docker image based off of ubuntu:18.04 for TP-Link Omada Controller to control TP-Link Omada EAP Series Wireless Access Points
latest
,4.2
- Omada Controller 4.2.x (currently 4.2.11)4.1
- Omada Controller 4.1.x (currently 4.1.5)3.2
- Omada Controller 3.2.x (currently 3.2.14)3.1
- Omada Controller 3.1.x (currently 3.1.13)3.0
- Omada Controller 3.0.x (currently 3.0.5)
latest-armv7l
,4.2-armv7l
- Omada Controller 4.2.x (currently 4.2.11)4.1-armv7l
- Omada Controller 4.1.x (currently 4.1.5)3.2-armv7l
- Omada Controller 3.2.x (currently 3.2.14)
latest-arm64
,4.2-arm64
- Omada Controller 4.2.x (currently 4.2.11)4.1-arm64
- Omada Controller 4.1.x (currently 4.1.5)3.2-arm64
- Omada Controller 3.2.x (currently 3.2.14)
If you have issues running the controller, feel free to file an issue and I will help as I can. If you are specifically having a problem that is related to the actual software, I would suggest filing an issue on the TP-Link community forums as I do not have access to source code to debug those issues. If you're not sure where the problem might be, I can help determine if it is a running in Docker issue or a software issue.
Click to expand upgrade instructions and 4.1 usage notes
The upgrade to the 4.1.x version is not a seamless upgrade and can't be done in place. You must be running at least 3.1.4 or greater before you can proceed. Instructions are available from TP-Link but many of the steps will be different due to running in a docker container. Here are the high level steps:
- Review the steps in the TP-Link instructions as some settings will not transfer to the new version.
- Take a backup of your controller as described in the upgrade procedure
- Stop your controller
- Clear your existing persistent data directories for data, work, and logs. I would recommend backing up the files so you can revert to the previous version in case of issues.
- Start your controller with the new Docker image and proceed with at least the basic setup options
- Import your backup file to the 4.1 version of the controller
- Ports - Do not change the ports for the controller or portal in the UI to ports below 1024 unless you have adjusted the unprivileged ports; for ports < 1024, see Unprivileged Ports. If you change the default port for the management interface, you should also either disable the container health check or update it to the new port.
- SSL Certificates - if you are installing your own SSL certificates, you should only manage them using one method - through the UI or by using the
/cert
volume as described below. - Synology Users - if you're using a Synology and are using the
latest
tag and update to 4.1, you will need to make sure to re-create the container due to theCMD
changing from older versions to 4.1 as Synology retains the entrypoint and command from the container as it is defined and not from the image.
Click to expand docker build instructions
As of the Omada Controller version 4.2.x, the Dockerfiles have been simplified so that there is a unified Dockerfile. There are some differences between the build steps for amd64
, arm64
, and armv7l
. These changes will happen automatically if you use the following build-args:
No build args required; set for the default build-args
docker build -f Dockerfile.v4.2.x -t mbentley/omada-controller:4.2 .
Only the ARCH
build-arg is required
docker build --build-arg ARCH="arm64" -f Dockerfile.v4.2.x -t mbentley/omada-controller:4.2-arm64 .
Both the ARCH
and BASE
build-args are required
docker build --build-arg ARCH="armv7l" --build-arg BASE="ubuntu:16.04" -f Dockerfile.v4.2.x -t mbentley/omada-controller:4.2-armv7l .
To run this Docker image and keep persistent data in named volumes:
Note: If you want to change the controller ports from the default mappings, you absolutely must update the port binding inside the container via the environment variables. The ports exposed must match what is inside the container. The Omada Controller software expects that the ports are the same inside the container and outside and will load a blank page if that is not done. See #99 for details and and example of the behavior.
docker run -d \
--name omada-controller \
--restart unless-stopped \
-p 8088:8088 \
-p 8043:8043 \
-p 8843:8843 \
-p 29810:29810 \
-p 29810:29810/udp \
-p 29811:29811 \
-p 29811:29811/udp \
-p 29812:29812 \
-p 29812:29812/udp \
-p 29813:29813 \
-p 29813:29813/udp \
-e MANAGE_HTTP_PORT=8088 \
-e MANAGE_HTTPS_PORT=8043 \
-e PORTAL_HTTP_PORT=8088 \
-e PORTAL_HTTPS_PORT=8843 \
-e SHOW_SERVER_LOGS=true \
-e SHOW_MONGODB_LOGS=false \
-e SSL_CERT_NAME="tls.crt" \
-e SSL_KEY_NAME="tls.key" \
-e TZ=Etc/UTC \
-v omada-data:/opt/tplink/EAPController/data \
-v omada-work:/opt/tplink/EAPController/work \
-v omada-logs:/opt/tplink/EAPController/logs \
mbentley/omada-controller:4.2
docker run -d \
--name omada-controller \
--restart unless-stopped \
--net host \
-e MANAGE_HTTP_PORT=8088 \
-e MANAGE_HTTPS_PORT=8043 \
-e PORTAL_HTTP_PORT=8088 \
-e PORTAL_HTTPS_PORT=8843 \
-e SHOW_SERVER_LOGS=true \
-e SHOW_MONGODB_LOGS=false \
-e SSL_CERT_NAME="tls.crt" \
-e SSL_KEY_NAME="tls.key" \
-e TZ=Etc/UTC \
-v omada-data:/opt/tplink/EAPController/data \
-v omada-work:/opt/tplink/EAPController/work \
-v omada-logs:/opt/tplink/EAPController/logs \
mbentley/omada-controller:4.2
Example usage for armv7l
docker run -d \
--name omada-controller \
--restart unless-stopped \
-p 8088:8088 \
-p 8043:8043 \
-p 8843:8843 \
-p 29810:29810 \
-p 29810:29810/udp \
-p 29811:29811 \
-p 29811:29811/udp \
-p 29812:29812 \
-p 29812:29812/udp \
-p 29813:29813 \
-p 29813:29813/udp \
-e MANAGE_HTTP_PORT=8088 \
-e MANAGE_HTTPS_PORT=8043 \
-e PORTAL_HTTP_PORT=8088 \
-e PORTAL_HTTPS_PORT=8843 \
-e SHOW_SERVER_LOGS=true \
-e SHOW_MONGODB_LOGS=false \
-e SSL_CERT_NAME="tls.crt" \
-e SSL_KEY_NAME="tls.key" \
-e TZ=Etc/UTC \
-v omada-data:/opt/tplink/EAPController/data \
-v omada-work:/opt/tplink/EAPController/work \
-v omada-logs:/opt/tplink/EAPController/logs \
mbentley/omada-controller:4.2-armv7l
docker run -d \
--name omada-controller \
--restart unless-stopped \
--net host \
-e MANAGE_HTTP_PORT=8088 \
-e MANAGE_HTTPS_PORT=8043 \
-e PORTAL_HTTP_PORT=8088 \
-e PORTAL_HTTPS_PORT=8843 \
-e SHOW_SERVER_LOGS=true \
-e SHOW_MONGODB_LOGS=false \
-e SSL_CERT_NAME="tls.crt" \
-e SSL_KEY_NAME="tls.key" \
-e TZ=Etc/UTC \
-v omada-data:/opt/tplink/EAPController/data \
-v omada-work:/opt/tplink/EAPController/work \
-v omada-logs:/opt/tplink/EAPController/logs \
mbentley/omada-controller:4.2-armv7l
Example usage for arm64
docker run -d \
--name omada-controller \
--restart unless-stopped \
-p 8088:8088 \
-p 8043:8043 \
-p 8843:8843 \
-p 29810:29810 \
-p 29810:29810/udp \
-p 29811:29811 \
-p 29811:29811/udp \
-p 29812:29812 \
-p 29812:29812/udp \
-p 29813:29813 \
-p 29813:29813/udp \
-e MANAGE_HTTP_PORT=8088 \
-e MANAGE_HTTPS_PORT=8043 \
-e PORTAL_HTTP_PORT=8088 \
-e PORTAL_HTTPS_PORT=8843 \
-e SHOW_SERVER_LOGS=true \
-e SHOW_MONGODB_LOGS=false \
-e SSL_CERT_NAME="tls.crt" \
-e SSL_KEY_NAME="tls.key" \
-e TZ=Etc/UTC \
-v omada-data:/opt/tplink/EAPController/data \
-v omada-work:/opt/tplink/EAPController/work \
-v omada-logs:/opt/tplink/EAPController/logs \
mbentley/omada-controller:4.2-arm64
docker run -d \
--name omada-controller \
--restart unless-stopped \
--net host \
-e MANAGE_HTTP_PORT=8088 \
-e MANAGE_HTTPS_PORT=8043 \
-e PORTAL_HTTP_PORT=8088 \
-e PORTAL_HTTPS_PORT=8843 \
-e SHOW_SERVER_LOGS=true \
-e SHOW_MONGODB_LOGS=false \
-e SSL_CERT_NAME="tls.crt" \
-e SSL_KEY_NAME="tls.key" \
-e TZ=Etc/UTC \
-v omada-data:/opt/tplink/EAPController/data \
-v omada-work:/opt/tplink/EAPController/work \
-v omada-logs:/opt/tplink/EAPController/logs \
mbentley/omada-controller:4.2-arm64
Variable | Default | Values | Description |
---|---|---|---|
MANAGE_HTTP_PORT |
8088 |
1024 -65535 |
Management portal HTTP port; for ports < 1024, see Unprivileged Ports |
MANAGE_HTTPS_PORT |
8043 |
1024 -65535 |
Management portal HTTPS port; for ports < 1024, see Unprivileged Ports |
PORTAL_HTTP_PORT |
8088 |
1024 -65535 |
User portal HTTP port; for ports < 1024, see Unprivileged Ports |
PORTAL_HTTPS_PORT |
8843 |
1024 -65535 |
User portal HTTPS port; for ports < 1024, see Unprivileged Ports |
SHOW_SERVER_LOGS |
true |
[true|false] |
Outputs Omada Controller logs to STDOUT at runtime |
SHOW_MONGODB_LOGS |
false |
[true|false] |
Outputs MongoDB logs to STDOUT at runtime |
SMALL_FILES |
false |
[true|false] |
See Small Files for more detail; deprecated in 4.1.x |
SSL_CERT_NAME |
tls.crt |
any | Name of the public cert chain mounted to /cert ; see Custom Certificates |
SSL_KEY_NAME |
tls.key |
any | Name of the private cert mounted to /cert ; see Custom Certificates |
TZ |
Etc/UTC |
<many> | See Time Zones for more detail |
Note: This only applies to tags for 3.1.x
and 3.0.x
as the 3.2.x
and newer versions manage the permissions for you.
If you utilize bind mounts instead of Docker named volumes (e.g. - -v /path/to/data:/opt/tplink/EAPController/data
) in your run command, you will want to make sure that you have set the permissions appropriately on the filesystem otherwise you will run into permissions errors and the container will not run because it won't have the permissions to write data since this container uses a non-root user. To resolve that, you need to chown
the directory to 508:508
on the host as that is the UID and GID that we use inside the container. For example:
chown -R 508:508 /data/omada/data /data/omada/work /data/omada/logs
By default, Omada software uses self-signed certificates. If however you want to use custom certificates you can mount them into the container as /cert/tls.key
and /cert/tls.crt
. The tls.crt
file needs to include the full chain of certificates, i.e. cert, intermediate cert(s) and CA cert. This is compatible with kubernetes TLS secrets. Entrypoint script will convert them into Java Keystore used by jetty inside the Omada SW. If you need to use different file names, you can customize them by passing values for SSL_CERT_NAME
and SSL_KEY_NAME
as seen above in the Optional Variables section.
Warning - As of the version 4.1, certificates can also be installed through the web UI. You should not attempt to mix certificate management methods as installing certificates via the UI will store the certificates in MongoDB and then the /cert
volume method will cease to function.
In Omada 3.2 and older, this image uses the default mongodb settings for journal files. If disk space is an issue, you can set the SMALL_FILES
variable to true
which will add --smallfiles
to the startup arguments for MongoDB.
Warning - As of the version 4.1 and newer, MongoDB utilizes the WiredTiger
storage engine by default which does not have the same journal file size issue as the MMAPv1
storage engine. If SMALL_FILES
is set to true
, a warning will be issued at startup but startup will still proceed.
By default, this image uses the Etc/UTC
time zone. You may update the time zone used by passing a different value in the TZ
variable. See List of tz database time zones for a complete list of values in the TZ database name
table column.
This Docker image runs as a non-root user by default. In order to bind unprivileged ports (ports < 1024 by default), you must include --sysctl net.ipv4.ip_unprivileged_port_start=0
in your docker run
command to allow ports below 1024 to be bound by non-root users.