5.5 KiB
Using the Web UI
The DockFlare Web UI is a powerful tool for managing, monitoring, and configuring your services. It provides a user-friendly interface for tasks that go beyond simple Docker label configuration.
The Dashboard (Main Page)
The first page you see after logging in is the main dashboard. This is your central hub for viewing the state of all your managed services.
- Managed Ingress Rules Table: This table lists every ingress rule that DockFlare is managing, whether it comes from a Docker container or was created manually.
- Hostname: The public hostname of the service.
- Service: The internal destination URL.
- Source: Indicates if the rule is from
Dockeror was createdManuallyin the UI. - Status: Shows if the rule is
active,pending_deletion, or has aUI Override. - Access: Displays the applied Access Group and mode badge. Expect to see
PublicorAuthenticatedlabels, cascaded group names, and quick links to the Cloudflare dashboard when reusable policies sync. - Manage Rule: This button allows you to edit any rule.
- Real-time Logs: Below the table, you'll find a real-time log viewer that streams logs from the DockFlare backend, which is invaluable for debugging.
Managing Rules
The UI gives you full control over your ingress rules.
- Add Manual Rule: The "Add Manual Rule" button lets you create ingress rules for services that are not running in Docker (e.g., a service on another machine in your LAN). The form allows you to specify the hostname, service URL, and optionally apply an Access Group.
- Edit any Rule: The "Manage Rule" button next to every rule opens a modal where you can change its configuration. This is how you can apply a UI override to a rule that was originally created from Docker labels.
- Revert to Labels: If a rule from Docker has a UI override, a "Revert to Labels" button will appear, allowing you to discard your manual changes and let the rule be controlled by its Docker labels again.
Access Policies Page
This page is the central location for managing your reusable Access Groups and securing your DNS zones with wildcard policies.
Advanced Access Policies
From the Access Groups section, you can:
- Create new Access Groups using the two-tab modal (Authenticated vs Public). Guidance banners update per tab so you understand when DockFlare will emit a Cloudflare
alloworbypassdecision. - Edit existing Access Groups. The modal enforces mode-specific validation (emails required for Authenticated) and keeps Geo/IP settings visible for both modes.
- Delete Access Groups that are no longer in use (system policies like
public-default-bypasscannot be deleted). - Sync from Cloudflare to import existing DockFlare reusable policies from your account.
- Use the action menu beside each entry to open the matching policy directly in the Cloudflare dashboard via the Cloudflare icon shortcut.
Note: The public-default-bypass system policy is automatically created and managed by DockFlare. All services using "Bypass" access reference this single policy, keeping your Cloudflare dashboard clean.
Zone Default Policies (*.tld Wildcards)
The second section shows Zone Default Policies - a security best practice feature that protects all subdomains:
- Protection Status: Visual badges show which DNS zones have wildcard
*.domain.compolicies (Protected 🛡️) and which don't (Not Protected ⚠️). - Create Zone Policy: Click "Create Policy" on any unprotected zone to create a wildcard Access Application.
- Select Policy: Choose which Access Group should protect all subdomains of the zone (can be public bypass, authentication, or any custom policy).
- Security Safety Net: Even if you forget to add a policy to a specific service, the zone-level wildcard policy will catch it.
Best Practice: Create zone default policies for all your domains. For public-facing domains, use the default bypass policy. For internal/private domains, use an authentication policy. This ensures no subdomain is accidentally exposed.
For more details, see the Access Policy Best Practices & Examples guide.
Settings Page
The Settings page contains various administrative and configuration options:
- Cloudflare Tunnels: This section lists all the Cloudflare Tunnels found on your account, their status, and their connected
cloudflaredagents. You can also view all CNAME DNS records pointing to any of your tunnels. - Backup & Restore: Download a full DockFlare backup archive (
.zip) containing encrypted config, agent keys, and state, or upload a previously exported archive to restore the instance. - Security:
- Change Password: Change your password for the Web UI.
- Disable Password Login: For advanced use cases where you place DockFlare behind another authentication proxy. ⚠️ Warning: This creates a security risk due to Docker network exposure - any container on the same Docker network can bypass external authentication and access DockFlare's API directly. We strongly recommend using OAuth/OIDC providers instead for single sign-on convenience without sacrificing security. See Accessing the Web UI for full security implications.
- Cloudflare Credentials: Allows you to update your Cloudflare Account ID and API Token after the initial setup.
- Core Configuration: Lets you change settings like the Tunnel Name and Rule Grace Period.