Showing 9 open source projects for "design"

View related business solutions
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 8 Monitoring Tools in One APM. Install in 5 Minutes. Icon
    8 Monitoring Tools in One APM. Install in 5 Minutes.

    Errors, performance, logs, uptime, hosts, anomalies, dashboards, and check-ins. One interface.

    AppSignal works out of the box for Ruby, Elixir, Node.js, Python, and more. 30-day free trial, no credit card required.
    Start Free
  • 1
    go-doudou

    go-doudou

    A lightweight microservice framework

    ...Built-in service governance support including remote configuration management, client-side load balancer, rate limiter, circuit breaker, bulkhead, timeout, retry and more. Supporting both monolith and microservice architectures gives you flexibility to design your system. Go-doudou (doudou pronounce /dəudəu/) is OpenAPI 3.0 (for REST) spec and Protobuf v3 (for grpc) based lightweight microservice framework. It supports monolith service application as well.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    Komari

    Komari

    A simple server monitor tool

    Komari is a lightweight, self-hosted server monitoring solution designed to deliver simple and efficient infrastructure visibility with minimal resource overhead. The platform uses a lightweight agent to collect performance data from monitored nodes and presents the results through a clean web interface. Its architecture emphasizes ease of deployment and full data ownership, making it attractive for users who prefer private monitoring environments over managed services. Komari is designed to...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Kilo

    Kilo

    Kilo is a multi-cloud network overlay built on WireGuard

    ...The Pod network created by Kilo is always fully connected, even when the nodes are in different networks or behind NAT. By allowing pools of nodes in different locations to communicate securely, Kilo enables the operation of multi-cloud clusters. Kilo's design allows clients to VPN to a cluster in order to securely access services running on the cluster.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    KUBEE ROUTER

    KUBEE ROUTER

    Kube-router, a turnkey solution for Kubernetes networking

    ...Kube-router provides a cohesive yet lean and powerful alternative to several network components you would use. All this from a single DaemonSet/Binary. It doesn't get any easier. Providing high performance is at the core of all the design choices made in Kube-router. Be it the use of IPVS/LVS for service proxy or the use of direct routing across the nodes for pod networking etc. Kube-router is also a purpose-built solution for Kubernetes so no additional overhead to support other orchestration platforms and natively integrates with out-of-box functionality provided by Kubernetes and CNI plug-ins for IPAM, pod networking, etc.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    endlessh-go

    endlessh-go

    A golang implementation of endlessh exporting Prometheus metrics

    Endlessh is a great idea that not only blocks the brute force SSH attacks, but also wastes attackers time as a kind of counter-attack. Besides trapping the attackers, I also want to visualize the Geolocations and other statistics of the sources of attacks. Unfortunately the wonderful original C implementation of endlessh only provides text based log, but I do not like the solution that writes extra scripts to parse the log outputs, then exports the results to a dashboard, because it would...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    surge

    surge

    Surge is a p2p filesharing app designed to utilize blockchain

    Surge is a peer-to-peer file-sharing application that leverages blockchain technologies to facilitate anonymous and secure file transfers. It employs end-to-end encryption and a decentralized network to ensure user privacy and data integrity. Surge's design focuses on simplicity and anonymity, making it a suitable choice for users seeking private file-sharing solutions.​
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    HttpRouter

    HttpRouter

    A high performance HTTP request router that scales well

    ...With other routers, like http.ServeMux, a requested URL path could match multiple patterns. Therefore they have some awkward pattern priority rules, like longest match or first registered, first matched. By design of this router, a request can only match exactly one or no route. As a result, there are also no unintended matches, which makes it great for SEO and improves the user experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    lastbackend

    lastbackend

    System for containerized apps management, from build to scaling

    ...It contains a set of technologies like container scheduling, service discovery, overlay network, container runtime, container images runtime, load-balancing and more. All of these technologies are provided out of the box and don't require additional research and setup. Our design principles allow us to create an extendable and powerful system. We separated runtime into the particular package and used interfaces to add the ability to extend supported technologies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    COW

    COW

    HTTP proxy to automatically identify blocked sites

    HTTP proxy written in Go. COW can automatically identify blocked sites and use parent proxies to access. COW's design goal is automation. Ideally, users don't need to care about which websites are inaccessible, and they can directly connect to the website without slowing down the access speed due to the use of secondary agents. As an HTTP proxy, it can be provided to mobile devices; if deployed on a domestic server, it can be used as an APN proxy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB