRbWy
  • InvoiceShelf

    8
    1
    8 Votes
    8 Posts
    1k Views
    L
    WanderingMonster packaging report: Easy! https://paste.wanderingmonster.dev/?6429b4f9e4186540#6KWSMGU9sHWcwHg2UzHYzjxxj4v51Lk3JEG6gmxFU38r
  • Anytype (finally) released for public beta

    Moved
    40
    14
    21 Votes
    40 Posts
    24k Views
    L
    WanderingMonster packaging assessment: hard but feasible: https://paste.wanderingmonster.dev/?b2fca6eaed2d0b52#GiC3HNTScC2ZvfkLDTy8HPGvRVjMEa4F19xZhiV1dEif
  • Wazuh - The Open Source Security Platform

    13
    18 Votes
    13 Posts
    4k Views
    L
    WanderingMonster packaging report: don't package Wazuh — Cloudron Packaging Assessment Verdict: Don't package. Wrong category, wrong scale, wrong topology. Wazuh is an open-source SIEM/XDR platform — a security infrastructure stack for monitoring fleets of endpoints, not an app a Cloudron operator runs alongside Nextcloud and a wiki. The URL points to the Wazuh GitHub organisation, which contains dozens of repos that together compose the platform. Even the smallest sensible deployment is a multi-node cluster sized in tens of GB of RAM. This belongs on dedicated infrastructure, not on Cloudron. What Wazuh actually is A free, open-source security monitoring platform — log analysis, intrusion detection, file integrity monitoring, vulnerability detection, configuration assessment, and regulatory compliance reporting (PCI-DSS, HIPAA, GDPR, NIST). It originated as a fork of OSSEC and now ships as a four-part stack: Component What it does Repo Wazuh Manager (Server) Receives data from agents, runs detection rules, generates alerts. C + Python daemons (ossec-analysisd, ossec-remoted, wazuh-modulesd, etc.) wazuh/wazuh Wazuh Indexer Search and analytics backend. A fork of OpenSearch, which is itself a fork of Elasticsearch. JVM-based. wazuh/wazuh-indexer Wazuh Dashboard Web UI. A fork of OpenSearch Dashboards, which is itself a fork of Kibana. Node.js. wazuh/wazuh-dashboard Wazuh Agents Lightweight collectors installed on every endpoint you want to monitor (Linux, Windows, macOS, AIX, Solaris, Docker, K8s). wazuh/wazuh The Cloudron operator would only ever package the first three. The agents live on the machines being monitored, which is the whole point. Auto-Detected Axes Axis Score Notes Data 2 The Wazuh Indexer (OpenSearch fork) is the database. There's no Cloudron addon for OpenSearch — it must run inside the container, with its data on /app/data. Indices grow continuously and unboundedly with log volume. Runtime 2 C, Python, Java 11+ (indexer + dashboard's bundled JVM), Node.js. Java is not in cloudron/base:5.0.0 and would need to be installed via apt. Broker 0 None per se, but the manager-to-indexer pipeline acts as one (Filebeat by default). Processes 8+ A non-exhaustive count: ossec-analysisd, ossec-remoted, ossec-monitord, ossec-execd, wazuh-modulesd, wazuh-db, the Wazuh API (Python aiohttp), Filebeat, the OpenSearch JVM, the OpenSearch Dashboards Node process, Nginx in front. Supervisor mandatory and complex. Manual Axes Filesystem writes Wazuh Manager state and rules → /app/data/wazuh/{etc,logs,queue,stats,var} — extensive, every daemon writes constantly. Indexer (OpenSearch) data → /app/data/indexer — this is the elephant. Tens of GB minimum, hundreds with real fleets. Dashboard config and saved objects → /app/data/dashboard. TLS certificates → Wazuh uses internal mTLS between manager, indexer, and dashboard. Generate on first boot, store under /app/data/certs. Authentication Wazuh has its own user system in the Indexer's security plugin (RBAC, internal users, role mapping). LDAP integration exists but is more involved than typical Cloudron ldap addon wiring — the security plugin's config files want OpenSearch-style YAML. SSO via the Cloudron oidc addon is theoretically possible but is days of work, not hours. Memory — the dealbreaker Realistic per-component minimums for a single-node, single-tenant, evaluation-grade deployment: Indexer (OpenSearch JVM): 4 GB heap minimum. 8 GB is the documented production floor. Dashboard (Node + bundled Chromium for reports): 1 GB. Manager + daemons + Filebeat: 2 GB. OS / cache headroom: 1 GB. Floor: 8 GB. Wazuh's own documentation specifies 16 GB / 8 vCPU as the minimum for an all-in-one deployment, scaling rapidly with agent count and EPS (events per second). Set memoryLimit: 16384 and warn loudly. This is not a 256 MB sidecar. Disk Indices grow with retained log volume. A small deployment (10 agents, 30-day retention) is in the tens of GB. A real one is hundreds of GB to terabytes. Every byte sits under /app/data and is therefore included in Cloudron backups — meaning the backup pipeline has to move all of it on every snapshot. This alone makes Cloudron the wrong substrate. Process count — 8+, Supervisor mandatory Boot ordering is delicate: certificates must exist → Indexer must be up and have its security index bootstrapped → Manager can register and start Filebeat → Dashboard can connect. Each of these has a cold-start time measured in minutes; the Cloudron healthcheck must serve 200 from Nginx immediately or the platform will kill the container before the stack is up. Agents — the architectural mismatch Wazuh's value comes from running agents on the machines you want to monitor. Those agents connect inbound to the Manager on TCP/UDP 1514 (encrypted) and 1515 (enrolment). Cloudron only routes HTTP(S) on the app's domain through its outer Nginx. There is no first-class way to expose arbitrary TCP ports per app — any agents would have to connect over the host's IP directly, bypassing Cloudron's routing model. This is the structural reason Wazuh doesn't fit Cloudron, independent of memory or process count. A SIEM that can't accept agent connections is a dashboard for an empty database. Why this isn't a Cloudron app Cloudron is a personal-server PaaS. Its sweet spot is Nextcloud, a wiki, a blog, a chat server — single-tenant web apps with modest footprints. Wazuh is enterprise security infrastructure. The two have approximately nothing in common operationally. Resource floor exceeds typical Cloudron host capacity. A real Wazuh deployment alone would dwarf the rest of an entire Cloudron server's apps combined. Multi-port ingest doesn't fit the platform model. Even if you crammed the three server components into one container, the agents have nowhere to connect. Backup pipeline mismatch. Cloudron backups assume gigabytes, not terabytes; OpenSearch indices want their own snapshot lifecycle (snapshot-to-S3, ILM policies), not filesystem rsync. Upstream ships its own deployment tooling. Wazuh's installation methods are an all-in-one bash script, distribution packages (rpm/deb), an official Docker Compose stack, Ansible roles, Puppet, and Kubernetes manifests. None of this is shaped like a Cloudron package, and there is no upstream interest in making it so. It's a fork-of-a-fork. Wazuh Indexer is a fork of OpenSearch, which is a fork of Elasticsearch. Wazuh Dashboard is a fork of OpenSearch Dashboards, which is a fork of Kibana. Tracking upstream security patches across that lineage is an ongoing maintenance burden that doesn't make sense for a single packager. Recommendation Don't package this. If you want SIEM/log monitoring on a Cloudron-class machine, the realistic options are: Run Wazuh on its own host using the official wazuh-docker Compose stack on a dedicated VM (4–8 vCPU, 16 GB RAM minimum), and let it monitor your Cloudron box as one of its endpoints by installing the Wazuh agent on the Cloudron host. This is the deployment shape Wazuh was designed for. Use a lighter alternative if your needs are modest. CrowdSec is closer to Cloudron-scale (small Go agent, optional local API, modest RAM) and there's existing community interest in packaging it. Graylog, Loki + Grafana, or even plain journald + rsyslog forwarding cover the "I want to see my logs in one place" use case at a fraction of the footprint. For endpoint hardening on the Cloudron host itself, install a Wazuh agent on the host OS pointing at an external Wazuh manager. The agent is lightweight (~50 MB RAM) and runs fine alongside Cloudron without needing to be a Cloudron app. If you're absolutely set on running Wazuh "near" Cloudron, the right shape is a separate VM on the same hypervisor or LAN — not a Cloudron app. Reference Packaging conventions and templates: forgejo.wanderingmonster.dev/WanderingMonster/cloudron-packaging.
  • Sabre/dav - CalDAV and CardDAV server, alternative to Radicale.

    32
    8 Votes
    32 Posts
    10k Views
    L
    WanderingMonster packaging assessment: not packageable https://paste.wanderingmonster.dev/?0530355d90ca5d6a#HGp7ygEK9Rw6mzCSy4DUGngvob7iHU79kL3Y6TryKEPd
  • 7 Votes
    3 Posts
    251 Views
    L
    WanderingMonster packaging assessment: Easy! https://paste.wanderingmonster.dev/?2180611792d396fd#BeCwtxUcEPECSe4gtMpJGNYgf3m132CkyMM7ucoywPZD
  • Wikibase - collaborative knowledge bases

    2
    1 Votes
    2 Posts
    53 Views
    L
    WanderingMonster packaging assessment: hard, bordering on wrong shape: https://paste.wanderingmonster.dev/?a87cb0fa708f8166#GdGPqs6XtgG5PNdpk4VKgAmkvjP164znsrJMVE4kXAnZ
  • Stirling Image: Stirling-PDF, but for images

    4
    10 Votes
    4 Posts
    131 Views
    L
    WanderingMonster packaging assessment: Easy to Moderate https://paste.wanderingmonster.dev/?e3d78d69bf08ef54#Bqt8B1yRUVkyon2VbuHpUEJpnnnCJBAUKBHzKRWtVXYo
  • AI DevOps + OpenCode - Alternative to _Claw bots

    4
    3 Votes
    4 Posts
    280 Views
    L
    WanderingMonster packaging report: don't package, install on desktop. What do you think, @marcusquinn ? https://paste.wanderingmonster.dev/?d0b1d50d0100d81b#ACdfPyaJEGja24wUWZ1sHrK8h59jyYhz3eEQHN3SJ4ke
  • 2 Votes
    2 Posts
    34 Views
    L
    WanderingMonster packaging report is that this would be hard but feasible: https://paste.wanderingmonster.dev/?ebe00188d1149a6d#GSN4LJzodW7ptL9toLBhkTHGj3YJWriFj5FsEu5vFbRw
  • 5 Votes
    3 Posts
    104 Views
    L
    This is a great proposal! We need it, other downloaders are flaky, and it would be about the easiest application to package on Cloudron. A report on how to package it is here: https://paste.wanderingmonster.dev/?06af18bc0e10b387#7JTZKMbxhiE4KuGNXYppA9t3NC6HoZos5sXUhzd1Kt2U
  • Foundry Virtual Tabletop

    80
    7 Votes
    80 Posts
    38k Views
    BrutalBirdieB
    Updated the app to version 14.359 version 14.359 is still very fresh. If you use a lot of community modules they will probably break. So only update to version 14.359 if you made sure your community modules are working for the new version. You can now use the CloudronVersions.json to install the FoundryVTT Community App. If you have installed the app in the old style, you won't get automatic updates and need to update the old style way. pull the GitHub repo: git pull git@github.com:BrutalBirdie/cloudron-foundryvtt.git && cd cloudron-foundryvtt cloudron update --app $YOUR_APP_LOCATION --image brutalbirdie/foundryvtt.cloudron.app:2.0.1 The easy way to "migrate" from the old installation style to the new community app style would be: update manually to the latest version create a backup download the backup config uninstall the app install the app from the app store with the CloudronVersions.json restore your backup Now you should get automatic app updates when I release a new version.
  • ERPNext - cost-effective ERP solution

    123
    50 Votes
    123 Posts
    121k Views
    humptyH
    Chatgpt recommended ERPNext when I asked for an app to manage a mini-mart's inventory and to be used with a POS/scanner. If so, +1 from me!
  • Zulip - Powerful open source group chat

    97
    54 Votes
    97 Posts
    45k Views
    D
    Zulip update: https://chat.zulip.org/#narrow/channel/31-production-help/topic/zulip.20for.20cloudron/near/2425677 (and following messages)