curl -sL https://raw.githubusercontent.com/simplecontainer/smr/refs/heads/main/scripts/production/smrmgr.sh -o smrmgr
chmod +x smrmgr
sudo mv smrmgr /usr/local/bin
sudo smrmgr install
smrmgr start
Setting up orchestrator on top of docker nodes in seconds with simplecontainer. Control and orchestrate docker daemons like a professional.
Simplecontainer is a container orchestration platform that transforms Docker daemons into managed nodes with GitOps capabilities. It provides enterprise-grade features like overlay networking, secrets management, and multi-node clustering while maintaining the simplicity of Docker management.
- GitOps Deployment: Deploy containers using Git repositories as the source of truth
- Bidirectional GitOps Controller: Gitops controller enables interface for applying patches to the git
- Overlay Networking: Secure container communication using Flannel with WireGuard encryption
- Multi-Node Clustering: Scale across multiple Docker daemons with RAFT consensus
- Dependency Management: Reliable container startup ordering with readiness probes
- Secrets & Configuration: Built-in secret and configuration management
- mTLS Security: Encrypted control plane communication
- Real-time Dashboard: Web UI for monitoring and management
- Docker installed and running (Installation Guide)
- For WireGuard networking: WireGuard package (Installation Guide)
- Download and install tooling(smrmgr.sh, smr, and smrctl):
curl -sL https://raw.githubusercontent.com/simplecontainer/smr/refs/heads/main/scripts/production/smrmgr.sh -o smrmgr
chmod +x smrmgr
sudo mv smrmgr /usr/local/bin
sudo smrmgr install
- Start a single node with default configuration:
smrmgr start
- Configure the CLI client:
smrctl context import $(smr agent export) -y
smrctl ps
After starting node, dashboard can be started on the local machine.
Dashboard comes as container package (Pack) that makes running it easy. You can use the already available Dashboard pack to install it and run it directly on the Simplecontainer node.
Add these to /etc/hosts file:
127.0.0.1 authentik.dashboard.localhost
127.0.0.1 proxy.dashboard.localhost
127.0.0.1 api.dashboard.localhost
127.0.0.1 dashboard.localhost
After that run:
git clone https://github.com/simplecontainer/dashboard-pack.git
mkcert dashboard.localhost proxy.dashboard.localhost api.dashboard.localhost authentik.dashboard.localhost
smrctl apply dashboard-pack --set user=$USER --set traefik.certificate="$(cat dashboard.localhost+3.pem)" --set traefik.key="$(cat dashboard.localhost+3-key.pem)"
That's it. This pack runs:
-
Authentik
-
Postgres
-
Traefik
-
Dashboard
-
Proxy-manager
-
Just access https://dashboard.locahost and you should see the login form.
Important
After applying dashboard pack, success of the deployment can be verified:
smrctl ps
NODE RESOURCE IMAGE PORTS ENGINE STATE SMR STATE
smr-development-node-1 containers/authentik/authentik-authentik-worker-1 ghcr.io/goauthentik/server:latest (pulled) - running (docker) running (1s)
smr-development-node-1 containers/authentik/authentik-authentik-1 ghcr.io/goauthentik/server:latest (pulled) 9000 running (docker) running (1s)
smr-development-node-1 containers/authentik/authentik-pg-1 postgres:15 (pulled) - running (docker) running (1s)
smr-development-node-1 containers/authentik/authentik-redis-1 redis:alpine (pulled) - running (docker) running (1s)
smr-development-node-1 containers/dashboard/dashboard-dashboard-oss-1 quay.io/simplecontainer/dashboard-oss:latest (pulled) 3000 running (docker) running (1s)
smr-development-node-1 containers/dashboard/dashboard-proxy-manager-oss-1 quay.io/simplecontainer/proxy-manager-oss:latest (pulled) 5443, 5480 running (docker) running (1s)
smr-development-node-1 containers/traefik/traefik-traefik-1 traefik:v3.5.0 (pulled) 80:80, 443:443, 8080 running (docker) running (1s)
Deploy a basic container definition on Docker using simplecontainer:
smrctl apply https://raw.githubusercontent.com/simplecontainer/examples/refs/heads/main/tests/minimal/definitions/Containers.yaml
smrctl ps
Expected output:
NODE RESOURCE PORTS DEPS ENGINE STATE SMR STATE
simplecontainer-node-1 containers/example/example-busybox-1 - - running (docker) running (9s)
Simplecontainer supports three deployment modes:
- Single Node: Standalone Docker daemon management
- Multiple Isolated Nodes: Independent Simplecontainer instances
- Clustered Nodes: Distributed container orchestration
- Control Plane: REST API for container management (port 1443)
- RAFT Consensus: Distributed state management (port 9212)
- Embedded etcd: Local key-value store (port 2379, localhost only)
- Flannel Networking: Overlay network with WireGuard encryption
- DNS Server: Isolated DNS resolution for containers
smrmgr start
Replace smr.example.com
with your domain:
smrmgr start -d smr.example.com
smr agent export --api smr.example.com:1443
From external machines:
smrctl context import PASTE_EXPORTED_CONTEXT_HERE
smrctl ps
smrmgr start -n simplecontainer-1 -d smr-1.example.com
smr agent export --api smr-1.example.com:1443
smr agent import --node simplecontainer-2 -y PASTE_EXPORTED_OUTPUT
smrmgr start -n simplecontainer-2 -d smr-2.example.com -j -p smr-1.example.com
Simplecontainer uses YAML definitions to manage containers and related resources:
- Containers: Define container specifications
- Configuration: Application configuration management
- Secrets: Secure credential storage
- Resources: Shared resources between containers
- GitOps: Git-based deployment automation
- CertKey: TLS certificate management
- HttpAuth: HTTP authentication configuration
- Create GitOps definition:
smrctl apply https://raw.githubusercontent.com/simplecontainer/examples/refs/heads/main/tests/gitops-apps/definitions/gitops-plain.yaml
- Check GitOps status:
smrctl ps gitops
- Trigger synchronization:
smrctl sync gitops/examples/plain-manual
- Verify deployment:
smrctl ps
For immediate deployment without GitOps:
git clone https://github.com/simplecontainer/examples
smrctl apply examples/tests/dependency-readiness-simple
This example demonstrates:
- Secret management
- Configuration handling
- Resource sharing
- Container dependencies
- Readiness checks
Containers can depend on other containers being ready:
spec:
dependencies:
- mysql.* # Wait for all mysql containers to be ready
Ensure containers are ready before marking them as available:
spec:
readiness:
- name: "mysql"
timeout: "60s"
command: ["mysqladmin", "ping", "-h", "localhost", "-p(( .password ))"]
Use secrets and configuration in container definitions:
spec:
configuration:
username: "root"
password: (( lookup "secret/mysql/password:password" | base64decode ))
- 1443: Control plane API (TCP)
- 9212: RAFT protocol communication (TCP)
- 2379: Embedded etcd (localhost only)
# List all containers
smrctl ps
# List specific resource types
smrctl ps gitops | smrctl gitops
smrctl ps secrets | smrctl containers
# Get detailed information
smrctl get containers/example/busybox-1
# Apply definitions
smrctl apply <file_or_url>
# Sync GitOps resources
smrctl sync gitops/example/app
# Import/export contexts
smrctl context import <context_string>
smrctl context export
# Start node
smrmgr start [options]
# Install tools
smrmgr install
# Export agent context
smr agent export --api <endpoint>
# Import agent context
smr agent import --node <name> -y <context>
- WireGuard not installed: Install WireGuard package for secure networking
- Port conflicts: Ensure ports 1443, 9212, and 2379 are available
- Docker socket access: Simplecontainer needs access to
/var/run/docker.sock
- Firewall: Open required ports for cluster communication
# View container logs
smr node logs OR docker logs <simplecontainer_container_id>
# Verify cluster connectivity
smrctl ps
- Managed infrastructure: app.simplecontainer.io
- Dashboard: github.com/simplecontainer/dashboard
- Documentation: docs.simplecontainer.io
- Blog: blog.simplecontainer.io
- Container Registry: quay.io/repository/simplecontainer/smr
- Source Code: github.com/simplecontainer/smr
- Dashboard: github.com/simplecontainer/smr
- Examples: github.com/simplecontainer/examples
We welcome contributions! Please see our contributing guidelines and code of conduct.
This project is licensed under the GNU General Public License v3.0. See the LICENSE file for details.