Showing 310 open source projects for "configuration"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    Cockpit

    Cockpit

    A sysadmin login session in a web browser

    ...It’s an interactive server admin interface that lets you see and understand the health of your server at a glance; interact directly with the operating system from a real Linux session; and perform system tasks with a mouse all in a web browser. With Cockpit, sysadmins can easily perform tasks such as starting containers, storage administration, network configuration, inspecting logs and more. They can also jump between terminal and the web interface at any time. Lightweight and very easy to use, Cockpit can be installed on many Linux operating systems, including Debian, Fedora and RHEL.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    Pow

    Pow

    Robust, modular, and extendable user authentication system

    Pow is a robust, modular, and extendable authentication and user management solution for Phoenix and Plug-based apps. Pow is built to be modular, and easy to configure. The configuration is passed to function calls as well as plug options, and they will take priority over any environment configuration. It's ideal in case you got an umbrella app with multiple separate user domains. The easiest way to use Pow with Phoenix is to use a :otp_app in function calls and set the app environment configuration. It will keep a persistent fallback configuration that you configure in one place. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Lexik JWT Authentication Bundle

    Lexik JWT Authentication Bundle

    JWT authentication for your Symfony API

    LexikJWTAuthenticationBundle is a Symfony bundle that provides JWT (JSON Web Token) authentication for RESTful APIs. It simplifies the process of generating and validating JWTs for secure user authentication. The bundle integrates seamlessly with Symfony’s security system, allowing developers to implement token-based authentication efficiently while maintaining flexibility in user management.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Traefik Forward Auth

    Traefik Forward Auth

    Forward authentication service. Google/OpenID oauth based login

    ...This is handled automatically when referencing the middleware from another resource in the same namespace (so the namespace does not need to be prepended when referenced). However, the full name, including the namespace, must be used when referenced from static configuration.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 5
    Go Backend Clean Architecture

    Go Backend Clean Architecture

    A Go (Golang) Backend Clean Architecture project with Gin, MongoDB

    ...It organizes code into layers—domain, use cases, interfaces/adapters—so swapping an HTTP framework or database does not ripple through core logic. The template includes well-chosen scaffolding for configuration, logging, dependency injection, error handling, and request validation so teams can focus on business features. It demonstrates practical patterns for repository interfaces, DTOs, and consistent response envelopes that keep APIs predictable. Testing is first-class: ports and adapters are designed for mocking and table-driven tests, which reduces friction when you add features. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    ...You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need. To achieve this we rely heavily on strict defaults, simple configuration, and self-healing components. This allows Kanidm to support small home labs, families, small businesses, and all the way to the largest enterprise needs. If you want to host your own authentication service, then Kanidm is for you.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Guardian

    Guardian

    Elixir Authentication

    Guardian is a token based authentication library for use with Elixir applications. Guardian remains a functional system. It integrates with Plug but can be used outside of it. If you're implementing a TCP/UDP protocol directly or want to utilize your authentication via channels in Phoenix, Guardian can work for you. The core currency of authentication in Guardian is the token. By default JSON Web Tokens are supported out of the box but you can use any token that Has the concept of a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    memconf - memory configuration on UNIX

    Identify sizes of memory modules installed on most UNIX-based systems

    Identify sizes of memory modules installed on a Solaris, Linux, FreeBSD or HP-UX workstation or server. memconf reports the size of each SIMM/DIMM memory module installed in a system. It also reports the system type and any empty memory sockets. In verbose mode, it also reports the following information if available: - banner name, model and CPU/system frequencies - address range and bank numbers for each module
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    Super Grub2 Disk

    Super Grub2 Disk

    Boots into many systems and GRUB2 ones!

    Super GRUB2 Disk helps you to boot into most any Operating System (OS) even if you cannot boot into it by normal means.
    Leader badge
    Downloads: 1,580 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10

    uaxtools

    Linux/Unix Mangement and Audit tools

    Linux configuration management and audit tools.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    Monitoring AIX, VMware,Oracle, Nutanix

    Monitoring AIX, VMware,Oracle, Nutanix

    AIX, Linux, VMware, Nutanix, Oracle, RHV, Cloud performance monitoring

    The tool offers you end-to-end views of your server environment and can save you significant money in operation monitoring by predicting utilization bottlenecks in your virtualized environment. You can also generate policy-based alerts, capacity reports and load forecasts. The product supports these virtualization platforms: - IBM Power Systems - VMware - Nutanix - Proxmox - Huawei FusionCompute - OracleVM - Oracle Solaris LDOM, CDOM, Zone - oVirt / RedHat Virtualization...
    Leader badge
    Downloads: 131 This Week
    Last Update:
    See Project
  • 12
    LDAP Account Manager
    LDAP Account Manager (LAM) is a webfrontend for managing accounts stored in an LDAP directory. You can use templates for account creation and use multiple configuration profiles. Account information can be exported as PDF file.
    Leader badge
    Downloads: 113 This Week
    Last Update:
    See Project
  • 13
    i-doit - Open Source CMDB & ITSM Tool

    i-doit - Open Source CMDB & ITSM Tool

    ITIL conform CMDB solution for documenting your entire IT landscape

    i-doit is a web based IT documentation and CMDB. i-doit documents IT-systems and their changes, defines emergency plans, displays vital information and helps to ensure a stable and efficient IT operation: The technical documentation: This means that all information can be organised (details flexibly adjusted), stored and maintained in one place. This allows simple Helpdesk, Support and Planning functions and provides the basis for quality assurance and certification. i-doit allows...
    Downloads: 29 This Week
    Last Update:
    See Project
  • 14
    VirtualHostAdd

    VirtualHostAdd

    Command-line tool for creating Apache virtual hosts on Debian 12.

    VirtualHostAdd is a command-line tool for Debian 12—and derived Linux distributions—designed to simplify the creation and configuration of virtual hosts on the Apache HTTP Server, for PHP and CGI-based applications. It automates the entire process, handling directory structure, Apache configuration, MPM and Apache modules handling, and file/directory permissions, reducing manual setup time and errors for developers and sysadmins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CID

    CID

    Insert and manage Linux computers in AD

    CID (Closed In Directory) is a set of bash scripts for inserting and managing Linux computers in Active Directory domains. Modifications made to the system allow Linux to behave like a Windows computer within AD.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 16
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    ...An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.
    Leader badge
    Downloads: 174 This Week
    Last Update:
    See Project
  • 17

    Syslogd2

    High capacity syslog data collection, filtering, and management.

    Syslogd2 is a syslog daemon that has been completely re-imagined specifically for use in network environments. It is multi-threaded, scalable and versatile with features designed for both network and host managers. Each Syslogd2 binary is customized from a set of over 20 features at compile-time. It can support input from text files, named-pipes, Linux kernel and user-defined Linux and (both IPv4 and IPv6) IP sockets (both UDP and TCP). It provides a pre-loadable name-cache that can...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18

    loadavgd

    Monitor CPU load and terminal activity, execute command when idle

    ...If the load is below a certain treshold and there is no input at any (pseudo-) terminal for a given amount of time, an action is issued. This action might be, for instance, "suspend". The D-Bus API of systemd-logind is called to invoke an action. The daemon is configured via a configuration file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    AutoArchive

    A simple backup utility

    Utility to help create backups more easily. The idea of the program is that all essential information for creating a backup is in a single file. It can use ‘tar’ for creating archives, has a command line interface, and supports incremental backups.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    openQRM - Cloud Computing Platform

    openQRM - Cloud Computing Platform

    Get latest Edition here: http://www.openqrm-enterprise.com.

    ...The Hybrid Cloud Connector in openQRM supports a range of private or public cloud providers to extend your infrastructure on demand via Amazon AWS, Eucalyptus or OpenStack. openQRM automates provisioning, virtualization, storage and configuration management, and it takes care of high-availability.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 21
    PHP-CMDB
    PHP-CMDB is a webbased Configuration Management Database (CMDB). Based on your own model you can describe configuration items and relations between. Using the graphical presentation you can browse through your environment and explore dependencies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ISPConfig Hosting Control Panel
    ISPConfig - ISP management and Hosting Control Panel. ISPConfig manages one or more webservers, mailservers, BIND DNS server, FTP servers, MySQL databases and virtual Servers with an easy to use webinterface for administrators, resellers and clients.
    Downloads: 27 This Week
    Last Update:
    See Project
  • 23
    NagiosQL - Nagios configuration tool
    NagiosQL is a professional, web based configuration tool for Nagios 2.x/3.x/4.x. It is designed for large enterprise requirements as well as small environments. Any Nagios functionalities are supported.
    Leader badge
    Downloads: 38 This Week
    Last Update:
    See Project
  • 24
    Ultimate Settings Panel

    Ultimate Settings Panel

    An all in one settings solution for a multitude of configurations.

    ...This program also includes Windows God Mode built into it for extra configuration items.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 25

    System Configuration Collector

    Collect much configuration data and record all changes in a logbook

    System Configuration Collector collects and classifies most of your UNIX/Linux/BSD configuration data in flat files called snapshots. This unique concept allows changes in snapshots of consecutive runs to be detected. These changes are added to a logbook that is helpful for administrators during troubleshooting and for auditors during audits. Snapshot and logbook are also available in HTML format.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB