Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • How to use Playwright in n8n?

    N8N
    2
    0 Votes
    2 Posts
    15 Views
    jamesJ
    Hello @odie The best way to install community nodes for N8N is with the UI. In your case you want to install https://www.npmjs.com/package/n8n-nodes-playwright I assume In your N8N UI go to Settings > Community nodes click Install a community node and paste n8n-nodes-playwright and it will install the community node. But while testing this I noticed that the Cloudron N8N app does not have chromium installed, so the playwright nodes can't be used at the moment. [image: 1774520767419-047edef9-dd59-4051-bef3-b007ff3dc8b9-image-resized.jpeg] So we might have to add chromium to the N8N app.
  • Constant LDAP/OCID errors in Outlook – Timeout or Server Issue?

    Unsolved Support
    2
    0 Votes
    2 Posts
    10 Views
    nebulonN
    To narrow down the issue a bit, can you create a mailbox on Server A which uses a local account to authenticate and then setup Outlook for that mailbox? If this suffers the same issue, then it is not related to the LDAP binding between those two Cloudrons.
  • Cannot add group images: Error 403 Forbidden

    GitLab
    2
    0 Votes
    2 Posts
    13 Views
    nebulonN
    I was able to reproduce this and a fix is being tested now. Also the user profile avatar upload suffered from the same problem.
  • Workflow timeout after 300s?

    N8N
    1
    0 Votes
    1 Posts
    6 Views
    No one has replied
  • MiroTalk Update regularly fails after update

    Moved MiroTalk port bindings
    13
    1 Votes
    13 Posts
    560 Views
    MiroTalkM
    @djxx said: Restarting the app doesn't fix it anymore, so now when it crashes I change the SFU TCP/UDP port range to something else and it works when the app restarts. This issue can occur if another application is already using ports within the 40000–40100 range. To resolve it, you can either change the port range (for example, starting from 25000) [image: 1774513002629-port-conflicts-resized.png] or enable WebRTC server mode in the env (edit it via Cloudron file manager), which requires fewer ports, as described above. SFU_SERVER=true Then restart the instance.
  • Securing cloudron against ddos attacks?

    Discuss security
    19
    2 Votes
    19 Posts
    5k Views
    I
    @LoudLemur said: @IniBudi I am not sure, but according to Grok: "you've got a classic volumetric DDoS (the kind that floods bandwidth with junk traffic like UDP floods or SYN floods) that chewed through 1TB and knocked your server offline. Cloudflare free + Hetzner/Netcup anti-DDoS is a solid starter setup, but it's getting bypassed or overwhelmed because:Most attacks hit your VPS's real IP directly (bypassing Cloudflare unless everything is perfectly proxied). Hetzner's protection (Arbor/Juniper-based) is automated but often slow to kick in or just null-routes your IP (blackholes the whole server to protect their network). Netcup's 2 Tbps filter is better but still leaks big attacks or causes brief downtime. Cloudflare free is unmetered and excellent for web traffic routed through it (absorbs massive attacks at the edge), but it only helps if traffic never reaches your VPS. The 1TB bandwidth bill/spike proves the attack was hitting your origin directly.Immediate Effective Fixes (Do These Right Now — Mostly Free)Force everything through Cloudflare In Cloudflare DNS, make ALL records Proxied (orange cloud icon). No A/AAAA records pointing directly to your VPS IP. This routes attacks to Cloudflare's global network first. Lock your VPS firewall to Cloudflare IPs only (this is the #1 game-changer) Block everything except Cloudflare's published IP ranges. This stops 99% of direct IP attacks. Hetzner: Use their Cloud Firewall (or iptables). Netcup: Same with ufw/iptables. Cloudflare publishes the list here: cloudflare.com/ips (update it automatically via their API — there's a simple cron script for this). Result: Attack traffic dies at Cloudflare; your VPS barely sees clean traffic. Activate Cloudflare's emergency mode Turn on "I'm Under Attack" mode (Security → Overview). Enable Bot Fight Mode + managed WAF rules + rate limiting (free tier has these). Set Security Level to "High" or "I'm Under Attack". This challenges suspicious traffic with JS/captchas before it even reaches your server. Extra quick wins Use Cloudflare Tunnel (cloudflared) if possible — runs on your VPS and proxies traffic without exposing any ports publicly. Zero public IP exposure. On the server: iptables rate limiting + fail2ban for extra layers. Contact your VPS support immediately — they can sometimes manually tune mitigation. These steps alone usually stop the bandwidth massacre because Cloudflare absorbs the junk at their edge (they've mitigated 11+ Tbps attacks).The Strongest Solutions (Ranked by Effectiveness vs Cost)Here's what actually survives big attacks in 2026:Best affordable strong solution: Switch VPS to OVHcloud + keep Cloudflare free/Pro OVH has the strongest built-in, always-on DDoS protection in the budget VPS world (unlimited, multi-Tbps scrubbing centers, rarely null-routes, works great for L3/L4 volumetric). Users consistently report it handles attacks that destroy Hetzner/Netcup. Pair it with Cloudflare for L7 (web) protection and you're basically bulletproof for most attacks. Migration is straightforward (snapshot your server, spin up OVH VPS, point DNS). This is the combo I recommend for 90% of people in your spot. Specialized DDoS-protected hosting DDoS-Guard (or similar like PATH.net / Evolution Host): Purpose-built for heavy volumetric attacks. Offers protected VPS or proxy services with fixed pricing and excellent filtering. Great if you want to stay cheap but stronger than Hetzner/Netcup. BuyVM: Super cheap add-on protection (handles 700M+ pps). Upgrade Cloudflare only (if you love your current VPS) Go Pro ($20/mo) for advanced WAF, better rate limiting, and more rules. Still use the firewall lockdown above. For non-HTTP/UDP (games, APIs, etc.), you'll eventually need Cloudflare Spectrum (paid) or a dedicated L4 protector. Enterprise-level (if budget allows and attacks are constant) Cloudflare Magic Transit (BGP routing) + your VPS, or Akamai/Imperva. These are what big sites use — full network scrubbing. Quick Reality CheckIf your server is a website/API (HTTP/HTTPS), the Cloudflare + firewall lockdown + OVH combo will solve 95% of cases for very low cost. If it's a game server, UDP-heavy service, or Minecraft/etc., prioritize a host with native L4 protection (OVH or specialized like TCPShield) — Cloudflare free alone won't proxy those ports easily.The core principle for any strong solution: You need high-capacity upstream scrubbing so the 1TB flood never reaches your VPS bandwidth/CPU.Do the immediate firewall + proxy steps first — that often fixes it instantly without spending anything. If you tell me exactly what your server runs (website? game? API? ports?), attack type (from CF analytics), or your budget, I can give exact config commands/scripts or migration steps. " I already created inbound traffic firewall only accept Cloudflare IPs. Unfortunately, my server is still down. I don't know why the attacker is targeting my website, the content only talks about Digital Marketing, SEO, etc. Hmm, I am still searching alternative solution because I just use Cloudflare Free and cheap VPS. Thank you for sharing @loudlemur
  • Looking for an App?

    Community Apps
    41
    4 Votes
    41 Posts
    2k Views
    scookeS
    I just want to say that this community fed, driven, produced work is wonderful. AND, I will always keep paying for my Cloudron! The people and the(ir) tech behind Cloudron has made this wonder possible. Thank you.
  • Grafana - Package Updates

    Pinned Grafana
    151
    1 Votes
    151 Posts
    125k Views
    Package UpdatesP
    [2.4.2] Update grafana to 12.4.2 Full Changelog Analytics tab: Improve voice over accessibility (Enterprise) Dashboards a11y: Do not open time zonemenu on focus #​120388, @​idastambuk Dashboards: Resolve display names by identity in version history #​120273, @​ivanortegaalba Plugins: Forward AWS SDK credential chain env vars to external AWS plugins #​120209, @​kevinwcyu Public Dashboards: Prevent unintended CRUD operations from different orgs #​120457, @​mmandrus IAM: Handle NULL team_member.external column to fix dashboard loading #​120179, @​difro Plugins: Fix installer IsDisabled condition #​120568, @​andresmgot Plugins: Forward PLUGIN_UNIX_SOCKET_DIR to plugin processes to fix tmp dir in restricted environments #​120275, @​HarshadaGawas05 Security: Fixes CVE-2026-27876 Security: Fixes CVE-2026-27877
  • Chatwoot - Package Updates

    Pinned Chatwoot
    96
    2 Votes
    96 Posts
    46k Views
    Package UpdatesP
    [1.50.1] Update chatwoot to 4.12.1 Full Changelog Fixed an issue where AI Assist returned a 404 error in the Community Edition. Fixed a regression introduced in v4.8.0 where webhook payloads for message_created and message_updated were sending channel-rendered HTML instead of the original raw message content.
  • OpenWebUI - Package Updates

    Pinned OpenWebUI
    198
    1 Votes
    198 Posts
    94k Views
    Package UpdatesP
    [3.2.10] Update open-webui to 0.8.11 Full Changelog Responses API streaming improvements. The OpenAI proxy now properly handles tool call streaming and re-invocations in the Responses API, preventing duplicate tool calls and preserving output during model re-invocations. Commit, Commit, Commit, Commit Responses API stateful sessions. Administrators can now enable experimental stateful session support via the ENABLE_RESPONSES_API_STATEFUL environment variable, allowing compatible backends to store responses server-side with previous_response_id anchoring for improved multi-turn conversations. Commit File viewing pagination. The view_file and view_knowledge_file tools now support pagination with offset and max_chars parameters, allowing models to read large files in chunks. Commit Knowledge search scoping. The search_knowledge_files tool now respects model-attached knowledge, searching only within attached knowledge bases and files when available. Commit Tool HTML embed context. Tools can now return custom context alongside HTML embeds by using a tuple format, providing the LLM with actionable information instead of a generic message. #​22691 Trusted role header configuration. Administrators can now configure the WEBUI_AUTH_TRUSTED_ROLE_HEADER environment variable to set user roles (admin, user, or pending) via a trusted header from their identity provider or reverse proxy. #​22523 OIDC authorization parameter injection. Administrators can now inject extra parameters into the OIDC authorization redirect URL via the OAUTH_AUTHORIZE_PARAMS environment variable, enabling IdP pre-selection for brokers like CILogon and Keycloak. #​22863, Commit Google OAuth session persistence. Administrators can now configure Google OAuth to issue refresh tokens via the GOOGLE_OAUTH_AUTHORIZE_PARAMS environment variable, preventing OAuth sessions from expiring after one hour and ensuring tools and integrations that rely on OAuth tokens remain functional. #​22652 Embed prompt confirmation. Interactive tool embeds can now submit prompts to the chat without requiring same-origin access, showing a confirmation dialog for cross-origin requests to prevent abuse. #​22908 Tool binary response handling. Tool servers can now return binary data such as images, which are properly processed and displayed in chat for both multimodal and non-multimodal models. Commit, Commit
  • Metabase - Package Updates

    Pinned Metabase
    529
    1 Votes
    529 Posts
    423k Views
    Package UpdatesP
    [3.3.1] Update metabase to 0.59.4.2 Full Changelog
  • Linkwarden - Package Updates

    Pinned Linkwarden
    57
    2 Votes
    57 Posts
    13k Views
    Package UpdatesP
    [1.21.0] Update linkwarden to 2.14.0 Full Changelog Improved team collaboration Improved tag browsing with pagination Faster interface with optimistic rendering Platform upgrades: Next.js 15 and Expo 54 Improved user experience Security improvements for submitted links
  • MiroTalk - Package Updates

    Pinned MiroTalk
    594
    2 Votes
    594 Posts
    418k Views
    Package UpdatesP
    [2.6.20] Update mirotalksfu to 2.1.63
  • Why ExtraHosts in Docker pushed as `172.18.0.1`?

    Unsolved Support
    2
    0 Votes
    2 Posts
    14 Views
    potemkin_aiP
    or, could you just make it optional? In my specific case I just commented out the string to let the apps running.
  • 2 Votes
    1 Posts
    15 Views
    No one has replied
  • 1 Votes
    2 Posts
    17 Views
    nebulonN
    Good catch, this was an oversight. Fixed with https://git.cloudron.io/platform/box/-/commit/7d594ab0d37bf6c91a4b7971a59a452027cdf9b6
  • Error while trying to restore a backup

    Solved Support
    10
    0 Votes
    10 Posts
    32 Views
    nebulonN
    ah good glad you found the issue in the end
  • Important Security Patch: 2.13.3 and 1.123.27

    N8N
    3
    0 Votes
    3 Posts
    37 Views
    U
    Glad to hear it! Thanks @nebulon.
  • n8n - Package Updates

    Pinned N8N
    421
    0 Votes
    421 Posts
    406k Views
    Package UpdatesP
    [4.15.1] Update n8n to 2.13.3 Full Changelog
  • InvoiceShelf

    App Wishlist
    7
    1
    8 Votes
    7 Posts
    1k Views
    J
    I am tired of InvoiceNinja's limitations - no true multi-domain support for multiple companies (10) that it allows. I had always want to try out building a cloudron package, so I will try to build one for InvoiceShelf. Looks very doable. The structure is: 4 files: CloudronManifest.json, Dockerfile, start.sh, logo.png Base image (cloudron/base:5.0.0) already has PHP 8.4, Node 22, Composer, Apache, Supervisor — no installing dependencies Cloudron provides MySQL, Redis, email, cron, TLS, backups as addons - just need to declare them in the manifest Reference package: Akaunting on git.cloudron.io is an identical pattern (Laravel invoicing app) Dev workflow: cloudron install → cloudron logs -f → cloudron update