Chris Wiegman

Running Nextcloud With Docker and Traefik 2

How to replace Google Drive, Calendar, Contacts, Tasks, Keep and more with Nextcloud, Traefik 2 and Docker.

I’ve been writing on general Traefik 2 usage for self-hosting for a couple of months now but, to date, I haven’t gone deep into any of the services I’ve been using it for myself. The first I want to cover has been the most import for me in my quest to leave big-tech behind, Nextcloud. Today I use it as a replacement for Google Drive and Calendar, Contacts, Keep and Tasks. Believe it or not, that’s just scratching the surface of what it is capable of too. The catch is, there isn’t much out there on getting it running right, particularly behind a proxy like Traefik 2.

This tutorial will get you a Nextcloud instance running behind Traefik 2 with auto-updates and a clean security overview.

Before you start

Before you start, make sure you have a domain for your Nextcloud instance and that it is pointing to your server. On your server, make sure you have Docker and Docker-compose available and that web ports (80 and 443) are available to the internet.

Setting up Traefik 2

Believe it or not, we can do this whole thing with a single docker-compose file. For a more complete explanation on the Traefik code below, you can visit my tutorials on hosting with Traefik 2, keeping your Docker containers updated and protecting your Docker socket file with Traefik.


version: "3" networks: default: driver: bridge traefik: internal: true services: watchtower: command: --label-enable --cleanup --interval 300 image: containrrr/watchtower labels: - "com.centurylinklabs.watchtower.enable=true" network_mode: none restart: always volumes: - /var/run/docker.sock:/var/run/docker.sock dockerproxy: depends_on: - watchtower environment: CONTAINERS: 1 image: tecnativa/docker-socket-proxy labels: - "com.centurylinklabs.watchtower.enable=true" networks: - traefik ports: - 2375 volumes: - "/var/run/docker.sock:/var/run/docker.sock" traefik: depends_on: - dockerproxy - watchtower image: traefik:2.0 labels: - "com.centurylinklabs.watchtower.enable=true" networks: - default - traefik ports: - 80:80 - 443:443 restart: always volumes: - ./data/conf/traefik/acme.json:/acme.json - ./data/conf/traefik/traefik.toml:/traefik.toml - ./data/volumes/traefik/tmp:/tmp
Code language: YAML (yaml)

The above will setup Traefik with a proxy for Docker’s socket file and Watchtower to make sure it all stays up to date. In the folder where you put your docker-compose file you’ll want to add two files to complete the Docker configuration. Adding them manually will help ensure they’re portable later:

data/conf/traefik/acme.json and data/conf/traefik/traefik.toml

While acme.json should be empty (Traefik will use it to store SSL information) the traefik.toml file should include the following:

[log] level = "ERROR" [providers.docker] exposedByDefault = false endpoint = "tcp://dockerproxy:2375" network = "traefik" [api] dashboard = true debug = true [entryPoints] [entryPoints.web] address = ":80" [entryPoints.web-secure] address = ":443" [entryPoints.dashboard] address = ":8080" [certificatesResolvers] [certificatesResolvers.default.acme] email = "" storage = "acme.json" [certificatesResolvers.default.acme.tlsChallenge]
Code language: TOML, also INI (ini)

If you were to run docker-compose up -D now you would have a running Traefik instance but of course that isn’t all that helpful yet.

Installing MariaDB and Redis

Nextcloud relies on both Redis and MariaDB for storing its data. To get them we’ll add the following to the services section of our docker-compose.yaml file:

mariadb: depends_on: - watchtower env_file: .mariadb.env image: mariadb:10 labels: - "com.centurylinklabs.watchtower.enable=true" networks: - default ports: - 3306:3306 restart: always volumes: - ./data/volumes/mariadb:/var/lib/mysql redis: depends_on: - watchtower image: redis:5 labels: - "com.centurylinklabs.watchtower.enable=true" networks: - default restart: always volumes: - ./data/volumes/redis:/data
Code language: YAML (yaml)

Note the volumes sections in both of the above service configs. These will ensure any data you run in Docker is preserved. If you wanted, you could move the data/volumes folder to another server or simply kill and restart Docker and all your data would be preserved.

Note the MariaDB setup specifies a .env file, .mariadb.env to be specific, in the same directory as your docker-compose file. That should specify your MYSQL_ROOT_PASSWORD. Once setup, log into the database with your favorite database editor and do two things:

  1. Setup a database called nextcloud
  2. Create a user and grant it all privileges to only the Nextcloud database.

By default, MariaDB only gives you an empty server. The above two steps will ensure you have a database to use and that the database is only accessible to its own user. Should you add services later this will help keep your Nextcloud database safe should any other databases ever be compromised.

Adding Nextcloud

Finally, we need to add Nextcloud to our configuration. Doing so is as simple as adding a block to the services section of docker-compose.yaml as you did above:

nextcloud: depends_on: - mariadb - redis - traefik - watchtower image: nextcloud:17 labels: - "traefik.enable=true" - "traefik.http.middlewares.nextcloud-caldav.redirectregex.permanent=true" - "traefik.http.middlewares.nextcloud-caldav.redirectregex.regex=^https://(.*)/.well-known/(card|cal)dav" - "traefik.http.middlewares.nextcloud-caldav.redirectregex.replacement=https://$${1}/remote.php/dav/" - "traefik.http.middlewares.nextcloud-https.redirectscheme.scheme=https" - "traefik.http.routers.nextcloud-http.entrypoints=web" - "traefik.http.routers.nextcloud-http.rule=Host(``)" - "traefik.http.routers.nextcloud-http.middlewares=nextcloud-https@docker" - "traefik.http.routers.nextcloud.entrypoints=web-secure" - "traefik.http.routers.nextcloud.rule=Host(``)" - "traefik.http.routers.nextcloud.middlewares=nextcloud-caldav@docker" - "traefik.http.routers.nextcloud.tls=true" - "traefik.http.routers.nextcloud.tls.certresolver=default" - "com.centurylinklabs.watchtower.enable=true" networks: - default restart: always volumes: - ./data/volumes/nextcloud/html:/var/www/html
Code language: YAML (yaml)

Let’s break this down:

The following section sets up a service named nextcloud and tells it to start MariaDB, Redis, Traefik and Watchtower first.

nextcloud: depends_on: - mariadb - redis - traefik - watchtower
Code language: YAML (yaml)

Next we tell it to use the official image for Nextcloud 17. This is the one thing you’ll have to change if you leave the 17 in place. When new major versions, such as 18, are released you’ll need to manually update the version. You can also replace 17 with latest but that could break your Nextcloud apps if your server updates before apps are available.

image: nextcloud:17
Code language: YAML (yaml)

Labels are the meat and potatoes of our setup. These will ensure routes are available to find caldav and carddav services, redirect all traffic to https, make sure SSL is configured correctly and ensure Watchtower is watching the service for updates.

labels: - "traefik.enable=true" - "traefik.http.middlewares.nextcloud-caldav.redirectregex.permanent=true" - "traefik.http.middlewares.nextcloud-caldav.redirectregex.regex=^https://(.*)/.well-known/(card|cal)dav" - "traefik.http.middlewares.nextcloud-caldav.redirectregex.replacement=https://$${1}/remote.php/dav/" - "traefik.http.middlewares.nextcloud-https.redirectscheme.scheme=https" - "traefik.http.routers.nextcloud-http.entrypoints=web" - "traefik.http.routers.nextcloud-http.rule=Host(``)" - "traefik.http.routers.nextcloud-http.middlewares=nextcloud-https@docker" - "traefik.http.routers.nextcloud.entrypoints=web-secure" - "traefik.http.routers.nextcloud.rule=Host(``)" - "traefik.http.routers.nextcloud.middlewares=nextcloud-caldav@docker" - "traefik.http.routers.nextcloud.tls=true" - "traefik.http.routers.nextcloud.tls.certresolver=default" - "com.centurylinklabs.watchtower.enable=true"
Code language: YAML (yaml)

Next we tell it to only connect to the default (external) network and to always restart the service.

networks: - default restart: always
Code language: YAML (yaml)

Finally, we map our data directory. As with MariaDB and Redis, this will ensure your data is preserved and can easily be moved between containers or even servers.

volumes: - ./data/volumes/nextcloud/html:/var/www/html
Code language: YAML (yaml)

Start your services

That’s it. The above docker-compose-yaml with the supporting Traefik files should be ready to do. Try running docker-compose up -D and go to your Nextcloud domain to finish Nextcloud’s own setup.