Kamal offers zero-downtime deploys, rolling restarts, asset bridging, remote builds, accessory service management, and everything else you need to deploy and manage your web app in production with Docker. Originally built for Rails apps, Kamal will work with any type of web app that can be containerized. Kamal seeks to bring the advance in ergonomics pioneered by these commercial offerings to deploying web apps anywhere. Whether that’s low-cost cloud options without the managed-service markup from the likes of Digital Ocean, Hetzner, OVH, etc, or it’s your own colocated bare metal. To Kamal, it’s all the same. Feed the config file a list of IP addresses with vanilla Ubuntu servers that have seen no prep beyond an added SSH key, and you’ll be running in literally minutes.

Features

  • Deploy web apps anywhere
  • Kamal is released under the MIT License
  • Kamal is meant to compress the complexity of going to production using open source tooling
  • You can have your web app deployed on several clouds at ease
  • Kamal will work with any type of web app that can be containerized
  • Documentation available

Project Samples

Project Activity

See All Activity >

Categories

Deployment

License

MIT License

Follow Kamal

Kamal Web Site

Other Useful Business Software
Attack Surface Management | Criminal IP ASM Icon
Attack Surface Management | Criminal IP ASM

For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Kamal!

Additional Project Details

Programming Language

Ruby

Related Categories

Ruby Deployment Tool

Registered

2024-09-03