2025-11-06
Jitsi Meet is an open videoconferencing platform that easily integrates with Active Directory (AD). Such integration allows using corporate accounts for login, simplifying administration and improving security.
In this guide we’ll go through how to connect Jitsi Meet (in Docker) to AD based on Windows Server 2016, and show proven debugging methods that help avoid common errors.
Important: using LDAP without encryption is insecure. For testing this is acceptable, but in production you must use LDAPS (port 636) with valid certificates.
2025-11-05
How to run Jitsi Meet (Docker) behind an Nginx Reverse Proxy
In the previous article we deployed a basic Jitsi Meet server using Docker.
This is a great way to quickly start video conferencing, but in production a Jitsi server often needs to run on the same host where other web applications are already running.
To keep everything peaceful, you should hide Jitsi behind an Nginx reverse proxy.
Nginx will take care of SSL, ports 80/443 and will proxy requests to the Jitsi containers running on internal ports.
2025-10-14
Local Telegram Bot API allows developers to run their own API server, providing significant advantages for handling large files, performance, and configuration flexibility. However, to understand the need for a local server, it’s important to consider the limitations of the standard Telegram Bot API that works via an HTTPS interface. In this article we’ll review the benefits of the Local Bot API, the limitations of the standard approach, and steps to set up a local server via Docker, including registering a bot to use with it.
2025-10-01
Problem
In some regions, access to Telegram may be unstable or completely blocked.
Using public proxies or VPNs is not always convenient: they can be slow, overloaded, or also blocked.
Task
🚀 Create your own fast and reliable proxy, register it in Telegram to track statistics, and optionally make it public.
Solution Choice: Docker + Official MTProto Image
Why Docker?
Docker allows you to run the proxy in an isolated container without installing unnecessary dependencies on the server. It’s clean, secure, and incredibly fast.
The docker-compose.yml file describes the entire configuration in one place, making the launch and management process trivial.
2025-09-24
There was a task to get n8n, redis and the database working. I had previously ordered from another contractor, it kept breaking all the time. Ordered from Mikhail, the next day everything started working fast, like clockwork!
Response: Thank you for the feedback!
Glad to help!
2025-09-10
In the previous article, we deployed a basic Jitsi Meet server using Docker.
Now let’s look at how to secure your server, enable authentication, and optimize performance for stable video calls.
Authentication: Invite-Only Access
By default, Jitsi Meet allows anyone to create rooms. To restrict access — enable Secure Domain.
- Open the
.env file and find the Prosody (XMPP server) section.ENABLE_AUTH=1
AUTH_TYPE=internal
Here, internal means that users will be stored locally.
2025-09-09
Want to set up your own fully private video conferencing server?
Jitsi Meet is a great choice, and installing it with Docker is the fastest and most reliable way. This article provides a step-by-step guide to get your server up and running in just a few minutes.
Step 1: Preparation
Before installing, make sure you have:
- A Linux server (e.g., Ubuntu).
- A domain name pointing to your server’s IP (e.g.,
meet.your-domain.com). - Installed Docker and Docker Compose.
👉 If Docker isn’t installed yet — use the instructions from the previous article.
2025-09-06
Thank you for the quick and good work. Everything was done promptly and as needed!
Answer: Thank you for the feedback!
Glad to help!
2025-09-05
Introduction
Unlike Caddy, which focuses on simplicity, Traefik (pronounced Traffic) was built to solve one specific task: routing traffic in dynamic environments.
It is a reverse proxy and load balancer designed specifically for Docker, Kubernetes, and other orchestrators.
The main difference from Nginx is not static configuration, but the ability to automatically discover and serve services.
Key Concepts: Dynamic Configuration
The philosophy of Traefik is built on the principle of Service Discovery.
2025-09-05
Introduction
Logrotate is a powerful tool for log management in Linux, but its interaction with Docker has its own specifics.
This guide explains how to properly use logrotate with Docker containers and when it’s better to rely on Docker’s built-in log management tools.
Docker Containers and Logs
Docker collects logs from the standard output streams (stdout and stderr) of containers and, by default, stores them as JSON files:
/var/lib/docker/containers/\<container\_id>/\<container\_id>-json.log
If a container generates a lot of logs, these files can take up gigabytes and quickly consume all available disk space.